Decluttering Blueprint – Step 4 – Organizing Your Family Room

Is the gathering area (a.k.a. family room, living room, den, great room) in your home chaotic and cluttered? If so, try the following prescription to create a calm, comfortable and orderly space you’ll love to relax in and entertain family and friends.

  1. Pin down the purpose(s) of your room. Is it your intention to use the family room as a place to watch a movie, curl up and read, play with the kids, take a short nap and gather with friends? Whether you have the foregoing functions in mind or something different, move objects unrelated to the purpose of your room (shoes, clothing and the ironing board) to other more appropriate quarters of your home.
  2. Specify the major categories of items to be kept in your family room. For example:
  • Reading – books, magazines and newspapers
  • Media – TV, VCR, DVD, stereo, videos, CD’s, DVD’s and remotes
  • Toys – dolls, action figures and vehicles
  • Games – board games, puzzles and cards
  • Collections – photos, baseball paraphernalia, etc.
  • Sort everything in your family room into piles that represent the major categories identified in step #2. Begin with all surface items, and then move to objects stored in baskets, drawers, and cabinets. Smart tip: If you haven’t edited your belongings for a number of years, you will find it easier to sort large quantities of things by using a large box to hold the contents of each major category; the boxes will ensure your piles don’t spill over and get mixed up.
  • Cut out the clutter and organize what remains. Working with one category at a time, evaluate each item using the following rules: don’t keep anything you don’t love or use; reduce multiples of any single item; recycle all but the current issue of magazines and newspapers; dispose of broken and unwanted items by pitching them, giving them to someone else, selling, or donating them. Then put the remainder of items in order. For example, eliminate: duplicate pictures, out-of-focus pictures, and unflattering pictures. Then arrange the pictures you want to keep by date or theme, such as home, family, school, vacations, etc. Smart tip: As you’re weeding out clutter from each major category, let go of 20% more stuff than you have room for, that way new acquisitions will have a ready made home.
  • Arrange your room for comfort and functionality. When you have one space that serves multiple functions, consider setting up your room in zones – each to accommodate a different activity. For instance:
    • Reading and gaming. Place a game table and chairs where you have a good light source, it makes a great spot for perusing the paper and playing board games. The same table top can also double as a place to set out snacks when you have friends over. Mount shelving or spot a bookcase on an adjacent wall to house books and gaming materials.
    • Watching TV. Pick a good place to locate your TV and hide electronic gear in cabinetry if you don’t want to see it. Coordinate the arrangement of key seating pieces so you can readily see the screen (and take advantage of the view, if applicable). Position a magazine rack nearby and toss a throw over a plush armchair so you can cover up and catch a cat-nap when it’s chilly.
    • Playing. Tuck toys into baskets or storage ottomans that blend with the aforementioned zones. These types of containers offer an ideal way to store distracting clutter and make the family room a welcoming adult space after the kids have drifted off to dreamland.
  • If needed, use containers you have around your home to accessorize and containerize items that are easy to access. Family rooms are a magnet for books, papers, magazines, and supplies that get piled on the floor and table tops. However, you can organize these items with budget friendly solutions you likely have around your home.
    • Shoe boxes of the same size and color can be used to corral photos, letters, CD’s and more. Using multiple containers with the same color and symmetry will elevate the ordinary into an appealing collection.
    • Fruit crates, baskets, and sturdy totes can be used to hold books, magazines and newspapers.
    • Pottery, glass jars, and mugs are good holders for pens, clips, rubber bands, and push pins.
    • Ice cube trays, muffin tins, box lids, and cutlery trays make great drawer organizers.
    • Vintage luggage and picnic baskets stacked on top of each other work well as side tables and make for durable, attractive storage.
  • Slip items you want to confine into their new vessel and place them where they’ll be pretty and practical. That’s it! You now have a family room that’s organized, easy to clean, and makes smart use of your space.
  • Stay tuned-the next addition of the Decluttering Blueprint will be released soon.

    Agricultural Biotechnology International Conference Kicks Off in Australia

    A major international conference on agricultural biotechnology starts in Melbourne, Australia, today (August 6, 2006).The Agricultural Biotech International Conference (ABIC) brings together representatives of biotech companies, agricultural researchers and policy makers from across the world.

    The theme of this conference is Unlocking the Potential of Agricultural Biotechnology. Some of the topics to be discussed include:

    * Importance of biotechnology in meeting global food requirements.

    * Application of agricultural biotechnology in biomedicine.

    * Commercialization of innovative biotechnology.

