- Project Management:
the business needs to provide interoperability in
the work place, using Common Object Request Broker
Architecture (CORBA) and Distributed Component Object
Model (DCOM) methods.
Well formulated understanding of Distributed Computing
Environment (DCE) requirements: in process replacement
& training, process development, programming,
Q/A, deployment, administration and maintenance.
and creating end user / administrator training manuals,
and Web Administrator: Responsible for the security, training
and maintenance of Domain Name Services (DNS) activities
on both sides of the Demilitarized Zone (DMZ).
Be respectful and dedicated to your employer
from the first day to the last.
To read the story where this bioacuity
is based; Scroll down and click
'Read More [+/-]'; OR,
here to download the PDF.
Logic: Identify the need and programming the results.
My first job after graduating from college with honors was as
a contractor for the most prestigious training hospital / universities
in Oregon (Oregon Health & Science University – OHSU).
Working a six month contract as an Image Library Technician to
support the dynamic needs of the Diagnostic Imaging department’s
library system; I quickly identified the opportunity to stream-line
business processes – AND provide functional, working N-Tier applications,
for business use.
My assigned task was to assist with the normal operations of the
department: file exam records, ship to requested internal and
external requestors and assist physicians /patients with their
record requests; In a HIPPA compliant department.
One of the first issues I identified was that the department relied
heavily on ‘paper’ communication to fill record requests for record
retrievals and had no electronic PACS record of the items shipped
to outside facilities.
These papers were blank forms that ‘ever-one’ was familiar with
their function and knew what information was relevant to the task
they were required to perform; however, it was inefficient – due
to paper transfer orders being duplicated, or lost.
Causing additional ‘stresses’ to the business model and ultimately
to the ‘people’ it was designed to help.
I embarked on a solution to resolve some of these issues by carefully
creating an electronic; 1-tier application in the form of MS Word
document templates to relieve the stresses of the departments
order takes. (See Example: Process
The relevance and ease of use for the department required little,
if no training to incorporate into the work process of the departments
It did present other opportunities in the development of 3-tier
application to resolve data storage, communication back flows
and lost records.
Designing the graphical user interface (GUI) was the easy part,
in my opinion. Provide the user with easily and identifiable controls;
the ability to enter and recall shared data; provide a fail –
safe to the user to quickly print a blank copy of the forms they
were familiar with using to transfer information. (See Example:Process
Delivery DB (mdb)).
Due to privileged / propriety reasons the full application developed
is not included in the above example.
I can share with the reader that this application was able to
send / retrieve information to / from a SQL Server 2000 data store.
Users would log into the GUI, perform their task in a secure environment;
Thus eliminating the need to rely on a paper transaction to fill
the recorded libraries requests.
Keywords used on the programming: MS SQL / Server, Visual Basic
for Applications (VBA), VB.NET, 508 Compliancy; MS Word, MS Excel,
Computing Environment: Being proactive in a reactive environment;
I was tasked to a one month contract for the State of Oregon –
DHS (Department of Human Services); HCLC (Health Care & Licensure
Certification) department; which quickly developed into a six
month contract that continued with the OIS (Office of Information
Services) and additional departments.
The interim manager of the HCLC department within the first week
presented me with a spreadsheet that the department used to keep
track of the client list this department was responsible for.
I was provided with no objectives; other than the statement, ‘It’s
broken; See what you can do to make it better?’
Because this was sensitive information; I knew that all descriptions
of the functionality would have to be generalized for this article.
Using my knowledge of N-Tier - MS Access, SQL, VBA and the internet;
I started and completed a graphical user interface (GUI) with
training material to securely access the spreadsheets information.
The ability for the users to lookup, add and administer records
was greatly improved in a secured networked environment.
I added additional functionality to the reports, which at the
time, was a huge improvement. I introduced the ability of the
user to access and create driving directions to the static locations
of each client.
