September 2016



The Social & economic price of menstruation

  • Periods are still social taboo
    Historically, all religions (except Sikhism) placed restrictions on menstruating women, who were considered unclean and impure. This is the origin of a social taboo that still exist all around the world.
  • Blue Blood
    TV commercials have always shown a blue fluid pouring with advertisers self policing to avoid shocking the public with blood…gasp!
  • Artist Rupi Kaur posted a shot of herself taking a nap in period-stained pants. Instagram deleted the photo -twice
  • If men had period…
    “Menstruation will become an enviable, masculine event: Men would brag about how long and how much. Boys would mark the onset of menses, that longed-for proof of manhood, with religious ritual and stag parties.” Gloria Steinem

Being Female is (unjustly) expensive

  1. $120/year (on pads & tampons) + $20/year (on meds for period side effects) x 40 years (between puberty and menopause) =
  2. $5, 600 spent by a woman on her period in her entire lifetime.
  3. Did you know? The UK enforces a 5% tax on sanitary pads and tampons, considered as luxury items. Meanwhile, men’s disposable razors are not taxed

Menstruating Girls in the developing world pay a high social and sanitary pads
In the developing world, low access to pads, tampons and other feminine hygiene products have a direct impact on girls’ and women’s health, education and prospects.

  • 10% of Girls in Africa skip school during their period and eventually drop out as a consequence (Unesco)
  • 48% of girls in Iran believe their period to be a disease
  • 30% of girls in Afghanistan skip school during their periods.
  • 1/3 of the world has no improved sanitation at home. 50% of schools in developing countries have no toilets, in Nigeria, there is 1 for every 600 students.This can lead girls on their period to decide to skip school
  • In Kenya, half of the girls living in slums have sex with older men in exchange for pads, which puts them at risk for HIV and other STDs.
  • In India only 12% of women used pads in 2010, 70% could not afford them, 88% used old cloth, dried grass, ash, sand or newspapers instead, a practice potentially linked to higher rates of cervical cancer
  • Even when periods can’t be linked to a drop attendance rates, such as in Nepal menstruation may still cause girls to drop out as it may be seen as a sign of sexual maturity or preparedness for marriage


  1. Eradicating the taboo:
    Better sex education for young men and women can help reduce the stigma surrounding menstruation.
  2. Ending the female tax:
    Options such as menstrual cups or women underwear are still largely unknown by the public or regarded as unpractical, but are more budget- and environmental- friendly, and thus an interesting solution in both developed and developing countries


Tax Day: Our Shared Investments

Tax Day: Our Shared Investments

Investments By Value Area:
Tax revenues are the vehicle by which as a state make investments in a more prosperous Washington. Our shared investments in safe neighborhoods, quality schools, public health and a cleaner environment are all made possible by the resources gathered through our revenue system. But where exactly do those taxes go?

Education & opportunity (52%)

  • Early Learning programs for children
  • High quality k-12 education
  • Higher educational opportunities
  • Skill re-tooling programs

 Healthy people and Environment (28%)

  • Public and environmental health protections
  • Supports for families and child protections
  • Health insurance coverage
  • Care for people with long-term health needs

 Thriving communities (17%)

  • Efficient and transparent state government
  • Safety and equal justice
  • Balanced and sustainable economic growth

 Economic Security (3%)

  • Work supports for low and moderate income families
  • Aid to Washingtonians for meeting basic needs


What Kind of Entrepreneur are you?

What Kind of Entrepreneur are you?

Do you fit the entrepreneur profile of an innovator, prodigy, strategist, Visionary, Hustler, or Machine? After working with top social scientists to test over 30,000 entrepreneurs and correlate those results with the real world performance of thousands of companies, the founder institute has found that most successful entrepreneurs fit into one of these six profiles

The hustler is an enthusiastic go-getter who can sell just about anything. They are supremely confident and conscientious and won’t let anything stand in their way. Example: Zig Ziglar and Mary Kay Ash

  • 15% Agreeableness (Above average)
  • 25% Conscientiousness (Above average)
  • 25% Extroversion (Above average)

Always forward thinking and adventurous, the innovator constantly seeks to challenge old ideas and find new unconventional ones. Example: Tony Hesh and Evan Williams

  • 10% Openness (Above average)
  • 5% Emotional Stability (below average)
  • 25% Agreeableness (Above average)

The Machine simple gets things done. Equipped with an aptitude for solving problems and high level of efficiency, they always deliver quality, quickly. Example: Bill Gates and Larry Ellison

  • 10% Fluid intelligence (Above average)
  • 5% Openness (below average)
  • 80% Conscientiousness (Above average)

The prodigy is blessed with an inborn business sense and instinct. Natural intellect, a stoic demeanor, and strong social skills help guide them to success. Example: Elon Musk and Larry Page)

