Hire an Experienced-IT Professional is the Best Choice
Click here, to contact William Hunter Breedlove Jr.  
 
 
Bioacuity - Project Management:

Identifying the business needs to provide interoperability in the work place, using Common Object Request Broker Architecture (CORBA) and Distributed Component Object Model (DCOM) methods.

Well formulated understanding of Distributed Computing Environment (DCE) requirements: in process replacement & training, process development, programming, Q/A, deployment, administration and maintenance.

Designing and creating end user / administrator training manuals, for process
.

Email and Web Administrator: Responsible for the security, training and maintenance of Domain Name Services (DNS) activities on both sides of the Demilitarized Zone (DMZ).

Be respectful and dedicated to your employer from the first day to the last.

   __

To read the story where this bioacuity
is based; Scroll down and click
'Read More [+/-]'; OR,
Click here to download the PDF
.
Read More[+/-]

Business Logic: Identify the need and programming the results.

My first job after graduating from college with honors was as a contractor for the most prestigious training hospital / universities in Oregon (Oregon Health & Science University – OHSU).

Working a six month contract as an Image Library Technician to support the dynamic needs of the Diagnostic Imaging department’s library system; I quickly identified the opportunity to stream-line business processes – AND provide functional, working N-Tier applications, for business use.

My assigned task was to assist with the normal operations of the department: file exam records, ship to requested internal and external requestors and assist physicians /patients with their record requests; In a HIPPA compliant department.

One of the first issues I identified was that the department relied heavily on ‘paper’ communication to fill record requests for record retrievals and had no electronic PACS record of the items shipped to outside facilities.

These papers were blank forms that ‘ever-one’ was familiar with their function and knew what information was relevant to the task they were required to perform; however, it was inefficient – due to paper transfer orders being duplicated, or lost.

Causing additional ‘stresses’ to the business model and ultimately to the ‘people’ it was designed to help.

I embarked on a solution to resolve some of these issues by carefully creating an electronic; 1-tier application in the form of MS Word document templates to relieve the stresses of the departments order takes. (See Example: Process Delivery Form(dot)).

The relevance and ease of use for the department required little, if no training to incorporate into the work process of the departments employees.

It did present other opportunities in the development of 3-tier application to resolve data storage, communication back flows and lost records.

Designing the graphical user interface (GUI) was the easy part, in my opinion. Provide the user with easily and identifiable controls; the ability to enter and recall shared data; provide a fail – safe to the user to quickly print a blank copy of the forms they were familiar with using to transfer information. (See Example:Process Delivery DB (mdb)).

Due to privileged / propriety reasons the full application developed is not included in the above example.

I can share with the reader that this application was able to send / retrieve information to / from a SQL Server 2000 data store. Users would log into the GUI, perform their task in a secure environment; Thus eliminating the need to rely on a paper transaction to fill the recorded libraries requests.

Keywords used on the programming: MS SQL / Server, Visual Basic for Applications (VBA), VB.NET, 508 Compliancy; MS Word, MS Excel, MS Access.

   __

Distributed Computing Environment: Being proactive in a reactive environment; Weighing risks.

I was tasked to a one month contract for the State of Oregon – DHS (Department of Human Services); HCLC (Health Care & Licensure Certification) department; which quickly developed into a six month contract that continued with the OIS (Office of Information Services) and additional departments.

The interim manager of the HCLC department within the first week presented me with a spreadsheet that the department used to keep track of the client list this department was responsible for. I was provided with no objectives; other than the statement, ‘It’s broken; See what you can do to make it better?’

Because this was sensitive information; I knew that all descriptions of the functionality would have to be generalized for this article.

Using my knowledge of N-Tier - MS Access, SQL, VBA and the internet; I started and completed a graphical user interface (GUI) with training material to securely access the spreadsheets information. The ability for the users to lookup, add and administer records was greatly improved in a secured networked environment.

