Politics: Together We Can Make it Happen

There are two months until the General Election, an election that will decide the next President of the United States . The person elected will be the president of all Americans, not just the Democrats or the Republicans. It’s time that we all came together, Democrats and Republicans alike.

If you support the policies and character of John McCain, please drive with your headlights on during the day.

If you support Barack Obama, please drive with your headlights off at night. Together, we can make it happen.

Anger Management

Sometimes when you are angry with someone, it helps to sit down and think about the problem.

50th Anniversary

A man and his wife were celebrating 50 years together. Their three kids, all very successful, agreed to a Sunday dinner in their honor.

‘Happy Anniversary Mom and Dad,’ gushed son number one …. ‘Sorry I’m running late. I had an emergency at the hospital with a patient, you know how it is, and didn’t have time to get you a gift.’

‘Not to worry, ‘ said the father. ‘The important thing is that we’re all together today.’

Son number two arrived and announced, ‘You and Mom look great, Dad. I just flew in from Los Angeles between depositions a nd didn’t have time to shop for you.’

‘It’s nothing,’ said the father, ‘We’re glad you were able to come.’

Just then the daughter arrived, ‘Hello and happy anniversary! I’m sorry, but my boss is sending me out of town and I was really busy packing so I didn’t have time to get you anything.’

After they had finished dessert, the father said, ‘There’s something your mother and I have wanted to tell you for a long time. You see, we were very poor. Despite this, we were able to send each of you to college. Throughout the years your mother and I knew that we loved each other very much, but we just never found the time to get married.’

The three children gasped and all said, ‘You mean we’re bastards?’

‘Yep,’ said the father. ‘And cheap ones too.’

Networking Protocols and Models

[Abstract]
The purpose of this document is to explain different networking protocols and models by explaining what is needed to upgrade a network from a bus topology to a star topology. Also included within this document is information about a network design to allow for maximum users with maximum throughput for 100Mbps to the customer’s desktop within the star topology.

[Content]
When considering changing the topology on a business network, it is important to know information about different network topologies and benefits of each. The four most commonly found network topologies are the star, ring, bus, and mesh (Mitchell, 2008). The star topology has a centralized device, that which is like a hub of a wheel, with multiple connections going out to different devices. The ring topology has multiple devices along a network ring and they can either send data only one way or they can send data bi-directionally. The bus topology has a single path with multiple devices connected along that path and terminators on each end of the path. The bus topology was most commonly found as using coaxial cable at 10Mbps with multiple computers connected in series to it. The mesh topology has multiple devices with multiple paths between devices; this is by far the most complex and most robust topology out of the group. Knowing about the different types of network topologies, helps a customer know which will best suite their needs.
When making a decision of upgrading from a bus topology to a star topology, there are many choices that need to be made prior to making the best decision. The first most important decision to be made is about what type of media is going to be used. If existing CAT-5 or CAT-5e cable is present, it would be recommended to reutilize that, however since it is most likely that coaxial cable was used the other option is to use fiber optic cable. Fiber optic cable would be an ideal choice in the event that long distances or network security are major concerns for the computer network. Since neither of these was identified as possible issues, we’ll assume that CAT-6 cable is being used. The reinstallation of the network infrastructure is the most major part for upgrading from a bus to a star topology.
In order to get a complete idea of what is needed to upgrade the network, all necessary hardware pieces need to be identified. First and foremost if the local computers do not have 100BaseT network interface cards (NICs) in them, then enough NICs need to be purchased to populate all of the necessary computers. Additionally drop boxes and patch panels will be needed to be purchased for the infrastructure to interconnect the communications closet to the local users work areas. Depending on how many users are going to be on the network, I would recommend purchasing smaller Cisco 3750 switches for each office. The Cisco 3750 switches need to have 2 Gigabit uplink ports to be able to connect to the centralized hub of the topology. I recommend using a Cisco Catalyst 4506, 6509, or 6513, depending on how large the network is going to be. If all users are going to be located in one building, then just one major switch can be utilized with no secondary switches needed, however if a few buildings or one large building is going to be used, then there may be a need for additional switches. I also recommend the Cisco catalyst switch to have redundant power supplies, supervisory cards, and uplinks to the router that is routing traffic out of the local area network. This is due to this one piece of equipment being the single point of failure, having redundant power supplies, supervisory cards, and uplinks all ensure there is minimal downtime in the event of a hardware failure.
Even though some equipment will be located at the local users work areas, some of the equipment will be located in the communications closet. It is recommended that the central core switch is located in the communications closet because physical security ensures a raised level of security on a computer network. Also located in the communications closet will be a patch panel that with the use of patch cords will interconnect the core switch to the local user’s workstations. Also located in the communications closet should be an uninterruptible power supply (UPS). The UPS should be large enough to keep all equipment in the communications closet online in the event of a power outage. Also located in the communications closet should be the router and point of demarcation for the LAN to be routed out of the building. All necessary core communications equipment, with supporting power equipment, and horizontal distribution for the network should be secured within the communications closet.
There are some key steps that need to be taken in order to ensure maximum network security and throughput can be maintained. All critical network, power, and horizontal distribution equipment should be locked and secured within the communications closet. Physical security is one level to ensuring the complete network is secure. Additionally, the configuration of all networking devices should be using port security. This ensures that only authorized computers are provided with network connectivity. Third it is recommended that any unused ports on any networking equipment are disabled. The horizontal distribution patch panel should only have patch cables for ports that are being used to be connected to the core switch. This ensures unauthorized users do not plug an unauthorized device into an open port on the network infrastructure to obtain network connectivity. To maximize network throughput it is recommended that wherever an additional switch is being used to utilized two uplink ports from that switch to the core switch and establish a Gigabit EtherChannel (GEC). The GEC establishes a two gigabit connection between switches and ensures there is enough bandwidth necessary to support all users (Cisco). Maintaining network security and maximum throughput on a network are essential for both protecting the network and ensuring scalability of the network, today and in the future.
In conclusion, when upgrading from a network bus topology to a star topology it is important to invest, not only in the infrastructure, but also in the core devices. By making the investment the network can maintain a high level of security, as well as, a high level of scalability. Proper configuration of networking devices also ensures a high level of security and a maximum level of data throughput for all users. Security all critical networking equipment in the communications closest guarantees the star topology is a more ideal choice to meet all the company’s business needs.

