Friday, October 29, 2010

2 Biggest Mistakes In Dieting


There are many information about diet. And not all the information are right, some of them is the wrong information. If you trapped in the wrong information, you will never gain your ideal weight. Yes, that’s happen to many people. You should know how to avoid that wrong information and the mistake in diet. And the biggest mistake that people do because the wrong information is:

1. Being Hungry
There many people start to decrease their eat portion or skip their meals in order to lose weight. This is the wrong step in diet. You can’t lose weight by yourself, you need the ‘third’ person to help you. And the person is METABOLISM. You need high metabolism to help you in burn more calories and also burn your far storage. You need energy that you get it from meals to face the day. if you skip your meals, you will not get enough energy, how about your metabolism process? Your metabolism will work slowly, not help you in losing weight.

The ideal is eating 5 meals a day, split it from your big meals. Eat the healthy food frequently every 4 hours. Eating smaller meals more often, will avoid you from being hungry and lets you be in control.

2. Extreme Exercise
There are many people still have a wrong idea about exercise, they wake up earlier jogging every day or go to gym every day. Well, for them maybe it just plain exercise, but for me, that is extreme exercise. You should know these kinds of exercise will not burn any fat… These kinds of exercise burn the protein from your muscle. When you do this exercise, you will quickly lose the energy, and your body must to supply the reserve immediately. And the only way to get the reserve immediately is get it from the protein not the fat.

Just do the simple exercise, just move more often. Walking more than 30 minutes a day already help you in burn fat.

You should check, did you do one of this 2 mistakes in order to lose weight. If not, it’s mean you are in the right way in losing weight, but if done one of this mistakes, you should correct it. Good luck.
http://www.articledashboard.com/Article/2-Biggest-Mistakes-in-Dieting/881464

Tuesday, October 26, 2010

Exercise To Lose Belly Fat – 2 Mistakes


If you're like me, you've tried to exercise to lose belly fat. This is a smart idea however there are 3 mistakes that most people make that cause their exercising to be ineffective. Let's take a look at these common mistakes when trying to lose belly fat.

Exercise to Lose Belly Fat

Cardio Mistake
Cardio seems to be a logical way to burn off belly fat. Some information available suggest that cardio routines are the best way to burn off fat. This is a big mistake.
With cardio, you've probably noticed that it gets easier with time. Your body gets used to the routine. When this happens, you will burn far less calories than when you first started your cardio routine.

This is why you see people doing cardio for months and they never seem to lose weight. The only way they will with cardio it to dramatically increase the intensity of their workouts.

Sit-Ups Mistake
Did you know that you can't target fat burning on areas of your body? It's true. You can only target muscles, not fat.

People naturally think that they need to do a bunch of sit-ups, crunches or buy an ab machine to get a flat stomach. This is completely wrong. All this will do is build muscle under your fat. You will never get a ripped stomach by doing this.

The right exercises to do need to focus on the largest muscles on your body that are on your legs and chest. When you build these muscles, your metabolism will jump and you'll start burning off fat all over your body.

Diet Mistake
In addition to doing some exercise to lose belly fat, you'll need to make some very minor changes to your eating habits. 

Stop any diet plan you're on right now. You don't need low carb, high protein, counting calorie diets at all. You just need to make a couple of minor changes to finally burn off your fat.

Starting today, you need to increase the frequency of your eating. Eating 6 smaller meals instead of 3 meals will dramatically boost your metabolic rate. Be sure that you are full each time you have a meal!

Also, you do need to cut out sodium from your diet. So no more fast food or frozen dinners. Too much sodium causes your body to retain fluid making you look bloated.

Now get out there and exercise to lose belly fat as outlined in this article. You'll have a flat belly in no time!

http://www.articledashboard.com/Article/Exercise-to-Lose-Belly-Fat---2-Mistakes-that-Most-People-Make-When-Trying-to-Lose-Weight-Off-Their-B/1880892

Saturday, October 23, 2010

A Common Mistake Most Of Us Make When Reading A Book



How do we read books? It may seem that there is nothing special in it. We take a book, open it from the first page and read it till the end of it. That is the way most of us do and actually it is an inefficient way to read books. It will result in relatively poor reading speed and low comprehension.

Have you ever watched professional athletes train or compete? No matter if it is basketball, tennis player or weight-lifting, athletes always perform some warm up exercises before training or competition. It probably includes some jogging, bends and stretches etc. It is necessary to get the pulse rate up to a training level, to get the body muscles warm and to stretch them in order to avoid injuries.

But how do we start reading? Most people just take the text and begin to read without any warm-up. Speed reading is to a great extent similar to a sports activity. Reading fast is similar to running fast. In both cases you want to reach the finish with the smallest possible time.

If you want to read fast and also remember what you have read then you should also make a warm-up. In case of speed reading you should preview the texts before starting to read them. It means that you will look through the text at rapid pace and you will get some background information about the text.

Have you ever noticed that it is much easier to read a text on a familiar topic? If you have some prior information about the content of the text then you can read the text faster and you will comprehend better. By making a quick preview you will acquire that kind of information from the text, which allows you to read it faster later.

How to make a preview? First, read the title of the text. Then look through the table of contents (if the text consists of many chapters). If you read the titles of all chapters you will get quite a good idea what the material is about. Next, look the text through at fast pace. Search for words and sentences with larger or bold font. Read them. If you find any tables or figures then take a glance on them. Do not waste too much time on them. Finally, read the introduction and the conclusion of the text or in case of a shorter text or article the first and last paragraph of it.

It does not take much time to do this, but it helps you to significantly boost your reading speed. In addition you will memorize the content of the text much better. So do not make a mistake most of us do that we read the books just from cover to cover without making a preview.

http://www.articledashboard.com/Article/A-Common-Mistake-Most-of-us-Make-When-Reading-a-Book/1104828

Wednesday, October 20, 2010

10 Top Catering Mistakes



Wedding food is very important because it bonds you with your esteemed guests. They will not remember the colour of the bride’s attire or the wedding decorations, but would never ever forget the sumptuous feast they had at your wedding.

Mind you, food usually accounts for half of your wedding expenses. Here are ten mistakes you can avoid to ensure flawless Wedding Catering Services. 

Mistake 1# Doing the catering yourself

The first and foremost mistake you can make is to do the catering yourself. A wedding feast or reception requires multi-level coordination. Owing to your inexperience, you will surely not know the exact quantity of salt to be added to make the curry tasty! 

Mistake 2 # Hiring wedding catering services without cross-checking

Most people do not bother to cross-check the credentials of the catering service. If yours is a Bengali wedding or a Punjabi wedding, you should hire a knowledgeable caterer, with proper references.

