How to be Led by the Spirit of God

Christ is Coming, Prepare to Meet the Lord

We see in the Book of Acts the LORD places much importance on being led by the Spirit of God in ministry and for guidance in all situations in life. If we learn how to truly hear from God we can: navigate through all deceptions & confusion and walk in truth; discern between true & false prophecy or predictions; make right life choices; be alert to either dangers or opportunities before us; and know what ministries areas to be involved in or help support.

Even for Internet sites, the media, churches or the many claims made in some You Tube videos that could be true or complete falsehood, He is here to lead us into all truth. There are other important issues in doing this such as correct bible doctrine, following the word of God, prayer, obedience etc, however this teaching is purely about the aspect of being led by…

View original post 1,581 more words

Advertisements

A High School Teacher’s List of 50 “wisest” words.

My Elusojian

image

So i found this list on tumblr and i couldn’t help but smile at some of the things mentioned on the list. I don’t know if i would go as far as calling them “wise words”, but truth is, they actually do make sense. Go through the list. you’ll find it quite useful. feel free to drop yours too if you have any!

1. There are plenty of ways to enter a pool. The stairs is not one of them.

2. Never cancel dinner plans by text message.

3. Don’t knock it ‘til you try it.

4.If you’ve made your point, stop talking

5. Know at least one good joke

6. When entrusted with a secret, keep it.

7. Don’t underestimate free throws in a game of ‘horse’.

8. Just because you can doesn’t mean you should.

9. Don’t dumb it down.

10. You only get one chance to notice…

View original post 387 more words

Hacking

When I say “Ethical Hacking”

In computer security, a hacker is termed as someone who performs a thorough search and seeks to exploit weaknesses and loop-holes in a computer network. A lot of reasons has been known to motivate this kind of act, some of which are:

–          Profit making, e.g. hacking financial institutions or accounts,

–          Protest, e.g. a disgruntled or unhappy worker could hack into his/her organization’s network just to destabilize the system and

–          Challenge, which could rise up among geeky friends.

Recently in the society, the work of hackers has been viewed as providing a “public service”, as it now reveals and exposes some lies that have been believed to be the truth, and establishes ways to verify them.

However, there are hackers who perform hacking, not to destroy, but to create and attempt to achieve only good ends, they are known as “White Hat Hackers”, and this category is what this write-up is about: Ethical Hacking.

Ethical Hacking is a term that was coined by IBM. It is term that describes hacking performed to assist an organization or a person in identifying possible threats, security risks and exposures on the computer or network. An ethical hacker attempts to bypass the system security panel, seeking weak points in the security that could be exploited by other hackers (Black Hat Hackers). The company or client that employed the services of the ethical hacker uses what the ethical hacker finds to improve on security architecture of their systems and networks, in an effort to minimize, and possibly eliminate, any potential hacker attacks.

Rules guiding Ethical Hacking

In order for hacking to be deemed ethical, the hacker must obey the below rules.

  1. The ethical hacker must have permission to probe the network and attempt to seek and identify potential security risks and threats. It is recommended that he/she gets written consent.
  2. The hacker must respect the individual’s or company’s privacy and only go looking for security issues.
  3. He/she must report all security vulnerabilities detected to the company, not leaving anything open for himself/herself or someone else to come in at a later time.
  4. The software developer or hardware manufacturer must be made aware of any security vulnerabilities located in their software or hardware if not already known by the company.

REFERENCES

Computer Hope: Ethical Hacking (http://www.computerhope.com/jargon/e/ethihack.htm). Accessed May 13, 2014.

Wikipedia: Hacker (computer security) (http://en.wikipedia.org/wiki/Hacker_(computer_security). Accessed May 13, 2014.

Wikipedia: White hat (computer security) (http://en.wikipedia.org/wiki/White_hat_(computer_security)). Accessed May 13, 2014.

 

An overview of the Object-Oriented Data Model

An Object-Oriented Data Model (OODM) has been defined for logical database design and database access. The OODM accommodates three types of relationship – aggregation, generalization and particularization – and provides four types of data operations for defining schema, creating database, retrieving objects and expanding objects.


Why Object-Oriented Database Management System?

In today’s world, Client-Server applications that rely on a database on the server as a data store while servicing requests from multiple clients are quite commonplace. Most of these applications use a Relational Database Management System (RDBMS) as their data store while using an object oriented programming language for development. This causes a certain inefficiency; this is because objects must be mapped to tuples in the database and vice versa instead of the data being stored in a way that is consistent with the programming model.