References
1. Mitchell, Bradley Topologies – Network Topologies – Types of Topology Examples – Bus Ring Star. Retrieved September 7, 2008, from Topologies – Network Topologies – Types of Topology Examples – Bus Ring Star Web site: http://compnetworking.about.com/od/networkdesign/a/topologies.htm
2. Catalyst 5000 Family Software Configuration Guide (6.3 and 6.4) – Configuring Fast EtherChannel and Gigabit EtherChannel [Cisco Catalyst 5000 Series Switches] – Cisco Systems. Retrieved September 7, 2008, from Catalyst 5000 Family Software Configuration Guide (6.3 and 6.4) – Configuring Fast EtherChannel and Gigabit EtherChannel [Cisco Catalyst 5000 Series Switches] – Cisco Systems Web site: [URL Removed Broken link]

Buttercups and Golfballs

Towards the end of the golf course, Dave hit his ball into the woods and found it in a patch of pretty yellow buttercups. Trying to get his ball back in play, he ended up thrashing just about every buttercup in the patch.

All of a sudden . . .POOF!! In a flash and puff of smoke, a little old woman appeared. She said, “I’m Mother Nature! Do you know how long it took me to make those buttercups? Just for doing what you have done, you won’t have any butter for your popcorn for the rest of your life: better still, you won’t have any butter for your toast for the rest of your life…As a matter of fact, you’ll never have any butter for anything the rest of your life!” Then POOF! … She was gone!

After Dave recovered from the shock, he hollered for his friend, “Fred, where are you?” Fred yells back, “I’m over here in the pussy willows.”

Dave shouts back, “Don’t swing, Fred, for the love of god, don’t swing!”

Interesting Houses

A Cat Named Lucky

Hallmark Writers

Ever wondered what happens when Hallmark writers are having a bad day……..

My tire was thumping.
I thought it was flat
When I looked at the tire…
I noticed your cat.
Sorry!

Heard your wife left you,
How upset you must be.
But don’t fret about it.. .
She moved in with me.

Looking back over the years
that we’ve been together,
I can’t help but wonder…..
‘What the hell was I thinking?’

Congratulations on your wedding day!
Too bad no one likes your husband.

How could two people as beautiful as you
Have such an ugly baby?

I’ve always wanted to have
someone to hold,
someone to love.
After having met you ..
I’ve changed my mind.

I must admit, you brought Religion into my life.
I never believed in Hell until I met you.

As the days go by, I think of how lucky I am…
That you’re not here to ruin it for me.

Congratulations on your promotion.
Before you go…
Would you like to take this knife out of my back?
You’ll probably need it again.

Happy Birthday, Uncle Dad!
(Available only in Tennessee , Kentucky & West Virginia)

Happy birthday! You look great for your age.
Almost Lifelike!

When we were together,
you always said you’d die for me.
Now that we’ve broken up,
I think it’s time you kept your promise.

We have been friends for a very long time ..
let’s say we stop?

I’m so miserable without you
it’s almost like you’re here.

Congratulations on your new bundle of joy.
Did you ever find out who the father was?

Network Design Scenario

                                                                                            [Scenario]
Schaumburg Elementary is a four-year-old, single-level building with 12 classrooms and a library. Each classroom currently has 24 students but could possibly seat 32 students. There are currently no portable classrooms but a student enrollment growth is just starting to hit the school.

Enough computers are available for six classrooms and the library immediately, and the intent is to outfit the remaining six classrooms next year. The plan is to make the Internet and some online services available to the students. The computers are current enough to be useful for at least two years.

The library, which is somewhat centrally located, is where the server(s) and router connecting the school to the Internet will be located. Assume that all rooms will have 24 computers and that each room will use a stackable hub solution that combines a 12-port hub and a 24-port hub for 36 total ports. Being stackable units, the network will see each stack as a single 36-port device.

                                                                                            [Content]
When looking at the scenario for the elementary school, or any networking design scenario, it is important to first understand all of the requirements that are set by the customer. We know there are enough computers to outfit seven classrooms and the library. Based upon the information provided we know we potentially have 24 students in each classroom and perhaps the same for the library, which is approximately 168 computers. Another requirement identified by the customer is that they intend to outfit another six classrooms in the next upcoming year, which means there will be a need for another 168 computers. We also know the school does not have an infinite budget and is in the classroom environment, so the room design may change based upon teachers wants or needs. The current design for the network is using a star topology and is located in a single story building. The school has agreed to upgrade from hubs to stackable switches allowing for a total of 36 ports per classroom.

