Training to be a.Net Programmer

Plan

Training is an essential activity to a programmer as it gets one equipped with the required skills and good knowledge of acquiring competence in the field of programming. I got my iteration of training into several tiers. I began with preparation for the upcoming training. The preparation defined the first division of my activities during the implementation of the training program. The process took a duration of three days where I got involved in reviewing the concepts related to.NET technology. Alongside that, I had to have a good understanding of what it entails a.NET programmer to possess, so that to get acknowledged according to his/her competency.

The second phase of the iteration was the development of the training which was outlined in five typical stages. I began with defining the needs that had purposed me to conduct the training on.NET programming. The needs were the major inputs for me to determine the training objectives easily. The training objectives were defined to enable me to have the good knowledge of what I am supposed to gather during the training session. And this was the second stage of the training program

The follow –up sub-session of the training session was the individual assessment of what I have before getting into the actual training process. This phase was once more a session that was conducted to outline the aspects I understand about the.NET programming career. The activities prepared me well for the actual training. After that, I got to the fourth stage where I was trained of all that entails.NET programming. I finalized the session by measuring or rather assessing myself over the knowledge acquired. The training process took the duration of seven days.

Action
The training was undertaken with the aim of getting me with the knowledge and good understanding of.NET programming. I began the implementation of the iteration by undertaking a preparation towards the actual training. I went to the nearby cyber café in the city center where I had to surf the internet for the.NET programming tutorials. In supplement to that, I consulted the.NET programmers who provided the guideline on the things that I have to make sure that I possess to get regarded as a competent.NET programmer.

I moved to the actual training session. During the program, I outlined the need for the training and it was revealed to be a guideline to getting the knowledge.

I defined the objectives of the training process. These objectives were obtained from a brainstorming session where I analyzed the information from the.NET programming experts and the research undertaken. I extended my assessment through outlining what I know and understand about.NET programming. The activities enabled a good preparation for train session. I got into the training processes where I began with understanding the.NET technology concepts. I moved to outlining and studying the tools applied by the.NET programmers. Subsequently, I got trained in the skills that I have to possess as a.NET programmer as well as the roles, duties and responsibilities that are undertaken by a.NET programmer.

After finishing the training, I went ahead to have an assessment of what I had learned. The trainers gave me some testing scenarios where I had to respond to an approach as a.NET programmer. The training had equipped me with the mechanism of coding and approaching different situations. The assessment defined the end of my training session that was concentrated on the programming mechanisms as far as.NET technology is concerned. Alongside that, I moved to undertake the personal practice of the knowledge acquired.

Observation
The training was educative as I acquired very useful knowledge that I believe can get me grow well in my career. The prior action of training preparation got me to discover that the organization had a well-organized archive that had good guiding materials to trainees. The materials obtained outlined the basics and details of expectations of the.NET programmer. The.NET programming had a major concentrate on designing applications that are internetworked oriented. The applications were focused on their accessibility to the network, and it meant that the skills required must have to do with internetworking.

The training process began with the appreciation of the.NET technology where the trainers described the Java technology, the ASP. NET, XML and extended to the.Net programming languages such as the Java language, Javascript, PHP, CSS, HTML and others. It was a very educative session. They coding procedures were also described and they instead on having a pseudo codes and flowcharts to easy the task of coding as they describe the modules and utilities of the application.

The desirable skills that a.The net programmer should possess included the database working skills, good knowledge of design patterns, programming analytical skills, strong ability with object oriented programming (Wallen, 2005), skill sin SQL server. Good skills with scripting languages such as the HTML, DHTML, CSS, XML, JavaScript, VBscript, Ajax and others. In-depth knowledge in software development lifecycle. Also, good analyzing, communication, presentation, reporting and interpersonal skills are desirable.

A.NET programmer has some distinctive roles, duties and responsibilities. They got defined and implemented according to the competency of the candidate. However, the main responsibility and duty are to develop applications, implement and support the software and the web pages.

Reflection
The.NET programmer training was a good mechanism for getting me equipped with the required knowledge that can get me determined in undertaking the responsibilities and the overall growth of application developing a career (Mattwriter, 2015). The entire training process got associated with some challenges such as the difficulty in outlining some aspects during the practical session. The theory part was concentrated much than the practical, and this got me some difficulties in responding to the scenarios assigned. However, I appreciate the advice of Mr. Kim, the company.NET senior programmer who requested me to have a good study and understanding of aspects relating to the topics of study.

