Friday, December 21, 2012

Ergonomics



























1. What is Ergonomics?
1.1 Ergonomics is the study of Human Factors Engineering
The term is derived from the Greek: Argo = labor and Nomos = law
Ergonomics is the study of the influence of the environment on productivity in the workplace; the evaluation and improvement of the interface between the individual and their work environment by correlating work conditions, instrumentation and tasks with the natural functioning of the individual in relation to their physical, mental and physiological fitness, so as to improve their convenience, health and efficiency at work.
Ergonomics implements theory, principles, data and the methods for designing the work stations and the environment, developing products, systems, tasks and assignments, so as to assure their compatibility and accessibility to users, in accordance with their capabilities, limitations and needs (compatibility 0f the environment to the individual and not the worker to the workplace).
Frequently, due to the ability of our body to adjust, we tend to fit ourselves to our environment rather than adjust the environment to us. With time, this might lead to accumulating physical trauma that will eventually manifest itself in pain and possible damage to the bones, muscles and nerve system in various places of the human body.
1.2 Accumulated Physical Trauma
Respective strain injury is defined as health disorders related to accumulating bio mechanical strains due to exposure to ergonomic risk factors in the work environment. Respective strain injuries (RSI) are most common at work, for instance: carpal tunnel syndrome: (CTS), a damage potentially caused to the median nerve of the wrist, which might impair the functioning of the hand and cause inflammation of the sinew (Tendonitis), muscular, neural and skeletal injury (MSD – Musculoskeletal Disorders) of the lower back, neck, shoulders, etc.
1.3 Risk Factors
These are physical risk factors such as improper posture at work, mechanical pressure, the extent of repetitiveness in motion, lack of movement and environmental risk factors such as light source, climate or noise. Exposure to these risk factors for an extended period of time may result in accumulating physical injuries.
1.4 Work Station Evaluation
Evaluation or review of the work station using an ergonomic labeling list aids in reducing ergonomic risk factors and potential physical injuries.
2. Ergonomic Principles for Appropriate Working Environments
2.1 Ergonomics in the Office
2.1.1. Sitting in front of the Computer
Adjust the height of the chair according to the height of the work station, ensuring that your hands are: at a 90 degrees angle, between arm and forearm, parallel to the table, and that your shoulders are relaxed and without strain.
Should your legs not reach the floor in this position, add a stool so as to allow a sitting posture in which your legs are supported, for more convenience.
Lean back on the chair in a 105 degrees angle. This will reduce pressure on your back. (Use the chair lever to change the angle of the back rest)
Adjust the height of the back rest of your chair for full support of the lower back (Use the chair lever to change the height of the back rest.)
Adjust the height of the computer screen until its upper edge is on the same level as your eyes. If the screen is low, its height should be adjusted. Another option is to raise the screen.
The optimal distance between your eyes and the screen should be that of the extended arm, i.e., between 60 to 70 cm.
The keyboard and the mouse should be placed side by side, 8 – 10 cm away from the edge of the table, to enable placement of the palms in a straight line with the mouse and the keyboard.
Make sure that your wrist is positioned straightly when typing and that your wrist is not bent.
The forearm should be supported by the table or by the arms of the chair.
Take regular intervals (5 minutes every hour) and perform stretch and relax exercises.

2.1.2. Movements to be avoided so as to prevent accumulated physical trauma
Avoid bending forward for an extended period of time. This might weaken the ligaments in the lower back and consequently cause lower back aches. Make sure you sit according to the ergonomic principles. (Clause 2.1.1).
Avoid extending your arm for too long. This will cause pressure on the arms, shoulders and neck. Make sure the most frequently used accessories are within reaching range, ideally up to 40 cm from your body.
Avoid bending or stretching your neck too much or for an extended period of time, i.e., over 15 degrees upwards or downwards. This might cause pressure on the neck and back. It is recommended that you raise or lower the screen, according to the ergonomic rules.
Avoid blocking the space around your legs with various objects. This might cause an improper sitting posture. See to it that the space around the legs is free for placing of the legs comfortably and vacant space is available for using a stool.
Avoid bending your wrists while typing. Sit properly and position a supporting pad under your wrist, according to the ergonomic principles.
Avoid bending your palm while operating the mouse, by adequate sitting posture: keeping elbows tight to the body and adding a supporting pad to the wrist.
2.1.3. Principles of Proper Sitting
Illustrations of proper and improper sitting positions , Advisable accessibility ranges – working with the computer:


