Tag Archive for Business

Sitting Is the Smoking of Our Generation

Sitting Is the Smoking of Our GenerationNilofer Merchant recently posted the article Sitting Is the Smoking of Our Generation at Harvard Business Review. In the article, Ms. Merchant argues that the amount of time spent sitting in meetings and watching TV has a negative impact on our health, akin to the preventable risk of smoking.

The author says people spend more time sitting than anything else throughout the day. She cites some statistics: “… we sit more than we do anything else. We’re averaging 9.3 hours a day, compared to 7.7 hours of sleep. Sitting is so prevalent and so pervasive that we don’t even question how much we’re doing it. “

There are big problems caused by sitting according to the article, health studies conclude that people should sit less, and get up and move around.

  • After 1 hour of sitting, the production of enzymes that burn fat declines by as much as 90%.
  • Extended sitting slows the body’s metabolism affecting things like (good cholesterol) HDL levels in our bodies.
  • Lack of physical activity is directly tied to 6% of the impact for heart diseases, 7% for type 2 diabetes, and 10% for breast cancer, or colon cancer.

The New York Times reported on another study, published last year in the journal Circulation that looked at nearly 9,000 Australians and found that for each additional hour of television a person sat and watched per day, the risk of dying rose by 11%. In that article, a doctor is quoted as saying that excessive sitting, which he defines as nine hours a day, is a lethal activity.

The author points out some trends to combat the negative impacts of sitting. The first is the mainstreaming of the standing desk. She concludes that, while it gets you off your duff, won’t help you get real exercise.

Additionally, Ms. Merchant describes a change she has made to her routine. “… I switched one meeting from a coffee meeting to a walking meeting… I now average four such meetings, and 20 to 30 miles each week.”

She also cites the work of James Fowler and Nicholas Christakis’s, book Connected. They observed that obesity spreads according to network effects; if your friend’s friend’s friend who lives a thousand miles away gains weight, you’re likely to gain weight, too. And if that extended friend also loses weight, even if you’re not in the same city, you’re likely to lose weight, too. Her goal, ” is to be someone who socializes the idea that physical activity matters, and that we each matter enough to take care of our health.”

The author says that her walking meetings had some unanticipated side benefits. She reports walking helps her listen to her participants. “… I can actually listen better when I am walking next to someone than when I’m across from them in some coffee shop. There’s something about being side-by-side that puts the problem or ideas before us, and us working on it together.”

Secondly, she reports that the meetings are more focused, because the iTimeWasters stay in the pocket, “the simple act of moving also means the mobile device mostly stays put away. Undivided attention is perhaps today’s scarcest resource, and hiking meetings allow me to invest that resource very differently.”

listen betterThe authors claim that the results of these off-beat meetings are positive.  “The number one thing I’ve heard people say is “That was the most creative time I’ve had in a long time” And that could be because we’re outside, or a result of walking. Research certainly says that walking is good for the brain.”

rb-

The author concludes that if you want to get out of the box thinking, you need to literally get out of the box.

If nothing else, when sitting for long periods, standing up every 20 minutes produces significant positive health benefits. I wrote about the link between inactivity and health back in 2009.

Do you believe that sitting to the smoking of our generation?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

5 Odd Tech Predictions

5 Odd Tech PredictionsJulie Bort at the BusinessInsider found some really interesting ideas buried within this prediction season’s avalanche of humdrum thoughts. She shared them in the hope they will become self-fulfilling prophecies.

Software as a Service -SaaS1. Bad guys start offering “hacking as a service” – Security company McAfee says that criminal hackers have begun to create invitation-only forums requiring registration fees. The author speculates that these forums could become some sort of black-market software-as-a-service. Pay a monthly fee and your malware is automatically updated to the latest attack. Don’t pay, and it would be a shame if something happened to your beautiful website …

Mobile ransomware2. Bad guys try to kidnap your smartphone – Hackers have become fond of a form of malware called “ransomware.” It’s a popular way to harass people who view Internet porn. While visiting a porn site, bad guys plant malware on a computer that threatens to report the computer user to the police unless they pay up.

In 2013, the article says the trend will be to hold your smartphone hostage. Hackers will sneak malware onto smartphones and then make you pay if you don’t want all the data on your phone destroyed or leaked. So thinks Chiranjeev Bordoloi, the CEO of security vendor Top Patch.