Mistake 3 # Catering hall that can accommodate guests

Most people do not consider whether the wedding or catering hall can accommodate the guests. Whether you are planning a mandir wedding or a wedding reception, hire a hall that can comfortably accommodate all your guests.

Mistake 4 # What to expect from catering agency

Most people fail to lay down the terms of catering services because they are not sure what to expect. The result – poor services that will lead to disputes when payments are due. You should give clear instructions to the Wedding catering group about your requirements. 

Mistake 5 # Elaborate Wedding menus would be a bother
You should have a short menu with food items liked by young and old. Some people think that an elaborate menu would make the wedding grand. A big menu leads to waste of food.

Mistake 6# Bad planning could lead to shortage of food 

Bad planning could lead to shortage of food for your guests. Have a clear idea about the number of guests who would come and keep an alternative plan to meet exigencies if the number of guests exceeds your calculations. 

Mistake 7# Lack of sufficient number of waiters

Most people overlook the guest-waiter ratio in catering halls. For monetary gains, the Catering Service will employ less number of waiters. It will not be easy to attend to food requirements of guests in such cases.

Mistake 8# Lack of sufficient wedding supplies 

Additional guests can put pressure on wedding supplies. A good catering agency will be adequately stocked with back up supplies to meet any exigencies. You might encounter this problem if you do the catering yourself.

Mistake 9# No crowd control

Most people mess up their wedding reception because they do not have proper crowd control. All your guests would like to have food before leaving. But crowding at the catering hall could put off some, especially the aged who do not like to jostle for entry. 

Mistake 10# Lack of variety in menu

If the wedding lasts for several days, the charm of the festivities is lost if there is no variety in the menu for each day of celebration.
http://www.articledashboard.com/Article/10-Top-Catering-Mistakes/1718712

Monday, October 18, 2010

Discipline mistakes that make your life harder

You know the drill: You give your child an ultimatum -- "Get dressed or we're staying home!" -- and naturally she says, "Okay, we'll stay home!" Might as well plant a big "L" on your forehead.
We all see our discipline efforts backfire on occasion (hey, you're tired!), and of course there are those battles just not worth fighting (no kid ever flunked preschool because his teeth were furry). But you do need to prove you're the parent at least some of the time. Learning to avoid these discipline land mines can help you hop to it.
Way to blow it No. 1: Tell a big ole lie
"My two-year-old daughter, Chloe, fights me about going to her babysitter's house every Monday," says New Jersey mom Gina Kane. One morning when Chloe refused to get out of the car, "I pointed to the house next door and told her it was a daycare center run by the caveman from the Geico commercials, which really scare her," says Kane. "I said she had a choice: Go to the sitter's house or to the caveman's daycare."
Mission accomplished -- Chloe dashed to the sitter's door. Fast-forward a week: The babysitter casually asked Kane if she knew of a daycare center in the neighborhood because her daughter couldn't stop talking about it.
"I was mortified having to explain, and Chloe now thinks that all daycare centers are run by cavemen," Kane admits. "I'm in big trouble if I ever actually have to send her to daycare."
Better way: Little white lies are so tempting in a pinch. You might even get away with them sometimes. Another mom had a great run while her toddler was afraid of a local clown named Macaroni. Whenever he refused to cooperate, she'd just say, "Maybe we should get Macaroni!" and the little guy would immediately don his pj's or gobble his carrots.
But as Kane found out, scare tactics can and do come back to bite you in the butt, so it's best to be honest, says Bonnie Maslin, author of "Picking Your Battles." Kane could have said instead, "I know sometimes you don't want to go to your babysitter. Sometimes I don't want to go to work." Empathizing would have made the Monday-morning transition easier.
Way to blow it No. No. 2: Back down
You want a surefire way to make sure your kids never listen to you? Threaten but don't act. My daughter Ella and I recently went for a playdate at a friend's house, where the little girl kept snatching away whatever toy Ella picked up.
Her mom would say, "Give that back to Ella or I'll take it away," and then turn back to our conversation. Of course, as soon as Ella moved on to another toy, the little girl wanted that one.
Better way: It's no fun to be the bad guy, but if a child acts out, there has to be a consequence. "Repeatedly saying 'If you don't stop throwing sand, I'm going to make you leave the sandbox' won't stop the bad behavior," says Bridget Barnes, coauthor of "Common Sense Parenting for Toddlers and Preschoolers."
"What your child hears is 'I can keep doing this a few more times before Mom makes me stop.'"
Instead, give a warning, and then, if your child does it again, give an immediate consequence such as a time-out. If he continues, leave. The next time, a gentle reminder should do the trick: "Remember how we had to leave when you threw the sand? I hope we don't have to go home early again today."