    * Practical applications of genomics to cereal crops.

    * Using biotechnology to protect and enhance food supply.

    * Biotechnology in developing countries.

    Unlocking the potential of agricultural biotechnology is an issue that has been with us since the commercialization of the first genetically modified crop a decade ago. Developed countries, notably the U.S. and Canada, appreciate that agricultural biotechnology has been a prime mover of their economies. They have massively invested in it, effectively eclipsing the so-called conventional agriculture. The gains have been innumerable.

    Farmers in these countries have almost doubled their income from cultivating genetically modified crops, that are usually high yielding and pest resistant.

    In developing countries, the picture is different. Agricultural biotechnology remains a contested issue. Many developing countries would not embrace because of their distrust for the developed countries. Others have been fed with lies that agricultural biotechnology, and in particular Genetically Modified Organisms (GMOs), pose danger to the environment and the health of consumers.

    Positive attributes of agricultural biotechnology must be played out at the Melbourne meeting for all to listen.

    It’s encouraging that delegates from developing countries such as Prof. Jennifer Thomson (South Africa), Dr. Jagadish Mittur (India), and Dr. Rangsun Parnpai (Thailand) are attending this conference. They have a chance to learn firsthand how agricultural biotechnology has revolutionized the economies of such countries as the U.S., Canada, New Zealand, and Australia. These delegates must explore how their countries can similarly benefit from agricultural biotechnology.

    Since this is a gathering of experts in agricultural biotechnology, it’s expected that there will a productive debate on the potential of agricultural biotechnology. Delegates should conduct their deliberations with developing countries in mind. It’s here where agricultural biotechnology is in dire need.

    Developing countries delegates are encouraged to view this conference as a window of opportunity to learn from as many experts as possible on the potential of agricultural biotechnology.

    Once the curtains of this conference fall, delegates from developing countries must ensure that they share the lessons learnt with policy makers, scientists and farmers in their respective countries.

    International Copyright Protection

    Copyright Intellectual Property can be protected at National and International. Copyright has international protection such as Berne convention, universal copyright convention, WIPO copyright Treaty, Rome convention, Brussels convention etc.

    The International union for the protection of literary and artistic works was established in 1886 in Berne, Switzerland. It is popularly known as Berne Convention. It entered into force on 5th December, 1887 and it has been revised for five times. It is administered by world intellectual property organization (WIPO). The Berne convention has 38 articles and special provisions for the developing countries. The convention has established a minimum of protection of life plus 50 years or an alternative of fifty years from publication of anonymous work and pseudonymous work. India is a member of the Berne convention.

    One of the International copyright protections is Universal Copyright Convention (UCC). The universal copyright convention was signed and entered into force on September 6, 1952. It was revised on 1971 at Paris. The protection given is for published as well as unpublished works. The member countries must grant a minimum copyright term of 25 years from publication, or life of the author plus 25 years. The foreign authors of other member countries must be granted exclusively rights for at least seven years.

    The next International Copyright protection for the performers, producers of phonogram and broadcasting organizations is Rome convention. The Rome convention was completed on October 26, 1961 and entered into force on may 18, 1964 basically intend to protect the neighboring rights. Phonogram is a sound recording. The rights in respect of phonograms and performances and broadcasting are called neighboring rights.

    The benefits of this convention are performers, producers of phonograms and broadcasters. The protection is granted for twenty years term will vary according to the nature of work. The eligibility to participate in this convention is that a state must be a member of either of the Berne convention or the universal copyright convention.

    Another International Copyright protection is WIPO copyright Treaty. It was adopted by the diplomatic conference at Geneva on December 20, 1996 and entered into force on January 1, 1996. This convention is for the protection of rights of performers and produces of phonograms. The term of protection is fifty years.

    Some treaties convention gives protection for the unauthorized duplication. On October 29, 1971, the convention for the producers of phonograms against unauthorized duplication of their phonograms is signed at Geneva. The main purpose of this Geneva Convention is to fight against the practice of piracy by third parties.

    The convention relating to the distribution of programme- carrying signals transmitted by satellite and audio- visual works is Brussels convention signed on may 21 1974. The main purpose is to battle the misappropriation of satellite signals on an international level. The treaty on international registration of audio-visual works Geneva signed on April 20, 1989 at Geneva. It deals with the registration of audio- visual works at the international level.

    Characteristics of Modern Media Technology

    Media has evolved a lot. Modern media depends on Technology to send information or gather them at a faster speed. The following are the characteristics:  

    Speed: The information reaches at a faster speed.     