Fake meat3. Fake meat becomes a real thing – Vegetarians have been manipulating vegetable protein to make it look a little like meat and taste nothing like it. But now BusinessInsider says the race is on to produce fake meat like bacon in much more technically advanced ways.

Dutch researchers have found a way to “grow hamburger” in the laboratory from just a few bovine stem cells. Tech investors have funded companies that will create food from plants. Stealthy startup Sand Hill Foods is one such company on investors’ watch list. Beyond Meat, a startup funded by Twitter cofounders Ev Williams and Biz Stone, makes realistic fake chicken and will ramp up availability in 2013.

Your smartphone will be your personal nurse4. Your smartphone will be like a personal nurse – Ms. Bort reports there is a healthcare revolution headed to your smartphone. IBM (IBM) has promised that one day soon doctors will use tech that will scan your body. They will send that data to the cloud for a diagnosis. Companies are developing smartphones with biosensors that do everything from check your blood sugar to detect the flu. Apple (AAPL) has promoted the iPhone as a platform for health technology since 2009, but some new devices are just coming to fruition.

tech you use for work will be fun5. The technology you use for work will be as much fun as the stuff you use at home – Most of us are so used to tech at work being a source of frustration that we can’t imagine a different world. But the author predicts that’s changing. In 2013, tablets will lead software to be redesigned for touch interfaces—which will make it fun and easy to use, more like a game than a spreadsheet. Best of all, more companies are adopting tech that lets you download a “virtual work desktop” on any device, simply by logging in on a Web browser or launching a mobile app.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Internet of Things

Internet of ThingsAdding computer communication to otherwise dumb devices isn’t new. As far back as the 1990s, a whole list of Internet-enabled Coke machines around the world had varying functionality. The granddaddy of all Internet of Things was the Coke machine at Carnegie Mellon University, set up in the 1970s.

Internet of Things vulnerable to false data injection

Smart meters vulnerable to false data injectionThe power grid delivers electricity to charge iPads and run data centers. The power grid connects users with electricity producers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to ensure reliable power grid operation. The analysis of smart meter measurements and power systems is a routine part of system monitoring.

Help Net Security reports that most energy security professionals told nCircle they did not believe smart meters are secure enough. When asked, “Do smart meter installations have enough security controls to protect against false data injection?” 61% of the 104 energy security professionals said “no”. False data injection attacks introduce arbitrary errors into state variables while bypassing existing techniques for bad measurement detection to exploit the power grid.

Patrick Miller, the founder, CEO, and president of EnergySec noted, “Smart meters vary widely in capability and many older meters were not designed to adequately protect against false data injection. It doesn’t help that some communication protocols used by the smart meter infrastructure don’t offer much protection against false data injection either.”

… we need to make sure that all systems that process usage data, especially those that make autonomous, self-correcting, self-healing decisions, assure data integrity,” Miller added.

Related articles
  • Not-so-smart meters costly | Herald Sun

Railroad Sensors Predict Derailments Wirelessly

Railroad Sensors Predict Derailments WirelesslyUnion Pacific (UNP), the nation’s largest railroad company, has deployed Internet of Things technology throughout its network. according to Dailywirless.org, the IoT can predict certain kinds of derailments days or weeks before they are likely to occur. This will improve safety and avoid millions of dollars in damages.

According to the article, Union Pacific, which moves 900 trains a day, started using acoustic sensors 10 years ago to monitor noises from vibrations of ball bearings in train wheels. This allows the company to get trains off the track before a faulty bearing causes a derailment. More recently, the company started using visual sensors that can detect when wheels begin to flatten–another factor that can cause accidents on the rails.

Lynden Tennison, CIO at Union Pacific, told CIO Journal, that the company can now check 40 million patterns every day and can alert the train operators of any anomaly in a bearing within five minutes. “Our goal was to design a system that requires very little maintenance,” he said.

To do this, Union Pacific worked with Intel (INTC) which addressed some of the unique challenges of designing a wireless sensor network for a rail system (pdf). The blog states that to overcome the battery-life issues, Millennial Net paired its i-Bean wireless technology with “energy harvesting” technology from startup Ferro Solutions. An inductive vibration generates power to send [battery free] at 115 Kbps over a distance of 30 m,” said Tod Riedel, cofounder and vice president of business development at Millennial Net.

Related articles

Are you ready for appliances that are smarter than you?