Way to blow it No. 3: Dis Dad (or vice versa)
When Polly Lugosi and her husband, Jim, take their two kids, Zoe, 5, and Miles, 2, out for a treat, this Milwaukie, Oregon, couple tells them that they have to behave or they won't get it. "Unfortunately, my husband is a complete pushover and always gives them the treat even if they act up," says Polly.
Better way: Even though Jim doesn't mean to undermine Polly's efforts, that's exactly what he's doing. Showing a united front won't just help your child behave better, it'll also prevent you from feeling like the bad guy all the time.
"If you and your husband prefer to use different punishments, that's okay -- just as long as there are consequences for the same actions," says Nancy Schulman, coauthor of "Practical Wisdom for Parents: Demystifying the Preschool Years." When your child is out of earshot, create a list of rules and discuss different options, she says.
Way to blow it No. 4: Bribe a little too often
"My two-year-old daughter, Isabelle, has never been a great eater," says Liz Samuel, a mom in Montclair, New Jersey. "So I once offered her a piece of chocolate if she would just finish her lunch."
The reward worked perfectly: Isabelle ate her chicken and sweet-potato fries -- but then she demanded another treat at dinnertime. "Now, whenever I want her to eat, she asks for either chocolate or a lollipop," complains the mom. "Plus, she'll eat just one fry and then expect her treat."
Better way: We all need to keep a good bribe up our sleeves -- to get through the grocery store, a church service, or that new episode of "Mad Men" you had to TiVo because you were too whipped to stay up for it. But the experts insist that reinforcing good behavior is a better way to go.
"So instead of saying 'If you're good at Grandma's today, I'll buy you a toy,' try 'I'm really proud of you for sitting so nicely during dinner at Grandma's,'" advises Maslin. And don't underestimate the power of disappointment. "Saying 'I'm really sad you broke the present Daddy gave me' makes a child feel appropriately bad about his behavior," says Maslin.
"You may feel like a terrible parent in the moment, but you're actually helping your child develop a conscience."
Way to blow it No. 5: Break your own rules
When Anne Wear's 2-year-old son, Brandon, would do things he shouldn't -- take his mom's car keys or pull books off the shelf, for example -- this High Point, North Carolina, mom would slap his hand and say "No, sir!" in a harsh tone of voice.
"It worked great," she says, "until his preschool teacher caught him slapping the hands of any child who took his toy or cut in front of him in line!"
Wear quickly realized that she couldn't say it was wrong for Brandon to smack his friends' hands when she and her husband, Brian, were doing the same thing to him. "We switched to time-outs," says Wear.
Better way: Not only are kids little mimics, emulating your bad behaviors, but they'll call you on it, as Suzi Dougherty found out. Her 2-year-old, Will, knows that throwing toys in the house is a definite no-no.
"But one day my husband, Chris, threw a dog toy into the next room, just to get it out from underfoot," says this Newburgh, New York, mom. "Will immediately ordered him into a time-out! Since then, we try to be more careful and follow our own rules," she says. "But on the plus side, at least it showed us that the 'no throwing toys' rule is starting to sink in!"
Way to blow it No. 6: Lose it
Taking care of an active toddler requires a lot of patience. But there are times when Gabrielle Howe of Staten Island, New York, finds herself at the end of her rope when dealing with 2-year-old Thea. "One particularly trying day I completely lost it and yelled at Thea," admits this working mom. "She then tried to send me to my room!"
Better way: Time-outs aren't just for kids -- they work great for adults, too.
"Give yourself permission to walk away," says Schulman. "Take a deep breath, count to ten, and then you'll be much more effective when disciplining your child." Walk into another room if you need to, as long as your child is safe in his crib or a childproofed room. "If you can't leave your child alone, then you should both go into another room," she adds.
"Often a change of scenery will help you both cool off." If your husband or a friend is around, just say "I need a break, can you handle this one?" suggests Schulman.
And remember that kids are expert at pushing your buttons, but if you can avoid letting the situation escalate by giving one warning and then an immediate consequence, it may help keep you both calm.
Way to blow it No. 7: Wait too long
Recently I was stuck in traffic with my 2-year-old daughter, Ella, when she started getting fidgety and tried to wiggle out of her car seat. Frustrated by both the slow trip home and the endless rounds of "Row, row, row your boat," I told her that if she didn't put her buckle back on correctly, she wouldn't get to have a bedtime story that night -- a technique that works great when my daughter's procrastinating about getting into her pajamas or brushing her teeth before bed.
This time, though, bedtime was hours away -- and the threat pretty much meaningless. Ella didn't stop playing with her seat buckle, and it seemed pointless to remind her about it hours later when she was getting ready for bed.
Better way: "Kids don't remember what they did wrong an hour after the fact, never mind the next day," says Barnes. "You want to show them the consequences of their actions as close to the bad behavior as possible." If your child hits a friend with a toy truck, don't cancel tomorrow's playdate -- just take away the truck.
Way to blow it No. 8: Talk on... and on... and on
My husband, Patrick, tends to launch into long explanations with Ella, like how going to sleep is a good idea because she'll feel well rested for our upcoming busy day at Grandma's house. Tempting as it can be to try and reason with a young child, you might as well be speaking gibberish.
Better way: "Kids are not mini-adults," says Barnes. "Long explanations or instructions go right over their heads." Saying "No cookies before dinner" is enough to get the point across; you can skip the lecture about how sweets will spoil a tiny appetite. Keep your words age-appropriate, too.
"I had one parent who was tired of always telling his son to stop whining," says Barnes. "Then one day his child finally asked, 'What's whining?'" It's okay to use a term like whining as long as you explain what you mean: "I can't understand you when you whine. Please use your big-boy voice."
Getting back on track
You gave a warning, then caved in. Or you yelled at your kid -- for yelling at you. Below, how to fix your own bad behavior, from Nancy Schulman, coauthor of Practical Wisdom for Parents.
Get over it "We all make mistakes," says Schulman. "Don't beat yourself up. Just say 'I know I said -- or did -- something I shouldn't have. Let's try to all follow these rules from now on.'"
Take it slow Even if you feel like your discipline techniques need to be completely overhauled, pick two of your top issues and start there. Don't overwhelm your child with 20 new rules. "Sit down when he's calm and go over the rules so he knows what's expected of him," says Schulman.
Work around it Let's say your child always has a tantrum over what to eat for breakfast. Rather than duke it out each morning, offer your child just two choices -- say, cereal or eggs -- so he can still feel in control.
Give it time "It takes time to undo a pattern of bad behavior," notes Schulman. "If you start being consistent, they'll catch on. It may take ten or twenty times, but they'll get it."

http://edition.cnn.com/2009/LIVING/wayoflife/11/02/p.discipline.mistakes.life.hard