The next step to choosing to most ideal solution for a customer is to know their physical layout and requirements and start choosing the media and best devices to suite the customer’s needs. Typically when designing a network it is common practice to put together a plan that meets the current requirements, plus a 30% overhead for future growth, however in this scenario the school is going to be upgrading 6 additional classrooms within the next year and each switch in the classroom already has plenty of room for future expansion with 36 ports. Since the school does not have an unlimited budget and currently has hubs in place and the building is only 4 years old, we can assume CAT-5, CAT-5e, or CAT-6 cable was previously installed into the building, and therefore we know our data speeds will be either 10/100/1000Mbps. If a previous network was not installed, we could recommend a wireless network to allow for the change of the classroom layout and to cut the costs of cabling. Since the scenario does not specify we will assume CAT-5e or CAT-6 was installed and we will reutilize current cabling infrastructure to better suit our design needs. With knowing the star topology and a current requirement for 6 classrooms to be outfitted and the library, we can begin to form a recommendation to the school. We will recommend using seven 12-port stackable switches with two uplink ports, seven 24-port switches with two uplink ports, and one core distribution switch with at least 12-gigabit ports. The uplink ports are essential because they will provide the gigabit uplink to the core switch. The second step in the design of a network is to look at the physical connectivity and put that together with current equipment that can be found on the market.

The third step in designing a network is to look at how many IP addresses will be needed and plan to accommodate all for now and the future. Since the school advised us that it could only afford 2 public IP addresses, we know we are going to using the network address translation protocol in the router and therefore we can use a private IP address range for all the devices on the network. We know the school currently needs approximately 168 IP addresses for computers, one for the server, one for the switch, and one for the router, which brings us to a total of 171 total IP addresses. A private class “C” network would accommodate 253 hosts and the current needs of this infrastructure, however we know we are going to add another 168 computers next year, so we should use a class “B” network because it allows for a total of 1,048,576 contiguous IP addresses. The 3rd step to designing a network is to plan for ease of configuration and accommodate all hosts/devices on the customer’s network.

The 4th step to the network design proposal is to get the pricing of different types of equipment from different vendors. Listed below is a price list of the necessary equipment and cabling needed for this project with references for each device.
Device Cost Quantity Reference
Solution #1
Cisco Catalyst 3750-24PS SMI Switch $3,199.99 7 http://www.google.com/products/catalog?hl=en&q=cisco+catalyst+3750&cid=7157816595940066664#ps-sellers
Cisco WS-CE500G-12TC Switch $1,229.99 7 http://www.tigerdirect.com/applications/searchtools/item-details.asp?EdpNo=3505616&Sku=C94-2180&SRCCODE=GOOGLEBASE&cm_mmc_o=TBBTkwCjCVyBpAgf%20mwzygtCjCVRqCjCVRq
Cisco WS-C3560G-24PS-E Switch $6,921.95 1
Linksys Router RVS4000 $137.95 1 [URL Removed Broken link]
Blackbox Cable 1000ft $216.99 2 http://www.onsale.com/shop/detail.aspx?dpno=499593&store=onsale&source=bwbfroogle
Belkin CAT6 RJ-45(M) Network Connector, 100 Pack $43.99 10 http://www.superwarehouse.com/p.cfm?p=1525507&CMP=KAC-GoogleShopping&ci_src=14110944&ci_sku=1525507
Crimpers $24.10 1 http://www.antonline.com/p_RJ4511TOOL-GP_221794.htm
Total Cost $38,967.74
Solution #2
Netgear GSM7328S Switch $1,749.99 15 http://www.netgear.com/Products/Switches/FullyManaged10_100_1000Switches.aspx
Netgear RP614 Router $49.99 1 http://www.netgear.com/Products/RoutersandGateways/WiredRouters/RP614.aspx
Blackbox Cable 1000ft $216.99 2 http://www.onsale.com/shop/detail.aspx?dpno=499593&store=onsale&source=bwbfroogle
Belkin CAT6 RJ-45(M) Network Connector, 100 Pack $43.99 10 http://www.superwarehouse.com/p.cfm?p=1525507&CMP=KAC-GoogleShopping&ci_src=14110944&ci_sku=1525507
Crimpers $24.10 1 http://www.antonline.com/p_RJ4511TOOL-GP_221794.htm
Total Cost $27,198.82
Solution #3
3Com 3CR17761-91 $2,143.79 7 http://www.provantage.com/3com-3cr17761-91~73COT06U.htm
3Com 3CR17660-91-US $916.15 7 http://www.eworldsale.com/3com-12-port-4200g-gigabit-switch-4x-mini-gbic-1x-xenpak-1u-stackable_6027_13292.html
3Com 3C13640-US $384.33 1 http://www.provantage.com/3com-3c13640~73COI01F.htm
Blackbox Cable 1000ft $216.99 2 http://www.onsale.com/shop/detail.aspx?dpno=499593&store=onsale&source=bwbfroogle
Belkin CAT6 RJ-45(M) Network Connector, 100 Pack $43.99 10 http://www.superwarehouse.com/p.cfm?p=1525507&CMP=KAC-GoogleShopping&ci_src=14110944&ci_sku=1525507
Crimpers $24.10 1 http://www.antonline.com/p_RJ4511TOOL-GP_221794.htm
Total Cost $22,701.89

Step 5 to the network design is to put together a proposal, which explains the requirements, the equipment necessary, the advantages and disadvantages of each, and the costs involved with the project.

In conclusion, when putting together a network design proposal for a customer it is best to start with looking at the customer’s requirements, then look at the physical aspects of the network, moving to the data link (switching aspects), planning the network/IP addressing, and then put it all together into one proposal to provide to the customer for them to decide which will best suite their needs.

Urologist

My internist referred me to a female urologist. I saw her yesterday and she is gorgeous. She’s beautiful and unbelievably sexy. She told me that I have to stop masturbating.

I asked her why and she said, “Because I’m trying to examine you…”

How To Recognize A Persian Cat

You Finish?

The Italian Lover, a virile middle aged Italian gentlemen named Guido was relaxing at his favorite bar in Rome when he managed to attract a spectacular young blonde woman. Things progressed to the point where he led her back to his apartment and, after some small talk, they retired to his bedroom where he rattled her senseless.

