Friday, November 30, 2012


Sunday, September 30, 2012

A new Computer maker has come into the market and will be selling their products online through E-bay and locally. Look for LC computers offering high-end home, office and student computers. Made here in the USA and a part of Cornerstone IT (computer) Solutions of Northwest Missouri.

Friday, July 20, 2012

I recently wrote papers on the subject of ethics, that I will eventually share when the time is right. I researched the (Thomas-Kilmann Conflict Mode Instrument). Then before I closed up for the night I researched what the philosophy of right and wrong was according to others. One a Swami of all resources, I will continue with this research before I write my next blog. Thanks for reading! By the way when writing on such a subject matter may also include personal opinions of personal belief and others I research.

Friday, June 29, 2012

Safety First, Protection Policy within the Business Part 2

END-POINT PORTECTION
Firewall do we need it? By Kenneth Brewer ©June, 27th 2012

The most effective way to prevent something from falling and spilling is to set it on the floor in the first place.

If you’re reading this you most likely have a computer. If you have a computer it would be wise to protect it. Perhaps you might ask,” why, I don’t keep my banking or do anything on there that other people can use against me”? That might be true, on the surface, however it is never what it seems and you will never know what someone will use against or take away from you.

Never believe that what little information you have on your computer is so innocent and incorruptible that you don’t need protection. WRONG! Everything you own is yours and everything you put on an internet enabled device is now accessible in way or another. Diaries, photos, personal letters, e-mails, account info and so much more. Mothers madden name your pets and spouse, kids and passwords, and these are just a beginning, in the mountain of possibilities that can be infiltrated by these few you may have heard of; spam laced with Viruses, Trojans, and keystroke monitoring programs.
Bottom line is how much can your life be lost or exploited if someone wanted to mess with your life that surrounds you. Even the youngest of person to grandparents are or can be at risk at any time.
We all want to protect our family, right? We all want to protect what little we have, money, home and family and our jobs. Yes your employment can be at risk too. Credit fraud is a billion dollar (fraudulent) industry that affects everyone. The results to you are devastating. Many employment recruiters look at the credit scores and financial backgrounds of their prospects for determining risk factors when being considered for hire.  

Primary defense using a firewall

The Industry giants like Wally world, Banks, and Card companies have safety policies in place for this, however even they can prevent total penetration from outsiders or even corruptible insiders. Hope is not lost; protections from threats are handled through safety measures that include a physical and logical firewall. Deployed along with a stringent protocol policy used organizational wide. Industry Giants had software developed to prevent unwanted intruders, and because of this a less costly version is passed along to non-industry use, providing the same or similar technology that you as a computer user can deploy.
  You should have a hardware firewall (such as a router) to protect your network, however you should implement the use of a software firewall on each computer to help prevent the spread of a virus within your network (meaning more than one device on one system in home or office) if one of the computers do become infected.

How firewalls work

Like in Windows the Firewall will help provide protection from mischievous users and programs that rely on unwelcome incoming traffic that are setup to attack computers. In the server arena, Windows Firewall integrates intelligent design so out-going traffic is configured using the Advanced Security snap-in which incorporates or uses certain rules for firewall behavior, giving traffic protection within the Internet Protocol and its rules of security.
In a previous story line I wrote about the network policy incorporated into any business, or even home use for that matter as a first line of defense. I stand by that statement and article. Most importantly what must be remembered that along with the wordy policy, which a physical boundary must need to be put into place. This is called a FIREWALL. After all the weakest link in a chain is one that breaks. A good mechanic can predetermine that weak link. Your IT person is that mechanic that can search out and find out most weak links.  

 Figuring out what to do is simple for most companies by conducting an evaluation of your system. It can be started by conducting an Overview, Product evaluation, and its Design, then Deployment.
In review, the firewall is design to protect/prevent your device from hackers and unwanted intrusion that can delete your data, slow and crash your device (computer) steal passwords, credit card info and some undetermined amount of other problems that can happen from the results of an attack.

Bottom line is, “yes you need a firewall”!

Helpful Website and resources:


Firewall resources: Check Point, Cisco, Juniper, Palo Alto and Sonic Wall 

Friday, June 22, 2012

Safety First, Protection Policy within the Business

Safety in sharing
A few years ago, traffic on the internet consisted of e-mails and FTP’s relatively threat issues were nonexistent, however today we are looking at new threats every day.  Keeping up with these threats are challenging enough.
Your First-line of defense is your IT professional knowing the system, and then knowing what that system needs.
First-line defense
All good IT people will tell you that start with a Security Policy, deploy it then enforce it. Often found when I visit a business the policy starts off with catering to the general consensus of the employees, then third party venders and management.
Being unreasonable in all the restrictions that can be place on a system  
Company owners want to keep their people happy; this generally is a concept that seems productive to the cause. A restrictive policy seems to be over taxing and burdensome, and makes the administrators want to lessen the policies and restraints within a system. This then allows the administrative personal to update the system without going to leaps and bounds to get the job done.
Flexibility
Enterprises find a need to assure that the policies are flexible enough to allow information to flow, but not so light that the doors to the business are utterly open.
I found most companies or organization want to write their own policy, and implement it themselves. The policy writers will most likely use terms that are agreeable with the employees and management needs as well as the Technical Admins so it will be easy as possible to access remotely and otherwise. This is what I call commonsense policy.
What about penetration from outside events, threats along with internal threats or from former employees?
A balancing act between what is wanted and needed to protect the business is needed. Outside third party consulting may be the best practice with today’s threats. Policy makers need to focus on the main objective here. The business needs makes policies that need to be monitored closely and consistently.
Too often Policy is over looked for one reason or another. With vulnerability lurking just around the corner, it is well to know you have a secure system.  There is a renewed interest in security policy. Far behind where it should be today, however there are policies that are designed to continue expansion outside the traditional boundaries of an organization with their partners and contractors which build a closer tie-in to responses to the businesses endurance should a disaster occur. Many external relationships with vendor products are very demanding. With the vendor wanting to review security policy and configurations before doing business to ensure that the transfer of information and Intellectual Property will be secure.
Securing data begins at home
Logical Data is protected through cooperation within the organizations boundaries. Keeping passwords privet is number one. Laws now protect the end-user from giving up their passwords to Admin personal. Admins should have their own passwords; however that is not a cure-all. Sometimes the work has to be done in user mode.
Employer’s need to have at least one safety meeting once a year to remind employees the risk involved with telephone solicitations, IT fraud, and so forth and most of all never giving up their passwords, along with deploying a strong password policy.
This awareness will only work on a human level if the participants are willing to follow the rules, which should include; no more minimum requirements in a security policy, strong password protection, trusted relationships with vendors, understandable  maintenance  policies.
With external threats on the rise
When connected to the internet vulnerability increases 3 fold, visibility (exposure), bandwidth (and IP address), and the length of time spent on a particular site. Exposure is the key to the outside hacker, watching your every move gaining information that can bring your business to its knees.
 Physical stopping power is needed. Installing a Fire Wall security system before the server this will insure the protection of external threats through Spam, e-mails and web-browsing attempts.
One simple rule to keep in mind when it comes to choosing the level of a fire wall needed is. How much information do you want to keep and how much can be lost. In other word how much value do you put on your personal, privet and company information?  Gauge your strength of security on this bases, follow through with a policy, deploy educate and remind.

