@iLabAfrica, SBS and Strathmore Faculty trained for Digital Marketing in Ireland.


ImageCloud computing has evolved through various phases; Grid and Utility Computing, Application Service Provision, and Software as a Service. Since the sixties, it has gradually developed, with Web 2.0 being the most recent evolution. To date, Cloud Computing has been the preserve of early adopters from leading technology giants such as Amazon’s Elastic Compute cloud EC2/S3, Microsoft’s Windows Azure and Google’s Google Apps. The knock-on effect to the industry as a whole is a wider general acceptance of online services.

Under the Public Private Partnership (PPP) model, public sector institutions in East Africa have a chance of slowly adopting Cloud Computing services as a way to cut costs and make their systems run more efficiently. Alliance Technologies has implemented Enterprise Resource Planning (ERP) solutions in major public sector institutions in the region, and one thing that stands out is the similarity of process and workflows in departments like Human Resource, Finance, Procurement and Support Services (Public Relations, Audit Legal, and Customer Relationship). This makes public sector institutions clear candidates for shared services applications offered on the cloud with shared data storage & virtualization.

On average each Ministry has five major Parastatals and/or state co-operations with almost similar mandates. In the past two years we have seen a surge in the automation of processes within public institutions, which is good. However, this has resulted in heavy investments in ICT infrastructure set up, hiring of highly trained IT personnel, implementation of highly complex software application, prohibitive proprietary license costs, not forgetting support & maintenance costs over the entire lifecycle of the software. The pressure to automate in order to be ISO certified or as fulfillment of the CEO’s Performance contract has resulted in hurried implementations which have led to acquisition of enterprise solutions with high Total Cost of Ownership (TCO). This diverts funds away from core mandates aligned to the respective state corporations.

Utilizing the cloud computing PPP model, the public sector bodies subcontract this ‘IT headache’ to the private sector giving them room and additional resources to focus on their core mandate of service delivery to the public. The government remains involved; acting as an oversight body due to the sensitivity of its transactions. Privacy, Security and Standardization still remain the main hindrances to adoption of computing in the cloud and only the government can reign-in to keep Law and Order.

 How will this happen?

Virtualization is the key to cloud computing, since it is the enabling technology allowing for the creation of an intelligent abstraction layer which hides the complexity of underlying hardware or software. In a PPP model the private sector will handle virtualization as they have the time, skill and dedication to make it happen.

Server virtualization enables different operating systems to share the same hardware making it easy to move operating systems between different hardware, while applications are running. Storage virtualization does the same thing for data. Storage virtualization creates the abstraction layer between applications running on servers, and the data storage. This means that, a parent ministry can have one vendor implement an ERP solution with majority of the workflows standardized then have all state corporations under it access it and store data seamlessly.

However, this does not mean all processes and work flows will be standard for all institutions. Customization is still possible and each organization still retains its autonomy especially in the way it accesses the system.  This presents interesting ways for the public sector to reduce its costs by paying minimal subscription costs that will cover customization, training and support of the application use. The private sector has a role in making Chief Information Officers (CIO’s) in public sector organizations feel more confident knowing that their data is encrypted and secure from loss or prying eyes.

On the other hand, public sector CIO’s are bound to face resistance from their IT managers and CEO’s who might see a partnership with private sector as invasion to their territory. Security is the main concern–and excuse–in government computing. One can expect public bodies, large and small to claim that their needs are so special that cloud computing cannot apply to them. A government culture that rules that its computing needs are different from other businesses is so entrenched and is used to riding out changes that seem to threaten their position.

I challenge our respective regional Ministries of Information and communication; and ICT Boards to spear head this transition to cloud computing and set up standards and policies that will protect both public and private institution while in the ‘cloud’. Obama administration is one step ahead by embracing Google Apps.gov cloud initiative that will save money and make applications easier for federal agencies to purchase, and YES we CAN here too!!


KAMAU TIRUS: Heads the Innovation Arm of Alliance Technologies and is responsible for driving and providing Leadership for the Research & Development (R&D) team. EMAIL: wtirus@gmail.com

Aside  —  Posted: October 23, 2012 by Afyanet Africa in Medical News, Product Development (IT)
Tags: , , ,

Image CIOs at leading public and private sector organizations are  pitching for investment in Open Source ERPs. The question is: Why the switch from proprietary softwares? Tirus Kamau  analyses the CIO’s search for enterprise flexibility and higher value-for money.