After a pleasant interlude, he asked with a smile, “So, you finish?”

She paused for a second, frowned, and replied, “No.”

Surprised, Guido reached for her and the rattling resumed. This time she thrashed about wildly and there were screams of passion. The sex finally ended and, again, Guido smiled and asked, “You finish?”

Again, after a short pause, she returned his smile, cuddled closer to him and softly said, ‘No.’

Stunned, but damned if he was going to leave this woman unsatisfied, Guido reached for the woman yet again. Using the last of his strength, he barely managed it, but they ended together screaming, bucking, clawing and ripping the bed sheets.

Exhausted, Guido fell onto his back, gasping. Barely able to turn his head, he looked into her eyes, smiled proudly and asked again, “You finish?”

Barely able to speak, the beautiful blonde whispered in his ear, “No, I Norwegian.”

Python Catcher in Africa

Competitive Intelligence and Information Systems

                                                               [Abstract]
The purpose of this document is to compare ethical issues that may or may not exist with using an information system, which is designed to gather strategic information, based upon a competitor’s customer base.  Also included within this document is an assessment of ethics as it pertains to customers whom are individuals as well as businesses.

                                                               [Content]
When using an information system to gather information about a competitor’s customers, it is important to know ethical issues that could be questioned. Many company’s believe it is important to gather information about competitors in order for them to provide a quality product at a competitive price, however there are some activities that should be avoided in order to prevent unethical activities from taking place. Some acceptable types of information being gathered and methods for gathering the information include; asking customer’s about equipment and pricing of competitors, asking employees of other businesses about the company’s practices, searching for information through public resources, reading books or publications about other companies, asking other people about practices that might be useful to the company. Any company has a right to information about competitors as long as they obtain the information through the means that is accessible to the public (onlineethics.org, 2006). Information, which is obtained through covert surveillance, is considered unacceptable as well as any information, which is gained through the influence of personnel holding any confidential information. Any information, which is gained through deception, is illegal and not an acceptable way to gain information about a competitor.

When gaining strategic information about a competitor there are acceptable customers and unacceptable customers from which information can be gained. It is completely acceptable and ethical to gain information from customers of a competitive business as long as the customers are individuals or if the customer is another business then they are not one of the competitors. If information is being gathered from a competitor from a customer who is a business and is in the same type of business, then this is not only unacceptable, but also unethical as well. It is unacceptable to gain information either by the way of first hand or third party about information that is proprietary about a particular business. Any proprietary information, which belongs to a competitor, should never be used to benefit a company. If a company chooses to use proprietary information that belongs to another company it is apparent they do not abide by the code of professional conduct of the Society of Competitive Intelligence Professionals. Using competitive intelligence practices to gain information about competitors is legal and ethical as long as companies use public means of obtaining information.

In the world of competitive intelligence (CI) there are ethical issues that arise from the lack of guidance, however when ethical means are used, using an information system to track information about competitors should be completely accepted. Many companies take business ethics very seriously, however some competitive intelligence practitioners feel that many difficult ethical decisions are currently being left up to them to make the judgment call on and this is due to the current ethical guidance being too vague to be very helpful with making ethical decisions (Sexton, 2007). When accepted methods are used and an information system is maintained to track this information about competitors, there is nothing ethically wrong about that.

In conclusion, there are many ethical issues in which people are faced with on a day to day basis in the business world, however using illegal or deceptive means to gather information about competitors is not only unethical, but should be unacceptable. Using deceptive means to gather information about competitors, dumpster diving, conducting covert surveillance, and even stealing documents are a few examples of unethical means of gathering information. The methods from which competitive intelligence is obtained should be scrutinized and should adhere to a strict code of ethics, however using acceptable means to obtain information and then tracking that information within an information system is completely acceptable and currently utilized.

References
1. (2006, February 16th). Benchmarking and Reverse Engineering (Advice from The Ethics Office at Texas Instruments Corporation) – Online Ethics Home. Retrieved August 23, 2008, from Benchmarking and Reverse Engineering (Advice from The Ethics Office at Texas Instruments Corporation) – Online Ethics Home Web site: http://www.onlineethics.org/CMS/workplace/workcases/ti-ethics/benchmarking.aspx
2. Sexton, Tiina-Liisa (2007, October). http://findarticles.com/p/articles/mi_qa5393/is_200710/ai_n21298481. Retrieved August 23, 2008, from Questionable intelligence gathering | Intheblack | Find Articles at BNET Web site: http://findarticles.com/p/articles/mi_qa5393/is_200710/ai_n21298481

Problem Solving Strategies and Management Decision-making

[Abstract]
The purpose of this document is to identify and implement problem solving strategies and management decision-making. Also included within this document is the answer to the questions, “What impact would decision-making styles have on the design of information systems that support decision making in international businesses?”

[Content]
There are a few different decision making styles that can aid with the decision making process. The democratic decision making style is where a leader relinquishes control of a decision in order to let members of a group vote. The consensus decision-making style is where the leader gives up total control and lets the group, as a whole, deal with the decision. The collective decision making style is where the leader involves the members of an organization in order to gain a different perspective in order to assist the leader with making the decision. The autocratic decision making style is where the leader maintains total control and ownership of the decision. Different types of leaders may use different types of styles in order to assist them with the decision making process (Leadership Management Development Center, Inc., 1997).

International businesses use information systems differently from more local or regional businesses. Local or regionalized businesses may use information systems to manage such things as people, documents, technologies, and procedures in order to assist with the management of operational activities in an organization. Localized information systems also help with management accountants to solve business problems like the costing of a service or product or even a business-wide strategy. International businesses can use information systems to aid with such things as international research or discovery. International businesses will also use information systems to achieve a competitive advantage by utilizing intelligence gained from the international market to make superb business decisions (goliath.ecnext.com, 2002). Local or regional businesses use information systems differently than international businesses.