I added additional functionality to the reports, which at the time, was a huge improvement. I introduced the ability of the user to access and create driving directions to the static locations of each client.

I had asked the department’s manager, ‘If he had a preference to secure access to the database I was creating?’

His response was unusual, in my opinion; however not unexpected, ‘Do what you feel is best.’

I developed a script that would allow an end user to use their [Last Name First Initial ] and a password that they could change, after the first log in.

The interim manager was impressed with the development and functionalities I had created thus far; and he presented me with a long list of common report generation topics, which he requested to be included in the GUI.

These topics were clearly identified to the user in the form of ‘buttons ‘ the user clicked to generate the reports from a filtered lookup. Because each user would have variable access to the reports; all encompassing group access to the selected reports was not an option.

Selective grouping, as assigned by the administrator was developed and implemented. This allowed the administrator to ‘show/hide’ selective reporting function to the end users.

With the development of this GUI; detailed explanations were created in tandem as to the administration of the DB access and user training manuals.

Keywords used on the programming: Structured Query Language (SQL), Visual Basic for Applications (VBA), VB.NET, 508 Compliancy; MS Word, MS Excel, MS Access.

On the last day of this one month assignment, the interim manager of the HCLC department introduced me to one of the Program Managers and his superiors of the OIS department.

They asked, ‘If I would like to extend my contract for another five months and work in their department?’

Naturally, I saw recognition and acknowledgement of my skills; AND I graciously accepted their offer.

My first task was to proof the roll out of an N-tier application that was ready for the HIV (Human Immunodeficiency Virus) department – CareWare 4.0 at the end of the month.

No training material was available for instruction to me or the users for this application; So I created one – in tandem with identifying visual mistakes, which would allow the user to be frustrated with the program.

I identified each screen in the GUI that had tab order inconsistencies’ and mistakes for 508 compatibility. Created an iterative learning manual that presented to the user a screen shot of the page; sequential instruction, in regards to the input of information; finally offer suggestions to the programming staff to resolve, what I considered: Errors and inconstancies.

This allowed for the N-tier application to deploy on schedule.

