30 April 2013

Et tu, Brute?

Disc Ass #8

"For your discussion assignment this time, share with the other members of the class any interesting facts or other information you have uncovered as you search for relevant job descriptions. Keep in mind that many other students in this class may share the same professional interests as you."

I'm in IT and employers are looking for professionals, I may not be alone in having discovered the amount of experience employers require and the anxiety this brings me since I'm still in school, and without certifications, which are a must in my career field. Nonetheless, I'm determined to put the best foot forward, which entails acquiring what employers seek as well as learning what that is by reading job-postings.

"What advice about finding employment have you heard or read about that you think others may want to know?"

Have a specific resume that presents fact and not fiction, that offers more legitimacy and less opinions and conjecture; not only dress for the job, but be prepared for the job, for the career you desire.

"What sorts of experiences (positive or negative) have you had in the past when seeking employment?"

Keeping optimistic, slow but steady, at all costs wins the race, a handshake and a smile goes a long way. Answering honestly, showing interest in the interview instead of putting faith in merely placing an application, and knowing what you want while keeping a level of composure that gives respect and takes responsibility, a good first impression.

"How do you think social media could help you find a job?"

Some temporary hiring agencies post job listings, some of which might have part-time to transitional full-time work. Companies thus use social media in the same manner, broadcasting new job openings or in some instances issues that lead to job opportunities in the manner of innovation/security, particularly in IT.

"What do you think are the benefits of becoming familiar with social media in the workplace?"

Networking is essential to gainful employment, social media is another way to learn, asses, study, and network with companies in a digital sense.

"Which keywords will your audience be looking for in your resume?"

I assume something that intrigues them that they interpret as integral or practical. Such as "diligent" or "attentive" or maybe "efficient/proficient" and I'm sure in IT the world "Certified" is nearly most sought.

"Has this research process changed your opinion or perception of your future career?"

I have a certain perception of employment in my intended field of study, some jobs we're overqualified and competing against other professionals, some we're in demand but unqualified. It seems to me that the numbers of applicants in both demographics are growing faster than I remember.

24 April 2013

Ruff Giraffe

Assignment: Write a proposal for your uninspiring technical writing class, make sure to haggle for approval of your topic before you begin, and review a proposal of someone in your group with a checklist written by a zombie.

Have you eaten your brains today? 




  "Om Nom Nom Nom," while eating.



Wi-Fi Implementation
Prepared for
G.N. Eric
X.M. Paul
National Venue Corporation
M.J. Banks
20 April 2013

Good Networking Robots
“For American Quality Unparalleled”
1060 W Addison St
Grovers Mill, NJ 08550
April 20, 2013
G.N. Eric & X.M. Paul
Office Complex Megatower
1718 Rhode
Downers Grove, IL 60515

Dear Doctors Eric and Paul:

Given to review is a Wi-Fi implementation proposal for NVC locations. Within this document is the information in regards to your RFP. 

In this report, you will find the listed corollary sections as listed:
- Product Specifications pp. 3-4
- Operating Instructions pp. 4
- Qualifications/Experience pp. 5
- Cost pp. 6
- Warranty pp. 7

We are much obliged to have you take interest in our information networking solutions, thank you for providing the opportunity, we will check within the week to finalize arrangements.
Matthew Banks
Marketing Director
Enclosure: Proposal

Table of Contents
1.1 Purpose
1.2 Problems
1.2.1 High Costs
1.2.2 FCC Subsidy Absence
1.2.3 Diminished Quality of Service
2.1 Implementation
2.2 Technical Description
2.3 Qualifications
2.4 Administrations
2.5 Cost
2.6 Warranty
3.1 Major Concern
3.2 Recommendation

Publicity has become a greater necessity as the digital era takes hold of the entertainment industry. Despite the short-lived trends, the power of the consumer while losing purchasing power has gained a near fanatical approach to live media, i.e. the ominous nature of social networking.
As the commuters attend events they can share their interests with the distanced internet community, the audiophiles, the ever-connected youth and the parents who pay for their children’s music taste. Bridging the gap from band tour to home tablet is a popular solution that provides trending and maintainable monitored commercial interests.
Using the best technology with the highest rated industry professionals to implement a metropolitan area network of digital throughput swiftly implements a niche network that opens venues and interests to profitable free advertising through voluntary public participation.