Is the amount of money you put in buying and maintaining your enterprise technology  equal to the capability the system provides? If not, what is most competitive alternative that can exceed your enterprise expectations with surprising affordability? For most CIOs exposed to  the two worlds of enterprise resource planning systems(ERPs), that is, the proprietary and Open Source worlds, the answer is everyone’s guess.

In the last ten years, the up take of Open Source Enterprise Resource Planning systems around the globe has grown significantly. Such systems such as A1 ERP, the feature-rich complete web based ERP; OpenERP andOpen Bravo, have continued to win accolades for usefulness, value for money and user friendliness.  In the East African market alone, the use of Open Source ERPs such as the A1 ERP and A1 eXpress for management and planning of Procurement , Finance, Human Resource, Asset Management, CRM, Sales and other enterprise functions has grown an overwhelming  40%, according to independent vendors market statitstics .

Analysts are still not agreed as to what key factors are  contributing to the immense growth in use of the Open Source ERPs,  but one group is a sure winner: CIOs are  celebrating a “value for money technology” that is offering their enterprises a dose of flexibility, innovations and scalability.

The Open Source Community of developers needs no more of the  pat on the back. Renown the world over for ingenous and innovative thinking and advance in programming, Open Source has been the source of most proprietary systems anyway.

But it is the readiness to share codes with clients that is providing the real flexibility enterprises need. Developers such as Alliance Technologies are helping information technology in enterprises pass on from developers to the officers employed in the user organizations mold and fit in any business process  application and scaled to accommodate a myriad of feature requests that are in most cases call for unique individual or businesses experiences. Most proprieatary systems won’t do that: they will ship in expatriates and charge hefty for any modifications beyond the usual vendor customizations.

When skill and code transfer to client organizations  happen, the information officers and other IT professional are empowered to adapt the ERP system further as they wish- develop new applications and enjoin them. Empower to make powerful.

To effectively harness the power of open source, you need an engineering team and  experienced business advisory group that understands the nuts-and-bolts  of your business to work together.  The A1 ERP team for instance has  implemented multiple  highly sophisticated ERP systems in layered enterprises successfully due to this blend. There are four critical stages within the Open Source ERP Life Cycle Strategy Roll Out that one needs to pay key attention to:

o    Strategic Planning Stage

o    Solution Adoption

o    Maintenance & Upgrade

o    Integration & Optimization

These stages are usually divided in two phases: Phase One involves the process of product selection, requirements planning and initial adoption, covered in Milestones 1 and 2.

Phase Two deals with the process of maintaining and enhancing the solution as the company moves forward after its system roll out has taken place. You get the above two phases right and you will be in the right path to unleashing the Power of an ERP

In this market it’s interesting to note that government bodies who have a higher spending capacity and are more demanding than their private counterparts have already shifted to the powerful advantages  of Open Source. Security of Open Source solution has been a key concern to all those targeting its use. CIO’s need not worry as with a good proffessional implemetation team Open source Application have all the security features that established propriatory ERP’s such as SAP and Oracle would offer. This was one key factor the US military considered in recommeding use of Open Source applications by its units.

Technocrats are advising more parastatals with national reach to opt for Open Source sytems, because these enterprise solutions can flexibly be customized and molded to fit specific operations without much added cost.

In the private sector, Ushahidi,  a non-profit tech company is developing free and open source software for information collection, visualization and interactive mapping. The world has taken note on the immense potential of their professionally managed open source projects.

This should deliver a strong message for  CIOs. In choosing an ERP solution for your  enterprise, check what the Open Source community has to offer, first. It will save your organization lots of  time and money.


KAMAU TIRUS:  Is the Head of Product Development & Innovation at Alliance Technologies and is responsible for driving and providing Leadership for Research & Development (R&D) activities at the leading Open Source Software Engineering firm in the region. EMAIL: wtirus@gmail.com

Aside  —  Posted: October 23, 2012 by Afyanet Africa in Medical News, Product Development (IT)
Tags: , ,

ImageWikipedia, the free encyclopedia defines Information Security as a means of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

For any Enterprise that has implemented an ERP solution, this seemingly simple definition arouses fear and paranoia. Security in the e-business, Enterprise Resource Planning (ERP) world requires a new way of thinking about security; not just about the bits and bytes of network traffic, firewalls, etc but about company transactions that inflict financial losses from systems-based fraud, neglect and errors.

While external threats from attacks and intrusions persist, the opportunity for inside fraud and systems abuse has increased exponentially with the advent of a single automated system that manages accounts payable, employee payroll, benefits and other sensitive information.