Keywords used on the programming: Structured Query Language (SQL), VB.NET, 508 Compliancy; MS Word.

~~~

For the next couple of weeks: I was directed to install application upgrade and general user support on PC desktops for the DWP (Drinking Water Program) and CDL (Clandestine Drug Labs) departments. I was tasked in the administering of minor changes to these departments’ web sites, using Dreamweaver.

Finally, I was tasked to develop, program, train and deploy a ‘legacy’ system into an N-tier program (License 2000). This process was created for the EMS (Emergency Management Systems) department. License 2000 was a MS SQL Server driven application that was scheduled for deployment 9 months after my six month contract had ended.

My obstacle to complete this task was timing: Four months to do the research, identify the required components, develop training material, program the data stream; not to mention test /evaluate the process – AND keep a detailed account to pass to the next person assigned to this task, if I wasn’t able to complete it.

Doing the research and identifying the components was relatively easy, after a brief discussion with the Program Manager and the EMS Director. The process was simple enough: Make the ‘legacy’ input method compatible with the new N-Tier application (License 2000) and provide user training material for its end users.

My technical writing skills were very helpful in creating instructions for the end users and administrative level needs of the department.

The process incorporated a ‘bubble’ scanner that read No.2, penciled application on ‘thick’ paper. These pages were filled out by the applicants and entered by the EMS department employees.

To map the coordinates of the scanner: I used my extensive knowledge of Adobe Photoshop to create a mask for point recognition by the scanners software and develop the first part of the training material to be presented.

Multi tasking of this process became habitual in its development to program the software recognitions of the information and the training manuals.

During this time: I was familiarizing myself with the N-Tier application and which headers would to be added to the output of the data the scanner was generating.

This is when I realized that the application I was creating was a 2-Tier component to the N-Tier application; which from my understandings made the time constraints more obtainable; however, this didn’t convince me to leave any ‘loose ends’ as other unforeseen circumstances’ might arise that would hinder my completion of the task at hand.

Mapping the data was easy, in my opinion; testing the results required additional ‘tweeks’ to the mask and verify that the correct data was being delivered.

At this time I built sub routines into the mask, to reject the data that was entered incorrectly and not allow it to be transmitted to the N-Tier data store. This is a proactive approach that removes the need for additional review of the database administrator, later on; place the decision to accept or reject on the EMS user.

In the training manuals: I prepared detailed explanations of ‘what an operator could do’ to enter the information into the N-Tier data store manually. This also served in the event, if the scanner became in operable for whatever reasons.

I was allowed by the Program Manager to use an open source application to further automate the process. The user would fill the hopper of the scanner with the filled out the 18# papers forms; click an ICON on the desktop and initiate the scanning of the material.

Tested, it could successfully identify 150 objects per minute. Provide the end user with the option to review the data accepted and ready for delivery to the N-Tier in a spreadsheet format before transmission; or allowed the option to send without review, for smaller items.

In the training manual: It was strongly encouraged to review the data before sending to the N-Tier data store.

Rejected objects were routed to a separate exit tray of the scanner; for further review, manual input or rejection of the form; as the data was not saved by the scanner after processing.

The assigned task was completed on time and the iterative training manuals were prepared; which included administration and troubleshooting guidelines as they related to the scanner, forms and process.

My only regret was that my contract ended for me to train the end users on the process; however I was able to successfully train the Program Manager and two other Systems Analysts with new process I developed. (See references from References: By Client ).

Keywords used on the programming: MS SQL / Server , Structured Query Language (SQL), JavaScript, VB.NET, 508 Compliancy; MS Word, MS Excel, MS Access, Adobe Photoshop, Macromedia Dreamweaver, Visual Studios 2003 – Enterprise Edition.

   __

Business Logic: Growth of experiences, from the consequences’ of my choices.

Initially hired as a Desktop Support Technician to support the needs of the Systems Administrator of Pacific Star Communications; my skills in N-Tier and programming were known by my immediate supervisor prior to accepting the position.

Within the first year of employment: My responsibilities included web and email administration. Being the tier 1 and tier 2 person, responsible for help desk duties and asset management administration of PC equipments.

At the beginning of my second year: Executive Managements announced that the company’s web presents would get an over haul and it was my responsibility to make it happen; hence the job title change to include Web in the title (Desktop Support / Web Technician). I was now reporting directly to the VP and Chief Financial Officer (CFO).

The first task I was directed to investigate the capabilities to continue to support the web site internally.

Yes, supporting the web site required .NET upgrades which was completed during that month’s network shut down, for computer / networking needs.

Next, was to develop and implement a process which allows for multiple, continuous users to add content to the web site.

This required a little research as to the intended employees’ skill level in adding content to a web site.

The responses to my inquiry regarding this to management and directly to the employees ranged from no experience to a lot.