Saturday, April 7, 2012


Chapter Four

      “Ms. Williams”, pause. “Ms. Williams”!
      “Yes Mr. Herne”. I looked up from my student’s papers and then finally into his appealing blue eyes. “May I do something for you”?
      “No”, he replied in an ungrateful tone as to, why should he be bothered with anything to do with her. “You have a phone call waiting for you in the Deans office. You should learn to keep your personal business at home where it belongs. I suppose you have a cell phone”?
      Was that a question? He knew I had one he called it almost every day complaining about one thing or another. He acted like he was the Dean instead of being head of the maintenance department on campus. I made the mistake of letting him connect with me at a school function over Christmas break. I was just trying to be nice to the, ugh, well man. He was a creep, paunchy, then the dirt. He was filthy every time I seen him, and did I say creepy, but his eyes were the bluest of blue I had ever seen.
      “Contacts”, a female voice said.
      “Ahh”! I screamed, “What, huh, what”? 
      It was Karen the Social Science Professor, we were best of friends on campus. “His eyes their contacts, you knew that didn’t you”?
      “What, what huh, what, yea of course, how-how, how did you know, I mean how do you know”? I shuddered and stammered.
      “You know last Christmas? Well”! She sings songs.
      “Yuck, him”? I exclaimed in pretend discussed, we laughed. “Ok, I got to know how far”?
      “Later you have an important phone call in the Dean’s secretary’s office”. She pulled me up out of my desk chair and pushed me down the hall to the golf cart waiting at the entrance to my building.
      “Come on get in, its long distance”. Karen pushed again.
        Long distance no one has long distance anymore, just pick up a cell phone and push in the number and presto your connected no charge. Then I thought about my big brother he was ten years older than me. He never had anything to do with my family he ran off right after high school. He didn’t even come to our parents funerals. Never called, he never cared. I had four siblings, one brother from Dads first wife and two sisters from my mother, making me the middle sister of the three girls. Frank or Frank junior by name and title never seemed to fit in. After I grew up and matured I figured he never tried to fit in. At eight he held his mom in his arms after a car wreck he was with her when she died. I expect Frank never got over it and my mother was no substitute in his mind. I don’t think that frank and mom fought any more than most kids do with their parents for that matter, yet he still left.   

Chapter Five
      Karen and I walked into the Deans office and the secretary, announced that the party would call back in about fifteen minutes. I sat down in one of the chairs normally reserved for waiting students. The Dean stuck his head out the door, “where you waiting to see me”?
      “No I don’t believe so; I was waiting on a phone call”. I replied.
      “Students don’t take personal phone calls here unless it is some kind of an emergency, Miss”.
      “Yes, I know that and I have no idea what it’s all about and sir I am not a student”. I smiled as I returned fire.
      He was yanked from the half opened door and the door was shut by a woman’s arm. “Hum what was that all about? You think he’s got a student or a faculty member in there calling the shots”?
      “Who cares”, I replied. From another door the secretary walked through and sat at her desk, I then realized that it was her arm we saw. “Can you tell me who the phone call was from”? I asked. She politely smiled and shook her head and said nothing. She kept looking at me stealing a mournful glance whenever she thought I wouldn’t see. I was fed up!
      “Okay, what’s up”? I stood up abruptly and walked over to her with purpose. “You know something Elaine, spill it”, I demanded.
      “Okay, you can’t shoot the messenger, do you agree”?

Chapter Five part two

      Okay Agreed, I just wanted to know why should she know before me anyway it was my call not hers. The Dean opened the door stuck his head out made a funny face of surprise and ducked back in.
      “What I yelled”, not too loud but enough to get my point a crossed. The phone rang just when Elaine was about to open her trap. Elaine answered the phone and without making eye contact she handed me the phone.
      I took the phone and paused taking a moment to compose myself and to get myself ready for the bad news whatever it was. I watched Elaine hurry over to Karen that was now standing at the counter and they began to tell secrets. If looks were darts they would be dart board.
      “Hello, this is Carol”, pause, “yes Carol Williams”. I listened and replied, “My social security number, why”? I listen again to the raspy voice I’m sure belong to a man but wasn’t quite sure. “I D purposes, tell me what this is all about”? I almost cussed I was so angry by now my friend Karen and Elaine of all people knew and I don’t because of this person wants to Identify me. How did Elaine know anything if this person on the other end of the conversation was keeping tight lipped until I assured her who I am?