Friday, October 15, 2010

Five breast-feeding mistakes new moms make, and how to fix them


ATLANTA, Georgia (CNN) -- When Erika Clowes was pregnant, she figured breast-feeding would be a breeze. After all, she'd read all the books and taken all the classes. After an easy birth, she brought home her baby, Charlie, and waited for paradise to begin.
But instead, it was a nightmare.
Charlie wouldn't latch onto her breast. She was in horrible pain. She had to wake up every two hours around the clock to pump milk and then feed it to Charlie from a bottle. He had colic and cried nearly all the time. She'd been so devoted to the idea of breast-feeding, but now felt like quitting.
"I felt betrayed and completely deceived, because nobody told me it would be this hard," she says. "It was the darkest time of my life."
Clowes almost became a statistic.
According to new numbers from the Centers for Disease Control and Prevention, 74 percent of mothers try breast-feeding, but after three months only 30 percent still exclusively nurse their babies. After six months, the number dwindled to 11 
he study didn't track the reasons the women quit nursing, but experts including Los Angeles, California, lactation consultant Corky Harvey said many women have a hard time nursing and don't know where to turn for help. She says one common reason for quitting is that women mistakenly think they don't have enough milk and decide to give the baby formula. Other women quit nursing when they go back to work, and others stop because family members encourage them to give bottles instead of breast milk.
What kept Clowes from giving up was the "Booby Brigade."
In the middle of the sleep deprivation, hormone rages, and feelings of failure, Clowes figured she had to do something. So she started the Booby Brigade, a group of new mothers near her home in Silver Lake, California, who met online and in person to give each other breast-feeding advice and support. With help from them, and occasionally from a lactation consultant, she was able to nurse Charlie consistently in about four months.
From Clowes, her lactation consultant, and another mother who started a support group, here are five breast-feeding mistakes new moms make, and how to fix them:
Mistake 1: Moms go it alone
Solution: Get out of the house -- fast
Clowes was reluctant to join -- let alone start -- a support group. "I hate that kind of thing," she says. But she did so out of desperation, and found the technical advice (how to latch on, how to deal with nipple pain) and emotional support indispensable.
Anthropologist Katherine Dettwyler, who studies breast-feeding, isn't surprised that women often fail at breast-feeding when they're left alone at home to raise a new baby. "Humans are very social creatures, and most of the world lives in extended families," says Dettwyler, an adjunct professor at the University of Delaware. "You have mothers and grandmothers around who knew everything about breast-feeding. You're not isolated at home for eight or 10 hours a day."
In addition to the Booby Brigade, Clowes joined a support group at The Pump Station, a local store that sells nursing pumps. La Leche League also has support groups. If you don't find a group, start your own, Clowes suggests. "I walked around my neighborhood and would just hand out a card with my name and phone number on it to other moms," Clowes says.
Mistake 2: Moms forget about their successful breast-feeding friends
Solution: Invite one over
While lactation consultants can be wonderful, they can also be expensive -- a visit from one in the Los Angeles area costs $200-$300 an hour, according to lactation consultant Harvey. Amanda Corbin, a mom who started a support group called "Got Milk?" in Tampa, Florida, says sometimes help can be free. She suggests inviting over a friend who's breast-fed successfully, and show her your attempts at nursing. It might be embarrassing to reveal all to your friend, Corbin says, but "we lay down our dignity during labor, so go ahead and lay down your dignity when it comes to the health of your baby."
Mistake 3: Moms assume they don't have enough milk
Solution: Rethink your baby's nursing behavior
Many times, new moms think if baby won't stop nursing, he must not be getting enough milk, so they give him formula. "Sometimes babies just nurse and nurse and nurse -- that's just what babies do," says Harvey. "It doesn't mean you don't have enough milk. It just means you should keep nursing."
Mistake 4: Moms get intimidated breast-feeding in public
Solution: Have snappy comebacks at the ready
Clowes says occasionally mothers in her group reported getting nasty comments when they've breast-fed in public. She suggests having a few retorts at the ready. On her Web site, crankylittleman.com, she has these two suggestions: "If you're uncomfortable seeing my baby eat, you are welcome to cover yourself with this baby blanket. I'll let you know when we're done," and "You think this is something? You oughtta see where he came out!"
Mistake 5: Moms panic when milk doesn't gush out
Solution: Realize that at the very beginning, you're not going to see a lot of milk
Through her work at the Booby Brigade, Clowes found some moms were expecting torrents of milk from the very beginning, and when they didn't get it, they'd give baby a bottle. They didn't understand that right after birth, moms produce small amounts of colostrum, a concentrated, nutrient rich liquid that's measured in teaspoons, not ounces, and is the perfect food for newborns. 
http://edition.cnn.com/2007/HEALTH/08/09/ep.breastfeeding

Monday, October 11, 2010

5 mistakes parents make with newborns -- and how to avoid them



Letting a newborn sleep through the night
"One of the things that makes me cringe is when parents say to me, 'The first night home from the hospital she slept all the way through the night!' " says Dr. Lance Goodman, a pediatrician in Boca Raton, Florida. "I tell them, 'Oh no! She's not supposed to be doing that!' "
Our pediatricians were unanimous: Parents need to wake up their babies to eat every four hours. With a few rare exceptions, newborns should not sleep through the night for the first two weeks of life.
Babies who go too long without eating could become dehydrated, Goodman says. Plus, sleeping eight hours at a stretch might be a sign of severe jaundice. "They might be so lethargic they can't arouse themselves to feed," Goodman says.
So when is it OK to let your baby sleep through the night? "At the two-week checkup, if your baby is gaining weight and sleeping through the night, hallelujah! Go enjoy it!" says Dr. Ari Brown, author of "Baby 411" and a spokesman for the American Academy of Pediatrics. 
Not feeding on demand
Our pediatricians say new parents sometimes make the mistake of wanting baby to eat on a strict schedule. The doctors say as long as a newborn is eating at least every four hours, they should keep whatever schedule they want.
"A baby is smarter than any grown-up," says Dr. Robin Madden, a pediatrician in Silver Spring, Maryland. "Whether breast-fed or bottle-fed, they know when they're hungry and they know when they're full."
"Babies don't feed on a cookie-cutter pattern," adds Brown. "If you follow their demand, they're going to eat better."
Taking a newborn to crowded places
Another thing that bugs Goodman: When people take their newborns to a crowded place, like a busy store or a child's birthday party. "There's no reason to do that," he says. "It's a matter of using common sense."
Exposing your baby to lots of germy people is a problem for two reasons. One, he could get a life-threatening bacterial infection. Two, even if he gets a fever from a virus (which is less dangerous), doctors will still have to hospitalize him to make sure it's not something more serious.
"A fever in a baby less than six weeks old is an automatic ticket for a two-day hospital stay," says Brown. "Your kid's going to get a spinal tap, blood drawn, and catheterized for urine."
Keeping a newborn cooped up at home
While going out to crowded places is a bad idea, it's also a mistake to stay home 24-7 for six weeks with your newborn. "Look at postpartum depression -- what could be more depressing than being cooped up with a kid who's not talking to you and cries all the time?" says Brown.
Brown encourages her patients to take their newborns for walks outside. She also tells them if they need to take the baby to the grocery store, to pick a time when it will be less crowded.
Not trusting your instincts
Our pediatricians said too many new parents don't trust their inner voice. "It's all about listening to yourself and trusting yourself," says Dr. Lisa Thebner, a pediatrician in New York City. "But when you're getting a lot of feedback from nannies and friends, it can be hard to block out all that white noise."
If you don't trust yourself, you could be putting your baby in danger, says Madden, who's chair of pediatrics at Holy Cross Hospital in Silver Spring, Maryland, and associate clinical professor of pediatrics at George Washington Medical Center in Washington.
"I've had parents who have a feeling their baby is sick, but people around them say the baby is fine," she says. "So even though their instinct says something's wrong, they wait way too long to bring the baby in to the doctor because people reassured them."
And here are three more mistakes parents of newborns make, according to our experts :
•They put their babies to sleep on their sides or stomachs. (The American Academy of Pediatrics says the back is best to avoid Sudden Infant Death Syndrome.)
 They don't vaccinate their babies even though the pediatric academy, the Centers for Disease Control and Prevention and virtually every scientific organization recommends it.
• They don't bring a baby with a fever to see the pediatrician. Any newborn with a fever needs to be evaluated by a doctor.
http://edition.cnn.com/2007/HEALTH/family/09/05/ep.newborn.mistakes/


Saturday, October 9, 2010

Digital Tools for Making Brilliant Mistakes

Imperfections attract, or at least that must be the guiding belief behind a new digital camera described on an e-commerce site as producing “a soft, out-of-focus feel that brings back the feeling of your old Super 8mm home movies.” A sample video made with the Digital Harinezumi backs it up: nearly three minutes of found-this-in-the-attic aesthetics. It’s just the sort of crude quality that digital camcorders elbowed aside years ago.
Progress toward perfection has genuine skeptics, who insist on sticking with marginalized tools. The newer thing may seem less flawed or simply easier, such traditionalists insist, but it sacrifices warmth, soul, depth, personality, chance and the human touch. They must have a point, because practically every antiquated creative process ends up inspiring some kind of digital filter, effect or add-on designed explicitly to mimic its singular properties. The upshot is a form of progress toward perfecting flaws.