This concerned me greatly as a company’s web site MUST be available 24/7/365, with zero distortion in the delivery of content.

So, I introduced a development ‘SAND –BOX’ solution with identical content as the LIVE site contained, to the company that would allow the content generators free access inside the DMZ to add content, for final review before it was pushed to the live web site.

At first this was alien to the Executive Management; however I quickly explained my concerns and reasoning’s in a fashion that was accepted as valid.

During my development of the ‘SAND-BOX’ solutions; Executive Management clearly instructed me NOT to edit other people’s files or content for delivery to the web site. Sometimes diplomacy had to be used to explain my concerns; which again were validated.

Because each of the employees had such a widely diverse set of skills; I introduced the notion to use two similar but different applications to access the ‘SAND-BOX’ (Adobe Dreamweaver and Adobe Contribute).

Dreamweaver was used for the more advanced and skilled employees to produce content, as part of the Adobe Creative Suite (CS, v3 to v4) of products being used. I was also responsible for supporting all Adobe applications in the company.

For the less advanced employees with limited skills: Selective parts to the ‘SAND-BOX’ were identified and locked to their portion of content edits, using Active Directory (AD) permissions, This was to reduce the opportunity for them to add / edit content in areas they had no need to change.

After Q/A of the redesigned web site was completed in the ‘SAND-BOX’; It was pushed to the ‘LIVE’ web site with zero distortions – On time and to the satisfactions of mine and the Executive Management.

Creating new additions to the web site was distributed to the Executive Management and their respective employees whom generated the content.

My responsibilities shifted to a more administrative role in content deployment; as it related to the Q/A of new content; training of new content providers - AND more in-depth report writing and researching the Executive Managements decision to outsource the web site and email functions to third party providers’.

At the beginning of my third year: My job title changed again to IT Support Analyst – I reported to the Senior VP of Operations.

The company had already gone through reorganization of its facilities as Asset Management was becoming a bigger part of my day. The web site was stable and the process I introduced was working well. Email was working; with increasing SPAM attacks that continued to overflow the buffers.

I was instructed to prepare a diagram for process development to outline my Help Desk Process that I developed for the company previously. (See example: Help Desk Proceedures (pdf)).

I was then requested to map out and identify the Website Process Scheme and Disaster recovery Locations: (See Example: Wedsite Process Scheme and Disaster Recovery Locations).
Metrics and comments for this example have been removed, due to propriety / security of the company’s information.

I was tasked to research: ‘What it would take to move the web site and email functions to a third party provider?’ I knew that something was up, as these two functions were part of my responsibility. I knew that my days with this company were numbered.

This did not hinder my dedication to the company and I followed the directions of Executive Management up to and beyond the last moment of my employment.

I suggested 3 HOST providers, with cost evaluations and history standings for up time and support services for the web site and email porting. Detailed instructions were prepared for migration at a yet to be determined date.

Executive Management chose the one that closely matched their criteria and I proceeded to develop transitional information for a seamless migration. Everything was ready for the migration at the next network shut down.

The asset management was to be transitioned as well. Executive Management asked me to research and provide cost analysis on a third party N-Tier application to store the assets records. They chose one. Fortunately for the company: The records I kept were easily imported to the N-Tier application and assigned to another department for service. Setting up permissions and linking them to AD profiles was a snap. Training / administration material were created for the employees that would take over this process.

In a group email I was notified to attend a meeting where the CEO informed 25% of the company, including myself, that we were being let go as part of a cost cutting measure that effected every department in the company.

After the meeting I saw a lot of emotional faces from the remaining employees. I did not let this somber ‘vibe’ effect my dedication to the responsibilities I would leave other to complete. While cleaning out my desk; I instructed the remaining IT members ‘where to find’ any ‘in process work’ that I would not be able to complete for the company. Provided detailed instructions for the activation and migrations that were planned for the next network shut down. I left confident: I provided the best I could offer this company with no regrets (See references: By Co-Workers and By Supervisor).

As part of our weekly reporting, I submited for this purpose, statistical anaylysis of my Work Experience:  Password is:
w0rk1ng.

 
Keywords used on the programming: Structured Query Language (SQL), Visual Basic for Applications (VBA), ASP.NET, C#, XML, XHTML, JavaScript, 508 Compliancy; MS Word, MS Excel, Adobe CS (v3 and v4), Adobe Acrobat (Standard and Professional v6 to v9), Adobe Dreamweaver (CS v3 and v4) and Adobe Contribute (v2 and v3).

How we live our lives; IS as important as how we depart our work. It is my hope that the person reading this story can glean the message which it was designed to relate. I am the best candidate for the position I've applied for. I possess skills that go beyond the positions requirements for the posted vacancy.


Further demonstrations of my skills 'I bring to the table' can be found on this web site.  I can be reached via email at the top of this page; OR by clicking Contact.


Top>>

__

Home 
Site Map
Webmaster
Copyright 2013 William Hunter Breedlove Jr.
Top>>