2.2 Ergonomics in the Laboratory
2.2.1. Sitting/Standing
When working at high work surface in the office or laboratory, it is advisable to work both standing and sitting.
When sitting, the height of the back rest of chair should be adjusted to the height of the work surface - elbows parallel to work surface.
The back rest of your chair should support your lower back.
Use a proper laboratory chair with a ring that supports the soles of your feet.
Frequently used accessories are to be positioned up to 40 cm away.
Accessories seldomly used should be positioned 40 – 60 cm away.
Sufficient space is to be left at the feet to enable comfortable sitting posture.
If standing for an extended period of time, one foot should be placed in front of the other. Change this position frequently.
2.2.2. Lifting and carrying
If objects/bottles are placed high above, a stool should be used.
When lifting heavy objects, lower your knees in and place your feet in a stepping position, thus straightening your back while accomplishing the task.
When moving an object, carry it close to the body and, if necessary, use a cart.
2.2.3. Working with pipetors
When using pipetor, lift your arm parallel to your body.
It is advisable not to exert prolonged pressure which might cause extensive pressure on the thumb.
Pipetors should be placed within reasonable range for comfortable accessibility (between 40 – 60 cm).
When using pipetors for small volumes (micro liter) that requires preciseness, it is advisable to lift the Eppendorf test tube and avoid bending the head forward.
Make sure the pipetor is in order and comfortable to use.
Make sure the illumination intensity is comfortable. This will improve the quality of performance.
Take regular intervals during prolonged activity and stretch and relax your wrist.
2.2.4. Movements to be avoided so as to prevent accumulated physical trauma
Avoid standing with your back bent forward for an extended period of time, as this might overstretch ligaments in your back and, consequently, cause back aches.
Avoid repetitive postures that require exaggerated bending or stretching of the wrist.
Avoid postures that require elongated pressure with the hand. This might cause pressure on the synovium and cause pains when moving the thumb. (Strong and quick pressing is advisable.)



For More details:
http://www.weizmann.ac.il/safety/ergonomics.html
http://www.nismat.org/ptcor/ergo


Friday, November 9, 2012

Ten Point Program for happy Family


1. Avoid the next quarrel: Never lose temper at the same time. Don't let the sun set on your quarrels (Never prolong fights if at all started). It is OK to say "I am sorry"

2. Do not expect perfection from your spouse: Marriage is coming together of two imperfect beings. Don't expect wife or husband to like this or that, accept them as they are.

3. Be a Good Listener: Think before speaking, it is a good idea to weigh before you speak. You are master of unspoken words but slave of spoken words. Better than listening from ear is listening through mind (with attention) and better than that is listening from heart.

4. Be a good forgiver: Some people forgive but they keep the memory alive or they forgive conditionally. Forgiveness should be complete and unconditional.

5. Grow in the spirit of humility: Be humble. Egos bring arrogance which divide and separate people.

6. Learn the art of appreciation: We all like to be appreciated. Always appreciate in front of others. Never criticize in a company of friends and relatives, you will get opportunities in privacy.

7. Do not argue: Winning love and friendship is far greater than winning an argument. It is OK to discuss with a open mind. Learn to win love and affection rather than arguments.

8. Develop healthy sense of humor: Learn to laugh and be cheerful. It is a great tonic for healthy living and being accepted by friends. It is important to laugh with others and NOT at others.

9. Always lend a helpful hand: You will win over if you have this attitude of offering a helpful hand with or without asking.