A conspicuous example is the $1.99 Hipstamatic iPhone application, which, as one review put it, filters images made with the device’s camera “to make them look as though they were taken with an unreliable plastic camera . . . rather than this complex mobile smart phone.” In mid-July it was the 17th-most-popular paid app in the iTunes store; drop by the Hipstamatic Flickr pool to browse more than 53,000 digital images, with pleasingly washed-out colors or other beguiling imperfections resembling those created by glitches in analog processes.
The same urge surfaces in other media. IZotope Vinyl recording software lets users “create authentic ‘vinyl’ simulation,” right down to filters to suggest the amount of dust on a record and the degree of warping. Digital typefaces ape handwriting, including idiosyncratic jots or messy scrawls in dashed-off marker or childlike crayon; others strive to capture the quirks of the hand-painted signage at a small business. Even crudely amateur Web design can now be recreated in a click with the Geocities-izer, which instantly reworks any slick contemporary site into a jarring mess of loud colors and pointless animation reminiscent of an earlier and more individualized version of the Internet — as if it were “made by a 13-year-old in 1996.”
Admittedly, the Geocities-izer is more of a joke than a tool, but it crystallizes the idea of new, easy-to-use methods for recapturing the error-riddled expression of yore. This echoes the long-established yen for “antiqued” furniture or “distressed” jeans: imperfection implies character, imposed by artificial means. Images from the Hipstamatic have “an instant haze of memory,” according to one endorsement. And really, who wants to wait around for the actual haze of memory to set in?
It’s telling that the urge for these tools seems strongest in the realms where bits have replaced film, a medium notable for its ability to capture reality accurately. Aside from the Hipstamatic, various apps allow you to layer a “warm vintage” appearance or “film emulsion” border onto phone pictures or even recreate the look of that classic botch, the double exposure. Users of actual cameras (actual digital cameras, I mean) can also unperfect their images with products from Holgamods and Lomography that re create the glitchy effects of cheap cameras; Lensbaby mounts do the same and include an option for making pictures that resemble those from a pinhole camera — all to “bring a more organic look.” Silver Efex Pro software aims to make color photographs into convincing black-and-white ones; Poladroid software promises to let you easily create “high-resolution Polaroid-like pictures from your digital photos.”
As for moving film, you don’t have to buy a Digital Harinezumi to fake an 8-millimeter movie: the Vintage Video Maker app converts iPhone videos to resemble a 1960s home movie or even a 1920s silent movie. The unifying theme is the link between the flawed and the interesting. A boringly perfect digital picture of a flower makes no impression. But an equally boring one marred by (digitally recreated) light leaks, exposure mistakes and focus inconsistencies presses the aesthetic button that suggests deeper meaning. Specifically, the image looks like one from a time before taking a thousand pictures in a weekend was routine. It taps into a language that predates digital abundance in order to layer on implied significance where, as often as not, none exists.
Not that anyone is complaining about digital abundance. The number of people who actually cling to what one flaw-tool endorser calls “the oh-so-last-century idea of film” remains small. Another enthusiast concedes the technologies of imperfection fall short of matching the qualities the actual outdated tools produced — but they’re so much easier to use that it’s worth the trade-off. And that raises and answers the question of how to choose among the many options for digitally antiquing your 21st-century self-expression: we want the ones that make the most convincing mistakes.

http://www.nytimes.com/2010/07/25/magazine/25fob-consumed-t.html?scp=8&sq=mistakes&

Thursday, October 7, 2010

The top 20 IT mistakes to avoid

We all like to think we learn from mistakes, whether our own or others’. So in theory, the more serious bloopers you know about, the less likely you are to be under the bright light of interrogation, explaining how you managed to screw up big-time. That’s why we put out an all-points bulletin to IT managers and vendors everywhere: For the good of humanity, tell us about the gotchas that have gotten you, so others can avoid them.
As it turns out, our many contributors to this article had a lot to say -- but precious little to say on record. Names may be withheld, but the lessons are still potent. We’ve distilled this glut of information down to the top 20 mistakes -- instances in which wrong decisions can lead to costly project overruns, business disasters, and in the worst cases, lost jobs. Read on, takes notes, and avoid.