The definition of the training objective process was easily handled as I began with describing the basic need for the training. The training needs to be described the objectives. The assessment of my understanding was also a good and enjoying session that got me enough courage in handling aspects as well as other technical utilities. The IT department ensured the availability of development and practice tools. The tools made the activities much friendly and easily handled.

In my opinion, the entire process was successful by it was my wish that the senior and professional persons in the developing section were our trainers. This could have got the process more friendlily and much could have been gathered as the world is dynamic and diversifying in all directions. The training was not enough, and I had to interact with the experts in the field to have a good understanding of the required skills.

Telenursing

Introduction
Telenursing is the utilization of technology to conduct nursing practice and deliver nursing care. The use of technology has changed the delivery medium of nursing care. It has necessitated competencies related to its use to deliver nursing care. Practitioners engaged in telenursing plan, assess, evaluate and intervene the outcomes of nursing care. Technologies commonly used in this practice include computers, Internet, telephones, telemonitoring equipment and digital assessment tools. The term telehealth is used to describe the breadth of health services provided through communication technologies. The paper will explore telenursing as a specialty of telehealth. Advantages and disadvantages for the patient and legal and ethical principles for the nurse of this technology will be explored. These will be used as the basis for decision-making and whether it is a good fit for me.

Advantages and disadvantages for the patient
Advantages
Diagnosis and Consultation
Research evidence shows increased success of diagnosis of diseases. Telenursing has productively been used as a tool for diagnosing acute conditions including leukemia. In addition to diagnosis, nurses can provide educational sessions or other patient education efforts. Telenursing has been shown to be a successful undertaking for nurses in patient education as it offers two-way video and audio technology. Nurses also have benefited from consultations through telehealth tools. Just as in patient education, nurses can use the two-way audio and video technology to consult with other providers. For example, home health nurses may use technology to consult with physicians or specialists regarding a particular patient (Hebda & Czar, 2013).

Monitoring and Surveillance
Adherence and compliance problems are among the various issues that are essential to achieving patient safety. After patients leave a facility, they take responsibility for their own health care at home. Patients may not always follow treatment plans as directed by providers or physician due to various factors, including wrong understanding and miscommunication of the treatment plan, complex treatment schedule that requires additional guidance for the patients to comprehend and the lack of access to facilities required for the treatment plan. This can cause negative outcomes and creates safety issues for the patient. Therefore, these technologies provide nurses with efficient tools of caring for patients. The use of these technologies improves adherence or compliance to the prescribed regimen of care. They also allow effective symptom management. Telenursing is one strategy that nurses currently use to monitor and communicate with patients beyond the acute care setting. It also reduces health care utilization rates for acute care services by reducing visits to the Emergency Department (Hebda & Czar, 2013).

Clinical and Health Services outcomes
Telenursing has been associated with an improvement in clinical and health service outcomes. Technologies have been used in the management of chronic conditions such as chronic obstructive pulmonary disease, congestive heart failure and diabetes. Mortality and morbidity are the outcomes measured for these patients. Telenursing shows better outcomes in these areas. More specifically, telenursing technology has been shown to be an important tool in health intervention. For example, nurses can induce communication to help patient reduce HbA1c levels. They may also offer assistance to patients with traumatic brain injury in their transitioning from the hospital to the community. In addition to these technologies, other devices and applications are also making a difference in patient health care and safety. Essentially, telehealth technologies have replaced traditional care as practical alternatives (Hebda & Czar, 2013).

Reduction of cost
With telephone-based telenursing, there is relatively no technical setup required for interaction or cost to the patient. Many individuals own a cell phone in their home that can be utilized during sessions. Often, nurses limit telephone discussions to education or counseling as there are no visual cues for the telenurse. Technologies offer more and broader potential for telenursing practice. With telehealth technologies, patient access to care is improved; adherence to care increases and providers network with each other improves. Nurses can also closely monitor safety of patients at homes or alternative living facilities. The evident improvement in patient’s outcome has an indirect impact on cost of delivery of services (Hebda & Czar, 2013).

