Organization in Mechanics of Sporting Administration – Racing as the Model

Kaminiatsummerstage3 By Kamini Kandica Abdool

Sporting administration is one of the most important parts of compliance in sports.  The rules and regulations are reviewed and observed there.  It’s the inspector that shows up with the checklist, it’s the mechanic and the tire guys, the cleanup crew, and even the guy that blows the residue off the track after your fast race car pulls off.

Is this where it starts arbitration? Every environment needs an arbitrator, whether it be driver who needs to know the rules, the pit crew who tells the driver that the part doesn’t work, or the manager that can’t come to a reasonable resolution. Is this where compliance begins?

Since I started with racing, racing is a good model to expand on.  Who is there to arbitrate the matters of the race? The matter of the grounds? Well, it starts there.

The ground work for racing starts there, in the garage on the ground. Here the configurations of the car, for the car start, the crew is scheduled, engine is checked for “compliance” to the race, the models and shapes are measure, the wind in the wings get a check, computer checks for spills, holes, or bubbles, and everything else that goes along with checking that car! The inspector here would be the arbitrator.

Is the arbitrator the administrator?  For compliance reasons, at that juncture, he is “the” administrator, the one that monitors, looks for errors, reviews the specs and spokes…. and then reports it.  Will it be in time for the race, for time trials?

Maybe, maybe not…. another arbitrator or is it the same guy?  Hmmm…. many times, sporting administration is a group thing, an effort of more than one persons.  Their main purpose is — compliance where the checkpoints distinguish their roles.

Posted in Uncategorized | Tagged , , , , | Leave a comment

Mobile Phones and IT security


By Kamini Kandica Abdool

Mobile phones now have Internet access, Email, Texing, You-Tube, streaming radion and social media.  Many times, with that comes access to open ports on your cell phone from hackers and other preying individuals.

How do you secure your phones and stop such attacks?

Many antivirus companies now have software to protect against such attacks and some are even free.  i.e. Trend Micro.



Posted in Uncategorized | Tagged , , , | Leave a comment

Safety Restrictions or Definitions

996820_10151515777653775_1347629707_n By Kamini Kandica Abdool

IT Security is currently being rebuilt to include the needs of the whole world. How do we though, come up with borders that will define and integrate better security measures rather than pose heightened restrictions that propose more risks.

Restrictions are of course necessary but guidelines are also.  New security requirements need guidelines to reinforce proper regulation.  Where do we go to get that? Most laws are already setup to protect and keep in line security measures but the problem is compliance.

Many companies and governments have problems with compliance – keeping up with checking the balances. How do miss it?  It disappears in the daily grind, the conversation that you just missed for to get a cup of coffee and forgot to follow up on, it was in your training manual, it was the i you forgot to dot or the t you forgot to cross today.

Or maybe it was just misunderstood…..

How do you fix these misses….. by being diligent and by creating guidelines that cater to those situations.  An example is one used by many help desks. They have found a way to curtail issues like this with a daily task list – ie site checks.

Other examples of ways to create better procedures to reinforce rules and regulations and keep standards in place are, schedules, curfews, menus, status bars, org charts, reorganization, beta queue, and procurement.

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Providing a Fundation for IT Security with Data

kaminiPhoto00591 By Kamini Kandica Abdool

IT Security, an important part of dealing with IT issues and providing safety has a means to create a better foundation to manage better the move of the Technology sector to a more global environment and it begins with data.

Data, a big mass undergoing reorganization is providing a means to develop a better infrastructure for technology.  To be fair, data is really where it begins, even with development. So there in start the machinery movements to better fundamental values and reach for security, security in IT.

One of the reasons for the review is to find a use for archaic data that just sits around in mass.

Ever had to defragment your hard drive?   Well in the same way that defragmenting sorts and keeps together files of the same sort, a similar change is set to occur with data.  The industry right now (IT industry) is looking to reorganize data in a format that will make it usable

Data is not just a mass that is immobile and unstable anymore.  Trend Micro, a major role model for security has gained popularity for their new initiatives to secure mass data.  By using Cloud Technology, they have enabled a network with high reach to secure data while Symantec another major influence in IT have given ideas and opportunities to organize sufficiently data in mass with programs specifically with data in mind.

A good relationship with technology is important for human survival.   Many metaphors exist showing the possibility of too much technology and little life. To keep intact a balance in security and communication which can facilitate ideas to furnish a better future based on the needs of the population, one being conservation of resources (technology can be a resource – as a matter of fact is one.

To better technology, data is necessary and it’s the necessity because it is already the building block of technology.  Forwarding goals for global security in IT depends on knowing that data is specifically the first block to build on.  Once data is correctly in place to be distributed appropriately, protocols can be implemented to furnish intelligence, products, ideas, policies and procedures, and conservation of resources, including labor.