An OODBMS is the result of combining object oriented programming principles with database management principles. Object oriented programming concepts such as encapsulation, polymorphism and inheritance are enforced as well as database management concepts such as the ACID properties (Atomicity, Consistency, Isolation and Durability) which lead to system integrity, support for an ad hoc query language and secondary storage management systems which allow for managing very large amounts of data. The Object Oriented Database Manifesto [Atk 89] specifically lists the following features as mandatory for a system to support before it can be called an OODBMS; Complex objects, Object identity, Encapsulation , Types and Classes , Class or Type Hierarchies, Overriding, overloading and late binding, Computational completeness , Extensibility, Persistence , Secondary storage management, Concurrency, Recovery and an Ad Hoc Query Facility.

From the aforementioned description, an OODBMS should be able to store objects that are nearly indistinguishable from the kind of objects supported by the target programming language with as little limitation as possible. Persistent objects should belong to a class and can have one or more atomic types or other objects as attributes. The normal rules of inheritance should apply with all their benefits including polymorphism, overriding inherited methods and dynamic binding. Each object has an object identifier (OID) which used as a way of uniquely identifying a particular object. OIDs are permanent, system generated and not based on any of the member data within the object.

An OODBMS is thus a full scale object oriented development environment as well as a database management system. Features that are common in the RDBMS world such as transactions, the ability to handle large amounts of data, indexes, deadlock detection, backup and restoration features and data recovery mechanisms also exist in the OODBMS world.

A primary feature of an OODBMS is that, accessing objects in the database is done in a transparent manner such that interaction with persistent objects is no different from interacting with in-memory objects. This is very different from using a RDBMSs in that there is no need to interact via a query sub-language like SQL nor is there a reason to use a Call Level Interface such as ODBC, ADO or JDBC. Database operations typically involve obtaining a database root from the OODBMS which is usually a data structure like a graph, vector, hash table, or set and traversing it to obtain objects to create, update or delete from the database. When a client requests an object from the database, the object is transferred from the database into the application’s cache where it can be used either as a transient value that is disconnected from its representation in the database (updates to the cached object do not affect the object in the database) or it can be used as a mirror of the version in the database in that updates to the object are reflected in the database and changes to object in the database require that the object is re-fetched from the OODBMS.

 

Bibliography

  1. Dare Obasanjo (2001):   An Exploration of Object Oriented Database Management Systems.
  2. L. Zhao and S. A. Roberts (1987): An Object-Oriented Data Model for Database Modelling, Implementation and Access.

Socialist and Capitalist :the difference

Read this : The difference between a capitalist and a socialist

One day, a socialist knocks on a farmer’s door and asked him to join the local socialist party. Not knowing what a socialist was, the farmer asked for an example of socialist behavior. The socialist said,
“If you have a cow, then everyone in the village can have some of the milk from your cow. It’s called sharing the wealth”.

“That sounds good, “said the farmer.

” And if you have a sheep, ” the socialist said,” then everyone shares in the wool. ”

” Very nice, ” said the farmer,” This socialism sounds good. ”

” That’s great, ” said the socialist, believing that he had a convert to socialism.” And if you have a chicken, then everyone shares in the eggs. ”

” What? ” the farmer screamed angrily.” That’s terrible. Get out of here and take your socialist ideas with you. ”

” But, but, but, ” stammered the socialist,” I don’t understand. You were happy with the idea of sharing milk and wool. Why do you object to sharing eggs? ”

” Because I don’t have a cow or a sheep, ” snarled the farmer.” But I do have a chicken “.

And this is why financial IQ #2 (Protecting your money) is very important. Everyone agrees that we need to share the wealth, as long as it’s YOUR wealth, not THEIR wealth.

Culled from Robert T. Kiyosaki’s INCREASE YOUR FINANCIAL IQ: GET SMARTER WITH YOUR MONEY.

My favourite sporting farewell

theressomepeopleonthepitch

‘Chelsea are champions of Europe, and Drogba, always the big man for the big occasion has won it’. These words delivered with such passion on BBC radio Five Live by Alan Green will forever be etched in my memory. In the days after Chelsea’s historic win I could not stop re-watching the game, highlights and listening to the radio commentary (sad I know, but the way I stumbled across this wonderful moment). With Brian O’Driscoll recently retiring from international rugby, and indeed on such a high by winning the Six Nations, it made me think of my favourite sporting farewell. I say ‘think’ but I did not have to ponder for long as Didier Drogba’s final moments in a Chelsea shirt instantly sprang to mind. This was the ultimate exit.