  • 25% Emotional Stability (Above average)
  • 45% Agreeableness (Above average)
  • 15% Fluid Intelligence ( Above average)

A creative and tactical thinker, the strategist is always calculating a game plan. Their habit of long term thinking leads to success. Example: Steve Jobs and Martha Stewart

  • 10% Fluid intelligence (Above average)
  • 5% Openness (Above average)
  • 55% Emotional stability (Above average)

Visionaries combine new and innovative ideas with the drive and enthusiasm needed to rally the masses behind them. Example: Oprah Winfrey and Ted Turner

  • 20% Openness (Above average)
  • 10% Fluid intelligence (Above average)
  • 40% Extroversion (Above average)



How to Backup Important Data

How to Backup Important Data

Do you know the lifetime of your hard drive
Information or data on your computer could be lost, if:

  • The hard drive in your computer fails
  • Your computer is lost or stolen
  • Your computer is in a fire or other event

1. Backup your data on a window

What you will need:

  • A Hard Drive
    Grab a secondary hard drive of equal or greater capacity to the machine you want to back up. Preferably, This should be an external drive, or an external network SAN drive such as western digital’s very affordable “My World Book” SAN drive.
  • Software.
    You can use one of the programs Microsoft ships with its operating system, or you can use third party app.

2. Backup Your Data on MAC

What You’ll Need:

  • A Hard Drive
    You should have a secondary hard drive of equal or greater capacity to the hard drive you want to back up.
  • Software
    Some back up software from third party vendors. Or, if you’re Unix savvy, you can get by with rsync and cron, which are built in to Mac OS X.

How to Recover Lost Data If accidentally DELETE

When you delete data from your PC it doesn’t immediately disappear and turn into digital dust: your simply redesignates the deleted files as “free space,” so later files can be written over the files that have been “deleted”

To follow are 5 actions to avoid when trying to recover data

  1. Don’t Save documents and files
  2. Don’t restart your computer
  3. Don’t start or run new programs
  4. Don’t install a new program
  5. Don’t compress your email files

Disadvantages of only making backup

  • Initial backup may take very long
  • You are not in full control of your files
  • High costs
  • Security risks from hackers


The Intersection of the Semantic Web & Cyber

The Intersection of the Semantic Web & Cyber

Evolution of web

  • WEB 3.0 (Semantic / Intelligent web)
    Connecting people, information and content. Information is voluminous, heterogeneous and dynamic, readable by machines which retrieve, fuse and analyze it within context
  • Note: WEB 3.0 Relies on linking of machine-generated meta data across web silos, enabling automated agents to more intelligently serve end users
  • WEB 2.0 (Social Web)
    Human involvement is necessary to interpret data. Information is voluminousness and dynamic, scattered across siloed sites. Human improvement is necessary to interpret pages and continue information.
  • WEB 1.0 (World Wide Web)
    Connecting people to information. Information is voluminous but static,digitized / confined in sites and posted for human read-only

Evolution of CYBER

1. CYBER 1.0 (Siloed Cyber)

  • Voluminous, homogeneous information
  • Siloed, on demand non-interactive content
  • Limited number of applications and protocols
  • Resources and missions not fully aligned
  • Manual contextualization of data

2. CYBER 2.0 (Integrated Cyber)

  • Voluminous high velocity data
  • Growth of applications and products
  • People connecting to people to interact with each other and content
  • Human defined approaches and technology to extract and contextualize data
  • Variety of interactions driving looser control (emergence of new threats)

3. CYBER 3.0 (Intelligent Cyber)

  • High volume, velocity and variety of data
  • Explosion in applications and protocols
  • Hyper connected people and content interactively between people
  • Automated alignment of resources with missions
  • Machine learning to extract intelligence and context

Key Features Of Cyber 3.0

  • Automation
    Auto Generation of profiles & cleaning of data
  • Data Fusion
    Merging of disparate data sets
  • Continual Learning
    Increasing resolution on specific targets as more data is collected
  • Compounding
    Increasing breadth of profiles as data accumulates
  • Contextualization
    Increasing linkage between content and context

CYBER Security

    Lack of visibility driven by velocity, volume and data variety and loss of control driven by manual processes for generating threat signatures, defecting anomalies and classifying threats
  • CYBER 3.0
    Machine generated signatures, accurate detection and classification of threats by fusing distinct dimensions ensuring continuous visibility and better control

CYBER Surveillance

    Users do their best to manually “connect the dots” across siloed public & private data sources
  • CYBER 3.0
    Machines automatically “connect-the-dots” compounding user identities and contextualizing every interaction





The Well-Oiled Data Machine

The Well-Oiled Data Machine

The inner workings of a business are dependent on good, clean, quality data; it’s the oil that keeps the business cogs turning! our most recent research reveals common data quality issues in organisations.
99% of companies have data strategy but common issues and errors are damaging data quality.