While most information security initiatives focus on perimeter security such as firewalls to keep outsiders from gaining access to the internal network, the potential for real financial loss comes from the risk of outsiders acting as authorized users to initiate damaging transactions within business systems. The other is enterprise’s internal staff intentionally or unintentionally leaking out confidential information. According to some of the latest IT security survey reports, internal staff carelessness is by far the biggest threat to corporate data leaks.

Strong fortress is often compromised in-house” It is regrettable; very few companies are able to realize that the threat from within the enterprise could be bigger than risk posed by the new productivity features such as mobile access for workers in the field and the ability to more easily share information with industry partners and vendors that expose your system to increased risk of unauthorized intrusion.

As a result, business could bear big losses in profit and image.

All is not lost; there are many controls that CIO’s can be able to put in place that will give Chief Executives’ peace of mind. They include some basic fundamentals like: requiring approvals on transactions, Data encryption, Uniquely identifying every transaction initiated, Restricting accessibility of the manipulation tools for changing system parameters, configurations, and/or master data, Separating developers from testers and deployers, Management review of reports using defined and documented criteria, for example, to assure that users are not circumventing procurement limits by submitting and approving multiple smaller purchases.

The following basic universal principals will also assist in making sure your ERP implementation results in a Secure deployment that will mitigate most of the risks discussed above:-

  • Evaluate & build up ERP access control policies and measures for on-going sustainability
  • Make use of field-tested methodologies and tools, facilitate the process of designing/re-designing appropriate data security
  • Analyze access to sensitive application objects, transactions and windows as applicable
  • Carry out segregation of duties analysis in all modules of a given ERP system
  • Be involved with the construction, deployment & testing of proper security user roles & access authorizations
  • Assist with the deployment of appropriate security configuration settings and procedures.

The benefits of implementing world class respected ERP’s such as A1 ERP, SAP and Oracle, are negated unless they have robust application level security built in to the design from the word go. Subtle balance between data availability and a well-secured ERP implementation is not easy to achieve. It’s advisable to have Penetration test done by a reputable firm on your ERP implementation as they help to realize the potential system breaches which may allow hackers gain access to business’ critical data, for reasons related to espionage, fraud and sabotage.

Never trust your staff too much! It is risky having one person access rights to alter your ERP system however they want. This is especially true when you have your IT staff given Administrator rights to the Database. As a basic rule; the ERP system should be configured in a way one needs an activation code to manipulate some key processes within the system. Audit logs and alerts should be able to capture & report any change effected on the system and by whom.  The access rights ought to be distributed across several persons in such a way that even if one decides to sabotage the firm, the access rights held by another will restrict the act. Security credentials for system accessibility should be guarded with vigor.

Today I end with a story: A worker once left her ID Unattended, where all could see. It disappeared that day. And we’re sorry to say So did the company’s IP.  (IP = intellectual property) Note: Act before It’s Too Late To Act.


KAMAU TIRUS:  Is the Head of Product Development & Innovation at Alliance Technologies and is responsible for driving and providing Leadership for Research & Development (R&D) activities at the leading Open Source Software Engineering firm in the region. EMAIL: wtirus@gmail.com

Aside  —  Posted: October 23, 2012 by Afyanet Africa in Medical News, Product Development (IT)
Tags: ,

ImageTransport & Logistics has become more complex for large enterprises, particularly for multinationals and public bodies that need to manage the mobility of their staff and goods across different regions.  In addition and to compound the situation, there is a blur when it comes to differentiation of business and personal vehicle usage hence, many fleet managers struggle to put in force company policies while making sure that all business process are running smoothly and the Total Cost of Ownership (TCO) of their fleet is kept at a minimum.

In a recent advert, the Kenyan Ministry of Finance invited players in the motor vehicle and leasing industry to apply for provision of leased vehicles and transport services, on trial basis.  The reason being, there is bound to be huge savings for the government if the purchase and management of these vehicles is to be outsourced. In making such a decision, the government will be joining the ranks of Kenya Shell, Supermarket chain Nakumatt, soft drink maker Coca-Cola, East Africa Breweries Ltd and several high ranking international NGO,s, which are currently the largest consumers of leased motor vehicles.

The government is also seeking to outsource related services such as insurance, scheduled and unscheduled maintenance, replacement of non-functional vehicles, and supply of fleet management systems. The fact that the Government, which is the largest consumer of various goods and services, plus the big enterprise ‘boys’,  are joining the bandwagon, already sets a trend and is a major indicator of the shifts within the industry.  It is for this reason that fleet management solutions will be huge business in the near future. When it comes to real-world fleet operations, triumph often hinges on how well you’re able to track and manage assets/people while taking advantage of the present opportunities in productivity and cost-per-kilometer savings.