Many governments play a major role in how businesses run or operate. Governments have a major impact on businesses by how companies are taxed, by which subsidies are allowed, interest rates, exchange rates, and ever by which partnerships are allowed. Governments also play a major role in how business function or operate by the laws or policies that are created or put in place. Governments have their hands in how business are ran everywhere from needing a business license in order to operate as a business all the way down to ensuring companies meet environmental, cultural, health and safety standards. It is always within a government’s best interest to encourage business. By allowing businesses, this is how many governments are able to fund many programs within the government. Governments influence many business in many different ways from ensuring companies are complying with government policies or laws and in return company’s pay many forms of taxes which the government uses to fund many government programs.

Their government of where the business resides influences international businesses, the government influence may affect how the company’s decision-making process by the type of decision making style that is used and therefore can affect how an information system is designed. A business in China may choose to use more of an autocratic approach to how decisions are made, whereas a company in the United States may choose to use more of a democratic decision making approach. When designing an information system when an autocratic decision making style is being used, there may be more controls or restrictions placed upon users of the information system, ensuring they do not have a free reign of access to information. When a democratic decision making style is being used, users such as managers may have a lot more access to information within that information system in order to ensure they are making the proper decisions.

References
1. (1997). Decision Making Style and its Effect On Morale. Retrieved August 22, 2008, from Decision Making Style and its Effect On Morale Web site: http://www.leadershipmanagement.com/html-files/decision.htm
2. International business and global information management research: toward a cumulative tradition.. Retrieved August 22, 2008, from International business and global information management research: toward a cumulative tradition. Web site: http://www.manta.com/

Military Humor

military_humormilitary_humor026military_humor025military_humor024military_humor023military_humor022military_humor021military_humor020military_humor019military_humor018military_humor017military_humor016military_humor015military_humor014military_humor013military_humor012military_humor011military_humor010military_humor009military_humor008military_humor007military_humor006military_humor005military_humor004military_humor003military_humor002

Unexpected Visitor

A fawn followed this beagle home, right through the doggie door, in the Bittinger, MD area. The owner came home to find the visitor had made himself right at home.

Pastor Fluff

The Reverend John Fluff was the pastor in a small town in Ireland. One day he was walking down the high street when he noticed a young lady of his congregation sitting in a pub drinking beer.

The Reverend wasn’t happy! He walked through the open door of the pub and sat down next to the woman. ‘Miss Fitzgerald,’ he said sternly. ‘This is no place for a member of my congregation. Why don’t you let me take you home?’

‘Sure,’ she said with a slur, obviously very drunk. When Miss Fitzgerald stood up from the bar, she began to weave back and forth. The Reverend realized that she’d had far too much to drink and grabbed her arms to steady her. When he did, they both lost their balance and tumbled to the floor.

After rolling around for a few moments, the Reverend wound up on top of Miss Fitzgerald, her skirt hiked up to her waist. The pub landlord looked over and said, ‘Oy mate, we won’t have any of that carrying on in this pub.

The Reverend looked up at the landlord and said, ‘But you don’t understand, I’m Pastor Fluff.’

The landlord nodded and said, ‘Ah well, if you’re that far in, ye might as well finish.’

Cats and Dogs

How To Give A Cat A Pill

1. Pick up cat and cradle it in the crook of your left arm as if holding a baby. Position right forefinger and thumb on either side of cat’s mouth and gently apply pressure to cheeks while holding pill in right hand. As cat opens mouth, pop pill into mouth. Allow cat to close mouth and swallow.

2. Retrieve pill from floor and cat from behind sofa. Cradle cat in left arm and repeat process.

3. Retrieve cat from bedroom, and throw soggy pill away.

4. Take new pill from foil wrap, cradle cat in left arm, holding rear paws tightly with left hand. Force jaws open and push pill to back of mouth with right forefinger. Hold mouth shut for a count of ten.

5. Retrieve pill from goldfish bowl and cat from top of wardrobe. Call spouse from garden.

6. Kneel on floor with cat wedged firmly between knees, hold front and rear paws. Ignore low growls emitted by cat. Get spouse to hold head firmly with one hand while forcing wooden ruler into mouth. Drop pill down ruler and rub cat’s throat vigorously.

7. Retrieve cat from curtain rail, get another pill from foil wrap. Make note to buy new ruler and repair curtains. Carefully sweep shattered figurines and vases from hearth and set to one side for gluing later.

8. Wrap cat in large towel and get spouse to lie on cat with head just visible from below armpit. Put pill in end of drinking straw, force mouth open with pencil and blow down drinking straw.

9. Check label to make sure pill not harmful to humans, drink 1 beer to take taste away. Apply Band-Aid to spouse’s forearm and remove blood from carpet with cold water and soap.

10. Retrieve cat from neighbor’s shed. Get another pill. Open another beer. Place cat in cupboard, and close door onto neck, to leave head showing. Force mouth open with dessert spoon. Flick pill down throat with elastic band.

11. Fetch screwdriver from garage and put cupboard door back on hinges. Drink beer. Fetch bottle of scotch. Pour shot, drink. Apply cold compress to cheek and check records for date of last tetanus shot. Apply whiskey compress to cheek to disinfect. Toss back another shot. Throw Tee shirt away and fetch new one from bedroom.

12. Call fire department to retrieve the damn cat from across the road. Apologize to neighbor who crashed into fence while swerving to avoid cat. Take last pill from foil wrap.