Chapter Five part three

      I assured the person of who I was, after they identified themselves as a law office to which I knew from my father’s affairs. This came weeks after my father passed away my sisters Trish and Emily had been back to some type of normalcy. I was back on campus teaching again. I liked Portland but I loved my family home best. Holidays at home had always been the best. My family home was this call about that. Were they going to tell me if we didn’t have a half million dollars we would lose the ranch? The person finally spoke then told me that there would be a reading of the will and all my siblings were asked to join them in their office, there would be coffee and pastry.

Chapter Six

      “Dad had a Will”? Trish asked. She was sitting on the edge if the chair that was placed around a giant oak table in the attorney’s conference room.
      “What, hum, huh, what? What Trish, what did you say”? I asked, I had been pondering all day I couldn’t keep focused on anything. I called for a car to drive me because I was too nervous that morning.
       Emily spoke up for Trish, “she questioned Dad’s Will”?
      “No I asked if dad had a Will”?
      “Same thing I just said,” Emily piped in.
      “No, Emma I said”…
      Emily cut her off and started to interrupt Trish again when the door opened and a man slightly recognized by all three of us judging from my sisters faces and mine, well I am an open book when it comes to making faces.        
      It was if our father walked through the door, at least of all a younger version of daddy. We all stood up but it was Trish that ran and climbed Frank as if he were a tree. He towered six feet and maybe 6 inches, maybe more, wow he was tall and broad. His face was weathered like daddy’s each line telling a story. As a girl I would sit on my father’s lap and trace my father’s lines on his face. They were like rivers and each of them had a story of its own.
      I gulped,” ah what are you doing here”? I managed to say.
      Trish clinging to his neck, him half stooped tried to speak. “I was called, just like you”.
      He pried Trish from his neck and stood upright. “I was called just like you”, he repeated.
      It was Trish that spoke next, “Leave him alone you are always attacking Frank”. Trish spoke in a mocking childlike voice.
      “What, I haven’t seen or talked about Frank for years. None of us had for that matter”, I said.    
      Emily sprang into action. Walking like a cat ready to prance on its pray she moved toward Frank speaking these terrible words of hate and anger. “Dad and mom are dead you know? Where in the world have you been? Why didn’t you come we searched and looked for you left word for you where dad told us you might be. We called the oil rig you were on last that place dad knew, you killed him Frank, you killed my daddy”. Fisted now she was on him pounding at his mighty chest, Frank with tears in his eyes just stood there took it knowing what she said she didn’t mean. Emily was our father’s favorite out of all of us. I think we all knew it and she loved daddy seemingly more than any. I took moms death hard she took daddy’s death hard and poor Trish hadn’t a clue how to act she cried and carried on when they both passed away. Trish was the combination of my sister Emma and I put together. I sat down and stared straight ahead. Then face down in my folded arms on the table like a school girl I began to cry.

 Chapter Seven 
Chapter Four

      “Ms. Williams”, pause. “Ms. Williams”!
      “Yes Mr. Herne”. I looked up from my student’s papers and then finally into his appealing blue eyes. “May I do something for you”?
      “No”, he replied in an ungrateful tone as to, why should he be bothered with anything to do with her. “You have a phone call waiting for you in the Deans office. You should learn to keep your personal business at home where it belongs. I suppose you have a cell phone”?
      Was that a question? He knew I had one he called it almost every day complaining about one thing or another. He acted like he was the Dean instead of being head of the maintenance department on campus. I made the mistake of letting him connect with me at a school function over Christmas break. I was just trying to be nice to the, ugh, well man. He was a creep, paunchy, then the dirt. He was filthy every time I seen him, and did I say creepy, but his eyes were the bluest of blue I had ever seen.
      “Contacts”, a female voice said.
      “Ahh”! I screamed, “What, huh, what”? 
      It was Karen the Social Science Professor, we were best of friends on campus. “His eyes their contacts, you knew that didn’t you”?
      “What, what huh, what, yea of course, how-how, how did you know, I mean how do you know”? I shuddered and stammered.
      “You know last Christmas? Well”! She sings songs.
      “Yuck, him”? I exclaimed in pretend discussed, we laughed. “Ok, I got to know how far”?
      “Later you have an important phone call in the Dean’s secretary’s office”. She pulled me up out of my desk chair and pushed me down the hall to the golf cart waiting at the entrance to my building.
      “Come on get in, its long distance”. Karen pushed again.
        Long distance no one has long distance anymore, just pick up a cell phone and push in the number and presto your connected no charge. Then I thought about my big brother he was ten years older than me. He never had anything to do with my family he ran off right after high school. He didn’t even come to our parents funerals. Never called, he never cared. I had four siblings, one brother from Dads first wife and two sisters from my mother, making me the middle sister of the three girls. Frank or Frank junior by name and title never seemed to fit in. After I grew up and matured I figured he never tried to fit in. At eight he held his mom in his arms after a car wreck he was with her when she died. I expect Frank never got over it and my mother was no substitute in his mind. I don’t think that frank and mom fought any more than most kids do with their parents for that matter, yet he still left.   

Chapter Five
      Karen and I walked into the Deans office and the secretary, announced that the party would call back in about fifteen minutes. I sat down in one of the chairs normally reserved for waiting students. The Dean stuck his head out the door, “where you waiting to see me”?
      “No I don’t believe so; I was waiting on a phone call”. I replied.
      “Students don’t take personal phone calls here unless it is some kind of an emergency, Miss”.
      “Yes, I know that and I have no idea what it’s all about and sir I am not a student”. I smiled as I returned fire.
      He was yanked from the half opened door and the door was shut by a woman’s arm. “Hum what was that all about? You think he’s got a student or a faculty member in there calling the shots”?
      “Who cares”, I replied. From another door the secretary walked through and sat at her desk, I then realized that it was her arm we saw. “Can you tell me who the phone call was from”? I asked. She politely smiled and shook her head and said nothing. She kept looking at me stealing a mournful glance whenever she thought I wouldn’t see. I was fed up!
      “Okay, what’s up”? I stood up abruptly and walked over to her with purpose. “you know something Elaine, spill it”, I demanded.
      “Okay, you can’t shoot the messenger, do you agree”?