1. Botching your outsourcing strategy
Mistakes relating to outsourcing could easily fill our top 20 list on their own. There are two different flavors. The first is the sin of commission: outsourcing important IT functions to avoid the hard work of understanding them. Relinquishing those functions can make it hard to get simple things done.
The other mistake is to hold on to functions that could easily and effectively be outsourced, such as running your own messaging environment. IT organizations with an overt bias against outsourcing could be courting disaster. For example, one CTO we interviewed took over operations for a Manhattan-based online services company, only to discover that the Web-hosting infrastructure for all mission-critical and revenue-producing applications was in-house because the IT staff didn’t trust third-party operations. When the great blackout of August 2003 darkened parts of Manhattan for as long as 28 hours, the company’s UPS systems kept everything running for only a relatively short time -- while competitors at well-provisioned Web-hosting companies experienced no downtime.
2. Dismissing open source -- or bowing before it
For better or worse, many IT shops are susceptible to “religious” behavior -- a blind, unyielding devotion to a particular technology or platform. Nowhere is that more true than with open source.
On the one hand, the most conservative IT shops dismiss open source solutions as a matter of policy. That’s a big mistake: Taking an indefinite wait-and-see attitude toward open source means passing up proven, stable, and scalable low-cost solutions such as Linux, Apache, MySQL, and PHP. On the other hand, insisting on open source purity in your IT operation can delay progress, as developers are forced to cobble together inferior or unwieldy open source solutions when more appropriate commercial software solutions already exist.
Open source software is not inherently better than commercial software; it all depends on the problem to be solved and the maturity of the solution being considered.
3. Offshoring with blinders on
Any list of IT mistakes would be incomplete without a mention of offshoring. The experience of one vice president of operations provides an instructive cautionary tale. At his previous employer, the vice president opened a branch office in India for software development and encountered numerous surprises, many counter to conventional offshoring wisdom.
At the time, India had been experiencing an IT employment boom similar to that of Silicon Valley in the late ’90s. According to the vice president, the workforce was not stable as a result. Transportation difficulties and the importance of time with family in Indian culture meant that employees generally worked eight-hour days -- the concept of the Silicon Valley engineer who goes sleepless at release time was, well, foreign.
In the end, the cost of offshoring the branch office was only 20 percent less than the going rate in the United States, and for cultural reasons, far more face time than initially expected was needed to ensure the commitment U.S. management demanded -- which resulted in trips to India at least once per quarter. The vice president emphasized that offshoring can indeed work but said it’s a mistake to assume that managing offshore IT is in any way equivalent to managing local IT or that cost savings will be as dramatic as you might expect.
4. Discounting internal security threats
IT managers focusing on external threats can easily lull themselves into a sense of false security. According to Gartner, 70 percent of security incidents that incur actual losses are inside jobs, making the insider threat arguably the most critical one facing the enterprise.
Of course, not all insider threats are born of malicious intent. In September 2004, HFC Bank, one of the United Kingdom’s largest banks, sent to 2,600 customers an e-mail that, due to an internal operator error, made recipients’ e-mail addresses visible to everyone else on the list. The problem was compounded when customers’ out-of-office messages -- containing home and mobile phone numbers -- responded to the mailing.
Even malicious acts are often carried out using very little technical sophistication. In a joint study released this year by CERT and the Secret Service, 87 percent of insider security breaches were found to have been achieved using simple, legitimate user commands, suggesting that IT needs to be vigilant about granting only necessary privileges to end-users. Identity management with specific permissions can help.
5. Failing to secure a fluid perimeter
IT’s responsibility now extends to Starbucks and beyond. The increasing mobility of workers, combined with the proliferation of public wireless hotspots and broadband in the home, means that IT is now responsible for securing systems on networks it does not control. In this environment, solid security means implementing host-based firewalls that will provide some level of protection on an unsecured broadband connection at home or at sites with public Wi-Fi access.
If you’re an experienced IT manager, you might feel comfortable with the top-of-the-line firewall you purchased three years ago. You configure it to block all incoming traffic except port 25 for inbound e-mail, and your employees generally make outbound WAN connections to the Web via ports 80 and 443. This is a common approach, but in a more decentralized IT environment, centralized approaches to network security are no longer sufficient. By encrypting traffic on your internal LAN, you will better protect your network from insider threats and from intruders who might have hopped onto your network via rogue wireless access points.
6. Ignoring security for handhelds
Although even inexperienced IT managers recognize the need for username/password authentication on network resources and desktop and laptop PCs, most IT shops still seem to be in a “wild West” phase when it comes to handheld devices.
At the time, India had been experiencing an IT employment boom similar to that of Silicon Valley in the late ’90s. According to the vice president, the workforce was not stable as a result. Transportation difficulties and the importance of time with family in Indian culture meant that employees generally worked eight-hour days -- the concept of the Silicon Valley engineer who goes sleepless at release time was, well, foreign.
In the end, the cost of offshoring the branch office was only 20 percent less than the going rate in the United States, and for cultural reasons, far more face time than initially expected was needed to ensure the commitment U.S. management demanded -- which resulted in trips to India at least once per quarter. The vice president emphasized that offshoring can indeed work but said it’s a mistake to assume that managing offshore IT is in any way equivalent to managing local IT or that cost savings will be as dramatic as you might expect.
4. Discounting internal security threats
IT managers focusing on external threats can easily lull themselves into a sense of false security. According to Gartner, 70 percent of security incidents that incur actual losses are inside jobs, making the insider threat arguably the most critical one facing the enterprise.
Of course, not all insider threats are born of malicious intent. In September 2004, HFC Bank, one of the United Kingdom’s largest banks, sent to 2,600 customers an e-mail that, due to an internal operator error, made recipients’ e-mail addresses visible to everyone else on the list. The problem was compounded when customers’ out-of-office messages -- containing home and mobile phone numbers -- responded to the mailing.
Even malicious acts are often carried out using very little technical sophistication. In a joint study released this year by CERT and the Secret Service, 87 percent of insider security breaches were found to have been achieved using simple, legitimate user commands, suggesting that IT needs to be vigilant about granting only necessary privileges to end-users. Identity management with specific permissions can help.
5. Failing to secure a fluid perimeter
IT’s responsibility now extends to Starbucks and beyond. The increasing mobility of workers, combined with the proliferation of public wireless hotspots and broadband in the home, means that IT is now responsible for securing systems on networks it does not control. In this environment, solid security means implementing host-based firewalls that will provide some level of protection on an unsecured broadband connection at home or at sites with public Wi-Fi access.
If you’re an experienced IT manager, you might feel comfortable with the top-of-the-line firewall you purchased three years ago. You configure it to block all incoming traffic except port 25 for inbound e-mail, and your employees generally make outbound WAN connections to the Web via ports 80 and 443. This is a common approach, but in a more decentralized IT environment, centralized approaches to network security are no longer sufficient. By encrypting traffic on your internal LAN, you will better protect your network from insider threats and from intruders who might have hopped onto your network via rogue wireless access points.
6. Ignoring security for handhelds
Although even inexperienced IT managers recognize the need for username/password authentication on network resources and desktop and laptop PCs, most IT shops still seem to be in a “wild West” phase when it comes to handheld devices.
