Friday, July 29, 2011

No link between cell phone use and cancer

A new study published in the “Journal of the National Cancer Institute” says that there is no correlation between cell phone usage and the risk of developing brain tumours. To reach their conclusion the researchers studied the effect of radiation upon 1000 participants, many of whom were children, as the younger users are thought to be more prone to phone emissions.

Cell phone usage by children has soared during the last two decades, and according to some surveys, most youths start using mobile phones by age 9 or 10. As children have a developing nervous system, some scientists in the past have suggested that cell phone emissions could penetrate deeper into their brains. Studies have indicated that the outer brain tissue of children ages 5 to 8 may absorb twice the amount of cell phone energy absorbed by adult brains.

However, the public health data in USA and Europe does not show any corresponding rise in brain tumours in children. This is despite the fact that radiation from devices has become a fact of everyday life in urban areas. Martin Roosli, lead author of the study and an epidemiologist at the Swiss Tropical and Public Health Institute in Basel, says, “The latest research shows that a large and immediate risk of cell phones causing brain tumours in children can be excluded.”

Last year WHO (World Health Ogranisation) had concluded that cell phones were “possibly carcinogenic” to humans. However, even that technical classification did not link cell phones directly to cancer. Now the present study refutes the basic premise of the WHO report. The cell phones have been in use for almost two decades and there is little evidence to conclusively link their use to major health problems, such as the development of brain tutors.

To beat stress play video game

To most of us a video game would conjure the impression of adrenalin packed entertainment, where you blow up entire spaceships full of evil aliens, and battle all kinds of monsters. However, new age guru Deepak Chopra seems to dwell on some other kind of video game. His idea of a video game is of something that is so serene and peaceful that it will help people relieve stress and achieve inner harmony.

With that lofty ambition in mind, he has spent the last three years, designing a video game called “Leela.” This game uses the ancient Hindu system of Chakras to teach gamers how to achieve a peaceful and focussed state of mind. THQ is the publisher of the game, which has been developed by Curious Pictures. Leela is set to make a debut in November and it is being marketed under the tag line – “A journey into the self.”

You will need Microsoft's Kinect system for Xbox 360 or Nintendo's Wii console to have a soothing tryst with Leela. Incidently, the word Leela means “play” in Sanskrit. The game subsumes 43 interactive exercises that focus on the seven energy centres of the human body. Naturally, Deepak Chopra’s spiritual teachings and philosophies have a central role to play in the game.

According to sources, Kinect users will be required to use their arms, legs, hips, and head to perform meditative tasks, while Wii players will use the hand-held controller.

Thursday, July 28, 2011

Reasons why a Company should outsource their IT to a data center

 

  • 1) Reduce or Control Costs. The primary reason (44% of respondents) to outsource data center functions is probably no surprise: to reduce or control costs. Co-location and dedicated server hosting are "Cap-Ex" free alternatives that can eliminate large-scale data center investments. Colocation enables CIOs to expand their data center footprint only on an as-needed basis rather than invest in an entire expansion up front.

  • 2) Gain Access to Outside IT Resources. The second most compelling reason companies are outsourcing their data centers is the ability to leverage the people, processes and equipment that aren't available internally. CIOs can get access to very experienced data center staff that are shared across a "multi-tenant" data center environment without needing to hire their own full time experts in networking, security, cooling, power and data center services.

  • 3) Free Up Internal Resources. Over three out of 10 respondents said they outsource their data center functions to free internal resources. By reducing the day-to-day maintenance chores, the in house IT team can concentrate on core applications and deliverables and leave the day-to-day data center operations to the colocation or dedicated server hosting operator.

  • 4) Improve Customer Focus. Another 3 out of 10 respondents outsourced data center functions to improve business or customer focus. It can be hard to keep in house staff motivated to service other departments. With competing requirements and many demands, responsiveness can be impacted. Outsourced data center operators are in the service business. They keep their customers by being responsive and accurate, and realize that poor service can hinder their business and profitability.

  • 5. Accelerate Company Transformation is a reason for outsourcing any number of functions. Outsourcing non-critical functions can help keep the organization focused on critical roles during time of transformation

  • 6. Accelerate Data Center Projects. According to an article in SearchCIO, once you determine how serious or urgent your data center problems are, quick fixes in critical areas like uptime, availability and cost efficiencies can be achieved within months via outsourcing versus an internal build out that can take years.

  • 7. Access Outside Management Expertise. The ability to leverage management expertise not available internally rounds out the top 7 reasons companies outsource their data centers. Managed data center management teams are focused day-in and day-out on delivering data center capabilities to their clients efficiently and with a high level of service. By managing multiple large data centers, they can apply industry best practices that are difficult or expensive for individual companies to apply to their own internal data centers.

  • Staff Computer and Internet Statistics

     

    Staff Computer and Internet Abuse Statistics

    · 70% of all web traffic to Internet pornography sites occurs during the work hours of 9am-5pm.

    · 58% of industrial espionage is perpetrated by current or former employees.

    · 48% of large companies blame their worst security breaches on employees.