10. Bring GOD back into your home: This is one of the most important one. Have a common time for prayers. It brings families together. Families that pray together stays together.


Wednesday, October 31, 2012

Know you Mobile Number


You Buy a new SIM and don’t know what the number is? :(

Don’t Worry. You can get your number by yourself only… :)



Provider Company Dial Code
AIRTEL *121*9#
Vodafone *111*2#
AIRCEL *122*131#
BSNL 164
Reliance *1#
IDEA *1#
Virgin *1#
TATA DOCOMO  *580#
Uninor   *555#
MTS   51230

Print a List item in SharePoint 2010


How to print a single list item in SharePoint 2010

You may need to print a single list item in SharePoint 2010. However, this functionality does not exist unless you print with Excel, which isn't what you are looking for anyway.

Following way to print the list item steps, can be found in multiple blogs... ;)

So, how do we go about accomplishing this?


  1. Open a List
  2. Hit the List tab
  3. Click the Form Web Parts dropdownlist
  4. Choose “Default Display Form”
  5. At the top of the Page – Insert Tab, Click the Web Part button to add a new Content Editor web part (CEWP).
  6. From Categories choose “Media and Content” > “Content Editor” and add it to the main section of the page.
  7. Click the “Click here to add content” and then click the HTML button in the Ribbon to bring up the Edit source code window.
  8. In the window add the following code to display a Print Button at the top of the list item window. 

         


  • Ignore any warnings.
  • Next, hit the Page tab at the top of the page to view the List item. You should see the Print button.

  • Hit the Print button to print just the list item.

  • So there you go, with just a little tweaking you can print a single List item.

    Friday, October 26, 2012

    USING WINDOWS FIREWALL WITH NON-SECURE FTP TRAFFIC


    USING WINDOWS FIREWALL WITH NON-SECURE FTP TRAFFIC


    To configure Windows Firewall to allow non-secure FTP traffic, use the following steps:

    Open a command prompt: click Start, then All Programs, then Accessories, then Command Prompt.

    To open port 21 on the firewall, type the following syntax then hit enter:

    c:/> netsh advfirewall firewall add rule name="FTP (non-SSL)" action=allow protocol=TCP dir=in localport=21

    To enable stateful FTP filtering that will dynamically open ports for data connections, type the following syntax then hit enter:

    c:/> netsh advfirewall set global StatefulFtp enable

    Monday, October 8, 2012

    Something about Hyperlinks


    Hyperlinks can be categorized into six types:

    Relative link : A relative link connects web pages within the same web site to one another.

    Absolute link : An absolute link connects resources or web pages on different web sites - in other words, to external web sites. An absolute link references a linked document's entire URL.

    e-Mail Link : An email link creates an e-mail message using the user's default e-mail client. You can specify an e-mail address in the link so that the new e-mail message has this information already filled in. This is most common on Contact us pages, for instance the reader can click a staff member's name to generate an e-mail addressed to that person.

    Named anchor: You can create links to particular sections within the same web page or another webpage. this section to which the link jumps is called the named anchor, which is a bookmark within a page. The target section opens with the named anchor section at the top of the page.

    Null link : A null link is an undersigned link. you use null links to attach behaviors to objects or text on a page. For example. you can attach a behavior to a null link so that it will swap an image when the pointer moves over the link.

    Script links : Script links execute JavaScript code or call a JavaScript function and are useful for giving additional information about an item without leaving the current web page. you use script links to perform calculations, validate forms or do other processing tasks when a visitor clicks a specific item.

    Monday, June 25, 2012

    IPV4 and IPV6

    “IP” stands for the Internet Protocol which refers to the communicational protocol or a packet transfer procedure of the Internet.


    Every device which connects to the Internet uses a unique IP address which is an analogue of your home address. Pieces of data are transferred via the Internet from one machine to another, and they are called “packets”. The transfer of packets will be impossible if two machines communicating through the Internet did not have the IPs.