LG Smart Thinq refrigeratorStacey Higginbotham at GigaOM asks “Are you ready for appliances that are smarter than you?” She points out that LG has introduced its first connected appliance, a Smart Thinq refrigerator that knows what’s inside it. The appliance can communicate with your phone. Your kitchen is about to get a similar level of connectivity as your living room.

The Smart Thinq refrigerator got a lot of press at the Consumer Electronics Show in Las Vegas as smart appliances were all the rage. The Android-based OS that enabled the fridge to communicate with your smartphone and share information like the contents of the fridge excited the press. The idea, according to the author, was that when someone got home from the grocery store they could choose to tell the fridge what was inside using a touchscreen or they could scan a bar code on their receipt that would contain the information about their purchases.

In this ideal world, the fridge would then be able to suggest recipes for the family based on their weight goals, age, gender, and whatnot. If the consumer selected a fridge-offered recipe the appliance could shoot the recipe to the Smart Thinq oven and it could preheat. All of the connectivity occurs via Wi-Fi and is controlled by the phone and the touchscreen.

The article explains that other features include such as calorie counting and notifications of expiration dates. And if grocery stores take part – then the fridge could show when certain items are out and order them for home delivery.

Is Your Dishwasher Really Yearning for the Internet?

Is Your Dishwasher Really Yearning for the Internet?Is Your Dishwasher Really Yearning for the Internet? A startup called Ube thinks so. The firm is betting that smart devices and smartphone apps will make home automation cheap and easy.

In MIT’s Technology Review article “Is Your Dishwasher Really Yearning for the Internet?” Glen Burchers Ube’s chief marketing officer says that more and more home gadgets will ship with microprocessors, enabling the automation and remote control of everything from your lights to your laundry. Until this is a widespread reality, he’d like to sell you a wall outlet.

The wall outlet includes an ARM processor, runs Google’s Android mobile operating system, and can connect to the Internet. This means anything you plug into it can be controlled via your smartphone, and it will also track how much power your devices are consuming.

According to TR, the startup plans to sell the outlet along with a “smart” dimmer switch and plug for $60 to $70 apiece. The Austin, TX firm also plans to offer a free smartphone app that can control these and other Internet-enabled devices.

The blog reports that the Ube app will access a Wi-Fi network to scan for nearby Internet-enabled devices it can manage and lets you know what it can control. Mr. Burchers says the app can control more than 200 devices, most of which are gaming systems, set-top boxes, and TVs.

Mr. Burchers believes that Ube’s first products are just the beginning. He told TR most new electronics will be able to connect to the Web, and home builders will offer smart dimmers to new home buyers as they do granite countertops.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Who supported the ITRs at WCIT-12

Who supported the ITRs at WCIT-12Byron Holland, President and Chief Executive Officer of the Canadian Internet Registration Authority (CIRA) speculated what the results of WCIT-12 mean for the Internet in the article, “Observations on WCIT-12.” Mr. Holland says the results of WCIT-12 will lead to a two-tiered Internet.

One tier consisting of the countries that supported the new ITRs and ratified the resulting agreement. He believes that these governments will use the United Nations agreement to limit and watch, if not censor, Internet traffic transiting across its borders.

censor, Internet traffic transiting across its bordersThe CIRA CEO states that governments that did not support the new ITR’s and the resulting treaty will continue to have access to the free and open Internet and all of its benefits. The governments that rejected the WCIT power grab are primarily in the developed world.  The rest of the world, primarily those that live in the developing world, will have access to some lesser version of the Internet.

There is a clear correlation between a state’s ranking in the Democracy Index and how their place on the International Telecommunication Regulations (ITR) at the International Telecommunication Union‘s (ITU) World Conference on Information Technology (WCIT-12) according to the article. The following chart compares those countries that supported the ITRs with those that did not or deferred their vote until after consulting with their home country.

The author concludes that some of the larger content producers are simply just not going to bother offering content or services to much of the world. This could very well mean that a content producer will be subject to the ITRs if it is available in those countries. Mr. Holland explains that Internet traffic doesn’t travel point-to-point. The traffic is broken into many packets of information which individually take the most efficient route possible. What if that route transits through a country that has signed on to the new ITRs?

content producerThe CIRA CEO urges everyone to think about how the Internet works against the backdrop of the above info-graphic. It is primarily countries in the developing world that supported the new ITRs. This means that it will be the developing world that will not have access to the same information, free and open democracies, like Canada, do.