As fate would have it, the Ivorian’s last game (although this was not announced until afterwards) would be in the…

View original post 884 more words

Valentine Special – A Heartfelt Letter to My Future Wife

Dear wife,

It’s not so much a date or an obligation I’m
celebrating, but the deeper meaning and
contribution our relationship brings into my life.
I sometimes can’t believe my luck I’m waking up
next to you today. It’s always a dream come
true. I can feel the chords playing in my heart,
“isn’t she lovely, isn’t she wonderful….” What
more can I ask for, what a gift you are!
While the world around us has thrown the
meaning of true togetherness in the abyss. I
wonder how we found ours. I couldn’t have
created what we have. I believe it’s providence
way of making my life eventful despite the
challenges and adventures of being the man that
I have chosen to be.

I appreciate you above all things that you accept
me and identify with my purpose. I feel strong
because you have always believed in me. I often
wonder if I’ll be able to do most of the things I
do today save for the climate of patient
understanding, thoughtful affection, loving
encouragement and supportive enthusiasm you
create and sustain.

I often think you a better person than I am. I
often wonder how you put up with my quirks, my
boundless energy and drive. I also credit your
ability to lovingly bring me in tune with my true
essence.

I like that you challenge me to a better me. With
you, I just want to be the best man that I can be.
I often struggle but you make it worth the fight. I
won’t accept I have given you my best yet even
though you say it. There is a lot more you
deserve.

Sincerely, I have no felt need for the dishonest
spoil that has indelibly stained the moral fabric
of most men. You deeply satisfy me my woman.
You comfort and encourage me so much that my
heart safely trusts you. I’m secured with you. I
delight in you. You are a reward for my earthly
toil, God’s precious gift to me. All of my wealth
pales in comparison to the goodness with which
you enrich my life.

I fondly remember you said you were going to be
around for the long haul during my days of
obscurity. Those days seemed long but you
taught me to focus on the rewards and not my
circumstances.

So much faith you had, to thrust your ALL
against the tempest storms of my then unseen
realities. Indeed, you confirm to me that
believing is seeing. You helped me see that I can
walk on my waters and still my storms. Such
strong convictions you have about me that I
sometimes think you are crazy.

Again, I want to say thank you like I have always
done for that dashing young man and beautiful
young lady. I won’t forget to mention she is the
prettiest thing in the world. Every bit of her
strong spirit, kindness and beauty she got from
you.

Thank you for being such a model for her. Thank
you for being a mum he can look up to. I was
glad to hear my prince chat with his friend just
recently, how much he wants to be like daddy.
I’m sure he will figure out his path clearly when
he is much older. If he values my character, then
I’m fulfilled.

Darling, I sincerely think marriage is tough. But
the binding cord of our creator’s love in our
heart has proven stronger even when ours
sometimes becomes dry and slack. I’m assured
that he who began the good work in us will
surely bring it to completion.

Above all, I want to thank you for partnering with
God and for being instrumental in the making of
a world renowned speaker, author, business
consultant, peak performance coach and a
leader’s leader. All who I have been a blessing to
all over the world should thank GOD first and
then YOU.

Happy Valentine’s Day My Queen.

Lesson
You too can write a letter to your future. It’s
nice to let your imagination develop wings once
in a while. “Imagination is the preview of life’s
coming attractions”, said Albert Einstein. Create
your dream life, career or relationship (whether
you are in a relationship or not) in your mind and
document it.
Write as if everything were perfect, regardless of
your current circumstances. You can’t change
your current circumstances until you can imagine
something better. Writing is the first step in the
creation of dreams.
We can have, be or do whatever we permit our
minds to imagine. Please don’t settle for less
than you deserve. Don’t feel guilty for thinking
“I’m more than this” or “I deserve better than
this”.

Finally, be courageous and share your dreams
with the world, your friends or spouse.
Again, Happy Valentine’s day.

Abimbola Popoola
World Renowned Coder.
The Kahuna of the billion dollar dynasty,
CodingPope.com
Follow me on twitter: @_dapope.
Connect with me on facebook: http://www.facebook.com/pbimbs
BBM : 7ADB54E2