    IPv4 is an older version of an internet address procedure. Now there are no more free IPv4 addresses, all of them are already busy and soon new users will not be able to dive into the Web. That is why there appeared the necessity to have a new version of an internet address procedure.


    IPv6 provided us with free IPs for a thousand years ahead.
    The IPv4 supports a 32 bit address that’s why if we count we had 2^32 IP addresses. IPv6 uses 128 bit address allowing maximum 2^128 available IPs.


    Comparison table of an IPv4 and IPv6 features:


    IPv4


    IPv6
    Addresses are 32 bits (4 bytes) in length.Addresses are 128 bits (16 bytes) in length
    Address (A) resource records in DNS to map host names to IPv4 addresses.Address (AAAA) resource records in DNS to map host names to IPv6 addresses.
    Pointer (PTR)resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names. Pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names.
    IPSec is optional and should be supported externally IPSec support is not optional
    Header does not identify packet flow for QoS handling by routers Header contains Flow Label field, which Identifies packet flow for QoS handling by router.
    Both routers and the sending host fragment packets.Routers do not support packet fragmentation. Sending host fragments packets
    Header includes a checksum. Header does not include a checksum.
    Header includes options. Optional data is supported as extension headers.
    ARP uses broadcast ARP request to resolve IP to MAC/Hardware address. Multicast Neighbor Solicitation messages resolve IP addresses to MAC addresses.
    Internet Group Management Protocol (IGMP) manages membership in local subnet groups. Multicast Listener Discovery (MLD) messages manage membership in local subnet groups.
    Broadcast addresses are used to send traffic to all nodes on a subnet. IPv6 uses a link-local scope all-nodes multicast address.
    Configured either manually or through DHCP. Does not require manual configuration or DHCP.
    Must support a 576-byte packet size (possibly fragmented). Must support a 1280-byte packet size (without fragmentation).

    Monday, June 18, 2012

    Undo Send

    Oops, hit "Send" too soon? Stop messages from being sent for a few seconds after hitting the send button.

    Here’s one to help avoid all those “Oops!” moments. Google, being the awesome bunch of coders that they are, allow you to call back emails which you have just sent.
    Steps to Undo the Message:

    1) Go to Settings
    2) Labs
    3) Enable "Undo Send" functionality.
    and done... :)

    Next time you send an email accidentally, just call it back by clicking on Undo.

    Tuesday, May 22, 2012

    Wrong Mail address reflecting in email address lookup while drafting mails


    People find issue with the Lotus Notes 8.x when they draft the eMail. They get automatic list name that they have wrongly added, in there past mails. 


    Solution for this issue is you need to clear your recent contact from your address book, or you can disable this feature.


    Recent Contacts feature can be disabled using any of the following methods: 


    1. Use the following parameter in the client's notes.ini file: 
    DisableDPABProcessing=1 


    2. Make changes in the Contacts section of the user preferences: 
    - Select File --> Preferences. 
    Choose Contacts on the left 
    - Select "Do not automatically add names to the Recent Contacts view" on the right. 


    3. Switch to Notes Basic type-ahead: 
    In the main Notes menu, select File --> Preferences. 
    Choose Basic Notes Client Configuration on the left. 
    In the additional options, check "Disable type-ahead for all name fields and use the Notes Basic type-ahead". 


    This reverts the type-ahead feature back to the Notes V6 and V7 type-ahead functionality and does not pull entries from the Recent Contacts view. 


    You can also implement this change using a Desktop policy on the Preferences --> Miscellaneous tab. The setting is "Disable type-ahead for all name fields and use the Notes Basic type-ahead".



    Note: These methods will prevent new entries from being added to the Recent Contacts view. If you already have existing Recent Contacts, they will continue to be suggested by type-ahead unless you delete the contents of the Recent Contacts view. 