I had asked the department’s manager, ‘If he had a preference
to secure access to the database I was creating?’
His response was unusual, in my opinion; however not unexpected,
‘Do what you feel is best.’
I developed a script that would allow an end user to use their
[Last Name First Initial ] and a password that they could change,
after the first log in.
The interim manager was impressed with the development and functionalities
I had created thus far; and he presented me with a long list of
common report generation topics, which he requested to be included
in the GUI.
These topics were clearly identified to the user in the form of
‘buttons ‘ the user clicked to generate the reports from a filtered
lookup. Because each user would have variable access to the reports;
all encompassing group access to the selected reports was not
Selective grouping, as assigned by the administrator was developed
and implemented. This allowed the administrator to ‘show/hide’
selective reporting function to the end users.
With the development of this GUI; detailed explanations were created
in tandem as to the administration of the DB access and user training
Keywords used on the programming: Structured Query Language (SQL),
Visual Basic for Applications (VBA), VB.NET, 508 Compliancy; MS
Word, MS Excel, MS Access.
On the last day of this one month assignment, the interim manager
of the HCLC department introduced me to one of the Program Managers
and his superiors of the OIS department.
They asked, ‘If I would like to extend my contract for another
five months and work in their department?’
Naturally, I saw recognition and acknowledgement of my skills;
AND I graciously accepted their offer.
My first task was to proof the roll out of an N-tier application
that was ready for the HIV (Human Immunodeficiency Virus) department
– CareWare 4.0 at the end of the month.
No training material was available for instruction to me or the
users for this application; So I created one – in tandem with
identifying visual mistakes, which would allow the user to be
frustrated with the program.
I identified each screen in the GUI that had tab order inconsistencies’
and mistakes for 508 compatibility. Created an iterative learning
manual that presented to the user a screen shot of the page; sequential
instruction, in regards to the input of information; finally offer
suggestions to the programming staff to resolve, what I considered:
Errors and inconstancies.
This allowed for the N-tier application to deploy on schedule.
Keywords used on the programming: Structured Query Language (SQL),
VB.NET, 508 Compliancy; MS Word.
For the next couple of weeks: I was directed to install application
upgrade and general user support on PC desktops for the DWP (Drinking
Water Program) and CDL (Clandestine Drug Labs) departments. I
was tasked in the administering of minor changes to these departments’
web sites, using Dreamweaver.
Finally, I was tasked to develop, program, train and deploy a
‘legacy’ system into an N-tier program (License 2000). This process
was created for the EMS (Emergency Management Systems) department.
License 2000 was a MS SQL Server driven application that was scheduled
for deployment 9 months after my six month contract had ended.
My obstacle to complete this task was timing: Four months to do
the research, identify the required components, develop training
material, program the data stream; not to mention test /evaluate
the process – AND keep a detailed account to pass to the next
person assigned to this task, if I wasn’t able to complete it.
Doing the research and identifying the components was relatively
easy, after a brief discussion with the Program Manager and the
EMS Director. The process was simple enough: Make the ‘legacy’
input method compatible with the new N-Tier application (License
2000) and provide user training material for its end users.
My technical writing skills were very helpful in creating instructions
for the end users and administrative level needs of the department.
The process incorporated a ‘bubble’ scanner that read No.2, penciled
application on ‘thick’ paper. These pages were filled out by the
applicants and entered by the EMS department employees.
To map the coordinates of the scanner: I used my extensive knowledge
of Adobe Photoshop to create a mask for point recognition by the
scanners software and develop the first part of the training material
to be presented.
Multi tasking of this process became habitual in its development
to program the software recognitions of the information and the
During this time: I was familiarizing myself with the N-Tier application
and which headers would to be added to the output of the data
the scanner was generating.
This is when I realized that the application I was creating was
a 2-Tier component to the N-Tier application; which from my understandings
made the time constraints more obtainable; however, this didn’t
convince me to leave any ‘loose ends’ as other unforeseen circumstances’
might arise that would hinder my completion of the task at hand.