MOTHER
BY K C SOMMERS
©APRIL 4, 2012
Chapter one
      My heart was in it but my mind wasn’t. I stared out the bay window into the darkened gloom. It was ten am yet, rain had set in. In the distance I could see the edge of the rain fall. Lighting was heavy in the sky. “Oh”, I jumped!
      “Aunt Carol, are you all right”?
      A voice that seemed to come from a distance call, and then gradually the words came clear. It was my nice Sybil. “Aunt Carol, are you all right”? Sybil asked once again.
      I just turned my head and looked at her and smiled, as if that should have been enough to satisfy as the answer. From the window bench where I had been perched I had seen a lighting strike off in the far distance. Perhaps it struck the trees, it often had. It was nature’s way of clearing out the over population of forest.
      Living in the northwest was a beautiful experience growing up. North and west of Sisters Oregon high in the hills that overlooked rivers and miles of green forest and the scars of my fellow man.
      Sybil came and set down opposite me, not saying a word to one another we turned and looked out the oversized window my father made in his workshop. Garand dad my father and his four brothers build this home for my Grandmother. That was two life time’s ago. My dad was the only survivor now sixty seven.
      Sybil pointed into the distance. I said, “I see it. It must have been from a lighting strike”.
      “How bad do you think it will get”?   
      I shuddered knowing the truth about forest fires. I didn’t like to say what I knew. It was indeed a fire we could see the smoke. She sprang from her perch ran from my room after turning right , then down the hall two doors and into my mother’s room. I reluctantly followed I reached mom’s room and froze at the door seal. Sybil had picked up my mother’s binoculars, aiming them into the gloom and now what looked like impending doom. There was a fire break so I wasn’t much concerned, I don’t know why; maybe I was upset about my mother’s funeral that took place yesterday. My Mother now rests on the mantle next to her parents.
       Rising and falling, up and down Sybil was flexing her ankles, up and down. She was athletic; many times I too exercised my calf muscles in that same way. She was my sister’s kid after all and she favored me mostly and I guess that would mean our mother too. I remember mom liked to hike and running was natural for her, that or biking. From a toddlers view I remember her as she pedaled her bike towing me and then later my younger sister behind her until we could join our older siblings on bikes of our own. Dad and grand-pa were the best of friends, except during football season, basketball and yes baseball too. Mom always exclaimed if they ever agreed on any sport our home would be boring. Dad and grand-pa did agree on one or two things when it came to sports. The both hated soccer and disliked golf, and hockey well I won’t tell what they said about hockey, partly because I like it.  Dad, well he played golf and still does, as funny as it was, I suspect dad and grand-pa just needed something to argue about.
      Sybil was staring out mom’s bay window focusing on the ever growing cloud of steam and smoke. I not willing to enter was standing at the doorway, I leaned my head to where it rested on the doorjamb. I loved to watch my nice doing her thing, it was like a window to my past and my childhood now lost. She was dressed for the funeral in a pair of slacks a vest that even had a jacket and it fit as it was made for her curves and knowing her mother my older sister Emily, it would have been tailored made and cut to show off. A power suit I heard Sybil say at the funeral dinner. That is what Emily would have called it too my big sis the stock broker.  
      I watched as Sybil stopped in midair, standing on the ball of her feet I watched her slowly sink her heals back to the floor. She picked up her cell phone from her suit jacket pocket and on speed dial she pressed send then raised the phone to her ear. “Hello! Yes this is Sybil Sims; I am calling from my Aunts home on old paint road”. The voice on the other end must have said something like they knew where she was calling from because my nice acknowledge, “yes that’s right, I mean correct. From my Grandmothers bedroom window I am watching the beginning of a forest fire. I believe my Aunt Carol watched the lighting strike about 5 minutes ago and it’s rapidly getting bigger”, she paused, “what? Oh I’m sorry I am looking south towards Sisters”. The conservation officer had known about the blaze and things had been set into motion already the fire tower spotted it and because of the dry lighting in the area they were on close watches.
      Sybil was 13 she had loved the forest, the nature of it all was part of her life, and furthermore she was truly born in the right state. I didn’t know then but had always suspected that one day she would become a conservationist.
      I turned from the door as Sybil turned to watch me step from view. Not far down the hall I heard her speaking to what sounded like one of her friends. I stopped and leaned with my back to the wall and sunk down to the floor, just three feet from my mother’s room. From the first floor I could hear laughter from my father come up from the open stairway. I heard my father laughing, again forcefully this time; at some lame joke I suppose. Probably something stupid my brother-in-law said no doubt. “Humph Sybil’s father is such an A_”, I said lowly. I never finished it you know that word how undignified; to actually think it, and really mean it and yet still just couldn’t bring myself to ever use bad language.  I leaned my head into my knees as I brought them up; I closed my eyes.   