Therefore, the Big question to CIO’s will be, “ will their  enterprises   manage their fleet from a tactical level — putting out day-to-day fires — or from a strategic angle which focuses on achieving specific long-term objectives that will work in reducing the TCO of the firm’s fleet? “

A variety of factors will inform their choice. One is Cost; it is getting increasingly expensive to operate a fleet, especially in an period of stratospheric fuel cost, the main reason for the increase in fleet management   outsourcing by the big ‘boys’ in the market. Another factor is the diminishing number of opportunities to reduce cost and enhance fleet efficiency using traditional fleet management techniques. The latter being what is creating a need for new fleet management solutions that operate outside the box.

Looking ahead, firms will continue to outsource fleet management services to Fleet Management Companies (FMCs). This will in turn create a need to integrate business processes between FMCs and their clients’ fleets. This will involve the automated collection of fleet data without human intervention providing a seamless and transparent system-to-system communication between the FMCs and a fleet’s HR, payroll, logistics and financial system.

But before this integration happens FMCs will have to acquire Fleet Management solutions that can easily be upgraded to integrate with its clients’ existing Enterprise Resource Planning (ERP) systems. This calls upon CIO’s to challenge the way fleets have been conventionally managed and run in the past, and spot exceptional opportunities to create an integrated fleet management strategy. This strategy, if supported by cautiously structured business processes and backed by appropriate open standard technology, can offer near and long term benefits of cost-savings and enhanced service.

Most Fleet management softwares come as stand – alone applications designed to meet the operation’s basic business requirements (i.e., just adequate attempt and resources to get things back to business as usual). This common scenario occurs when, during a system’s implementation, the firm focuses solely on getting the system up and running to meet core business needs, such as work orders, parts inventory management, and basic reporting without first looking into setting up an integrated fleet management strategy.

An integrated fleet management strategy should consider Fleet Management Software as an integral component of the ERP. The ‘E’ for Enterprise connotes that the core functionality consists of fleet software applications that have an organization-wide impact. The ‘R’ for Resource suggests that the applications concern the management of both financial and non-financial resources of fleet management. Finally, the ‘P’ for Planning implies that the system focuses on improving strategic (i.e., future-oriented) decision making for the enterprise as a whole with emphasis on rolling-out features such as warranty management, workshop  scheduling, GPS vehicle tracking, insurance, Route mapping  to economize on fuel consumption, motor vehicle pool scheduling, logistics and administration,  ­management ­reporting etc.

In short the current trends by government and large organizations with complex distribution networks in respect to fleet management is a wakeup call to CIO’s to rethink their proposals of acquiring or upgrading their ERP systems to include  an  open standard integrated fleet management strategy that can scale.


KAMAU TIRUS: Heads the Innovation Arm of Alliance Technologies and is responsible for driving and providing Leadership for the Research & Development (R&D) team. EMAIL: wtirus@gmail.com

Aside  —  Posted: October 23, 2012 by Afyanet Africa in Medical News, Product Development (IT)
Tags: , , , ,

There is an ongoing debate as to whether homosexuality is genetic or not. I do not know the answer. However going through literature, I found that there are very many things that have been blamed on genetics. One argument that I found interesting was on crime. Are people born criminals or are they made? See below the viewpoint of science students as reported in http://library.thinkquest.org/26750/main2.htm.

Genetics is the most argued point of criminology today. Some believe that genetics cause people to commit crimes. Research has been undertaken to find out if a certain chromosome combination will automatically make you a criminal or not. If this is true then you should be able to find out if your child will be a criminal even before they are born. Here are some outcomes of the geneticist and their lab studies :

One of the most used theories of why criminals commit crimes is that the person’s ability to commit crime is pre-determined. If that is so, then criminals have no choice over what they do. Some of the genetic abnormalities that would make someone pre-determined would be the XYY chromosomal structure (Not effective in women, just men). A chromosomal test in prisons had an outcome of 27Y, which means most of the prisoners had that many Y chromosomes. This is a chemical imbalance with its causes in genetics.

These theories have been tested on people in prison and have seem to have a high outcome. The “criminal disease” could be caused by a recessive gene passed down from one or both of the parents.

Does the Enviroment Control Crime?