Disadvantages
As the use of technology increases in nursing profession, cost, privacy, autonomy, security and confidentiality issues have emerged. Facilities invest heavily in the security of patient information. These measures call for significant allocation of resources interms of human resources and money. Thus, the use of telecommunication increases the costs of purchase and operations of these equipments. These costs are passed on to consumers of health. Patients meet these costs through charges to health services. Health organizations are also faced with continued threat of as the need for confidentiality and security of patient data remain in the forefront of telenursing. On the other hand, Laws and regulations continue to place requirements for the protection of personal information. Data breach incidents have more impact than government fines, publicized lawsuits, and labor or union disputes. Breaches also have an impact on patients. Another disadvantage of telenursing is the technicality associated with the use of specific technologies. Telehealth technology differs and can range from telephone calls postoperatively to live, interactive voice and video patient education to using a popular video game system and downloadable data devices (Schlachta et al., 2010).

Legal and ethical principles for the nurse
With telenursing, confidentiality remains a concern that must always be addressed. Telehealth sessions must remain confidential interaction between a provider and a patient. Information privacy is the relationship between technology, collection and sharing of data, the public expectation of privacy, and the legal and related issues surrounding them. Privacy concerns exist when there is sensitive information or personally identifiable information that might be of interest to other parties. Maintenance of information privacy is a risk management issue for any organization (Greenberg, 2000).

The security risks increase with the extraordinary utilization of internet services due to the advent of cloud computing. Hence, training is a necessary component of an organization’s security practices. Hospitals are forced to instead focus on making information system users intrinsic to the security processes through awareness, training and information rather than focusing purely on implementing technologies. Technologies such as firewalls, intrusion detection system, intrusion prevention system, antivirus content filtering and encryption are commonly implemented to reduce the risk of cyber attacks. While such technologies are widely available to help hospitals mitigate the risk of intentional and unintentional threats, their effectiveness is limited if security threats and risks fail to focus on user intrinsic components of the organization’s ICT system. Computer dependency, false sense of entitlement and ethical flexibility increases the security risk to the disadvantage of the medical facility. This exposes health facilities to risks of security and data breach. In the long run, this may compromise patients’ safety (Greenberg, 2000).

Conclusion and Recommendations
Innovative technologies are employed in nursing practice to improve patient care and thus improve safety. Technologies range from the ubiquitous computing to simple telephone and only promise more in the future. The research on telenursing practice shows significant benefits related to consultations, diagnosis surveillance and monitoring of patients, technology advancement and clinical and health services outcomes. These areas have considerable patient safety concerns. On the other hand, special concerns in relation to patient safety have emerged with this method of health care delivery. As the use of technology increases in nursing profession, cost, privacy, autonomy, security and confidentiality issues have emerged. A job in telenursing is in my future. The pro of this decision is that I will get to work in a field that has shown high potential of growth in the future. The con of this decision is that ability to safeguard data is important as personal information increasingly continues to be collected.

Disaster backup/disaster recovery

Database backup
In information technology, backup is the process of copying and archiving the computer data so that one can use it to restore the original after an event of data loss occurs (Mullins, 2012). There are two distinct purposes of backups. One is to recover the data after its loss maybe because of data deletion or corruption. The data loss may be a common experience of the computer users. The second purpose of the backup is to recover the data from the earlier time according to the user-defined data retention policy. There are two divisions of the backups that include the logical and the physical backups (Dafoulas & Ward 2011). The logical backups usually contain the logical data from the database with the Oracle export utility. It is stored in a binary file so as to help in later re-importing to a database using the corresponding Oracle import utility. On the other hand, the physical backup refers to the backup of the physical files that is used for storing and also recovering databases such as the control files and the data files. It is a copy of the files storing database information to another location whether it is on offline storage or a disk.

The database backup tends to form a duplicate of the data when the backup is complete. With a backup, it is easy for an individual to recreate the whole database from the backup in just one step that involves restoring the database. During restoring, it is a process that involves overwriting the existing database or it may create a database in case it does not exist (Dafoulas & Ward 2011). During backup, it is a process that tends to use a lot of storage space for every backup, and it also requires more time so as to completely backup all the operations.