MOTHER
BY K C SOMMERS
©APRIL 4, 2012


Chapter Two

      I must have fallen asleep as I had done many times before in that same position three feet from my mother’s door. “Carol, Carol! Whispered chants of my name brought me back from sleep. It was my eighteen year old niece Sybil. Mom wants to know if you’re ready”.
      “Hum! Yea”, clearing my throat. “Yes almost, I need to fix my face. I hated warring makeup, yet five years older since last burying a parent I may have needed it.
       Dad, dad, now my father had passed away at seventy two he seemed to be in the best of shape better than most men his age. Playing Golf almost every day for the past five years, he even died doing what he loved most, golfing. On the nineteenth hole after playing my turn he turned to my sister and me, and then said. “Girls, you know I love you, but I am giving up golf, this is my last hole he putted and sank his last putt from twelve feet away. “I’m tired girls; I want to see your mother”. Then he sat down next to the nineteenth cup and stopped breathing.
      I stood up from my favorite spot since mom past away and walked to the door way of my parent’s room. When Mom had gotten sick, Dad moved into the room next to mine that put him between mom and me with and adjoining door to a shared bath. Having southern exposure dad and grand-pa built bay windows for the five bedrooms on the second floor of our home each had a window seat that I loved to look out on to the natural beauty that our Lord had provided.
      Now as I stepped into what I sometimes call my mother’s room I look around and remember when they shared the room and then remembered the last few months when I came back home to help dad with her. He had moved at her request; the bed into the middle of the room so that mom could look out the window onto ranch she loved so dear.
      The bed, well the bed had been moved back now and my father had moved back into their room. When my little sister Trish and I stayed there from time to check in on him and wash his dishes and cloths. Well let’s say staying all night, it was a chore to sleep. We both have discussed the crying and low talking we heard from my parent’s room. I suspected he was praying, maybe he was, but Trish thought he was talking to mom.
      I loved my dad, and my mom both but I knew my father loved my mother so much it hurt him deeply when she past.
       I wondered if I ever loved my mom as much as he did. You see I have never once cried since my mom past away.

Chapter Three

      Sybil followed me into my parent’s room. Grown and beautiful my eighteen year old niece had taken my hand and lovingly squeezed it. “Are you all right”, she had asked the very same question five years prior in the same manner on the same occasion yet this time it was my father that is gone now and I was standing in their room looking out the same window that they looked from every day as my parents.
      “The black is almost gone”.
      “What”? I asked
      “The blacken trees, well at least here they are. Up by Sisters the trees are standing dead. My professor said they might not come back in our life time. Hundred year old trees gone in one afternoon, all from lighting, you know”? Sybil sighed.
      “Your grand-ma loved those trees; it was like she took them with her when she died”.
      “Yea, I thought that too, I remembered that morning when the rain came and the lighting struck the trees and sometime after we had dinner the fire burned out at great grand-pa’s fire break”. Sybil replied.
      “Look”, Sybil said solemnly. “It’s raining again”!
      “Yea”!
  

Chapter Four

      “Ms. Williams”, pause. “Ms. Williams”!
      “Yes Mr. Herne”. I looked up from my student’s papers and then finally into his appealing blue eyes. “May I do something for you”?
      “No”, he replied in an ungrateful tone as to, why should he be bothered with anything to do with her. “You have a phone call waiting for you in the Deans office. You should learn to keep your personal business at home where it belongs. I suppose you have a cell phone”?
      Was that a question? He knew I had one he called it almost every day complaining about one thing or another. He acted like he was the Dean instead of being head of the maintenance department on campus. I made the mistake of letting him connect with me at a school function over Christmas break. I was just trying to be nice to the, ugh, well man. He was a creep, paunchy, then the dirt. He was filthy every time I seen him, and did I say creepy, but his eyes were the bluest of blue I had ever seen.
      “Contacts”, a female voice said.
      “Ahh”! I screamed, “What, huh, what”? 
      It was Karen the Social Science Professor, we were best of friends on campus. “His eyes he has blue contacts, you knew that didn’t you”?
      “What, what huh, what, yea of course, how-how, how did you know, I mean how do you know”? I shuddered and stammered.
      “You know last Christmas? Well”! She sings songs.
      “Yuck, him”? I exclaimed in pretend discussed, we laughed. “Ok, I got to know how far, did you, you know”?
      “Later you have an important phone call in the Dean’s secretary’s office”. She pulled me up out of my desk chair and pushed me down the hall to the golf cart waiting at the entrance to my building.
      “Come on get in, its long distance”. Karen pushed again.
        Long distance no one has long distance anymore, just pick up a cell phone and push in the number and presto your connected no charge. Then I thought about my big brother he was ten years older than me. He never had anything to do with my family he ran off right after high school. He didn’t even come to our parents funerals. Never called, he never cared. I had four siblings, one brother from Dad's first wife and two sisters from my mother, making me the middle sister of the three girls. Frank or Frank junior by name and title never fit in. when I matured I figured it was because he lost his mom early on and never got over it and my mother was no substitute in his mind. They fought no more than kids do with their parents for that matter.  

Thursday, March 22, 2012

Windows 8, Really?




             Yesterday I began to write about my short experience with Windows 8. Then my poor old XP machine I often use crashed. I was going on about the things I did and did not like about windows 8 and then it crashed. What a chore, to search and find the reboot disk I made so long ago. You would think even after I moved my office I would keep track of that kind of stuff. I did find out where it went someone barrowed it and never returned it. Oh well right? 

             I built a new machine in a Mid Tower with 6 fan holes, neon blue lights; the amenities really have no effect on me other than a customer might like that. The machine turned out to be a Quad Core AMD 3+, with 32 gigs of RAM on a Gigabyte 970-A-UD3 motherboard and a MSI DDR3 Video card and 7.1 HD surround sound. I contemplated what OS I should use; I went with the Win 8 and was happy the new machine took the OS. It seemed to run on the Vista or 7’s platform of drivers. (If I’m wrong I would like to know).
Turning the OS on was easy, the operation was a bit annoying to learn. Still keep in mind because the tablets that sport touch screens Windows 8 can be set up for the use with a finger or a pen. With keeping that in mind 8 might work out well for most persons.

            I continued to use this Bata version for close to a month before reverting back to a Win 7 Ult. OS. Why, you might ask? The lack of the ever so infamous start button is missing and things like the missing off button can have an annoying effect on a body.

            It’s a road trip of learning and the experience you may or may not want to hassle with, just yet. If you’re like me and love to stick with the things that we are comfortable with; like sticking with the things that we know work, well we find it hard to change don’t we? If you are wondering about my time machine, excuse me please, I’m referring to the XP. I will recover the data then I will finely update it to a Win 7 32 bit and put it into service in my internet cafĂ©, so it will still be around for a while.
            Good luck with Windows 8 if you decide to try it. Please let me know your experience with the new format of Windows. With a further thought split the OS and toggle between your favorite OS and Win 8 if you only have one machine.