Mapping the data was easy, in my opinion; testing the results
required additional ‘tweeks’ to the mask and verify that the correct
data was being delivered.
At this time I built sub routines into the mask, to reject the
data that was entered incorrectly and not allow it to be transmitted
to the N-Tier data store. This is a proactive approach that removes
the need for additional review of the database administrator,
later on; place the decision to accept or reject on the EMS user.
In the training manuals: I prepared detailed explanations of ‘what
an operator could do’ to enter the information into the N-Tier
data store manually. This also served in the event, if the scanner
became in operable for whatever reasons.
I was allowed by the Program Manager to use an open source application
to further automate the process. The user would fill the hopper
of the scanner with the filled out the 18# papers forms; click
an ICON on the desktop and initiate the scanning of the material.
Tested, it could successfully identify 150 objects per minute.
Provide the end user with the option to review the data accepted
and ready for delivery to the N-Tier in a spreadsheet format before
transmission; or allowed the option to send without review, for
In the training manual: It was strongly encouraged to review the
data before sending to the N-Tier data store.
Rejected objects were routed to a separate exit tray of the scanner;
for further review, manual input or rejection of the form; as
the data was not saved by the scanner after processing.
The assigned task was completed on time and the iterative training
manuals were prepared; which included administration and troubleshooting
guidelines as they related to the scanner, forms and process.
My only regret was that my contract ended for me to train the
end users on the process; however I was able to successfully train
the Program Manager and two other Systems Analysts with new process
I developed. (See references from References: By
Keywords used on the programming: MS SQL / Server , Structured
MS Excel, MS Access, Adobe Photoshop, Macromedia Dreamweaver,
Visual Studios 2003 – Enterprise Edition.
Business Logic: Growth
of experiences, from the consequences’ of my choices.
Initially hired as a Desktop Support Technician to support the
needs of the Systems Administrator of Pacific Star Communications;
my skills in N-Tier and programming were known by my immediate
supervisor prior to accepting the position.
Within the first year of employment: My responsibilities included
web and email administration. Being the tier 1 and tier 2 person,
responsible for help desk duties and asset management administration
of PC equipments.
At the beginning of my second year: Executive Managements announced
that the company’s web presents would get an over haul and it
was my responsibility to make it happen; hence the job title change
to include Web in the title (Desktop Support / Web Technician).
I was now reporting directly to the VP and Chief Financial Officer
The first task I was directed to investigate the capabilities
to continue to support the web site internally.
Yes, supporting the web site required .NET upgrades which was
completed during that month’s network shut down, for computer
/ networking needs.
Next, was to develop and implement a process which allows for
multiple, continuous users to add content to the web site.
This required a little research as to the intended employees’
skill level in adding content to a web site.
The responses to my inquiry regarding this to management and directly
to the employees ranged from no experience to a lot.
This concerned me greatly as a company’s web site MUST be available
24/7/365, with zero distortion in the delivery of content.
So, I introduced a development ‘SAND –BOX’ solution with identical
content as the LIVE site contained, to the company that would
allow the content generators free access inside the DMZ to add
content, for final review before it was pushed to the live web
At first this was alien to the Executive Management; however I
quickly explained my concerns and reasoning’s in a fashion that
was accepted as valid.
During my development of the ‘SAND-BOX’ solutions; Executive Management
clearly instructed me NOT to edit other people’s files or content
for delivery to the web site. Sometimes diplomacy had to be used
to explain my concerns; which again were validated.
Because each of the employees had such a widely diverse set of
skills; I introduced the notion to use two similar but different
applications to access the ‘SAND-BOX’ (Adobe Dreamweaver and Adobe
Dreamweaver was used for the more advanced and skilled employees
to produce content, as part of the Adobe Creative Suite (CS, v3
to v4) of products being used. I was also responsible for supporting
all Adobe applications in the company.