With the Oracle backup, the types of backups include the logical backup, cold backup, and the hot backups. The hot backup is a backup of the data while it is running. Oracle tends to have RMAN which usually ensures the success in the hot backup. A cold backup is a backup that involves the offline physical backup, which is a process that happens when the database is not operating. It is a type of backup that accommodates all of the essential data files and other database components (Snedaker, 2014). On the other side, the logical backup is that backup of the tablespace, schemas, and whole database. Since an organization has a large amount of data, it is essential for the database administrators to use the automatic backup utilities that are available in a database such as ORACLE.

Any of the backup strategies used tends to start with the data repository. The backup data should be stored and organized to a degree. Other types of data backups include the full backup, differential backup, incremental backup, and mirror backup. The differential backup is the backup that includes all the files that changed since the last full backup. The incremental backup is the backup including files that changed in the last backup process (Snedaker, 2014). The full backup refers to the initial process of the backup that includes all the files and folders. Mirror backup is the backup of all files of the data that changed since the last full backup.

Disaster planning
Disaster planning is important as it helps in ensuring the continuation of the business processes if a disaster happens. Disaster is a term that is relative since disasters tend to occur in varying degrees. Disaster planning is essential as it offers an effective solution to use in recovering all the vital business processes (Whitman et al. 2013). The disaster recovery plan tends to offer the procedures for handling emergency situations. In disaster planning, the plan must offer information for the proactive handling of the crisis and must include detailed procedures for communication, executives, investor relations, human resources, and technology management. The plan must also document the procedures, responsibilities, and the checklist to use in managing and controlling the situation following the crisis.

Disaster planning tends to offer a state of readiness that allows prompt personnel response after a disaster occurs. It tends to provide a more efficient and effective recovery process. A disaster recovery plan must be able to accomplish several objectives. These objectives include managing the recovery operation in an effective and organized manner, recovering information and data imperative to the operation of critical applications (Mullins, 2012). It should also assess the damage, repair damage, and activate the impaired computer center. Every business tends to have the responsibility of responding to short or long term disruption of the services. Developing, documenting, implementing and testing the disaster recovery plan enable the business to restore the availability of the critical applications in an organized and timely manner after the occurrence of a disaster.

The advantages of disaster planning are that it results in improved technology. An organization requires improving IT systems so as to support the recovery objectives that you develop in disaster planning. The attention that one pays to recoverability leads to making the IT systems more consistent with each other. Disaster planning also results to improved business process. Since the business processes tend to undergo analysis and scrutiny, the administrators may not help but find areas that need improvement (Whitman et al. 2013). Disaster planning also benefits the organization through fewer disruptions. Because of improved technology, the IT systems are more stable than in the past. When one make changes to the system architecture so as to meet the recovery objectives, the events that used to cause outage do not do so anymore. Disaster planning also offers a competitive advantage because having good disaster recovery plan provides the organization with bragging rights that cab outshines the competitors. Disaster recovery plan tends to allow the organization to claim higher reliability and availability of services.

During disaster planning, it is significant that one should define the strategy to follow when employing the required softness to ensure the principles of detection, prevention, and response to the disaster. Such a strategy tends to define the activities that people will participate in when a disaster occurs, and it has a plan for explaining how to conduct the activities. It is essential for the organization to set the priorities of the processes and operations that they should perform. A disaster recovery plan is essential for the company as it contains the action that will help reduce the impact of the disaster and enable the organization to resumes its operation as fast as possible (Schin, 2014). It is an important aspect of the organization because it helps the organization save a lot of costs that it would incur if it never had a disaster recovery plan.

Importance of integrating backups and disaster planning
Database recovery is an essential aspect of disaster recovery. The purpose of the database backup is so as to safeguard the data in the case that a disruptive event occurs. The disaster planning aims at safeguarding the data and also the physical devices. It is important to integrate database backups and disaster planning as they work as complementary to each other when both of them are not properly implemented. Integrating database backup and disaster planning are important as backup database help in deciding the data to keep a backup for, and disaster planning helps in selecting the suitable backup plan for the physical storage of the data (Schin, 2014). Disaster planning is important as it helps to pinpoint the likely areas for problems. During planning, one need to assign tasks to different people so that everyone can know what is expected of them. Then again, backing up data and storing the copy off site may help to ensure that if a disaster strikes, one can move on without a lot of disruption.