1.0 Introduction
1.1 Purpose
This proposal is to establish contract with Good Networking Robots (GNR) for full-scale assessment, design, and implementation of a wireless solution in all NVC locations. This bid to obtain a services contract includes the specifications of hardware, personnel involved, and discounts provided as subsidized costs to NVC by federal oversight.

1.2.1 Costs
As advertising costs increase, providing free Wi-Fi to customers is a return on investment that only begins remunerating when implemented.

1.2.2 FCC involvement
Internet access at current time the FCC requires purchase commercially; should a Federal initiative to implement national Wi-Fi occur, telecommunication companies have vied for options that sell services instead to corporations, such as NVC, in which case provisional or subsidized funding comes through them or federally. (POPSCI, 2013)

1.2.3 Diminished Quality of Service
Due to the cost of living circumventing cheap cellular network saturation, and the overall increase in population, a demand for the cheaper more common version Wi-Fi increases with time and impassable consumer interests. Time without Wi-Fi keeps the events hidden from free advertisement.

2.0 Discussion
2.1 Implementation
Because the price of internet Access Points will only slowly decline, a dependable hardware solution is the best consideration. GNR, a forerunner in achievements in all things networking, proposes the implementation of Cisco Systems routing equipment and anti-theft measures. They are an American multinational corporation that is the leader of industry standard technical excellence. The unit we recommend you using is the Cisco Aironet 3602I - Wireless access point.

Cisco routers provide access to applications and services, and integrate technologies. (Cisco Systems, 2013) All of which fall into the requirements of a metropolitan area network. The following provides an accurate technical description.

2.2 Technical Description

Compliant Standards:
IEEE 802.11a , IEEE 802.11b , IEEE 802.11d , IEEE 802.11g , IEEE 802.11h , IEEE 802.11i , IEEE 802.11n , IEEE 802.1x , Wi-Fi CERTIFIED
Connectivity Technology:
Data Link Protocol:
IEEE 802.11a , IEEE 802.11b , IEEE 802.11g , IEEE 802.11n
Data Transfer Rate:
450 Mbps
4T4R MIMO technology , Auto-sensing per device , CleanAir technology , Maximum Ratio Combining (MRC) , Power over Ethernet (PoE) , Wi-Fi Multimedia (WMM) support
Form Factor:
Power Over Ethernet (PoE):
Status Indicators:
Wi-Fi Bands:
2.4 GHz , 5 GHz
Wireless Protocol:
802.11 a/b/g/n
Ethernet 10Base-T/100Base-TX/1000Base-T
Encryption Algorithm:

2.4 Qualifications and Experience
Good Networking Robots has been a computer network solutions agency since 1775. Starting with the player piano market, we have come to provide for the technological needs by bridging entertainment and technology to the point of satisfaction for many years. Our technicians are required to have both Master’s level college degrees and ISO certifications, which each employee is screened and delegated to lead and assist projects according to the demands of each special operation.

2.5 Personnel
Nerdy technicians rigorously trained in hacker prisons since childhood to install and maintain jukeboxes regiment each of our networking substations and other various highly technical devices, the following employees will oversee the implementation of a wireless solution at a single venue of your choosing before project assessment and plausible full-scale implementation.

John Camp, PhD Internet Sales Taxation
John Gomez, PhD Radiologic Sciences
John Jones, PhD Archeology
John Littlejohn, PhD Oriental Medicine/Herbology
John Omar, PhD Nanotechnology
John Smallberries, PhD Blacksmithing
John Kim Chi, PhD Aromatherapy
John Edwards, PhD Global Governance
John Rajeesh, PhD Comedy Studies
John Whorfin, PhD Enigmatology

2.6 Cost
GNR is pleased to offer these implementation services for merely the cost of labor at a single project cost to match the timeline requirements your company needs, this will portend a clean, efficient, successful, and timely operation. A full installation will cost $2,500 per venue, or five for $10,000. The Wi-Fi Access Points cost $1,000 each and will be included in the billing statement once quantity known. (CDW, 2013)

2.7 Warranty
Good Networking Robots provides an unconditional warranty, unless purposefully damaged, in case of accident for 100 years, despite any manufacturer warranty issued on the equipment we install. There is no additional cost of labor billed to NVC as result of maintenance of GNR warranties.