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

Overclocking Security Precautions – Systems at Risk

Kamini at Mets vs TigersBy Kamini Kandica Abdool

Overclocking  – a popular speed-or-upper or system enhancer.  It is usually included as a BiOS update file that comes with the motherboard cd or available on the download site for computer or system board.

Speed is great and everything, especially for systems that use heavy graphics, have cameras and is setup for sound and music editing or stores. But why the hesitation with me to do it – overclock my board I mean.

Several reasons.

One is that when a system is in overdrive – well its in overdrive.  It’s exercising at its full potential and its hard for it to find time to rest.  As with everything else, computers need rest too.

Another is that updates update almost everything on a computer and can change the settings for programs, pixels on pictures, enhance or damage graphics, or changes fonts and font files.

And the last and one of the most important reasons is that the files on the Internet are subject to change by hijackers, prowlers and hackers. Eavesdropping files and information hijackers and invaders cling to download files and lately it has been found that many Trojans and other hijackers have found means to attach and update download files with add-ons that help open a path for other prowlers, hijackers that steal information and hackers that attack to eavesdrop, steal information and violate privacy.

Many times, these attacks are used for menace but there are instances where they’re done for more sophisticated reasons, such as plots to thieve, to attack, or to damage. Keeping the system up would be inappropriate as well as hazardous and threatening to the end-user and also they mail and contact networks.

When these attacks occur, they are the most difficult to get rid of and the best options is to contact a system administrator for advice as well as the police for investigations of foul play.

Posted in Uncategorized | Tagged , , , , , , , , , , | 2 Comments

Cyber Safety Reaches Borders with Video Games

KaminifacepicsBy Kamini Kandica Abdool

Cyber Safety finally got a big win with video games.  The ESRB and its rules that govern gaming and game release with rating recently became the advent for bordering security online and ensuring cyber safety margins.

The categories, especially for the United States, gave cyber tech an opportunity to reach a wide audience and enhance the security options for a big cyber space by regulating video games.

As referenced below, the ESRB, added two new categories that help regulate the release of video games, one is E+10 for everyone over ten; and RP for ratings pending for content that might be outside the regular scenarios or not clear for categories, just being advertised, or is in marketing phase.

Rating Categories

esrb ratings symbol for ec games EARLY CHILDHOOD
Content is intended for young children.
esrb ratings symbol for E-rated games EVERYONE
Content is generally suitable for all ages. May contain minimal cartoon, fantasy or mild violence and/or infrequent use of mild language.
esrb ratings symbol for e10 games EVERYONE 10+
Content is generally suitable for ages 10 and up. May contain more cartoon, fantasy or mild violence, mild language and/or minimal suggestive themes.
esrb ratings symbol for T-rated games TEEN
Content is generally suitable for ages 13 and up. May contain violence, suggestive themes, crude humor, minimal blood, simulated gambling and/or infrequent use of strong language.
esrb ratings symbol for m-rated games MATURE
Content is generally suitable for ages 17 and up. May contain intense violence, blood and gore, sexual content and/or strong language.
esrb ratings symbol for AO-rated games ADULTS ONLY
Content suitable only for adults ages 18 and up. May include prolonged scenes of intense violence, graphic sexual content and/or gambling with real currency.
esrb ratings symbol for rp rating RATING PENDING
Not yet assigned a final ESRB rating. Appears only in advertising, marketing and promotional materials related to a game that is expected to carry an ESRB rating, and should be replaced by a game’s rating once it has been assigned.


ESRB;; May 12, 2013.

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Cyber Safety and Borders – Togetherness Apart

kamini0307By Kamini Kandica Abdool

Borders are an important part of interaction.  The physical earth and the borders it provides to distinguish territory, countries, populations and societies are set forth by and managed by policies that help ensure proper trade, interaction, money exchange, safety, and travel.

It goes the same way for the cyber world – largely based out of the mass of furnished data console called the Internet. Really, borders are necessary there, on the Internet for the same reasons why they are necessary in the physical world – for safety, proper interaction, trade, exchange and travel.

The Internet, a mass of information and its travel just migrated its masses to cyber security challenges that it did not expect.  The new stage for information, communication, and interaction just became a space for security as well.

Cyber space, in recent years have seen many challenges such as piracy, invasion of privacy and even threats as dangerous as cyber terror. Expectations for globalisation and bringing the world together did not anticipate on big mass with such problems of course but unfortunately, it was what came along with the new Internet experience of recent years.

For this reason, it is important for the Internet to now bring about better travel mechanisms with borders that will manage the space better with consideration for people and spaces.  Requirements similar to air or ground travel that requires documents, Internet travels will soon be more secure with similar documents called “Certificates” that protects the end user by delivering safe and legal travel.

Together is great but the separation that secure travel pathways will create definitive borders that will keep withing its regions information secure in the means that it needs for the region that its in.  Whether it be in region for business, government, agency, or home.



Posted in Uncategorized | Tagged , , , , | 1 Comment