13. Tie the little bastard’s front paws to rear paws with garden twine and bind tightly to leg of dining table, find heavy-duty pruning gloves from shed. Push pill into mouth followed by large piece of fillet steak. Be rough about it. Hold head vertically and pour 2 pints of water down throat to wash pill down.

14. Consume remainder of scotch. Get spouse to drive you to the emergency room, sit quietly while doctor stitches fingers and forearm and removes pill remnants from right eye. Call furniture shop on way home to order new table.

15. Arrange for SPCA to collect mutant cat from hell and call local pet shop to see if they have any hamsters.

How To Give A Dog A Pill

1. Wrap it in bacon.

2. Toss it in the air.

Ever Wonder Where the Term “Dickhead” Came From?

Untrained Personnel Developing Information System

[Abstract]
The purpose of this document is to provide a basic knowledge of what types of problems an untrained user may face with trying to develop an information system. Also included within this document is information about different case tools and how these case tools can aid in reducing cycle time and increase quality.

[Content]
Whenever untrained personnel attempt to build an information system, there are always going to be issues, problems, or hiccups that may need to be resolved. The key to any project is planning, without planning anybody, trained or untrained, is setting him or her up for failure. When untrained personnel attempt to build an information system they typically are taking something from how they know how it works in theory, planning how they want the product to act for them, and then attempting to make it operational. A major problem faced by many with developing new information systems are called “software crisis,” this is when developers are backlogged or having a limited supply of developers or funding (jyu.fi). When an untrained person attempts to take on a task that they do not know about, they can quickly get in over their head, which leads to project overruns and wastes precious resources.

CASE (Computer Aided Software Engineering) tools can be used throughout the lifecycle of a software development lifecycle. When trying to develop an information system there may be a need for different types of CASE tools to accommodate the different aspect of the project. CASE tools can be used for instances of the development lifecycle such as: code generating tools, data modeling tools, unified modeling language (UML) tools, refactoring tools, model transformation tools, and even configuration management tools. CASE tools can speed up the process of developing an information system by helping to create, not only documentation, but also code for the project. By using CASE tools throughout the lifecycle of a project, the project is more consistently completed and therefore a better quality product is produced.

Visual Paradigm is a UML modeling tool, which has many key features that can aid with developing an information system. Some of the specific key features of Visual Paradigm (2008, visual-paradigm.com) are: Automatic software updates, Class diagrams supported, Use Case diagrams supported, State diagrams supported, Sequence diagrams supported, Activity diagrams supported, Component diagrams supported, Deployment diagrams supported, Package diagrams supported, Object diagrams supported, Composite structure diagrams supported, Timing diagrams supported, and interaction overview diagrams supported. When a product is as diverse and aids in the development of so many portions to a product the efficiency and quality both increase as well.
There is a whole slue of types of code generator tools available for use of developers. It has been argued that the code generation tools have made programmers much more productive in completing a project. The code generation tools work by using a generic classes, templates, or aspects in order to create source code. Programmers are then able to focus their time on quality checking the product they are creating instead of writing source code for everything.

In conclusion, there is without a question of a doubt that CASE tools in fact do both ensure high quality standards of a product and reduce lifecycle time to create a product. CASE tools are very useful tools to aid with almost every aspect of the lifecycle of a product and these tools definitely speed up the process. CASE tools also ensure high quality products are produced by efficiently standardizing the process of the product lifecycle. The major problem to CASE tools and software crisis are untrained personnel. The bottom line is that you can have the best toolbox in the world, but if you do not know how to use the tools, you are not going to get very far with whatever it is you are trying to fix or build.

References
1. Robredo, Jamie (1989). Some Problems Involved in the Installation of Advanced Information Systems in Developing Countries.. Some Problems Involved in the Installation of Advanced Information Systems in Developing Countries., ED329238, Retrieved August 21, 2008, from http://eric.ed.gov/ (Robredo, 1989)
2. Problems in information system development. Retrieved August 21, 2008, from Problems in information system development Web site: http://users.jyu.fi/~jpt/doc/thesis/ime-1_1.html (jyu.fi)
3. UML CASE Tools – Free for Learning UML, Cost-Effective for Business Solutions. Retrieved 2008, from UML CASE Tools – Free for Learning UML, Cost-Effective for Business Solutions Web site: http://www.visual-paradigm.com/product/vpuml/

Business Ethics With Employees

[Abstract]
The purpose of this document is intended to provide an answer to what ethical may arise based upon an employee devising a way to make their job better, if any at all. Also included within this document is a basic understanding of why it is important to share knowledge and information at the workplace.

[Content]
When working in any type of position it is always a good idea to share information. By sharing information you are making yourself more marketable because you are the person that people will come to for information or on the job type of training. Without sharing information about the type of job you do, you are essentially digging yourself a hole where it may be difficult to get out of. This happens by performing a job that nobody else can do or what nobody else knows about, this means you cannot be replaced, however this means that if you go on vacation and there is a problem with the job, you are going to be the 1st person they call about it too. Also by working a position that nobody else knows or nobody else knows how to do, you are making it difficult for you to be promoted as well. It is always a good idea to share information in order to ensure more people know about your job and share the knowledge so that in the event you want to further your career, the company can easily find a replacement to fulfill the duties that you performed in that position (Lloyd, 2007).

Ethical issues can arise when an employee creates a product, idea, plan, process, or something that makes their job better or easier while they are on company time. Many companies have similar policies, which they make employee’s sign prior to employment. Herbalife’s policy states the following: “If you are an employee, you signed an agreement when you joined the Company, under which you assumed specific obligations relating to intellectual property as well as the treatment of confidential and proprietary information. Among other things in the agreement, you assigned to the Company all of your right, title, and interest in intellectual property you develop when you are employed in certain capacities, such as a managerial, technical, product planning, programming, scientific or other professional capacity (herbalife.com).” For many companies, which make employees sign agreements like this one from Herbalife, it is common that a company can promote this idea, process, or whatever it may be that the employee created and the company can turn a profit and the employee may never see any addition profit.