Sunday, February 5, 2012

Internet Service and its Nature

Internet Service and its Nature
Attributes, what makes communication by computers work, looking at a brief insight of Dialup, DSL, Cable, Line of sight and direct ISP services. This will not cover wireless service providers, such as plugging in a cell phone to the computer.

What is D S L? DSL is an acronym for Digital Subscriber Line. DSL is seen a faster more stable connection that is made available over telephone lines. Using the same traditional wired telephone connections DSL in turns uses the same line to send electric digital pulses to a switching mechanism known to most as a modem then to the device such as a router and or computer.
As a DSL subscriber, household or business would subscribe to this service form a local provider, the phone company in most cases. The provider then acts as the connection to the worldwide web. The provider is most commonly referred to as the ISP (Internet Service Provider).

 How it Works

The subscriber makes a request form their computer it then travels through a traditional phone line to the ISP. From the service provider your request is then sent out over a Wide Area Network (WAN) to its destination gathers the request and sends it back to you in the opposite direction. The services are still an analog system that converts the voice signals into an electrical signal and transfer that back and forth. Typically traditional phones do not utilize the full amount of the signals (Bandwidth) that are available and as a result the maximum speeds that you can get using a dial-up connection are only about 128 Kbps. A DSL modem takes the analog signals and converts them into digital signals or bits. Therefore they can transfer higher bandwidth of data by using the modulation and demodulation processes.

DSL v’s Phone Dial up

Speed matters when working from a computer, frustrating enough is trying to work on a research project and the item you are searching for takes 15 minutes to show up. 128 Kbps is a high norm for dialup. With a DSL services a range of 3 Megs is normal. In comparison DSL is lighting fast.
Disadvantages are present in everything. In this case download speeds are fast however in the broadband world upload speeds are slow. This is a trait that all service providers have. One inherently disadvantages that DSL customers face is the distance between the customer and the ISP location. Because signals are sent over wire transmission strength is lost every so many feet. Thus explaining one example of the slower speeds, speed variation can happen in any services as well; this could be referred to as a flap. Every so many miles of transmission lines a node (repeater) is placed modulating the signal. Variants including amount of users are online, weather related and or non-working nodes can prove disappointment in customer service. Line technicians are sent in these cases to adjust and or replace non-working modulators, (repeater nodes).

DSL v’s Cable v’s Direct to Satellite v’s Line of Site

Cable Company that provides Television signals to the home can also provide over the same cable lines Internet services. Explained in the previous paragraphs, the cable company uses existing wires or in this case round braded coax cable, unlike the flat twisted copper wire that is used with phone and DSL.
Just like DSL nodes (repeaters) are used to modulate signal strength so when 100 devices are running at the same time on one neighborhood in theory the same constant signal strength as expected is being provided to the customer.
Cable companies and phone companies have discovered that along the same hard wire is a varying cornucopia of bandwidth that had been unused. Bandwidth is the rate a signal analog or digital can be sent over hardwire. This allowed both phone companies and cablevision companies to become an internet provider without replacing transmission lines.
The real trick is to ask or test the area that you are in as a potential customer for either service. For example; what speeds will the cable company provide verses the DSL service? As was stated earlier speed does matter. DSL may not be available in your area because of the outdated service equipment or a DSL repeater hasn’t been installed in the neighborhood. Then on the other hand Cable might not be available, so a direct link to a satellite dish may be the answer.
 Line of site offers a limited advantage to the others mentioned. While depending on the topography of the area such as trees, tall buildings and hills and of course if it is offered in tour area line of site is an inexpensive fast alternative to DSL, Cable, Dialup, and Direct. The direct line of site is the fastest wireless service available in today’s market. The disadvantage is as with any provider is that not everyone can get these services as well. The compared rate of speed is similar to a T1 connection At about 1.544 Mbps so I am told. T1 lines are expensive and a typical T3 which is like 28 T1 lines compiled and is considered a dedicated line. This service is of course more than the average homeowner can afford with prices upwards over a thousand dollars a month.
 

In Review

Dialup is slow, however if an occasional visit to the web is needed its okay. It provides about 128 Kbps of varied services. DSL when provided can deliver 256 kbps up to 40MBitps. Cable providers have a variety of data packages that they can provide, typically 5 Megs to 100 Megabits of data transfer, yes that’s a lot faster than kilobits’. A one Gig line is not unheard of now days, some cable companies do provide this service under the business package for their customers however many would love to take advantage of a 1 Gig service a 10 to 50 Meg connection is a good alternative standard. Direct Satellite services are used mostly in rural areas where Cable and DSL are not provided. It has been proven to be slow and cumbersome in its history. With a combination of a phone service, dialup and a down link via satellite made for a workable solution to just having a dialup service. Requesting info was slow however retrieval of the information was fast. With a dish in present days it is capable of two way signal transmission within one dish unit and receiver. The drawback is trees buildings and the topography of where the services would be provided. Note always before one buys anything, it would be wise to look at these four alternatives before making a decision. Base your decision on what is available in your area cost and speed.

Just a note:

The US and its infrastructure are behind the European market in telecommunications area. Not for the lack of science, however for the infrastructure we do have has been established longer, and proves to be still working without the expense of making the market more modern compliant. Earlier in the present administration the nation seemed to want to cross some barriers of what worked so well for so many years suddenly the US had to change and update the Broadcasting signals from analog to digital. Although this stimulated the TV market sells for a short time. This ploy greatly benefited the overseas Flat screen and digital component makers while Americans continue to struggle to support themselves.