It is important to execute database backup and disaster planning effectively. Failure of effectively executing them can result in a lot of loss to the organization. Without good backup and disaster planning, the organization can lose essential data and even customer data that can be of negative impact on the company (Mullins, 2012). When the two are not properly integrated, it can cause confusion to workers in the organization when an event of disaster happens as employees will not understand what to do in such a situation. Therefore, the damage can be much when the plan and backup are not properly executed.

Online Buying and Traditional Buying

Currently, technology has continued to develop dramatically. It has therefore made lives more convenient. One convenience is the online shopping which remains renowned as a business strategy on The Internet. While there are differences in several ways, the two methods have many similarities. This paper will compare as well as contrast aspects between online buying and traditional buying. With the increasing popularity of the Internet and the increasing options to online shoppers, more people continue to turn to cyberspace for shopping needs. As a response, retailers continue to enhance online stores, giving customers similar comprehensive experience available at a mall.

Like traditional shopping, online buying gives a great variety of stores. Nearly any store typically found in malls correspond online store with similar items. From departmental stores to specialty ones, many retailers find through Internet search. In both options shopping experience provides a large item selection to choose from. If one is looking for dresses, a simple search end up yielding hundreds of dresses with various styles, sizes, shapes as well as colors. Similar to visiting a specialized department in the store, the criteria for search can become narrowed to present the particular results like cocktail dresses or sundresses. Many retailers give similar deals in store as well as on their website. Like in the mall, online stores always have seasonal as well as end-of-season items, in many case having extra incentives like free shipping for online buyers. The retailer’s site end up reflecting seasonal promotions present in-store and enable buyers to redeem coupons as well as gift cards. Sales and promotions will typically start and end on the same dates both in-store and online.

The other similarity is that both the two shopping options have an interactive experience. Through the enhanced features on many retailer websites, buyers manage to see how an item look like in other color, in different sizes, or send links to friends for feedback. The Victoria’s online store Secret, for example, allows buyers to click on the color swatches to alter the color of items then click through alternate brands to know the exact fit as well as shape. Similar to purchases at the mall, items purchased from online shops also get returned to retailers for a refund as well as an exchange with conditions varying depending on retailer’s policy. Like in mall stores, most online stores allow buyers to return items for a total full refund while others only allow for exchanges. As one would expect, returns as well as exchanges of some personal items like undergarments as well as toiletries get not accepted at malls or online.

The two business methods pose some distinctive features. A basic difference is time operation. For instance, customers may buy and view things every time they feel like because online shops operate on a 24-hour basis as well as seven days a week. Contrary, stores, supermarkets, markets, as well as plazas, begin in limit time like 8 am to 9 pm. Hence, online buying remain more useful as compared to traditional shopping particularly those without time or those always working with a computer like office workers. The Second difference is the mode of the exhibition (Odyssey & the Standard’ 2000). Traditional shopping has direct alternative to a product through touch as well as handling to ascertain their quality as well as their material. On the contrary, online shops only display items on the Internet for customers to image the producers through their mind pictures, information in every produce. Hence, face many difficulties in making choices. As a consequence, traditional buyers remain more attracted as compared to the online customer.

The third difference is the communication. In specific, online buyers have no capacity to negotiate directly with the sellers since they face a screen while traditional buyers have a face to face interaction and can bargain with respective sellers. Therefore, communication in online buying remains more interesting as compared to traditional shopping. Fourthly, the investment also contrasts between the online and the traditional buyers. For example, online business have no huge budget of leasing space, rent employee as well as décor store while traditional shops need more money. Additionally, online business managers to save money in the investment and they manage to expand and produce over the globe in short time, making online buying easy. Lastly, one of the advantages of online buying is convenience. Particularly, online buyer access products not only from within the nation but also from other countries. Hence, buyers get items by their computer irrespective of their area of stay.

To conclude, while there are differences between the two shopping methods, there are many similarities. Many factors propel people to choose the type of shopping suits their demands. Hence, both methods have advantages and disadvantages, and while making chooses between them, it remains critical to consider the situation. Irrespective of the method both the two enables buyers to get what they want and satisfy their consumer needs. Hence, if opportunity dictates, they can shop online, and the same should apply in traditional shopping.