    Monday, May 21, 2012

    CMD Tricks and useful


    Here are some fun tricks used with cmd command:

    1. If your RUN option is disabled and you want to execute cmd then try this. open notepad type command.com and save it as filename.bat. bouble click on it. and your cmd prompt will be displayed.
    2. If you cant open regedit by run open notepad type regedit and save it as filename.bat double click on this and regedit window will open.
    3. Use notepad to abort shutdown. Open notepad and type "shutdown -a" and save it as filename.bat. Now next time when your computer is about to shutdown double click on this bat file, your shutdown will be abort.
    4. CMD fun - open notepad and type shutdown -r 15 and save as filename.bat this will restart your computer in 15 seconds if you want to use this for fun paste this file in system32 and see. computer will restart in every 15 second.

    Use Pen Drive as ram memory in windows 7

    Hi friends, Windows 7 and Windows vista comes with a ready boost option. 

    "ReadyBoost" is a disk cache component of Microsoft Windows, first introduced with Microsoft's Windows Vista in 2006 and bundled with Windows 7 in 2009. It works by using flash memory, a USB flash drive, SD card, CompactFlash or any kind of portable flash mass storage system as a cache.
    If you are using a high configuration PC, It doesn't show any effect on speed because if you are a normal user I think only a few times you use your full ram memory but if you are using an old pc with low ram memory(Like 512 MB or IGB) and harddisk & using vista or 7. It speed up your PC and you will see the result, reduced application data loading time, reduced shutdown and restart time and many more you can't imagine without High ram memory. How to use this feature

    • Plug in your pendrive-> Format with NTFS or FAT32
    • Now go to properties->Select ReadyBoost
    • Check Use this device->Choose maximum space to reserve system speed
    • Click on Apply and OK. 
    Your readyboost PenDrive is ready Now to Use.

    Tuesday, April 24, 2012

    Change AM/PM with your Name

    My friend saw in my system that it was showing time @ task-bar following with my name instead of AM/PM. So he ask me to tell him, and I thought I should share with other friends too.. so here the trick is....


    Step1 :
    Click Start --> Control Panel --> Regional and Language Option 


    Step2 :
    Click on Customize/Additional Setting -> Go to TIME Tab 


    Step 3:
    Change AM symbol and PM symbol from AM and PM to your name 


    Step 4:


    Click Apply -> Ok.


    you are done :) enjoy



    Hidden Applications in windows


    Title : Private Character Editor
    Application name : eudcedit.exe
    Used for: Editing fonts, and other private characters!!!....



    Title : Dr. Watson
    Application name : drwtsn32.exe
    Used for: This an inbuilt windows repairing software!!!....



    Title : Media Player 5.1
    Application name : mplay32.exe
    Used for: Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!....




    Title : iExpress
    Application name : iexpress.exe
    Used for: Used to create Setups, you can create your own installers wizard !!!....




    Monday, February 13, 2012

    Windows 7 Contacts


    Using contact in window 7
    If you choose to use window mail, windows contact is integrated with windows mail.

    What's in a contact?
    You can store as much or as little information as you like about each contact, including any of the following:

    E‑mail addresses: Store as many e‑mail addresses as you want for a contact, and set one as the preferred address.
    Picture:  Adding a picture of a contact can help you remember the person.
    Phone numbers: You can store home, work, cell, and fax phone numbers for a contact.
    Street addresses: You can store both home and work street addresses for a contact.
    Family information: You can enter information here about a contact's spouse or partner, children, gender, birthday, and anniversary.
    Website addresses: You can store both home and work website addresses for a contact. 

    Finding the Contacts folder
    Open Windows Contacts by clicking the Start button, clicking All Programs, and then clicking Windows Contacts.

    Address book are available in both your desktop mail tools and in web mail tool. Such as yahoo, hotmail and Gmail address book.

    Adding a contact.

    Click New Contact, and then type the information you want for the contact in any of the boxes on the available tabs. You don't have to fill in all the boxes; just enter as much information as you want about the contact.


    Adding information to a contact
    Open Windows Contacts by clicking the Start button, clicking All Programs, and then clicking Windows Contacts. Double-click the contact you want to change. Click the tab where you want to add information, and then type in any of the available boxes.