In conclusion, many companies require you to protect their physical, proprietary, and intellectual assets. If you devise a way to make your job easier while you are at work, technically the company views this as they own it, however if you think of this on your off-duty time then technically you own it. This is an ethical gray area that most employees are unwilling to fight because they do not want to lose their pension and benefits. Even though it is always a good idea to share information both to your company and to other employees, always make sure credit goes to where credit is due and if there is any compensation for the credit, always ensure you get what you are entitled to.

References

1. Lloyd, Joan (2007, July 13th). Helping train replacement logical move – The Business Journal of Milwaukee:. Retrieved August 19, 2008, from Helping train replacement logical move – The Business Journal of Milwaukee: Web site:
2. Herbalife – Corporate Code of Business Conduct and Ethics. Retrieved August 19, 2008, from Herbalife – Corporate Code of Business Conduct and Ethics Web site: [URL Removed Broken link]

Online Auction Ethics

[Abstract]
The purpose of this document is intended to provide an answer to what moral or ethical constraints should be placed upon users of online auctions, if any at all.

[Content]
When the question arises of what types of constraints should be put in place to prevent users of online auctions from putting immoral, unethical, or otherwise offensive items for bid on an online auction, some people may argue that the constraints goes against their 1st amendment rights of freedom of speech (Shouhong Wang and Diana Kao, 2005). Others may argue that when a person creates an account and accepts the agreement, they are knowingly subjecting themselves to anything that they may find offensive, immoral, or unethical. There is without a question of a doubt a need for some sort of constraints put in place, but where is the limit? Who needs to monitor and police the constraints? Who needs to regulate should be sold and what is not to be allowed?

Online auction sites, like Amazon or eBay, have disclaimers, which protects them from current laws. Even though online auction sites have disclaimers to protect them from current laws, the laws are being challenged. The online auction sites reserve the right to modify this disclaimer as the laws change and thus allowing the online sites to protect themselves. Auction sites also reserve the right to disallow anybody whom they feel is not abiding by their rules from using the online auction (Barker).

In conclusion, when the question is asked about who should be monitoring immoral material being placed on online auctions; I think it is the sole responsibility of each and every individual user to decide what should be allowed. If a user finds something so offensive, then it should be up to that person to report it to the online auction for further review, after all, what is immoral to one person might not be the same for another. It should be up to the online auction owners to follow the law and their policies should reflect the law. If a user is not following their policies, the online auction owners should ban the users from using the auction.

References

1. Shouhong Wang, and Diana Kao (2005). A Model for Monitoring and Enforcing Online Auction Ethics. A Model for Monitoring and Enforcing Online Auction Ethics, Retrieved August 14, 2008, from
2. Barker, Alex W. Ethics, E-Commerce, and the Future of the Past. Retrieved August 14, 2008, from Ethics, E-Commerce, and the Future of the Past Web site: [URL Removed Broken link]

A Beer Before It Starts

Sears Cajun Catalog

Boudreaux and Thibodeaux were looking at a Sears catalog and admiring the models. Boudreaux says to Thibodeaux, ‘Did you see de purty girls in dis catalog?’

Thibodeaux replies, ‘Yes, dey are vary beautiful. And look at de price!’ Boudreaux says, with wide eyes, ‘Wow, dey don’t cost much. At dis price, I’m gonna to buy one.’

Thibodeaux smiles and pats him on the back. ‘Good idee! Order one an if she’s as purty as she is in de catalog, I’m gonna get one too.’

Three weeks later, Thibodeaux asks Boudreaux, ‘Did you ever get de girl you ordered from the Sears catalog?’

Boudreaux replies, ‘No, but it shoudn’t be long now. I got her clothes yesterday!’

Information System Controls

[Abstract]
The purpose of this document is intended to look at a course registration system within a university and argue which controls should be inputted into that system to ensure the system is not being abused. Also included within this document is an argument for which controls should be put into place to ensure students are able to enroll into courses they request.

[Content]
When using an information system within a university to ensure student enrollment within classes they request there are few security controls that will have to be implemented. Without controls to protect the information system people will most certainly abuse the system. Controls not only assist the students, but they also aid the school in ensure the classrooms are not being overfilled. Controls will also help the school faculty by protecting information that students, whom don’t have a need to know, from viewing. If controls weren’t put into place, students would have access to other students personal information such as social security numbers and addresses, students then would be able to steal their identity and open credit cards and reek all sorts of havoc on each other.

Without an information system having controls in place there would be virtually no security to protect peoples information or the information system itself, however what types of controls should be put in place? When talking about information systems there are different types of controls that happen at different levels, the overall goal is to ensure data confidentiality, data integrity, and data availability. This means users should only have access to information that they are authorized to have access to. Data integrity means that data is secured and not being changed from the time a user inputs the data into the system to the time the data is being accessed. Data availability means that the data is there and ready for when the wants to access it. One form of controls is user-based permissions; this ensures users have access to only the data they are authorized to have access to. Another form of control is file-based permissions; this ensures only authorized personnel can access that specific file. Everything that happens within an information system happens at the system level. The system-level is responsible for auditing everything that happens on that system, but also ensuring everything on that system follows the correct policies and procedures for operation (intosaiitaudit.org, 2004). System-level controls cover everything from proper administration of the system, acceptable use policies of that system, backup procedures of the system, and how data is accessed, stored, or modified on the system. The different types of controls on the information system ensure the confidentiality, integrity, and availability of the data within an information system (Locicero, 2007).