For the less advanced employees with limited skills: Selective
parts to the ‘SAND-BOX’ were identified and locked to their portion
of content edits, using Active Directory (AD) permissions, This
was to reduce the opportunity for them to add / edit content in
areas they had no need to change.
After Q/A of the redesigned web site was completed in the ‘SAND-BOX’;
It was pushed to the ‘LIVE’ web site with zero distortions – On
time and to the satisfactions of mine and the Executive Management.
Creating new additions to the web site was distributed to the
Executive Management and their respective employees whom generated
My responsibilities shifted to a more administrative role in content
deployment; as it related to the Q/A of new content; training
of new content providers - AND more in-depth report writing and
researching the Executive Managements decision to outsource the
web site and email functions to third party providers’.
At the beginning of my third year: My job title changed again
to IT Support Analyst – I reported to the Senior VP of Operations.
The company had already gone through reorganization of its facilities
as Asset Management was becoming a bigger part of my day. The
web site was stable and the process I introduced was working well.
Email was working; with increasing SPAM attacks that continued
to overflow the buffers.
I was instructed to prepare a diagram for process development
to outline my Help Desk Process that I developed for the company
previously. (See example: Help
Desk Proceedures (pdf)).
I was then requested to map out and identify the Website Process
Scheme and Disaster recovery Locations: (See Example: Wedsite
Process Scheme and Disaster Recovery Locations).
Metrics and comments for this example have been removed, due to
propriety / security of the company’s information.
I was tasked to research: ‘What it would take to move the web
site and email functions to a third party provider?’ I knew that
something was up, as these two functions were part of my responsibility.
I knew that my days with this company were numbered.
This did not hinder my dedication to the company and I followed
the directions of Executive Management up to and beyond the last
moment of my employment.
I suggested 3 HOST providers, with cost evaluations and history
standings for up time and support services for the web site and
email porting. Detailed instructions were prepared for migration
at a yet to be determined date.
Executive Management chose the one that closely matched their
criteria and I proceeded to develop transitional information for
a seamless migration. Everything was ready for the migration at
the next network shut down.
The asset management was to be transitioned as well. Executive
Management asked me to research and provide cost analysis on a
third party N-Tier application to store the assets records. They
chose one. Fortunately for the company: The records I kept were
easily imported to the N-Tier application and assigned to another
department for service. Setting up permissions and linking them
to AD profiles was a snap. Training / administration material
were created for the employees that would take over this process.
In a group email I was notified to attend a meeting where the
CEO informed 25% of the company, including myself, that we were
being let go as part of a cost cutting measure that effected every
department in the company.
After the meeting I saw a lot of emotional faces from the remaining
employees. I did not let this somber ‘vibe’ effect my dedication
to the responsibilities I would leave other to complete. While
cleaning out my desk; I instructed the remaining IT members ‘where
to find’ any ‘in process work’ that I would not be able to complete
for the company. Provided detailed instructions for the activation
and migrations that were planned for the next network shut down.
I left confident: I provided the best I could offer this company
with no regrets (See references: By
Co-Workers and By
As part of our weekly reporting, I submited for this purpose,
statistical anaylysis of my Work
Experience: Password is:
Keywords used on the programming: Structured Query Language (SQL),
Visual Basic for Applications (VBA), ASP.NET, C#, XML, XHTML,
v4), Adobe Acrobat (Standard and Professional v6 to v9), Adobe
Dreamweaver (CS v3 and v4) and Adobe Contribute (v2 and v3).
How we live our lives; IS as important as how we depart our work.
It is my hope that the person reading this story can glean the
message which it was designed to relate. I am the best candidate
for the position I've applied for. I possess skills that go beyond
the positions requirements for the posted vacancy.
Further demonstrations of my skills 'I bring to the table' can
be found on this web site. I can be reached via email at
the top of this page; OR by clicking Contact.