If genetics doesn’t control crime what does? Most of the criminologists today still believe the same thing that was thought when we first started to look into crime. It’s the environment and nothing else. Genetics has no play, because if you are never introduced to a life of crime you won’t know what crime is, and will therefore not commit crime, but if you grow up in a house of crime, then you are going to commit crime due to the fact that all you know is crime.

So what do you think?

Even as we contemplate the effects of the Mututho bill, we thought you should know that:

According to interstingfacts.org, a hangover is a condition which is a result of the consumption of an excessively large amount of alcohol. But in reality a hangover is more like a withdrawal from alcohol for a short time period. A lot of experts state that some of the ingredients which are present in alcohol cause the hangover. The ingredients which are present in alcohol are known as congeners.

During the ancient times, people used a combination containing myrrh and the beaks of birds which had been grounded to a fine paste, in order to treat a hangover. But most people feel that a similar combination cannot be used in the modern times in order to treat a hangover. Liquor which is light like vodka and gin should be consumed instead of heavy and dark liquors like whiskey and brandy. All kinds of alcoholic beverages which contain chemicals should be avoided since they will cause a very sever hangover. The worst hangover will usually be caused by the consumption of red wine. A lot of people are also likely to become very angry and depressed after they have consumed a large amount of alcohol.

BestHangovercure.com on its part advices that while most hangovers disappear naturally after between eight and twenty-four hours, there are several remedies . These including drinking water to hydrate the body. Since alcohol causes the blood sugar to fall, foods that boost blood sugar are recommended. Foods that restore lost potassium and salts as well those containing fructose (which assists in burning the alcohol faster) would be helpful too.

Over the counter pain relievers can ease the unpleasantness but aspirin and Tylenol are to be avoided; aspirin irritates the stomach while Tylenol can cause liver damage. Taking more alcohol as a remedy is foolish since this only postpones the misery. Coffee is also not a good remedy since it is also a diuretic.

Prevention is always better than cure though. Before engaging in drinking alcohol one should take fatty foods to prevent the irritating effects alcohol has on the stomach. Milk also protects the stomach lining besides slowing the absorption of alcohol. Another preventive measures is taking water and non-fizzy soft drinks while imbibing to hydrate the body.

Now you know

2010 in review

Posted: January 3, 2011 by Afyanet Africa in Medical News
Tags: ,

The stats helper monkeys at WordPress.com mulled over how this blog did in 2010, and here’s a high level summary of its overall blog health:

Healthy blog!

The Blog-Health-o-Meter™ reads Wow.

Crunchy numbers

Featured image

A Boeing 747-400 passenger jet can hold 416 passengers. This blog was viewed about 9,400 times in 2010. That’s about 23 full 747s.


In 2010, there were 12 new posts, growing the total archive of this blog to 38 posts. There were 14 pictures uploaded, taking up a total of 543kb. That’s about a picture per month.

The busiest day of the year was November 8th with 442 views. The most popular post that day was All Crazy Weird X-rays.

Where did they come from?

The top referring sites in 2010 were mail.yahoo.com, facebook.com, en.wordpress.com, search.conduit.com, and WordPress Dashboard.

Some visitors came searching, mostly for placenta, nursing council of kenya, crazy x rays, weird x rays, and crazy x-rays.

Attractions in 2010

These are the posts and pages that got the most views in 2010.


All Crazy Weird X-rays May 2009
1 comment


Nursing Council of Kenya April 2009


The Placenta Party March 2010


Abortion in Kenya- The facts March 2010


The Health Ambiguity April 2010

Notes Pope’s Ability to See Small Steps of Impoverished Humanity

VATICAN CITY, NOV. 21, 2010 (Zenit.org).- A Vatican spokesman is clarifying that Benedict XVI is not justifying condom use, though the Pope said it could in some cases be a first step toward moral behavior. Jesuit Father Federico Lombardi, director of the Vatican press office, said this in a statement today regarding the words of Benedict XVI as recorded in a book, “Light of the World” (Ignatius Press), scheduled for release on Tuesday.

On Saturday, L’Osservatore Romano published some quotes from this book, which drew public interest and media misunderstandings.

At the end of the tenth chapter of the book, the writer, German journalist Peter Seewald, asked the Pontiff two questions on the fight against AIDS and the use of condoms. Seewald referenced the Holy Father’s comments on this topic while aboard the papal plane on the way to Cameroon and Angola in March, 2009.

Father Lombardi noted that Benedict XVI answered Seewald by insisting “on the fact that focusing only on condoms is equivalent to banalizing sexuality, which loses its meaning as an expression of love between persons and becomes a ‘drug.'”

