Tag Archive: Software


“The One Thing I Know Is…”

In the Lab

“Well Dr. Caldwell, what do you think is wrong?”

“I’m not sure… I might need to do a more thorough investigation to the problem at hand.”

“Doc, can you please tell me what the nature of the problem is…?”

“I don’t know.”

“But Doc, what do you know?”

“The one thing that I do know is…I don’t know. Do you know how many people are willing to admit they don’t know something?”

“No Doc, how many?”

“I don’t know.”

The quote from the title refers to what the character, ‘Dr. Caldwell’ of the hit television show of the seventies fame, ‘Sanford and Son, uses in response to questions he doesn’t have the answers to.

Now, this author doesn’t practice the art of knowing everything…just makes attempts at trying to know about anything and everything. If you can dig it!

“The one thing that I do know is…How to Understand Technology!”


Business Intelligence (BI) and Information Technology (IT) virtually, methodically, and basically go arm-in-arm. Students who are majoring in business, i.e., administration, management, marketing, accounting, etc., will find that BI and IT have morphed into one entity. One does not do without the other.


When a program or a computer is not operating the way that it is supposed to, we take steps to correct them…we want it fixed. When a person is sick or not behaving the way that one should, we call a doctor or a particular professional to make things right again, right? Well a patch is what IT pros (and non-pros) use to make corrections to the program or computer. They fix the things that are wrong in the program or the computer. Many would rely on a computer geek to get their PC’s up and running. That’s one of the reasons that IT personnel rely on updates to offset the possibility of glitches or malfunctions. In the case of the Matrix movie, “Neo” can be described as the patch, the thing or program that is sent to make things right. One could also interpret the Neo program as the ultimate program or an upgrade. What would the purpose of the all-seeing, all knowing Oracle represent? Can it be viewed as an “All Mighty Being?”

The cloud as we know it; a metaphor for the Internet based upon how the Internet is depicted in computer network diagrams; is a style of computing in which dynamically scalable and often virtualized resources are provided. SaaS (Service as a Software) over the Internet, as I’ve mentioned in previous postings, is the driving force.



It definitely takes new tactics and skill sets in order to acquire a position in the new world of IT, Communications, and Analytics. Sentiment Analysis is gauging the mood of Social Networks and is being incorporated by companies monitoring Community-Driven Websites.



The jobs creation claims it’s logical for Microsoft to point to the cloud providers. Tech vendors plan to double its’ workforce this year. They’re saying cloud and mobile applications are giving birth to millions of U. S. jobs.

That perplexing boast causes me to wonder; if that’s the case, why is the national unemployment rate at record highs? The United States Unemployment numbers read between eight and ten percent. These numbers are devastating to the U. S. economical system.


A Few Tech Definitions From A to Z:


A loosely defined set of technologies developed by Microsoft. ActiveX is an outgrowth of two other Microsoft technologies called OLE (Object Linking and Embedding) and COM (Component Object Model). As a moniker, ActiveX can be very confusing because it applies to a whole set of COM-based technologies. Most people, however, think only of ActiveX controls, which represent a specific way of implementing ActiveX technologies.

Ad Hoc:

Description of Research Group:

An ad hoc network is an autonomous system of routers (and associated hosts) connected by wireless links–the union of which form an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network’s wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet operating as a hybrid fixed/ad hoc network.

This group is concerned with the study of Ad hoc Network Systems (ANS). Ad hoc networks are complex systems, with cross-layer protocol dynamics and interactions that are not present in wired systems, most prominently between the physical, link and network (IP) layers.  The IETF community and the wider research community could benefit from research into the behavior of ad hoc networks that would enable advanced routing protocol development. This research group will endeavor to develop sufficient understanding in topic areas of interest to enable the desired protocol specification work.


Administrative Law; to resolve legally, rulemaking, investigation and enforcement, administrative process. The administration of law by administrative agencies.




Short for Data Definition Language, DDL is a computer language that is used to define data structures. In Database Management Systems (DBMS), it is us…


Short for Data Definition Language, DDL is a computer language that is used to define data structures. In Database Management Systems (DBMS), it is used to specify a database scheme as a set of definitions (expressed in DDL). In SQL, the Data Definition Language (DDL) allows you to create, alter, and destroy database objects.