3.0 Conclusion
3.1 Major Concern
NVC may go without providing free Wi-Fi to its customers; this prevents free advertisement, and impugns the dissemination of NVC ventures and activities for the public to acquire and asses.

3.2 Recommendation
To bypass oversight by a digital era, we recommend the use of GNR to implement Cisco network solutions in all NVC locations.

4.0 Glossary
Access Point: Hardware device that uses high-frequency radio waves to relay magical invisible communication with the Internets.

Cisco: International networking hardware, networking, and communications company. (NASDAQ: CSCO)

Jukebox: A machine that automatically plays a selected musical recording when a coin is inserted popularized in the 20th century.

5.0 Works Cited

CDW. (2013). Retrieved from http://www.cdw.com/shop/products/Cisco-Aironet-3602I-wireless-access-point/2544633.aspx#TS

Cisco Systems. (2013, 4 24). Retrieved from http://www.cisco.com/en/US/products/hw/routers/index.html

POPSCI. (2013, Feb 2). FCC Proposes Free WiFi For Everyone In The U.S. . Retrieved from POPSCI: http://www.popsci.com/technology/article/2013-02/fcc-proposes-national-free-super-wifi-network


22 April 2013

Everyone's a Critic

Book Review
"The Art of Deception” By Kevin D. Mitnick & William L. Simon

M. J. Banks
Monsters University
Spring 2013
ITS 20000-01 Ethical & Legal Issues


           This review will entail observations of “The Art of Deception” by By Kevin D. Mitnick and William L. Simon; overall, it will portend the quality of the book. While assessing tactical hacking and the authors’ suggested approaches at stopping the malicious intents relayed, foremost the personable affectations needed to deceive the deceivers, and relaying how the book presents itself for the layperson. The amount of intrigue given from the book is acceptable to hobbyist and analogue readers alike, proffering enough useful knowledge for IT managers also, in entirety can become excessive to the uninitiated techie, and outlines the certainty of the dichotomy of hacker and security professional. This inroad to technical security oftentimes panders to all readers with isolated scenarios that touch upon literary noire elements, simple altruistic tales that illumine otherwise trivial elements of the technical world as the perils that they are and can be, validated by proven security measures it maintains standing as designed, a partial manual to avoid human error. Infamous Mr. Mitnick relies as much on his criminal past as he does the gathered solutions written in the book to prove the value of the guide. Balanced against humble brags and common knowledge the book is a descent read for people of the nerd community.