    Reach: The information must have mass reach.  

    Preventing Calamities: Modern media broadcasts 24 hours. So high technology is used to beat natural calamities.     

    Constant Transmission: Technology is used for constant transmission.  

    The following tools of technology is used to achieve the aforesaid targets:  

     

    Use of Satellites: Satellite Technology is used to ensure constant transmission. A satellite hardly  gets affected by climatic conditions.     

    Use of Video Conferencing: It is used to get live and personalized feedback without physical presence.  

    Use of Television Conferencing: It is used to get audio inputs from far off places.  

    Use of Internet: Internet is being relied upon for information.  

    Use of high end Computer Technology: Computing and high speed processors are used for fast and able data processing.  

    Use of Mobile Satellite Vans for News Coverage: Satellite vans are used for high mobility and anytime coverage.    

    Use of high end Audio visual equipments: Use of high end audio visual equipments have emerged that leads to clear sound and picture. Tape recorders and high end video cameras are used by media persons to take interviews fast and transmit news ina proper and efficient manner.    

    Thus these are the characteristics of Modern Media Technology that has made media more fast, accurate and improved and has made it an indispensable tool for protecting the  largest democracy of the world named India by making it more transparent and accountable to people. Hence these are the characteristics of modern media technology.  

    How To Make Successful Communication Through International Conferencing Services

    Do you feel the necessity of communicating with others all around the globe? International Conferencing is the best ever way to meet the end of your like nature requirement in a gainful way. Such conferencing features Audio Conferencing which works through telephone calls using people’s voices or audio medium. This system attaches a group of people, dialing into a specific conference network, hosted by particular conferencing service provider. As a raconteur, on behalf of any global business organization, you can handle efficiently the relation with consumers & employees all over the world through this unique system. This is also an easy task to make a close bonding with your friends or relatives residing or working abroad through this type of conferencing service. This system is an ideal for those who want to lop off the travelling cost and many other problems related to making of a big business promotion. Anyone can get this facility at home, in the office, in your car or sitting in a pub, too.

    Feature rich Conferencing

    The web or audio conferencing solutions seems apt enough for Real-time communication in a professional environment as it takes good care of the necessary functionality in a corporate or business scenario. Users get the liberty of transferring the documents, applications and files effortlessly alongside sharing the whole desktop with the participants present on the other end. Effective features including white-boarding, drag and drop, annotations are being blended into the collaborative software to ensure proper brainstorming and real-time sharing amongst participants who are located distantly. Companies or individuals can choose these features as per their needs and requirements while acquiring international conferencing solutions from reliable service providers.

    To let people well aware of the high-end features, the service providers have come up with collaboration software with intuitive interfaces. Such user-friendly web conferencing can be included into phone or audio conferencing platforms to ensure greater functionality to users. The large bold icons, cool interface designs, screen fit feature etc ensure easy operational functionality for new users. Besides, the conferencing products are well backed with online controls so as to help the participants in configuring dial-out options, participant settings and mute, unmute features from interface.

    Working procedure of Worldwide Conferencing:

    The methods of Global Call Conferencing start in a lucid manner; this are-

    Conference Calling Number: In this process, you need an exclusive access number to get rid of paying high-priced international call rates. The caller may get a global toll-free number, to gain access into the discussion, in case you go for such types of call services provider.

    Getting into through Access Code: The individual member of the conference must come into the PIN number or the specific access code for entering into the said discussion.

    Start over the Discussion: After substantiation of the exact access code or recognition process, you can start your conference.

    So, prior to selecting International Conferencing, you must particularly find out whether the systems match well with your factual requirement. It is expected that you can make good use of this article before initiating a communication with such type of Audio Conferencing.

    How International Audio Conferencing Works

    Audio conferencing enables individuals from different locations to connect and speak with each other using the services of a secure telephone line. The process allows people who otherwise may not be able to physically meet each other to communicate and have meetings. This is a preferred mode of communication as it is more economical for businesses than to have their personnel travel across cities or countries to attend meetings. International voice conferencing allows people in different countries to communicate with each other at a pre-determined date and time.

    This is more commonly known as teleconferencing or voice conferencing, any number of people can be connected at the same time. This form of communication is widely in use in commerce, education and business. It also saves time as traveling from one country to another can take time, and delays can always make such trips much longer. Traveling also causes disruption at work as the time it takes for an employee to travel means time away from the office.

    An international audio con-call differs from an ordinary phone call in the sense that there are more than two people who make up a voice con-call. Callers are connected to what is known as a conference bridge which is a server that makes it possible for many people to communicate with one another.