    · 46% of the one thousand largest companies globally will be utilizing IM as a daily communications tool.

    · 64% of employees say they use the Internet for personal interest during working hours

    · 70% of all Internet porn traffic occurs during the nine-to-five work day.

    · 37% of workers say they surf the Web constantly at work.

    · 77.7% of major U.S. companies keep tabs on employees by checking their e-mail, Internet, phone calls, computer files, or by videotaping them at work.

    · 63% of companies monitor workers' Internet connections and 47% store and review employee e-mail.

    · 27% of companies say that they've fired employees for misuse of office e-mail or Internet connections, and 65% report some disciplinary measure for those offenses.

    · 90% of employees feel the Internet can be addictive, and 41 percent admit to personal surfing at work for more than three hours per week.

    · 60% of Security Breaches occur within the Company - behind the Firewall

    · 25% of corporate Internet traffic is considered to be "unrelated to work".

    · 30-40% of lost productivity is accounted for by cyber-slacking.

    · 32.6% of workers surf the net with no specific objective; men are twice as likely as women.

    · 27% of Fortune 500 organizations have defended themselves against claims of sexual harassment stemming from inappropriate email.

    · 90% of respondents (primarily large corporations and government agencies) detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million.

    The Bottom Line

    Companies that do not conduct policy training or monitor internal messages can be putting themselves at risk. In 2003, oil company Chevron USA paid $2.2 million to settle a sexual harassment lawsuit over its email content.

    Most studies show 70% of companies have had sex sites accessed using their network.

    Some estimates reveal that computer crime may cost as much as $50 billion per year.

    Around 80% of computer crime is committed by "insiders". They manage to steal $100 million by some estimates; $1 billion by others.

    The average fraud inflicts a loss of about $110,000 per corporate/organization victim, and $15,000 to each individual victim.

    Traditionally, employers have been responsible and liable for the actions of their employees in the workplace. However, if an organization can demonstrate a "duty of care" to reduce unacceptable employee activity, then it could minimize it's potential for liability.

    Office Productivity Loss

     

    Office productivity is fundamental to controlling labor costs and maximizing your company’s resources. As you know, time is money. Every minute spent off task is negatively affecting your bottom line. Every minute your staff is aimlessly browsing the Internet or chatting with friends affects your bottom line.

    The Internet is a huge distraction for your staff. Employees are wasting valuable company time by surfing inappropriate web sites (Facebook, pornographic, shopping, sports, MySpace, auctions, etc…), sending/receiving personal email, talking to friends or spouse via online chat, downloading illegal software and music and a multitude of other time wasting activities.

    Do you want to know what they are doing? An office computer monitoring program will let you know how much time they are wasting online.

    Taking charge of how your employees use the Internet and eliminating excessive non-business Internet activity will increase productivity and produce significant cost savings. Additionally, observing the ongoing performance of your employees will provide you with valuable information about how to improve their effectiveness on the job.

    Imagine the look on their faces when you show them a log of their Internet activities during a performance evaluation.

    Productivity Loss

    Productivity loss due to extracurricular Internet activity is dangerous. Unlike an attack, this threat can rarely be isolated to a particular time or place, and it persistently undermines the performance of both people and equipment in a variety of ways.

    Losses result from:

    · Personal Email

    · Online Gaming

    · Instant messaging and peer-to-peer programs

    · Chat Rooms

    · Non-work related web surfing (e.g., Facebook, auctions, pornography, personal finance, MySpace)

    · Chain letters, hoaxes and other e-mail content

    These online distractions are difficult to resist but easy to monitor. They reduce network bandwidth and waste disk space. And the effects are compounded. People usually rely on other people to get work done - just as they rely on network availability. When one person uses the Internet inappropriately, others suffer as well. So does your bottom line!

    The Bottom Line

    According to IT research firm Gartner, non-work-related Internet surfing results in an estimated 40% productivity loss each year for American businesses. Even more dangerous are the legal ramifications of viewing unauthorized or pornographic content in the workplace. Companies both large and small risk heavy fines for allowing their employees to view this content at work. Implementing an effective Web-filtering solution can help eliminate the legal liability and associated loss of productivity that results when employees view unauthorized content.

    According to a recent Gallup poll, the average employee spends over 75 minutes per day using office computers for non-business related activity. That translates into an annual loss of $6250 per year, per employee. An average mid-size company of 500 employees could be expected to lose $3.25 million in lost productivity due to Internet misuse.

    There is a huge cost for inappropriate Internet use. Just 20 minutes a day of inappropriate Internet use can cost a 100-employee company over $8,000 per week. (Assuming $50 per hour per employee.) That is not even factoring in compounding effects.

    Tuesday, July 26, 2011

    Dare to lead?

    Many of us believe that if we work hard, meet targets and keep on delivering results consistently, we will be on our way to becoming a true leader.

    It would be great, if this was true. Unfortunately, it is not! So, what do we need to do besides working hard and accomplishing our goals? Here is a list of actionable points that I have seen many successful people implement in their career.