Book Review: “The Art of Deception”
           ‘Deception’ begins with a close focus on threats based in the computer world and a call to acknowledge, define, and prevent them. Slowly it brings the readers on a journey that eventually forces the reader to realize the necessity of network hardware firewalls, intrusion detection systems (IDS), antivirus (AV) software, and other security protocols digital and physical, each in individuated experiences. Each serial foray into a security threat is predictably simple, which allows the reader to learn typical solutions to the most typical problems, distinguishing the book as persuasive rather than rigidly technical. Easily enough to read, it has many explanations for novice readers and can at times redundantly explain things. In other instances, the writers impose lulls to security scenarios with elongated personal attestations, which served to explain the flaw of neglecting dangers of a mere unfortunately trusted and unattended hackers. The prose points balanced with the technical aspects make for a descent book to read, but probably a better audiobook.
In the book, Mitnick explains his role in becoming a famous hacker, by means of a national FBI search due to ruining several millions of dollars in the monies of corporate America through his hacking skills, duly ending in incarceration by the federal government, and since has strived for legitimate business ventures. My assessment being that he intimates in his writing sympathy for hackers in his own way, yet now consults corporate institutions and security firms around the world to the malicious hacker element. Logically inundated with a need for IT security these companies hire security admins to propose, design, implement, maintain, and improve the valuable networks they implement for large amounts of commerce all day every day. The book scenarios define users and a network, credentials and insecure situations, showing that hacking has the simplicity of stolen passwords as much as the complex actions of network intruders. In regards to detection, threats found case-by-case present as autonomous and predictable threats, dealt with formulaically to stop the intrusion. Given to the forthcoming information, the threats remain unto themselves human.
The book’s subtitle, “Controlling the Human Element of Security” is a certainty to the narrative, from personal confessions to common threats, a good handbook to moral legality in a growing network, formal it continues to educate the reader to the shocking industrious nature of a hacker, eventually telling that threats from within a company are as viable as from without. Commonly the book paints the same pictures as do today’s spy movies, wherein patient thieves wait for the time to strike, using falsified data and pretenses, under the auspices of professional courtesy. Before explaining how to be suspicious in each scenario, each life lesson styled chapter stresses the importance of security through secrecy in the aspects of personal info, passwords, badges, etc.
It’s not exactly the most informative of books for a student with a degree in computer sciences, but does discuss many techniques and insights, the balanced views of hacker and security professional give the book weight, and the depth of hacker profiling compartmentalized by chapter gives an interesting twist to an otherwise textbook. In attempts to leave little to the imagination a descent compilation of hacker events and social engineering crimes are presented in an entertaining book that deserves a second read, but not a third, worthy of recommendation to the generation prior to millennials, and moderate approval among them, given that the examples are plausible hypothetical. 
          Not to spoil the finer points of anarchy the book reveals, some favorite points included beating speeding tickets with a holiday, bypassing a rotating password with inclement weather, top-level clearance with a fake persona, and gaining restricted access by exploiting kindness, among many other hacker exploits. It is a very ‘spy-world’ book that enlightens obvious circumventions unknown to the average well-mannered individual and goes as far to explain why a person becomes victim in each scenario, thus making the book fairly useful to modern corporate interests. 


16 April 2013

Joined at the Hipster

Ethical & Legal Issues

·  Read the Case study 3-Cyberbullying on page 378 of "Ethics In Information Technology" 4e.  Answer the three questions on pages 380-381. Each question shouldn't be longer than a page and please keep it professional looking, no MLA or APA required. (Same case study starts on pg. 321 in Third Edition)
·  Due Date: April 16, 2013 11:59:00 PM EDT

1) Do you believe that knowingly violating the terms of a Web site’s service agreement should be punishable as a serious crime, with potential penalties of substantial fines and jail time? Why or why not?

If the terms of the Web site’s service agreement protect itself and its users from crimes, than there is a moral and ethical precedent to enforce the laws subject when violating the service agreement. Informing users of terms and conditions is a fair usage of warning measures to the community that uses the website, enforcing those laws despite any service agreement is the responsibility of regional laws, which are partaken by users and law enforcement entities. The site may have a legal obligation to the country in which is resides and/or is accessed by, to display the service agreement, and equally may be a requirement to protect its commercial interests, as in, certain legal actions cannot be taken without prior warning of a Web site’s service agreement.

2) Imagine that you are the defense council for Lori Drew. Present your strongest argument for why your defendant should not be convicted for violation of the Computer Fraud and Abuse Act. Now imagine that you are the prosecutor. Present your strongest argument for why Drew should be convicted. Which argument do you believe is stronger? 

Defense: Lori felt adamant about her opinions, enough to share them, yes they were shared anonymously, but the false profile that she created is no different than the average user, which she herself is one, making her fully qualified to voice those opinions in that manner, free speech does not require a lack of anonymity. 

Prosecution: Ms. Drew knowing of her intentions had no right to provide false information to the website in this case, providing a perfect example of identity theft, misleading the public, as well as misleading the victim with harassment, slander, intimidation, and forethought malice, which resulted in the death of an innocent girl. 

The stronger argument I believe belongs to the defense, not merely because I wrote it, but for the legitimacy of free speech principles, and that the CFAA was not broken in this case. The prosecution has a far stretch to make in order to reach either, equivocation for false identities being fatal, and or, to make the cyber bullying actions of Lori Drew sway the emotional sentiment of the jury to sway the verdict in differentiated CFAA parameters. 

3) Do you think that Lori Drew was responsible for Megan’s death? Do you think that justice was served in this case? Should new laws be created to address similar future cases? 