    There are different types of international voice conferencing services available today. The first type is the “dial in” which is simply dialing a number that has been pre-designated and given to all the participants of the conference to call. It is normally accompanied with a code or passkey that needs to be entered via a touch tone phone.

    The second type is called the “reservation-less call” which is most commonly used for businesses that choose to allow participants in Canada and/or in the US to connect toll-free into the con-call. If the participant is outside the local dialing calling area, there is no long distance cost incurred as these are charges to the host of the con-call. This type of call also utilizes a passkey or pass-code.

    The third type of voice conference call is “operator assisted.” Operator assisted con-calls uses services offered by a conference call company which normally includes the bringing of participants to the call (operator dial out), call moderator and live call monitoring, roll call, faxing or emailing of any documents to all the participants, services like translation, and many more services.

    Such voice con-calls allow businesses to communicate with people in different locations or countries without incurring traveling, hotel costs, per dime costs, and any travel delays that can arise.

    Make An International Conference Call

    A lot of technological advancements in communication and broadcasting have paved the way for bringing people from across the globe closer through an international conference call. However, people have been calling internationally without so much the thought of doing it the right way to save costs. If not, their telephone bill could amount to hundreds or even thousands of dollars every month.

    On the bright side, thanks to technology and modern times, there are a lot of international calling methods that are existent nowadays than there did many years ago. The humble telephone is not anymore the only means to call someone half a world away, but there is now a new method that relies on new technology like VoIP or Voice over Internet Protocol. VoIP makes phone calls over the Internet possible instead of traditional long distance calls.

    To effectively communicate with other people across the globe without making a hole in your wallet is fairly easy. Just like making a regular conference call, an international conference call follows the same basic principles:

    (1) participants dial in to a conference call access number, (2) they enter the access code or PIN for their conference, and (3) they join the conference.

    International conference calling is unique in a way that international participants need special access numbers to avoid paying expensive international call rates. If you go to the larger services providers you might get an international toll-free number to access the conference. Other providers set up local access numbers in countries where their customers normally call.

    For instance, you want to hold a conference call with clients in England, Japan, and Canada and you’re located in the United States. All you need to do is dial either an international toll-free access number or a local access number. Those who use the local access number are right away connected to the central conference bridge via a global IP network.

    Using a dial-out system rather than a dial-in system is another economical way of making these kinds of calls. In a dial-out system the moderator dials out to each participant individually, thus absorbing the costs of each international call.

    5 Reasons Your Business Should Have an Information Protection Policy

    Information is the lifeblood of all businesses, but many business owners and high level managers often overlook the security of their business information to focus on what they consider more important; “the generation of revenue.” Many even know the risk well in advance but take on the mentality, “It will never happen to us.” Then the inevitable happens.

    Experience has proven that the disregard for the protection of business information is disastrous. The smallest vulnerability in a business’s Information Security System (ISS) can and does cause businesses thousands, even millions of dollars in financial loss everyday. Experts have found that in the majority of the cases involving “loss” from the theft of information that the business owner(s) or managers were aware that potential breaches existed and did nothing to correct the issue. Experts also point out that in 99% of the cases that the cost to fix the breach would have been thousands to millions of dollars cheaper then the loss the business sustained from the breach itself.

    According to “Trends in Proprietary Loss” (ASIS International, 2007) these are the top 5 reasons businesses of all sizes should have an active and progressive Information Security System (ISS) and Information Security Management System (ISMS) in place.

    • Loss of reputation/image/goodwill – Taking a hit in the pocket could be bad but not as half as bad as taking a hit to your reputation. Many business can rebound from loss of revenue but repairing your business reputation can cost astronomical time, effort and money. The implications are overwhelming in most cases.
    • Loss of competitive advantage in one product/service – When you have been working feverishly to stay ahead of the game but your competitor beats you to the finish line every time, “There’s a hole in your boat.” The leaking of trade secrets, product delivery timelines and other business processes can completely derail a business and destroy its competitive advantage.” In 2006 there was a well known case of information theft concerning an employee from a major beverage. That employee stole trade information and conspired to sell it to another beverage company for 1.5 million dollars.The employee was arrested after the competitor turned her in.
    • Reduced of projected/anticipated returns or profitability – This can occur when your competitor knows your pricing strategy. If they’re selling the same type of product or service as your business they can, and will easily outprice you.
    • Loss of core business technology or process – A quick Google search will give you some insight on how businesses lose billions in the process when technology is leaked or stolen. The case of the drawn out and costly battle of the “Cell Phone Giants” comes to mind. Do a Google search about it. There are some really insightful facts that you may not have known about the case.
    • Loss of competitive advantage in multiple products/services