Research shows business are experiencing data breakdowns.

  • 44% say incomplete, missing data is the most common problem.
  • 41% see outdated contact information as the biggest issue.
  • 86% Suspect their data might be inaccurate in some way.

Business machine can’t be efficient when…

  • 75% Of companies waste an average of
    14% Revenue due to bad data quality.

Multi-Chanel strategies are increasing the room for error.  

  • 49% Say it’s their website.
  • 52% Recognize the call center as the most problematic channel

But what is the root cause of data errors?

  • 59% Human error
  • 31% Poor communications
  • 24% An inadequate data strategy
  • 22% Lack of resource
  • Insufficient budgets

The impact translates to…

  • Having problems when generating meaningful business intelligence.
  • Not having enough information about customers


  • 38% Use point-of-capture solutions to verify entered information
  • 34% Use dedicated back-office software to clean new data.
  • 23% Of companies depend on manual methods to check their customer data

What are the main outputs businesses want from their data machine

  • 62% increase efficiency
  • 54% Better customer satisfaction
  • 44% Cost savings
  • 43% increased opportunities through customer profiling







Italy’s Finest Cheese…

Italy’s Finest Cheese…

Preserved with Data
Parmesan cheese has been made from the same ingredients for 1,000 years. The chief instrument for quality control has always been a hammer. But now Italy’s cheese masters are adding data analytics to improve quality, help battle fraud and to protect vulnerable brand. Here’s how new technology is changing the way cheese is made in the old world.

  1. Stamped:
    Each wheel of Parmigian Regiano is stamped with a unique ID number that contains data about creation date and location plus the source of ingredients.
  2. Scanned:
    The wheels are scanned and logged into a certain database, providing up-to-the-minute production volume and inventory data for all members of the consorzio del Parmigiano Regiano
  3. Recorded:
    In 2014, the consortium logged data on roughly 3.3 million cheese wheels from 350 dairies with a retail value of $2.6 billion.
  4. Inspected: 
    After a year of aging, wheels are inspected with a special hammer. Those that fail are discarded or sold as cheap, grated cheese. The ID numbers enable cheese makers to gather intelligence on failed cheese and to avoid future mistakes.
  5. Shipped:
    The wheels that pass inspection are now trackable. Whether they’re destined for further aging or bound for store shelves worldwide.




How Dutch Cheese is Made

How Dutch Cheese is Made

1. Milk
Firstly, cheese is made from fresh milk. To make one kilogram of cheese about 10 liters of milk is required.

2. Thermization, Standardization and Pasteurization
Once the milk has arrived at the factory it is put into three processes.

  • The first step is heating the milk to a 63 degree Celsius temperature. This helps to better the bacteriological quality but still maintain the taste.
  • Once the milk has been heated it is moved to centrifuge. Here the fat content is altered until the right level is reached. This process is called the standardization.
  • Finally, the milk is then  sorted in a cool place. Then it is heated again, this time 72 degrees Celsius. This is the pasteurization process. Here all the harmful bacteria in the milk are destroyed.

3. Starter Culture and Rennet

  • Once the milk has been pasteurized a starter culture is included in the milk order to convert the lactose into lactic acid, This is a crucial step for the ripening process for the taste of the cheese, as well as its shelf life.
  • Rennet, an enzyme, is then added to the milk to make sure that it thickens. This makes the milk solidify. This is the curdling process.

3. Curds and Whey

  • Once the milk has formed a solid mass from the curdling, it is then cut up to devide the whey (the fluid) from the curd (the thick part). The cutting is done using knives that move at different speeds.
  • The particles of curd then make up the basic cheese. They whey is cooled, treated  and processed to form other kinds of dairy products.

4. Pressing

  • Once the whey has been drained, the curd particles are then moved to the cheese moulds. Here they are pressed into the necessary shapes (loaf, wheel, ball, and rectangle) for about an hour.

5. Pickling

  • In order to preserve the cheese, it is put into a brine solution, This is done until the right salt content has been arrived at.
  • The cheese will then remain in the brine solution for two to five days.
  • Salt is important because it preserves the cheese, and it also influences its texture and taste.

6. Plastification 

  • A fine plastic layer is then added to the cheese. this layer is important because to prevents dehydration and the formation of mould on the rind of the cheese.
  • This plastic layer cannot be eaten, but it is not harmful if it is accidentally eaten.

7. Ripening

  • Cheese have to be ripened to get their aroma and taste.
  • The cheese is placed onto special wood shelves which also absorb extra moisture. During this ripening process the cheese has to be turned regularly to ensure that it maintains its shape and does not begin to sag.
  • White cheese ages it begins to get a different character, it becomes drier and it also develops more flavor. The minimum time for ripening is 4 weeks for young cheese up to more than 1 year for the tasty old cheese.