I don’t have the maternal instinct that I believe is a qualifier to this case. I guessing, I think that suicide is a crime because of the killer, which in this case is the victim and not quite the harassers. The timeline puts Lori’s actions near the death and could be the outlier that pushed Megan ‘over the line’, but I like to believe that Megan’s excuse for suicide could have been personal. 

I think that justice was served in this case, a particular amount of attention was shed to this case amongst the fanfare, the harassers did not gain immunity by means of mistrial or double jeopardy laws (in regards to harassment, stalking, intimidation, slander charges). I reckon to remember that after this actual case that new cyber bullying laws were enacted, which expanded current laws of the civil justice code to amend new penalties for existing offenses to include Internet communications, around the globe. 


15 April 2013



Describe the positive aspects of social networking.
A well-established form of communication, the advent of social media has created a digital society for both professional and anonymous interaction, that allows current media trends to be disseminated and obtained simultaneously and instantaneously, deferring media monopoly to privatized interest, while allowing information sources to advertise and track public interest.

How important is it in your life?
Very importantly it allows me to obtain information from contacts I would otherwise have difficulty reaching or trusting, it can be a waste of time and a misleading gathering of self-loathing where everyone is a critique arguing with everyone and themselves. It also connects analogue workers digitally to career opportunities.

What are some of their practical business uses?
Advertising prospectively raises revenue for companies, and it gives the advertising companies the ability to test public-relations campaigns against a wider audience in a smaller amount of time. It also allows potential employers to screen recruits quicker and assessing a person's social networking behavior/actions.

What is at least one key ethical issue associated with the use of social networking?
The right to not self-incriminate no longer exists for those who have published 'tweets' and 'status updates' to social networking sites. Full disclosure and admission are pertinent to much of social networking, easily documented and open to interpretation widely.

How trustworthy is the information on these sites?
A report is only as good as its source; a renowned journalism portal can be trustworthy, while opinion/editorials without cited information can be misleading by their omissions, while bias and agenda can corrupt the information revealed, while honest information can be tainted by a trail of bad information.

"There are lies, damned lies and statistics"
- Mark Twain

"The problem with most quotes on the internet is that you don't know if they are true"
~ Abraham Lincoln


07 April 2013

Nothing Tangible Is Worthless

Assignment Question:
For the average worker, does higher productivity result in higher wages? Clearly, higher wages means a higher standard of living. Is there a relationship between GDP and the average earnings of workers? Discuss the advantages and disadvantages of teleworking for employees.


Productivity creates wages, wages create jobs, mandating jobs for the single goal of production do not create wages. Growing production lowers the value commodities, which serves the purpose of progress for social enterprises, but offers levels of artificial subsidized activity, often known as an industrial complex. A system of market commodity values that balance in direct conjunction with wages duly of productivity, commonly referred to as capitalism, is what survives.

Wages increase with the advent of profit from market activity in this regard, not from mere productivity despite the privatized outliers. In which private property, for instance private-sector corporate ownership, is the only effectively true form of worker-owned institutions, by means of their production leverage. This in regards to GDP only holds leverage while consumers (and likewise workers) are allowed to have capitalism, balanced by business being able to set the price (fairly in regards to anti-trust laws), balanced by absence of both subsidy and over-taxation of any income level ultimately leading to currency inflation, which further creates wage detriment. 

Teleworking is flexible and limiting. Distances closed by teleworking increase efficiency and thus the related activities, but is different to open human interaction, which by any aspect is communication that is susceptible to losses in translation opposed to physical work environments, and the aptitude available of teleworking when responses to activities either cannot be done or are impeded by static limitations.


05 April 2013

For your viewing pleasure...

I have installed a "Send To Kindle" button on the page, to the right-side.

This is it; try it now, if so desired.

Send to Kindle

For anyone that has a Kindle device and account, when on any posted entry to this site, click the button in order to Send to Kindle the page being read. Simply sign-in if not already, choose which Kindle to read the article (if you have more than one), choose whether or not to archive said article in your 'uploads library', and read it in the mental state and physical luxury of your choosing. The document can easily be deleted when finished reading. 

A Thousand Thanks,