PHP is responsible for powering an extraordinarily large segment of the Web, driving significant parts of many of the world’s most trafficked websites, among them Facebook and Yahoo. Facebook’s reliance on PHP is so great that they’ve even gone so far as to create Hip-hop for PHP, a utility that converts PHP code into highly optimized C++, resulting in the ability of the Facebook API tier to double its performance while reducing CPU usage.

Distributed Denial of Service (DDOS)

Attacks The Problem:

There are several tools being distributed on compromised computers that allow vandals to remotely control those computers to launch attacks rendering a victim’s computers inoperable. The attacks of several prominent Web sites during the week of February 6-12, 2000 used these Distributed Denial of Service (DDOS) attack tools. The nature of the attack is such that it is very difficult to stop and next to impossible to prevent single-handedly. Some sites have experienced several days of downtime while trying to restore services.

The core problem is the existence of the compromised computers used to create the attack

(note 1).

RSS: Rich Site Service

RSS Optional Channel Elements

In creating an RSS feed (also called an RSS document) Optional Channel Elements are tags you can include in your feed, but are not required in order for the feed to work. Optional channel elements are added in the beginning of your feed and require an open and close tag.


                     Real property and the law

                       Land use and Development

                       Interest in Real Estate, Legal Descriptions

                       Forms of Real Estate Ownership

                       Transfer of title

                       Landlord and Tenant Interest

                       Environmental Issues in Real Estate

                       Real Estate Taxes and Other Liens

                       Title Records

                       Real Estate Contracts

                       Real Estate Financing

                      Pa. Real Estate Licensing Law

  1. Air Rights–The right to use the open space above a property, generally allowing the surface to be used for another purpose; The rights to use the open space or vertical plane air above the land. Air rights may be redefined by the courts to include Solar Access Rights. (ex.-Tall buildings to be interfering with the smaller building’s sun rights.






The physical taking of the deed by the grantee.


The seller’s agreement to the terms of the agreement of sale.


A formal declaration of one’s signature before a notary public.


A mortgage which charges an interest rate which may rise or fall dependent on the movement of the standard by which the interest is gauged.

Diversity Training, The Do’s and Don’ts

Summary Diversity training can improve the company’s bottom line. Tailor diversity training to your needs. Don’t tolerate harassment or weak diversity efforts.

Before you roll your eyes and groan the next time your boss announces a diversity-training workshop, consider this: Diversity training, when conducted properly and under the right circumstances, can dramatically improve not only employee relations but a company’s bottom line.

This book is packed with a whole bunch of factual IT/BI data, Technical Techniques, and loaded with time tested solutions to your Information Technology Library and Study Reference. It’s the perfect learning tool for the novice or beginning Tech Student as well!

The P-O-S-D-C Of Management – A Student Aid

Students should also become familiar with the process of management and what is required to become a manager. The best managers are well informed and are acutely aware of team needs. The needs of the team are met with the managerial support reflecting alternatives and suggestions for a team coordinated solution.


Pupils need every available edge when it comes to studies, whether they know it or not. They should take advantage of every bit of information available, i.e., research articles, white papers, periodicals, magazines, and yes…blogs.

“I was working as a ‘Database Insurance Analyst’ for an insurance company in Blue Bell, Pa., in a contractor capacity, when I wondered what would happen if someone hadn’t shown me how this all worked, you know, computers. I was highly prepared to “hit the ground running” when I walked in the door!”


This new book by Mr. Gregory V. Boulware will be available in the printed version… “It’s Here Right Now!”

‘The One Thing I Know Is…”
5.5″ x 8.5″ (13.97 x 21.59 cm)
Full Color on White paper
236 pages
ISBN-13: 978-1502581150 (CreateSpace)
ISBN-10: 1502581159
BISAC: Technology & Engineering / Project Management 



PreGraduation Photo 4 2004

“It’s a simple decision.”