By Kenneth A Brewer Composed and Copy righted © 10/20/2011 revised 02/04/2012    

Thursday, January 19, 2012

Distributed System by Defining its Properties © 11/12/2011

Introduction: To define and explain a distributed system by defining it properties

 Within the system is found single entities which survive on its own with its individual capabilities and components that make up its own properties however it has the capabilities to communicate with others alike by passing messages from point to point. The system and all the single entities maintain one common goal, which is to work together for a relative commonality yet still work independently of one another.  
The attribute of this article is to explain two broad distributed system models and defining their properties.
There are two principal reasons for using distributed systems. Firstly, the very nature of the application may necessitate the use of a communication network that links several computers.
Secondly is a network capable computer that works individually, independently working off the network however still benefiting in practical on the network scenarios.
 A distributed system is beneficially more reliable more cost effective and can obtain a healthy level of performance by using a collection of numerous low-end computers, in comparison with a single high-end computer.
The hybrid distributed system or a monolithic uniprocessor system and otherwise known as a Fault tolerant cell array. Which is a system containing an array of computers with individual aspects. Supper fast multithreading and multi core processers running servile programs at the same time, less bottlenecks and it will support massive parallel data processing architectures into a single monolithic entity.
 The workstation server
A server is an application or device that performs service for connected clients as part of client server architecture. It can also be a computer system that has been designated for running a specific server application. A server can also serve applications to users on an intranet. (Compair, 2011)
Servers will keep files organized and provide applications and share points, and connect those in the system to the internet.
Workstations themselves are typically designed for specific high-end computers found in graphics design, audio and video editing typically speaking.
A typical organization such as the Government will have a large number of computer workstations, laptops and client desktops dispersed over wide geographical area and bridging across the globe. The premise would be to have each unit configured with an operating system that may include similar and dissimilar features hardware and software configurations pending on the geographical area in which the unit would be deployed with one or more common applications that will interact with the main entity (the server) by using the World Wide Web or an Intranet.
The providing advantages the implementations of multiple unites spread across the globe allows information to be gathered from each location and transmitted back to the main server.
Processer Pool
The shared processer pool allows an assigned partial partition to a specific user or group of users. This concept is done through the logical makeup of a server or server array. These processes can also be implemented logically into a global distribution system also. Commonly could be labeled as a Share drive and or server where one or more drive partitions in a single drive or physical drives are assigned. Each group or single unit will be allocated to that assigned space. Assigned logical partitions are basically configured shared processor pools. You can assign a logical partition to a shared processor pool at the time that you create the logical partition, or by reassigning existing logical partitions.
Common workload issues
IBM has been powering processer pools for a long time since the POWER5 and now POWER6 processors came along. They were designed to handle multiple shared processor pools. Unlike UNIX and some other distributed systems are likely dedicated to single applications, designed to handle the demand of high and low peaks of services or common workload. Units using the pooling system will take advantage of having less traffic throughout its connection to the server so the only high demand will be among those using that partition. By creating separate shared-processor pools and putting the applications that have the same or similar software needs together provides a differential licensing-cost reduction. They allow greater control of the percentage of processor resources. They can be used to isolate the resources that are available to the units within the shared pools. They also can be used to separate workloads.
Maintenance and security can be most difficult and make things seem like having multitudes of units a disadvantage. Within a closed system or an open system such as globally deployed units the security risks are high, granting the open units security is higher. The obvious disadvantages of this type are replacements, problematic fixes, enforcing codes, updates, viruses, and things like theft. All of the disadvantages can be addressed and remedied by implementing policy, secure logon apps like “Smart off” and “Tokens”, and general operating and security classes by addressing proper behavioral aspects needed while using all government computers.    
 This is primarily used in high work load operations whereas many are in the same organization yet having different jobs with all the information leading back to a main controlled server. Nodes may makeup in part of any type of server along with separate nodes known as print servers.
The needs the wants and the things that are deployed into a system great or small are allocated by the nature or environment of which a system will operate.


Works Cited
Compair. (2011). Retrieved 11 18, 2011, from Diffen: http://www.diffen.com/difference
Andrew Tanenbaum. (2007). Distributed Systems. Upper Saddle Rive, NJ, USA: Pearson Prentice Hall.
Tony Sintes. (2002, 08 23). App server, Web server: What's the difference? Retrieved 11 18, 2011, from JavaWorld.com, 08/23/02: http://www.javaworld.com/javaqa/2002-08/01-qa-0823-appvswebserver.html?page=2

Security and the Internet & Distributed System By Kenneth A Brewer © 11/23/2011

Drawbacks and disadvantages inherent with distributed computing are somewhat disturbing to the system owner/admin.
Drawbacks to what is seemingly perfect by having a distributed system doing all the work, transferring data around the globe and back again. What could go wrong?
Lots if the system is not secure. Security is the number one vulnerability in anything that you want to keep out of prying hands. If the data is streamed on a dedicated line or pipe the   transference of secure data across the state to the mainframe is vulnerable at many points along that pipe. Wi-Fi could be a dangerous entry point. Keeping the net-work closed with firewalls and passwords that change every month helps prevent loss.
New data and software installs designed primarily for a specific organization could place the system at a risk. It could evolve backdoors, key-loggers, virus, and spy-ware. So the administrators have to play a big part in the development of Organizational specific software.
Diagnostics, IT Admins, Managers, and Controllers, to aid in the defense of theft, maintenance, policy issues, IT personal and IT issues. Have to be in place. This all comes to a hefty cost to many organized establishments. Pending on the risk factors involved determines the amount of IT along with the amount of control is or will be needed to maintain the system.