ANATOMY of a Business Blog post

ANATOMY of a Business Blog post

General Blogging principles:

  1. Know who your audience is and write to them.
  2. Your goals is to get clicked on. make your tittles magnetic and captivating.
  3. Write for people first, search engines second.
  4. Get to the point.
  5. Use plain language.
  6. Write in a conversational, yet professional style.
  7. Let your post sit for a while before you publish it. When you come back to it, read it out loud and edit ruthlessly.

The 4 U’s of Business Blogging:

  1. Be useful to the reader
  2. Provide a sense of urgency
  3. Convey the main idea as unique
  4. Do all of the above in an ultra specific way

1. Tittle Tag

  • The tittle tag is the blue link on search engines, so make it enticing.
  • Its how search engines identify your content, include important keywords.
  • Make it neutral, compelling and under 75 characters

2. URL

  • Include important keywords in the URL
  • you can customize the URL within your blogging software
  • HTTP://

3. Blog Post Tittle 

  • The tittle a promise to your reader.
  • Be sure what you writes is exactly what you published in the tittle.
  • Include important keyword

4. Sharing Button:

  • Sharing can greatly amplify your content
  • Put social media sharing buttons near the top.
  • Email is still very popular way to share. Be sure to include this as an option

5. Image 

  • Relevant, interesting and informative images make image a huge difference in the reading experience
  • Include important keywords in the file name and ALT text tags
  • Give credits to the image creator.

7. Short Paragraphs

  • Make the first few paragraphs short and scannable.
  • Long paragraphs at the beginning are a sure fire way to discourage people from reading

8. External Links

  • Link out to other web pages for more in-depth information
  • Use anchor text instead of “click here”. It provides content to your reader.

9. Key Point

  • Make sure the key point focuses on the benefits to the reader.
  • Keep it concise and highlighted on its own line
  • If it sounds natural use keywords.

10. Internal Links

  • Links to a page inside your domain, like a product or service page that solves the issue highlighted in the post
  • Use anchor text instead of “click here.” This improves SEO.

11. Video

  • Video adds richness and emotional appeal.
  • Find relevant video on YouTube and embed it. Give credit to its creator.
  • Put in rich snippets around the video to improve click-through rate.

12. Tittles & Sub-tittles

  • Allows readers to scan.
  • It’s OK to have several tittles and sub-tittles.
  • Format them in HTML as H1,H@, etc
  • important for SEO, use keywords.

13.  Like & +1 Buttons

  • Include these buttons on your post.
  • These give further engagement value within social media

14. Call to Action

  • Always include a call to action graphic that directs the reader to do something
  • Links to a landing page that converts the reader into a lead.

15. Meta Description 

  • Search engines use this as the descriptive text under the blue link.
  • It’s no longer used for ranking or relevancy.
  • Make it a concise 150 character summary that sells the post


Workplace Trust

Workplace Trust

The Jacobs model
The Jacobs model links eight intrinsic drivers of trust, each of which is impacted by an individuals psychological well-being and work environment, to two paths of performance, leading to either positive or negative outcomes. When each of the drivers is satisfied, this leads to the positive outcome path- engagement, energy release boosted well-being and improved performance.

Individual factors
well being and Perception

Environmental Factors

  • Work-life flexibility integration
  • Flexible working
  • Workload
  • Communication
  • Leadership
  • Resources
  • Technology
  • Physical environment
  • Reward and performance
  • Other people strategies

The Eight Intrinsic Drivers

  1. Belong & Connect:
    If people feel excluded in the workplace they feel threatened and it can affect their health and well-being. Its important to make sure individuals feel connected to their team.
  2. Significance & position:
    People are continually assessing their role within their organisation and what contribution they are making. If people do not feel valued, they can feel threatened, which will negatively impact their performance.
  3. Learn & challenge:
    People are continually  learning so they can adapt to the ever-changing modern work environment. Research has shown that employees who feel  challenged are more productive
  4. Security & certainty:
    If workers aren’t secure in their position then they can feel threatened which has a negative effect on their performance and productivity levels.
  5. Voice & recognition:
    People should be encouraged to put their views and ideas across in the workplace so they feel that their contributions are recognized and appreciated.
  6. Fairness:
    It is critical for an organisation to treat its employees fairly and consistently. If employees feel they are being treated unfairly it can cause high stress levels and low productivity.
  7. Choice & autonomy:
    Giving workers a degree of control and the ability to make their own choices can help them balance their work and homes lives more effectively, helping to improve their performance.
  8. Purpose:
    If workers have a clear sense of purpose and are aware of exactly what their contribution to an organisation is, they are more likely to be engaged.