The One Thing I Know is_10.1.14.jpeg

“Article Posting Sites”





























“The Spirit of the Soul and the Death of Morals: From Whence Comest Thou?” http://www.goodreads.com/book/show/18377562-the-spirit-of-the-soul-and-the-death-of-morals   



“The Un-Obscure”







‘The Triplets and One’

http://theeyeofcain.blogspot.com/ http://thehebrew-israelitesandjapan.blogspot.com/ http://theessenceofinvasionandannihila.blogspot.com/ http://yahvehthefatherthelosttribesoftwelve.blogspot.com



Don’t forget to view:


‘A Philadelphia Story Teller’

A Couple of Stories From:

“Hallow II”

‘A Portentous Epoch of Sagacious Redolence and Epiphany’




“The Pendulum of Hades”


~”Hallow” A Sojourn Into Now and Then”~




‘A Bite Of The Apple’



Gregory V. Boulware

Apple computers have frequently been criticized for putting design over function. Is their product designed to meet the needs of the masses? Which is a better buy, the proprietary schematic or one that is interchangeable?

The IT Community has big issues with Apples’ stance on covert and proprietary practices in the world of technology. One gripe about the product has IT decision makers in a survey, saying “This is an ergonomic flaw that reveals a preference.” They say Apple likes form over function. The iMac connectors on the rear of the machines are designed and/or decided by anal retention.

Your existing customers already know, like, and trust you. This gives you the technology, tools, and retention marketing expertise to increase their immediate and long term expenditures within your company. Every day, you focus on increasing total customer lifetime value and profitability by retaining your customers longer and increasing the frequency of their purchases, right? Apple’s practices as it relates to IT’s position, one has to wonder if Apple is indeed on the side of technology or profitability.

A second criticism reflected by the survey revealed Apple being held up as a leading innovator. The reality of it tends to refine existing ideas that have already been invented. Apple didn’t invent the MP3 Music Player, The Smartphone, or the Tablet computer. However, from niche to market, it made the breakthrough device that took those products to homes, hands, and the pockets of consumers worldwide.

Does success make its’ own argument? Do not be surprised of more enterprising and acceptance leads to CIO’s bending and ear or two and making choices that benefit IT. Apple also didn’t invent the USB port. It did, albeit, adopt and incorporate it into the family as a universal interface when few PCs used USB. So that means, as proprietary as Apple product are, they did lend a helping hand in jump-starting the widespread adoption of those devices;the convenient and desirable tech toys.

“Inflection Point,” according to Apple, means success. Attention from IT management, at the very least, thinks it’s worth a closer look. (One possible meaning: A point on a curve at which the curvature changes from convex to concave or vice versa, also called flex point, point of inflection). Regardless of whether they’re talking about delivering digital music, connecting an online store to a brick-and-mortar retail presence, developing a unibody laptop chassis, driving ubiquitous Wi-Fi or, innovating smartphones and tablets, Apple has either been impossibly lucky or has managed to repeatedly anticipate and advance transformational technology trends, according to a report in the InformationWeek Magazine’s January 28, 2013 edition. Richard Hoffman described several scenarios surrounding the Apple Outlook Survey by InformationWeek. The article focused on more than 90% of 331 IT decision-makers who support iPhones and iPads or have plans in the making that do. The report says more than 80% support or plan to support Mac laptops and desktops. Furthermore, there’s reason to believe IT would like nothing more than to go back to the days of top-down hardware purchasing.

Hoffman reports that i-devices are here to stay. But enterprise support is weak and IT is calling for ways to manage them more efficiently and securely.

The kind of change the survey represents can’t be overstated. Many IT pros remember, not that long ago, Apples’ presence in the enterprise outside of a few markets, was negligible. One respondent said “Apple products are nice, but they are not really suited to the enterprise because we have no means of ensuring their security. Apple is slow to release security updates for known exploits. Their products are fine for home use and small business, but they have an outdated approach to security that is not acceptable.” The respondent continued on with his opinion, “If they do not make the necessary implementations, they will not be an IT enterprise ‘go-to’ solution. One example is when Apple abruptly killed its well-regarded Xserve Rack-Mount Server Line two years ago; IT pros saw it as one more bit of proof. The bottom line is that Apple is not a reliable partner.” In short, IT Pros aren’t enthusiastic about having Apple gear in their data center.