Distributed Architecture within a Distributed System By Kenneth A Brewer © 11/28/2011

Information is essential to the accomplishment of government structural objectives. It’s acknowledged that reliability, integrity, and availability are significant concerns. The use of networks, principally the Internet, is modernizing the way governments’ conducts business, commerce of trade, industry and is proven essential for its future.
 In the same manor factors that a system can be beneficial also pose detrimental threats when not properly controlled, and will be left to vulnerable attacks. The benefits of speed, reliability and, creative design have imposed unparalleled risks to government operations. Computer security has, in turn, become extremely important in all levels of government that operate information systems. The fraud factor along with, sabotage, and malicious intents, natural disasters and unintentional errors by official computer users can pose overwhelming concerns if information resources are not protected. Such exposure will pose significant risks to data systems, information, and to the critical operations of the infrastructures they support.
Security measures are necessary to avoid data tampering, deception, interferences in critical operations. The unknowing threats of the inappropriate disclosure of sensitive information from an innocent conversation between friends also add to the risk factor. The effective use of computer security becomes indispensable when reducing the risk of malicious attacks.
Policy is put into place to help safe guard form inside and outside threats. Government Accounting Office (GAO) or the Operation and Investigations (O&I teams) will evaluate and audit security policy’s, offer recommendations for the reduction of risk factors to an acceptable level. Provided in memorandums and handbooks The GAO has issued guidelines governing the policy’s used in Data Distribution Systems within the government.
My notes: If serious about Distributed IT Designs; there are a wealth of Government guidelines for the security and the development of sophisticated systems both at the Library and online. K.B.
Works Cited


GAO, N. &. (2001). Management Planning Guide for Information System Security Auditing. Washington DC: GAO, NSAA.

Title Distributed Design By Kenneth A Brewer © 11/11/2011

Attributes:
Present a 2-3 page presentation of some key features of what should be found within a distributed computing configuration to the Washington DC Consulting team.

The premise of an IT distributed design is to implement a logical organization through automation and process. The design must allow Value, Responsibility, and Growth potentials along with experience in design development deployment and service.
Proper architecture pattern design is among the key features in development of any distributed computing design. The rapid success by its nature, sophisticated systems have grown from independent creativity of applications to Internet-connected networks of numerous network types and managed services, now known as the cloud.
The creation of successful distributed systems will involve how the architecture design would address its accountings within the design its development; how it will be maintained, supported, and governed.
Sophisticated distributed systems will involve these capabilities.
Implementation of applications and or services.
The physical applications will include Communications equipment and wiring Computers, laptops, and similar devices along with backups and archives of sensitive data such as personnel and legal records
Use of services from within as well as external.
Passwords, configuration utilities, confidentiality, and data integrity.
Management of services including risk management
Unauthorized deletion or modification Unauthorized disclosure of information
Database penetration from Hackers, Malware, Trojans, Viruses, and Worms.
Bugs in software Apps
Physical normality’s; floods, earthquakes and human interventions.
Organizations will manage applying methods, patterns, and technologies to model systems which enable proper control.
The scalability is important to any system. Expandability should be incorporated into the design as well. The Government and Companies will not stay the same size; they expand and shrink at any given notice.
Adopting a design is a daunting tasks within tis self. It is important to adopt the working patterns of the environment to which it will be deployed. The architecture will include Key Architectural Styling; Layered, Object-based, Data-centered, and Event-based architectures. (Andrew Tanenbaum, 2007)
Distribution systems consist of internal components such as computers. Computers that can distribute information within the confines of a facility, commonly manufacture, business office, Colleges or Government Campuses. It will consist of a collection of independently working computers which characterization will represent a single functioning operating system. One trunk with many branches many roots all functioning to support the trunk. The distribution system therefore would be classified and named “Tree”.    
The importance or characterization function of any system would show a collaboration known as a relationship between more than one computer including a server and autonomous devices. Devices sometimes called nodes are inline servers making up an array of sensor networks within the main works of the system. Still a mainframe of the system will make up the concentration center of any network. The usefulness of nodes within the network will take care of localized information traffic help distribute the work load thus supporting the mainframe relieving it from over tasking.
 Here is an example: Large corporate companies and the Government will have one or two sites that will support a mainframe. The nodes would be at local sites supporting within that site. A distribution Pipe line as we call it will send information to the main site where IT and it support teams is located. Information can be sent with constancy or updated on a time schedule. This frees up the mainframe from being over tasked and any given moment allowing the steady controlled digestion rate of information to be handled.
Naturally the importance of security cost and monitoring of a system must be considered in its development focusing on numerous aspects that can be followed in order to protect Government proprietary policies.
Firstly taking a look at the assets and level of protection needed evaluating the risk to each asset. Then taking a look at the cost evaluation verses the level of need to protect against threats.
Keep in mind protection is present when human intervention is observed policy is up held. There are too many time is information is lost when a PC is left unattended or on lookers observe what they shouldn’t have.
Generalizing in a key focus important issues, is the exploring the possibilities of compromise, which is called risk assessment. Risk management may include devising the plan, implementing policy and deployment to include deployment planning and most of all training and following up with scheduled training.  
 A conclusion with thought; A distribution system can work over an Intranet, L A N, W A N, local and world over incorporating application layers; User-interface, processing, and data handling. They are capable of being both centralized, and global. Information must be easily read, stored, managed and shared. (Andrew Tanenbaum, 2007) They must be empowered to change, share and be controlled. Attributes must include well maintained balance connectivity with complexity and dissimilar networks systems and devices throughout a managed controlled automation.
   









Bibliography

Microsoft Support, Revision: 5.4. (2006, Febuary 4). (Microsoft, Producer, & Microsoft ) Retrieved July 4 , 2011, from Microsoft Support: http://support.microsoft.com/kb/230125
Internet Protocol Suite. (2011). Retrieved April 16, 2011, from Answers.com: http://www.answers.com/topic/tcp-ip#ixzz1K11MBYWB
Andrew Tanenbaum, M. V. (2007). Distributed Systems. Upper Saddle River, NJ, USA: Pearson Prentice Hall.
Benson, C. (2011). Best Practices for Enterprise Security . (G. Berg, Editor, I. C. Ltd, Producer, & Microsoft ) Retrieved 11 09, 2011, from MS Tech Net: http://technet.microsoft.com/en-us/library/cc723503.aspx
Erbschloe, M. (NOV-2004). Physical Security for IT. In M. Erbschloe, Physical Security for IT. Washington, DC: DIGITAL PRESS.