    Demonstrate honesty, courageWalking the talk is the key trait to becoming a leader. You need to have the ability to articulate what you think and then to execute it as well. Be truthful and honest to yourself and your employer.

    Display positive temperamentAlways play positive and hard irrespective of the state of the market. I have seen many people demonstrate capabilities when things go well and struggle when they don’t.  Then again, I have also seen people failing to handle the risks of exponential growth.

    Learn to balance the tide.Be all that you can be, influence othersSimply put, drive your career and growth by being earnest about your strengths and areas of improvement and constantly exploring the unknown in terms of new projects or career opportunities. It is always good to seek feedback from peers and managers, and strive for self-development, influencing others in the process.

    Involve yourself, communicateGet involved in all aspects of the work you do viz, when someone needs help, when there is a crisis or when there is a situation where no leadership is being shown. This will make you stand out.

    Live in the presentMake sure you know what is happening in the industry you are working in, what are the trends and how external events influence your workplace. Leaders appreciate people who are well-informed and in sync with the developments around.

    Plan for the futureOne consequence of failing to live in the present is that you risk a setback that you could have anticipated. The fact is, if it is not in your nature to anticipate, then you normally would not. But you should at least try and learn. Those constantly looking around for trends are normally best suited for leadership.

    Collaborate and cooperateIt is surprising how many individuals still resist collaboration or sharing credit, even though we know how much more we can achieve when we bring everyone together to solve a problem, or celebrate a victory. As teams become more dispersed, collaboration is mandatory for leadership.Show initiativeThere is no way of knowing how challenging a new project or assignment will be. So, individuals are often reluctant to be associated with an untested idea. Showing positive temperament and taking risk at that time demonstrates you are not bound by what exists but are open to innovation and trying new things.

    What I have shared with you are key characteristics of a good leader. In fact, as you evaluate your own leadership skills, try to find out what is it that you need to focus your energies on. You may also want to find out how influential you are among your peers and team-members.While I am sure each organisation and team has a vision, as a leader, it is important to assess whether you are doing enough to lead others to achieve that vision. Also, introspect whether you need to work on being a person of character and setting a good example for others? What is your level of enthusiasm and have you learned from past failures? Are you making a commitment to life-long learning?Welcome to leadership!

    via Dare to lead?-ITNEXT.

    To be a CIO, think like one

    Everybody yearns for professional growth and promotion. I’m sure you as an IT manager also aspire to be in the CIO’s role at some point in your career, sooner the better.In today’s agile organisations, experience and knowledge alone do not guarantee a journey to the top of the IT organisation ladder. There are other important factors that distinguish a budding CIO from the rest of IT managers.Sure, ambition is one of the important factors. Yet, in the course of my long professional career, I have seen many ambitious and technically competent persons who did not succeed in making it to the big club.Often, I have pondered over the subject and have come to believe that while ambition is important, there is a trait more that is perhaps even more important. That’s attitude or the mindset. It plays a very vital role in developing leadership traits in a person.What exactly is attitude and how does one get it?Well, attitude can be defined as a behavioural trait of individuals as which they come to exhibit as they carry out day-to-day affairs at work or at home.Often these traits are either genetically coded or imbibed early in life, at home and during the school days. These traits mean that faced by the same set of problems, different people react differently. While some take a problem as an opportunity many others tend to see it as a challenge. Now that is what I call an attitude.How do you get an attitude, or the right attitude? Like I said, part of it is encoded and part of it is imbibed. So go, work on it, if you lack it. Let me illustrate.The CIO’s role has changed dramatically over the past decade or so. No longer is he the technologist who looks after the company’s IT infrastructure.The CIO is now more of a confidante of the CEO, who keeps finding new ways to increase the top-line while working to reduce the expenses. The CIO today is a business leader, who is often a face of the organisation dealing with customers, vendors and employees.Thus IT managers must not only have sound technology knowledge, they should have good people management skills. They also need to measure actions in terms of financial considerations and scales like RoI and TCO.  So, how will you know that you are ready?Actually, it’s not very difficult. Keep weighing yourself on the ASK scale—attitude, skill and knowledge. While knowledge and skill can be gained over a period of time, one needs to consciously work to acquire the right attitude.Just like a good mentor can help you pick up skills fast, a mentor can give you tips to develop the right attitude too. And most often, an indulgent boss is a good mentor too. So if you have such a boss, maybe you have already got what you need.Once you have imbued the right attitude too, it is often a matter of time that you step into the CIO’s shoes. Remember that to be a CIO, you have to think like one.

    via To be a CIO, think like one-ITNEXT.

    What chokes my Internet?-ITNEXT

    What chokes my Internet?-ITNEXT.

    Cloud Computing need standard exit strategies-ITNEXT

    Cloud Computing need standard exit strategies-ITNEXT.

    Saturday, July 9, 2011

    Skype to power video chat on Facebook

    Few days ago, the Facebook CEO Mark Zuckerberg had titillated his audience on the Internet by claiming that the social networking giant would be announcing something awesome soon.

    http://www.itnext.in/content/skype-power-video-chat-facebook.html