At the time, India had been experiencing an IT employment boom similar to that of Silicon Valley in the late ’90s. According to the vice president, the workforce was not stable as a result. Transportation difficulties and the importance of time with family in Indian culture meant that employees generally worked eight-hour days -- the concept of the Silicon Valley engineer who goes sleepless at release time was, well, foreign.
In the end, the cost of offshoring the branch office was only 20 percent less than the going rate in the United States, and for cultural reasons, far more face time than initially expected was needed to ensure the commitment U.S. management demanded -- which resulted in trips to India at least once per quarter. The vice president emphasized that offshoring can indeed work but said it’s a mistake to assume that managing offshore IT is in any way equivalent to managing local IT or that cost savings will be as dramatic as you might expect.
4. Discounting internal security threats
IT managers focusing on external threats can easily lull themselves into a sense of false security. According to Gartner, 70 percent of security incidents that incur actual losses are inside jobs, making the insider threat arguably the most critical one facing the enterprise.
Of course, not all insider threats are born of malicious intent. In September 2004, HFC Bank, one of the United Kingdom’s largest banks, sent to 2,600 customers an e-mail that, due to an internal operator error, made recipients’ e-mail addresses visible to everyone else on the list. The problem was compounded when customers’ out-of-office messages -- containing home and mobile phone numbers -- responded to the mailing.
Even malicious acts are often carried out using very little technical sophistication. In a joint study released this year by CERT and the Secret Service, 87 percent of insider security breaches were found to have been achieved using simple, legitimate user commands, suggesting that IT needs to be vigilant about granting only necessary privileges to end-users. Identity management with specific permissions can help.
5. Failing to secure a fluid perimeter
IT’s responsibility now extends to Starbucks and beyond. The increasing mobility of workers, combined with the proliferation of public wireless hotspots and broadband in the home, means that IT is now responsible for securing systems on networks it does not control. In this environment, solid security means implementing host-based firewalls that will provide some level of protection on an unsecured broadband connection at home or at sites with public Wi-Fi access.
If you’re an experienced IT manager, you might feel comfortable with the top-of-the-line firewall you purchased three years ago. You configure it to block all incoming traffic except port 25 for inbound e-mail, and your employees generally make outbound WAN connections to the Web via ports 80 and 443. This is a common approach, but in a more decentralized IT environment, centralized approaches to network security are no longer sufficient. By encrypting traffic on your internal LAN, you will better protect your network from insider threats and from intruders who might have hopped onto your network via rogue wireless access points.
6. Ignoring security for handhelds
Although even inexperienced IT managers recognize the need for username/password authentication on network resources and desktop and laptop PCs, most IT shops still seem to be in a “wild West” phase when it comes to handheld devices.
A CTO of a wireless software company tells us about a venture capitalist who lost his BlackBerry on a business trip while he was in the middle of closing a highly sensitive, confidential deal. The BlackBerry wasn’t password-protected, so even after the panicked venture capitalist contacted his IT department to have e-mail delivery to the device stopped, anyone who happened to pick up the lost BlackBerry could read e-mails already received.
In this case, the minor convenience of not requiring a password had major implications. Ignoring the security of easily lost devices, particularly those belonging to key executives that traffic in confidential information, is a recipe for disaster.
7. Promoting the wrong people
As CTO or CIO, rewarding your top technologist with a promotion to a management position might seem like the right thing to do. But when a technologist is not ready to give up constant, hands-on technology work in favor of more people-oriented management duties, it could be a mistake you’ll regret on many levels.
One vice president of IT painted a grim picture of such a decision: The promoted employee could be resented by former peers and might not like the new management duties, which could lead to poor performance. Even worse, the new manager might feel compelled to cling to the ill-fitting position because the old position might no longer be available.
Just such an experience put this particular vice president in the tough position of having to deal with a new manager’s performance problems, which led to a double whammy: A top technologist left the company, and the new manager still had to be fired.
Management training can help avoid such disasters. But use your gut. Either the aptitude is there, or it isn’t.
8. Mishandling change management
The former CTO of a computer equipment manufacturer describes one situation in which a talented, but perhaps overly ambitious, systems administrator decided to make seemingly simple changes to a set of critical servers during routine maintenance.
While this individual was making the changes, all of which had been agreed on and planned in advance, he decided on his own to upgrade BIND (Berkeley Internet Name Domain), the open source server software that powers mission-critical local DNS for many companies.
A few hours later, the entire business was at a standstill, as all DNS functions failed. Reversing the “one small change” took hours, and millions of dollars in revenue were likely lost as a result. The lesson is that even talented employees can cause major problems when they don’t follow change management procedures.
Remember, change management is cultural. It all starts at the top: If IT management cuts corners, so will IT staff.
9. Mismanaging software development
In his seminal book The Mythical Man-Month, Frederick Brooks posited that planning software-development projects based on per-unit “man-months” ultimately does not work due to the unique nature of software development.
Even if the building of software could be broken into easily managed, interchangeable time units, the vast productivity difference between the best coders and merely average ones means IT managers might get their best work out of fewer, but more talented, programmers doing their work in less time.
Henri Asseily, CTO of BizRate, tells us via e-mail, “The right individual will always create better and faster core software than a group of people [will]. Everyone in every industry talks the usual talk of, ‘We invest in people,’ or, ‘Our people are our greatest asset,’ but nowhere is it more important than in IT. Simply put, a great programmer is 100 times more valuable than a regular programmer.”
The mythical man-month has been part of software lore since Brooks’ book came out 30 years ago, but many IT managers still plan projects and staff them based on this disproved paradigm. Holding on to this method might lead a naïve IT manager to staff a project with the right number of people for a defined amount of work, but CTOs such as Asseily insist that getting quality people is most important.
“IT managers should devote most of their free time to [finding] the best people. Almost nothing else matters, really,” Asseily says.
10. Letting engineers do their own QA
Not allowing engineers to do their own QA is an axiom of software development, but for small software development teams, there is always the temptation to cut corners. In fact, sometimes management colludes with developers to enable the practice. One CTO relates a situation in which a software development project was running significantly behind schedule and the lead developer had begun to do his own QA to try to speed up the release process. To make matters worse, the lead developer had planned a vacation that was approaching rapidly. A day before the vacation commenced, the developer pronounced all outstanding bugs resolved, and the system was released into production. By the time the developer arrived at his tropical destination, the system was crashing to the point of being unusable. Many of the existing bugs had not been corrected because the developer had not tested thoroughly or formally. Allowing engineers to perform their own QA is akin to allowing  defendants to be the judges and juries for their own trials.
11. Developing Web apps for IE only
Despite the fact that mission-critical applications continue their march onto the Web browser and that Windows continues to dominate the corporate desktop, Web developers should avoid the temptation to develop applications only for bug-ridden IE. IT shops that insist on using IE for Web applications should be prepared to deal with malicious code attacks such as JS.Scob.
First discovered in June 2004, JS.Scob was distributed via compromised IIS Web servers. The code itself quietly redirects customers of compromised sites to sites controlled by a Russian hacking group. There, unwitting IE users download a Trojan horse program that captures keystrokes and personal data. Although this might not sound like a threat to corporate IT, keep in mind that employees often use the same passwords across corporate and personal assets.