    All of the above are sound reasons while your business should have an active information security policy. I am of the opinion that any business that regularly loses money and fails to implement processes to stop it,will soon be out of business. Therefore, I encourage all business managers, executives and owners to take the protection of their information seriously. Make time to review your current information security processes and policy with your security manager. Listen to his/her concerns and recommendations. After all that is what you hired him/her for. Concentrate on making your security a “Necessary good” instead of a “Necessary evil” and dedicate a reasonable but flexible budget to immediately address new or unexpected security threats. It could truly save you a life of headaches, court battles and money in the end.

    Below are a few recommendations that I believe will help any business to begin improving their information security process. It will also help to improve overall security in general.

    Recommendations

    • Ensure that sensitive information is only accessible to a small group of people based on a need to know basis. This information is to be kept in a secure area with progressive and redundant security measures.
    • The first level of security can be posted signage that designates the level of authorization required to be in specific areas. These signs should also advise the consequences for ignoring them.
    • The second level of security may include CCTV cameras which are manned or unmanned (but have the ability to be reviewed later). Cameras serve as a good method to detect, deter and in some cases respond to nefarious behavior.
    • The third level of security mandates designated key cards or key fobs to enter restricted areas. This authorization can also be indicated by color coded ID badges. A security checkpoint guarded by trained security officers is also an option.
    • The fourth level of security concerns areas where the most sensitive information is held. This area should include CCTV cameras, locked file cabinets and safes. This should be supported by a well written Information Protection Policy created in partnership with an experienced security professional and it should be strictly adhered to.
    • Lastly, a schedule for audit and compliance should be instituted and a designated person appointed the responsibility for its oversight. This recommendation has more to do with Information Security Management, which I will discuss in a later topic.

    General Information Security Practices

    The preceding concerned security strategies for highly sensitive information however, we must not overlook the need for the security of general business information. Information comes in many forms and businesses must protect them all. Here are a few more tips that I recommend to improve your current Information Security Policy:

    • Ensure that all documents that contain personal, personnel and company information are always kept secure. This information should never be left lying around on someone’s desk or in their inbox. Always keep this type of information under lock and key and designate a person to ensure strict accountability.
    • Ensure that you have a information security policy in place and share it with your entire staff. This policy should include how to file or discard company information.
    • Ensure that your company has a shredder and include shredding regulations (what should be shredded, when and by whom) into your policy.
    • Always ensure that someone in your organization stays abreast of current cyber threats. This person is normally the head of the IT department or your security manager. He/she should also ensure that your anti-virus and firewall systems are regularly updated and tested. If your company does not have a dedicated IT department of manager it wouldn’t hurt to consult with an IT Security firm to get a check-up.
    • Ensure that your Information Protection policy includes regulations pertaining to thumb drives and portable hard drives. The policy should clearly state what information can be saved or uploaded from and to the devices. Also consult with your IT department to disable the USB ports on your computers and networks if necessary.
    • Finally, every business should have a Non-Disclosure Agreement. NDAs set the expectations for your employees as it pertains to the privacy of your business affairs, processes and materials. It also provides the recourse for violating the policy. can be found on the web, but I recommend consulting with your attorney to ensure that your NDA provides you and your business optimum protection.

    That about sums it up. I believe that by implementing these strategies that every business can improve the protection of their information and reduce the chances of suffering financial loss. In many cases you may even increase your profitability, which is why we are all in business anyway. I hope that you found this information valuable. Never underestimate what a solid Information Security Program can do for you.

    Thanks for reading and I hope that these quick security tips help to kick start or rekindle your Information Security Program.

    Making Your Employees Understand the Value of Information

    When deploying a bespoke information security awareness campaign, the ultimate aim is to build a mindset in which employees come to respect and protect the information they work with. To achieve this, it’s imperative that employees fully understand the value of that information.

    Failing to understand the value of information is a major cause of information security breaches. For example, it’s the reason why sensitive information ends up in wastepaper baskets or recycling boxes, which subsequently exposes it to ‘dumpster diving’ – the practice of scouring company bins for useful competitor intelligence.

    Failing to understand the value of information has led to some of the high profile ‘laptop left on a train’ incidents, where employees are walking around with sensitive information on their hard drives that hasn’t been encrypted for transport.