    Adding a new picture to a contact
    On the Name and email tab, click the contact picture, and then do one of the following:
    To add a new picture, click Change picture, locate the picture you want to use for the contact, click it, and then click Open.

    Creating contact groups (mailing lists):
    You can also create contact groups, which combine multiple individual contacts into a single group. Creating a contact group enables you to send e mail to many people at once. If you send an email message to a contact group, it will be sent to everyone you added to the group. Sending email to a contact group can be a lot easier than adding names one at a time to an email message, especially if you often send messages to the same group of people.





    Friday, February 3, 2012

    Email Guidelines ...


    DO’S
    Timeliness :  Answer swiftly.
    Customers send an e-mail because they wish to receive a quick response. If they did not want a quick response they would send a letter or a fax. Therefore, each e-mail should be replied to within at least 24 hours, and preferably within the same working day. If the email is complicated, just send an email back saying that you have received it and that you will get back to them. This will put the customer's mind at rest and usually customers will then be very patient!
    Comprehensiveness : Answer all questions, and pre-empt further questions.
    An email reply must answer all questions, and pre-empt further questions – If you do not answer all the questions in the original email, you will receive further e-mails regarding the unanswered questions, which will not only waste your time and your customer’s time but also cause considerable frustration. Moreover, if you are able to pre-empt relevant questions, your customer will be grateful and impressed with your efficient and thoughtful customer service. Imagine for instance that a customer sends you an email asking which credit cards you accept. Instead of just listing the credit card types, you can guess that their next question will be about how they can order, so you also include some order information and a URL to your order page. Customers will definitely appreciate this.
    Crisp : Be concise and to the point.
    Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed communications and a long e-mail can be very discouraging to read
    Language :  Use proper spelling, grammar & punctuation.
    This is not only important because improper spelling, grammar and punctuation give a bad impression of your company, it is also important for conveying the message properly. E-mails with no full stops or commas are difficult to read and can sometimes even change the meaning of the text. And, if your program has a spell checking option, why not use it?
    Readability :  Use proper structure & layout.
    Since reading from a screen is more difficult than reading from paper, the structure and lay out is very important for e-mail messages. Use short paragraphs and blank lines between each paragraph. When making points, number them or mark each point as separate to keep the overview.
    Contemplate : Read the email before you send it.
    A lot of people don't bother to read an email before they send it out, as can be seen from the many spelling and grammar mistakes contained in emails. Apart from this, reading your email through the eyes of the recipient will help you send a more effective message and avoid misunderstandings and inappropriate comments.
    Clarity : Take care with abbreviations and emoticons.
    In business emails, try not to use abbreviations such as BTW (by the way) and LOL (laugh out loud). The recipient might not be aware of the meanings of the abbreviations and in business emails these are generally not appropriate. The same goes for emoticons, such as the smiley :-). If you are not sure whether your recipient knows what it means, it is better not to use it.
    Neatness : Be careful with formatting.
    Remember that when you use formatting in your emails, the sender might not be able to view formatting, or might see different fonts than you had intended. When using colors, use a color that is easy to read on the background.
    Readability : Take care with rich text and HTML messages.
    Be aware that when you send an email in rich text or HTML format, the sender might only be able to receive plain text emails. If this is the case, the recipient will receive your message as a .txt attachment. Most email clients however, including Microsoft Outlook, are able to receive HTML and rich text messages.
    Relevance : Use a meaningful subject.
    Try to use a subject that is meaningful to the recipient as well as yourself. For instance, when you send an email to a company requesting information about a product, it is better to mention the actual name of the product, e.g. 'Product A information' than to just say 'product information' or the company's name in the subject.
    Active : Use active instead of passive.
    Try to use the active voice of a verb wherever possible. For instance, 'We will process your order today', sounds better than 'Your order will be processed today'. The first sounds more personal, whereas the latter, especially when used frequently, sounds unnecessarily formal.
    Neutral : Keep your language gender neutral.
    In this day and age, avoid using sexist language such as: 'The user should add a signature by configuring his email program'. Apart from using he/she, you can also use the neutral gender: ''The user should add a signature by configuring the email program'.
    Clarity : Use cc: field sparingly.
    Try not to use the cc: field unless the recipient in the cc: field knows why they are receiving a copy of the message. Using the cc: field can be confusing since the recipients might not know who is supposed to act on the message. Also, when responding to a cc: message, should you include the other recipient in the cc: field as well? This will depend on the situation. In general, do not include the person in the cc: field unless you have a particular reason for wanting this person to see your response. Again, make sure that this person will know why they are receiving a copy