Many enterprises may not be able to avoid using IE. But if you make sure your key Web applications don’t depend on IE-only functionality, you’ll have an easier time switching to an alternative, such as Mozilla Firefox, if ongoing IE security holes become too burdensome and risky for your IT environment.
12. Relying on a single network performance
When it comes to network performance, there’s no single metric by which to judge network health. Douglas Smith, president of network analysis vendor Network Instruments, points out that it’s a mistake to think that network utilization can be quantified in a single way. When management asks for a single network utilization report, IT is typically sent scurrying for a single metric for network health that is ultimately impossible to define.
That said, certain aspects of a network, such as port utilization, link utilization, and client utilization, can and should be measured. In any scenario, successful network analysis means taking a step back and looking at the data in the context of your enterprise.
Network utilization requires judgment calls. If two ports on a switch are 90 percent utilized and the others are not utilized, do you consider your switch utilization to be 90 percent? It might be more appropriate to ask which application is causing those particular ports to reach 90 percent utilization. Understanding the big picture and analyzing utilization levels in context are the keys to getting a sense of your network’s health.
13. Throwing bandwidth at a network problem
One of the most common complaints addressed by IT is simple: The network is running slower than normal. The knee-jerk reaction is to add more capacity. This is the right solution in some cases but dead wrong in others. Without the proper analysis, upgrading capacity can be a costly, unwise decision. Network Instruments’ Smith likens this approach to saying, “I’m running low on closet space, and therefore I need a new house.”
Capacity aside, common root causes of slowdowns include unwanted traffic broadcasting over the network from old systems or apps, such as IPX traffic, or misconfigured or inefficient applications that spew streams of packets onto the network at inconvenient times.
According to Smith, one of Network Instruments’ banking customers was considering upgrading its WAN links due to complaints from tellers that systems were running slow. The IT team used a network analyzer to determine that increased traffic levels were being caused by a security app that ran a daily update at 3 p.m. When the IT team reconfigured this application to make updates at 3 a.m. instead, they were able to quickly improve traffic levels without making the costly WAN upgrade.
14. Permitting weak passwords
In the Internet age, new threats such as worms and phishing tend to garner all the security attention, but the SANS Institute’s Top 20 Vulnerabilities list released in October points to a basic IT mistake: weak authentication or bad passwords (infoworld.com/2193). The most common password vulnerabilities include weak or nonexistent passwords; user accounts with widely known or physically displayed passwords (think Post-it Notes); administrative accounts with weak or widely known passwords; and weak or well-known password-hashing algorithms that are not well secured or are visible to anyone. Avoiding the weak authentication mistake boils down to simple IT blocking and tackling -- a clear, detailed, and consistently enforced password policy that proactively deals with the most exploited authentication weaknesses detailed in the SANS report.
15. Never sweating the small stuff
CTOs and CIOs like to talk about the strategic application of technology, but ignoring basic tactical issues can lead to simple but extremely costly mistakes. Missing a $30 domain name registration payment can be enough to grind your business to a halt. In one notorious example, last February a missed payment by The Washington Post knocked out employee e-mail for hours until the renewal was paid.
As datacenter environments become denser, even low-level facilities issues may demand scrutiny. On his Weblog, Sun Microsystems President Jonathan Schwartz quoted a CIO who responded to a “what keeps you up at night” question with, “I can no longer supply enough power to, or exhaust heat from [our datacenter]. I feel like I’m running hot plates, not computers.” A CIO who overlooks burning -- but not necessarily obvious -- issues such as these may soon be in search of another job.
16. Clinging to prior solutions
A common mistake for IT managers moving into a new position at a new company is to try to force solutions and approaches that worked at a prior job into a new environment with different business and technology considerations.
One current vice president of operations describes a new, low-cost open source environment he had to manage after working in a more traditional shop that relied on high-end Sun hardware and Oracle and Veritas software. The new startup company couldn’t afford the up-front cash required to set up a rock-solid environment based on commercial software, so they ran a LAMP (Linux, Apache, MySQL, PHP) architecture with an especially aggressive Linux implementation on 64-bit AMD Opteron machines. Gradually, the vice president realized that his old solutions wouldn’t work in the new environment from a technology or cost angle, so he changed his approach to fit the new reality, using none of the technologies from his prior job.
17. Falling behind on emerging technologies
Staying current can prevent a disaster. For instance, the emergence of inexpensive consumer wireless access points during the past few years has meant that anyone can create a wireless network -- a real problem for any reasonably structured corporate IT environment. A Network Instruments retail client, for example, was installing a WLAN to serve the needs of employees who measured warehouse inventory levels. Soon enough, management wanted access to the WLAN, and without asking for approval, some employees installed wireless access points at their desks.
Fortunately, the IT staff had implemented ways to check for rogue access points, and a WLAN channel scan with a network analyzer quickly showed there were more access points on the network than the administrator knew had been deployed. In this case, the IT staff recognized an emerging technology that might be stealthily introduced by employees and developed procedures to inventory the threat, thereby controlling it.
18. Underestimating PHP
IT managers who look only as far as J2EE and .Net when developing scalable Web apps are making a mistake by not taking a second look at scripting languages -- particularly PHP. This scripting language has been around for a decade now, and millions of Yahoo pages are served by PHP each day.
Discussion of PHP scalability reached a high-water mark in June, when the popular social-networking site Friendster finally beat nagging performance woes by migrating from J2EE to PHP. In a comment attached to a Weblog post about Friendster’s switch to PHP, Rasmus Lerdorf, inventor of PHP, explained the architectural secret of PHP’s capability of scaling: “Scalability is gained by using a shared-nothing architecture where you can scale horizontally infinitely.”
The stateless “shared-nothing” architecture of PHP means that each request is handled independently of all others, and simple horizontal scaling means adding more boxes. Any bottlenecks are limited to scaling a back-end database. Languages such as PHP might not be the right solution for everyone, but pre-emptively pushing scripting languages aside when there are proven scalability successes is a mistake.
19. Violating the KISS principle
Doug Pierce, technical architect at Datavantage, says that violating the KISS (keep it simple, stupid) principle is a systemic problem for IT. Pierce says he has seen “hundreds of millions” of dollars wasted on implementing, failing to implement, or supporting solutions that are too complex for the problem at hand. According to Pierce, although complex technologies such as CORBA and EJB are right for some organizations, many of the organizations using such technologies are introducing unnecessary complexity.
This violation of the KISS principle directly contributes to many instances of project failures, high IT costs, unmaintainable systems, and bloated, low-quality, or insecure software. Pierce offers a quote from Antoine de Saint-Exupery as a philosophical guide for rooting out complexity in IT systems: “You know you’ve achieved perfection in design, not when you have nothing more to add, but when you have nothing more to take away.”
20. Being a slave to vendor marketing strategies
When it comes to network devices, databases, servers, and many other IT products, terms such as “enterprise” and “workgroup” are bandied about to distinguish products, but often those terms mean little when it comes to performance characteristics.
Quite often a product labeled as a “workgroup” product has more than enough capacity for enterprise use. The low cost of commodity hardware -- particularly when it comes to Intel-based servers -- means that clustering arrays of cheap, workgroup hardware into an enterprise configuration is often more redundant and scalable than buying more expensive enterprise servers, especially when it comes to Web apps.

http://www.infoworld.com/d/developer-world/top-20-it-mistakes-avoid-314

LinkWithin

Related Posts with Thumbnails