    Failing to understand the value of information can even cause employees to talk themselves into doing things they’ve already been told is bad practice, such as connecting to an unsecure hotel wi-fi to check email. We’ve all been tempted to do it because of the convenience. What stops us is knowing how valuable the emails coming in and out are – all of which can be intercepted on an unsecure wireless connection.

    Communicating value

    The value of information is best communicated through a clear information classification scheme. For example, let’s use the traditional labels of ‘public’, ‘internal’ and ‘confidential’ information. One of the most effective methods of communicating value is to consider all of the information types within your organisation and categorise them under these headings. Turn that into a clear communication that allows employees to see exactly which information types should be considered under which classification. There are also some engaging and fun ways to embed this in your employees’ minds.

    Make classification mandatory

    Making classification of all documents mandatory also helps to embed this consideration of value. A classification must be assigned to every new piece of information that employees generate. Similarly, every piece of information they receive must be immediately checked for its classification. If a piece of information is passed on without a classification, then the practice of sending it back to the originator for classification will eventually cause this handling procedure to become second nature.

    Protecting confidential information: Carrot or stick?

    For most organisations, accidentally or intentionally disclosing confidential information is a disciplinary offence. As long as you state this as part of a campaign that simultaneously instils the value of information, then it can be quite effective.

    However, bear in mind that the most effective internal communications campaigns succeed by aligning the objectives of the employee with the objectives of the organisation. Therefore, a more effective method is to make the employee see the personal value of protecting information at work. There are many messages that can be used, such as building the employee’s perception of their contribution to organisation success, and the need to protect the integrity of this achievement. You can also communicate how devastating an information breach can be – for example, through lost revenue or a fine from the Information Commissioner’s Office. An information breach could even cause enough lost competitive advantage that an organisation is no longer able to operate at the same size it was. This associates the concept of information security with job security.

    Acformation – The New Information Paradigm

    The First Paradigm – Age of Information (circa 1980 – 2000)

    Information, coming in, captured the then market realities. It represented the collective market notions such as ideas, beliefs, etc. for a given time period. The Information Gradient (IG), the rate at the which a given information changed – proven, disprove etc. was fairly linear. In other words, the market behaviour was within the predictable limits of Organizational Think-tanks (OT).

    The Second Paradigm – The Rise and Fall of Real Time Information (circa 2000 – 2012)

    The changing market dynamics brought new problems to these OT. The IG lost its linearity. It became a victim to unforeseen market forces, and thus became more skewed. The Information captured did not convincingly represent the market notions.

    It was then time for the next paradigm shift – the Real Time Information (RIT). But, RIT never represented information at all. It was a screenshot of the market notions at any point of time. It allowed the OT to ‘trust’ the market forces before taking any strategic decision.

    It worked well for a while. Until RIT started losing the ‘realness’ of the information. As the real-time capturing of information peaked, companies started becoming more aspirational. They wanted information created a moment ago. While the technological advancements made it possible to capture and deliver information real-time, these companies found it difficult to put this information into perspective. For a vital component of the information made no sense – how useful is this piece of information for the immediate decisions to be made and its integrity for long-term strategic decisions.

    The era of RIT came to end.

    The Third Paradigm – The Age of Acformation (Present)

    RIT is dead. How could a piece of information captured a minute ago make sense? More so, when information captured a minute ago will not be the same as the information that is to be captured the next minute. Especially in an industry such as Apparel or Footwear where the fashion trends are changing.

    RIT lacks a continuity, in terms of aiding the business in taking market decisions.

    Acformation was born. It stands for Actionable Information.

    Acformation is radically different. It does not capture or represent information at all.

    Acformation, in essence, represents the rate of change of information. In other words, it represents IG. IG is a meta-information, i.e. information about Information. It provides the much need context for the information, and is thus, Actionable.

    Understand your company’s Information Structure

    As a retailer, you need to understand the Information Structure of your business.

    Primary Information (PI)

    Stock Levels

    What do you have? How much of it do you have?

    Sales

    What has been sold?

    How much of it has been sold?

    Secondary (or Meta) Information (SI)

    What did this customer buy?

    How much did the customer buy?

    What is the Customer Profile?

    What is the customer buying history?

    Miscellaneous Information (MI)

    Company Performance

    Accounts and Balance.

    Actionable Information (AI)

    Given the PI, SI & MI levels, how disposed is the customer (or a group of them) to buy in the future?

    How likely will the purchase be made?

    How frequent will this happen?

    Will there any change in their preferences as result?

    How resources is your shop in making this happen?