When a student needs to enroll into a class they should first have to have a username and password to log into the information system with. The information system should be using encryption in order to ensure the data being passed between the users computer and the information system is secured. The information system itself should either be placed on a server or multiple servers to ensure that it has maximum uptime, as well as, being on some sort of uninterruptable power source (UPS) or backup generator. The information system should also have redundant paths to ensure the network access has maximum uptime. The information system’s audit, security, and application logs should be stored on a separate server, which should be secured. Trained personnel who are trained to follow all necessary policies and procedures should complete the basic administration of the system. The information system should have a consistent backup plan, which is tested on a regular basis in the event of a failure. There should also be a disaster recovery plan for the information system, which should be stored in a location that is different from where the information system resides. These sets of controls will ensure students are able to enroll in courses they request, as well as, maintain the information system for everybody to use.

In conclusion, when there are proper policies and procedures that have been implemented for an information system and everybody follows the doctrine this preventative action should greatly reduce the event of improper use of an information system. Proper administration of an information system will greatly mitigate any security issues that may arise. Having backup and disaster recovery procedures will ensure the information system can be recovered in the event of something catastrophic.

References
1. (2004, February). Review of Information System Controls. National Audit Office Form 905, 2.3, Retrieved August 21, 2008, from [URL Removed Broken link]
2. Locicero, Claudio (2007, November 5th). Confidentiality, Integrity, Availability and What it Means to You. Retrieved August 21, 2008, from Confidentiality, Integrity, Availability and What it Means to You Web site: http://ezinearticles.com/?Confidentiality,-Integrity,-Availability-and-What-it-Means-to-You&id=817559

Bangkok Bar

Computer Literate Executives and Information Systems

[Abstract]
The purpose of this document is to provide an argument to the question, “As more computer- and information system-literate employees move into executive positions, will executive support systems be needed? Why or why not?” The second part of this document answers the questions, “What special knowledge, other than that found in a course catalog, is needed to advise students about course and degree requirements in a university? Is it explicit or implicit knowledge? Could this knowledge be made available through a knowledge management system? Why or why not?”

[Content]
When answering the question, “As more computer- and information system-literate employees move into executive positions, will executive support systems be needed? Why or why not?” it is important to know what an executive support system is. An executive support system is a software application that produces reports with metrics for higher-level executives to analyze based on the information provided (webopedia.com, 2004). Many of the reports pull data from different departments such as accounting, staffing, scheduling, and more. With these reports, executives are able to make critical decisions that will best benefit the company for planning or business opportunities that may arise. These decisions should be based on the company’s vision or the direction the company wants to go, using the reports that hold the information about where the company currently stands.

Based on the definition of what an executive support system (ESS) is, one can argue that even though there may be more technologically savvy business executives, there will still be a need for the support system for the company to grow. No matter how big or small a company is, it is important for decision-makers to have a macro view of where the company currently stands. Without knowing where the company is, the business executive or CEO cannot create a plan to achieve the company’s vision. It is the need for knowledge of the company’s current status that necessitates the executive support system. Even though a business executive may be more technologically advanced, they will still need the ESS. However, they may require less support from their local information technology (IT) department. With business executives that are more technologically proficient, the IT department may not need to respond to mundane tasks like helping a user map to a printer or properly set up their email account.

To answer the questions, “What special knowledge, other than that found in a course catalog, is needed to advise students about course and degree requirements in a university? Is it explicit or implicit knowledge? Could this knowledge be made available through a knowledge management system? Why or why not?” it is first important to know the difference between implicit and explicit knowledge. Explicit knowledge is the type of knowledge that can be gained from documents, manuals, and even procedures (Zoltan Dienes, Josef Perner, 1999). Implicit knowledge is the type of knowledge where you consciously or unconsciously process information within your mind. A good way to differentiate the two is that implicit knowledge is something you gain from within, while explicit knowledge is something you gain from an outside source.

Knowing the differences between explicit and implicit knowledge, one can argue that to advise students about course or degree requirements within a university, the majority of the information is going to be explicit and therefore could be made available through a knowledge management system. The majority of information about courses and requirements can be found in a course catalog, and therefore is explicit knowledge. However, the ability to look at each student on a case-by-case basis and determine which path best suits their interests requires experience or implicit knowledge. The vast majority of students should be able to use a knowledge management system to determine their best course in obtaining a degree. By using explicit knowledge, there should be few instances where implicit knowledge is needed.

In conclusion, when trying to determine if an ESS is going to be needed due to businessmen becoming more technologically savvy, and if a knowledge management system would work for a university advising students, it is best to understand what an executive support system is and the differences between explicit and implicit knowledge. Once a person knows what these things are, they can make an argument to support their claim.

References
1. (2004, October 24th). What is Executive Support System? – A Word Definition From the Webopedia Computer Dictionary. Retrieved August 9, 2008, from What is Executive Support System? – A Word Definition From the Webopedia Computer Dictionary Web site: http://www.webopedia.com/TERM/E/Executive_Support_System.html
2. Zoltan Dienes, and Josef Perner (1999). A theory of implicit and explicit knowledge. Retrieved August 9, 2008, from A theory of implicit and explicit knowledge Web site: http://journals.cambridge.org/action/displayJournal?jid=BBS

Hungry at the Olympics

If you’re going to the olympics, be sure to bring your appetite. These are a few things you may be able to find.

A Real Man’s Grill

Free to a Good Home


* Free to good home.
* Excellent guard dog.
* Owner cannot afford to feed him anymore, as there are no more thieves, murderers, or molesters left in the neighborhood for him to eat.
* Most of them knew him as “Holy Shit.”