The article concludes that the result of Dubai is that the free and open Internet – the Internet that has allowed free speech, democracy, and economic development to flourish – will only be available to the citizens of the developed world. The citizens of the developing world – the people who could most benefit from the free and open Internet, from the free flow of information, and from access to global markets for their products and services – will be deprived of these benefits.

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Top Five IT Trends for 2013

Top five IT trends for 2013Ian Kilpatrick, who has the longest job title I have ever seen, chairman of international value added distributor, specialists in market development for secure IP infrastructure solutions and convergence at Wick Hill Group shares his vision of the top five IT trends for 2013. In the article, Top five IT trends for 2013 at ITnewslink he shares his predictions.

BYOD Man1. BYOD – He says the first IT Trend for 2013 is BYOD. BYOD is now an unstoppable, user-driven wave that will continue to make a major impact on the IT world in 2013 and beyond.  2013 will see companies trying to integrate BYOD into their networks.

He also speculates that we can expect to see the growth of Microsoft (MSFT) Windows to Go secure USB sticks based on Windows 8, which provide remote users with the supported version of the corporate desktop. These are available from a limited number of suppliers authorized by Microsoft and include Imation’s IronKey Workspace for Windows to Go.

Mobile Device Management2. Mobile Device Management – The next IT trend for 2013 is that Mobile Device Management solutions growth will accelerate in 2013. The growth is due to the rapid growth of mobile devices such as smartphones, tablets, and laptops, but particularly smartphones.

Growth will be strongest for MDM solutions that offer features such as ensuring mobile device usage complies with company security policies, allocating access rights, managing configuration, updating policies, dealing with data leakage issues, and dealing with lost or stolen devices.

A crucial component for the continued growth of MDM solutions will be the clear separation between the management of business and personal data on devices. There are over 100 suppliers in mobile device management many of them are good but niche solutions. The Gartner (IT) Magic Quadrant identifies the strategic leaders, which includes Zenprise.

High density wireless3. High density wireless – Wireless requirements have been significantly incrementing over the last year making it the third IT trend for 2013. The firm says BYOD has changed both the data transfer and performance expectations of users. However, these expectations have not been met, with many networks still inadequate in their coverage and performance.

The new 802.11ac standard, with 1 gigabit per second throughput rates, will be a key driver in organizations moving to high-density wireless in 2013. High density wireless will provide companies with high coverage and high performance, supporting business-critical applications and delivering complete site coverage There will continue to be a shift from niche solutions towards more strategic solutions. The Gartner Magic Quadrant identifies Xirrus, which will continue to experience stratospheric growth.

Data back-up and recovery4. Data back-up and recovery – 2013’s fourth IT trend for 2013 deals with data back-up and recovery. Organizations have been under immense pressure from ever-increasing data volumes, archiving, and compliance requirements.

At the top end, new data replication technologies will have a major impact on data centers in 2013. For smaller organizations, the shift from tape will continue apace. For conservative organizations, the move to disc (and, in particular, RDX technologies that combine the best of tape and disk) will accelerate. Hybrid back-up to RDX and then the cloud will increase. In volume terms, the lowest move (but in market-hype the biggest) will be significant growth in direct back-up to the cloud. RDX, hybrid, and cloud data backup solutions are available from vendors such as Imation and Barracuda Networks.

Data leakage protection5. Data leakage protection – The last Wick Hill Group IT trend for 2013 says that with the growing volumes of data and regulatory bodies’ willingness to levy fines for non-compliance, data leakage protection will continue to be a major cause for concern during 2013. Companies will be looking closely at how to secure and manage their data as their network boundaries spread even wider, with increased use of social networking and BYOD, increased remote access, the rapid growth of wireless, increased virtualization, and the move towards convergence.

Increasingly, organizations will couple DLP products with SIEM (Security Information and Event Management) solutions. DLP concerns will also continue the growth curve for authentication (much of it hosted in the cloud) and encryption, to protect data, both in motion and at rest. Some companies will look to hosted security services and the cloud to cope with an increasingly complex security situation. SIEM and authentication solutions are available from companies such as LogLogic, Check Point VASCO, and SafeNet.

rb-

So these are not really earth-shattering predictions for 2013, BYOD, MDM, and Wi-Fi are already part of my world. We are doubling our backup capabilities and will be updating from our current McAfee to some sort of DLP

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.