The gripes continued to flow with yet another IT beef. It appears that Apple is abandoning its long term customers. They have embraced an effort to jump into the mobile and tablet market with all available hands and feet. A ‘Higher Educational Coordinator’ announced a major change in their long-term plans for hardware and software because of the abandonment. The coordinator stresses a fact labeling Apple’s previous offerings as amateurish when benchmarked with the iOS system.
On record, Macs running OS x tends to operate in a near perfectly stable service than their counterparts. Its stability has a unique advantage in both its hardware and software operations. Apples ‘Multiboot’ utility and virtualization applications allow you to run Windows via parallels and VMware’s fusion at full speed. The excellent compatibility allows Linux to similarly run as well.
Apple feels their proprietary standards allows for a less chaotic environment in terms of compatibility of drivers and components.

Hoffman also reports that Macs are less likely to be infected with malware or to need time consuming repair of OS re-installations that Windows devices require. The report continues to say that it is arguable how much of the security is due to architectural and implementation decisions. The company refuses to undercut its margins. They stand firm in their belief – the product is worth it.

IT organizations say if they would make their schematics and repair information more accessible, the expensive point of pain could be cured. An Onsight Services and IT Consultant chimed in with his two cents. “They should change to standard screws and closures to make repairing an out-of-warranty item possible for re-furbishing – especially for power users.” The consultant continued to say it would add great value and show that they care how long their products remain in the marketplace. Christopher Grande said, “When I see a 20 year old Volvo or a 10 year old Dell, that’s a tremendous selling point – that’s stabilization.”

Apple has used a great deal of it revenue to construct a well-oiled, fine-tuned, marketable enterprise designed to deliver top-quality products to tech enthusiasts at large. Apple has made mistakes along the way. One example was its sub-standard iPhone maps app and a faux pas that have led to complaints about some iPhone app developers improperly collecting users’ address book information. But…reports have been recorded to reflect most of Apples’ data points to an extremely well run operation.

Apple is reported to be putting more effect into business user marketing. The survey suggests that Macs and iDevices are making their way into the enterprise arena because IT managers, not users, like them, according to a poll of 244 end users. Many other users of IT organizations say the cost of Apple stuff is to expensive. They also say the value of the product is rated between poor and fair, the latter value at fair.

End user data suggests the product as good and excellent on ease of use, design, and reliability.

20% of Apples’ revenues have dropped while maintaining a solid position in Macintosh sales. Dell was down by 16.5%, the PC by 2.1%, and Acers’ by 21.6%. Apple doesn’t rule the school in cooling strategies for small network and IT spaces, regardless of its sales standings. Every kilowatt of electricity consumed by the IT equipment creates a kilowatt of heat that must be removed from the space to maintain uptime. It almost makes one wonder why it’s no coincidence that Apples’ interest in data center hardware waned just as the iPhone began to gain popularity over the Mac.

Many network closets and other small IT spaces were never designed to house IT or networking equipment. These spaces are often cooled by building HVAC systems and can accommodate low density deployments in small IT spaces.
(Ex.): power levels below 700 watts, passive venting (appropriately placing holes of vents to the ambient air) is effective for critical closets. An air fan-assisted venting is recommended for power levels between 700 and 2,000 watts of power.

When a UPS (uninterruptible power supply, a power supply that includes a battery to maintain power in the event of a power outage. Typically, a UPS keeps a computer running for several minutes after a power outage, enabling you to save data that is in RAM and shut down the computer gracefully) is installed in the closet, the IT equipment will continue to create heat during a power outage. The cooling system therefore, will need to continue to operate. If the runtime is more than 10 minutes, fan-assisted ventilation of a dedicated air conditioning unit must be powered by the UPS. This type of support is quite a bit for many small computer manufacturers and data base managers as well. Apples operations to not offer or include support nor do they spend time with concern.

The closing facts in Hoffman’s report says that the survey based results have IT decision makers saying they have little choice but to move ahead with Apple products; based on 11% of IT decision maker respondents. In 18 months, 16% predict their companies will spend more than 20% of their IT budgets on Apple stuff. Such are the pros and cons of IT Decision Makers. Would you be willing to pluck a juicy red Apple from a seemingly lifeless IT Tree…and take a nice big bite of it?

Beware; a bite of the apple can produce a worm of two. You know, it doesn’t fall far from the tree.

Forrester predicts that Apple will sell $7 Billion of Macs and $11 Billion of iPads with $13 Billion in 2014. The report espouses Apples financial health as unparalleled, with profits rising year after year.

That may well be…but for me, it’s the PC.

Til next time…



“Article Posting Sites”

‘Web Site’