The spokesman affirmed that “fighting against banalization of sexuality is ‘part of the great effort to help sexuality be valued positively and have a positive effect on man in his totality.'”

He added, “In the light of this broad and profound vision of human sexuality and the contemporary discussion of it, the Pope reaffirms that naturally the Church does not consider condoms as the authentic and moral solution’ to the problem of AIDS.”

“In this the Pope does not reform or change the Church’s teaching, but re affirms it,” the priest stated.

“At the same time the Pope considers an exceptional circumstance in which the exercise of sexuality represents a real threat for the life of another,” the spokesman explained.

Recovering awareness

The Ignatius Press blog, Ignatius Insight, published these excerpts of the book today, noting the Pontiff’s words: “There may be a basis in the case of some individuals, as perhaps when a male prostitute uses a condom, where this can be a first step in the direction of a moralization, a first assumption of responsibility, on the way toward recovering an awareness that not everything is allowed and that one cannot do whatever one wants. But it is not really the way to deal with the evil of HIV infection. That can really lie only in a humanization of sexuality.”

When Seewald asked the Holy Father to clarify the Church’s position on the use of condoms, Benedict XVI responded: “She of course does not regard it as a real or moral solution, but, in this or that case, there can be nonetheless, in the intention of reducing the risk of infection, a first step in a movement toward a different way, a more human way, of living sexuality.”

Father Lombardi explained, “In that case, the Pope does not morally justify the disordered exercise of sexuality but maintains that the use of a condom to reduce the danger of infection may be ‘a first act of responsibility,'” as opposed to “not using it and exposing the other to risking his life.”

“In this, the reasoning of the Pope certainly cannot be defined as a revolutionary change,” he said.

“With courage Benedict XVI thus offers us an important contribution of clarification and reflection on a question that has long been debated,” the priest affirmed.

He continued, “It is an original contribution, because on one hand it maintains fidelity to moral principles and demonstrates lucidity in refuting an illusory path like that of the ‘confidence in condoms.'”

On the other hand, Father Lombardi said, “it manifests a comprehensive and far-seeing vision, attentive to uncovering the small steps — even if only initial and still confused — of an often spiritually and culturally impoverished humanity, toward a more human and responsible exercise of sexuality.”

He pointed out that in this book, “the Pope again clearly stresses” that when he spoke to journalists aboard the papal plane “he had not intended to take a position on the problem of condoms in general.”

Rather, the spokesman noted, the Pontiff “wanted to affirm with force that the problem of AIDS cannot be solved simply by distributing condoms, because much more needs to be done: prevention, education, help, counsel, being with people both to keep them from getting sick and in the case that they do get sick.”

With the recent legalization of Changaa and other traditional brews, we thought you should know that:

  • according to an answer in answers.yahoo.com, Ethanol  will not make you blind unless you drink so much that you get brain damage that ultimately causes you to go blind. Methanol or methyl alcohol which is the alcohol obtained from wood will cause blindness because it depletes the enzymes that work in the retina and therefore burning the nerves in the eye that then causes blindness.
  • A study  conducted by researchers from the American Cancer Society, the World Health Organization, and Oxford University, and that followed a group of 490,000 people over a nine-year period,   found that, compared to teetotalers, subjects who had a drink a day were 30 to 40 percent less likely to die of cardiovascular diseases. Their overall death rate was 20 percent lower.
  • At midnight on January 16, 1920 in the USA, the Eighteenth Amendment took effect that prohibited the manufacture, sale, transportation, import, or export of intoxicating liquor.  Intoxicating liqour was defined by the Volstead Act as any beverage containing more 0.5% alcohol. The law was in effect for 13 years.
  • One glass of white wine has 85 calories, a gin and tonic 140 and a pint of beer can contain up to 300 calories and that alcohol inhibits leptin, the hormone that promotes a feeling of fullness.
  • According to wikipedia, in 2006, the total global revenues from Beer alone were US$294.5 billion. If this money was to be distributed to the approximately 6 billion people alive then, each man, woman and child alive would have received approx Kshs 3,920 or Kshs 23,520 for a family of six!
  • That in the year 2000, 32% of fatal accidents in the USA were associated with drivers with a drinking history
  • According to Wikipedia,  the Chzeck Republic had the highest per capita consumption rate of beer in 2004 at 156.9 litres per person i.e. more than 300 half little bottles per person,  Kenya does not rank in the top 34

Thought you should know!