    DONT’S
    Do not attach unnecessary files.
    By sending large attachments you can annoy customers and even bring down their e-mail system. Wherever possible try to compress attachments and only send attachments when they are productive. Moreover, you need to have a good virus scanner in place since your customers will not be very happy if you send them documents full of viruses!
    Do not write in CAPITALS.
    IF YOU WRITE IN CAPITALS IT SEEMS AS IF YOU ARE SHOUTING. This can be highly annoying and might trigger an unwanted response in the form of a flame mail. Therefore, try not to send any email text in capitals.
    Don't leave out the message thread.
    When you reply to an email, you must include the original mail in your reply, in other words click 'Reply', instead of 'New Mail'. Some people say that you must remove the previous message since this has already been sent and is therefore unnecessary. However, I could not agree less. If you receive many emails you obviously cannot remember each individual email. This means that a 'threadless email' will not provide enough information and you will have to spend a frustratingly long time to find out the context of the email in order to deal with it. Leaving the thread might take a fraction longer in download time, but it will save the recipient much more time and frustration in looking for the related emails in their inbox!
    Do not overuse Reply to All.
    Only use Reply to All if you really need your message to be seen by each person who received the original message.
    Do not forward chain letters.
    Do not forward chain letters. We can safely say that all of them are hoaxes. Just delete the letters as soon as you receive them.
    Do not request delivery and read receipts.
    This will almost always annoy your recipient before he or she has even read your message. Besides, it usually does not work anyway since the recipient could have blocked that function, or his/her software might not support it, so what is the use of using it? If you want to know whether an email was received it is better to ask the recipient to let you know if it was received.
    Do not ask to recall a message.
    Biggest chances are that your message has already been delivered and read. A recall request would look very silly in that case wouldn't it? It is better just to send an email to say that you have made a mistake. This will look much more honest than trying to recall a message.
    Do not use email to discuss confidential information.
    Sending an email is like sending a postcard. If you don't want your email to be displayed on a bulletin board, don't send it. Moreover, never make any libelous, sexist or racially discriminating comments in emails, even if they are meant to be a joke.
    Avoid using URGENT and IMPORTANT.
    Even more so than the high-priority option, you must at all times try to avoid these types of words in an email or subject line. Only use this if it is a really, really urgent or important message.
    Avoid long sentences.
    Try to keep your sentences to a maximum of 15-20 words. Email is meant to be a quick medium and requires a different kind of writing than letters. Also take care not to send emails that are too long. If a person receives an email that looks like a dissertation, chances are that they will not even attempt to read it!
    Don't send or forward emails containing libelous, defamatory, offensive, racist or obscene remarks.
    By sending or even just forwarding one libelous, or offensive remark in an email, you and your company can face court cases resulting in multi-million dollar penalties.
    Don't forward virus hoaxes and chain letters.
    If you receive an email message warning you of a new unstoppable virus that will immediately delete everything from your computer, this is most probably a hoax. By forwarding hoaxes you use valuable bandwidth and sometimes virus hoaxes contain viruses themselves, by attaching a so-called file that will stop the dangerous virus. The same goes for chain letters that promise incredible riches or ask your help for a charitable cause. Even if the content seems to be bona fide, the senders are usually not. Since it is impossible to find out whether a chain letter is real or not, the best place for it is the recycle bin.