Cynthia J. Cordell

Cynthia J. Cordell

Tuesday, November 22, 2016



Today I’ll say a little prayer for you.  This was a mantra that Crissy had in mind to all that bought a pretzel from her pretzel stand.  You look marvelous.  That one was a mantra that Jill, the department store cosmetologist quietly said to each customer who looked at eye shadow at her counter.  Eventually, more or less, people who had daily mantras checked into to contribute and also to walk away with one or two other mantras.  It was treated like those give a penny, take a penny trays at some of the store registers.
     At, people typed in their first and last names and then there would be a staging thing going on where the computer analyzed just what the user had just typed in.  For example, it would determine that what was typed in second, was a surname.  This would be tagged as a last name because it was typed in the last name field.  After that, it would be tagged by whatever the first letter of that last name was.  For example, if the full name was Cheryl Rudolph, the last name information would add the tag of the letter R as part of where to electronically file the last name Rudolph_20087.
     Afterwards, the website might ask the user to type in a short paragraph about themselves and there might be provisions to upload a picture of themselves.  On the computer side the inputted paragraph might be tagged cherylRudolphParagraph_20087 and the picture would be similarly tagged cherylRudolphPhoto_20087.  All of the Cheryl Rudolph information would be analyzed and there might even be metadata included with each hashtag (#) tag.  A metadata for the last name memory field might read something like this:  The last name field will be tagged with a unique user ID number.  This user ID number will be used for each tag that matches that particular user’s last name.
     Each individual tagged information at that point when they are inputted, will be filed away into either a memory space or a spreadsheet or a more sophisticated database.  It would be up to the software engineer (in my sister’s day, they were called computer programmers) to organize and explain the method of their elaborate filing system.
     Furthermore, each hashtag ID could be expanded to let’s say, five more hashtag placeholders for five more statistical facts about each last name of each user.  The user, after typing in all the required information would become the newest user of (a fictitious website).  All of that information gathering is not necessarily for websites only.
     Let’s say that there is a magazine whose main thrust is to interview different authors and writers.  The interviewer, after jotting down the writer’s first and last name might start out taking notes.  The highlights of the interview, she might jot down as individual hashtag words (like #childhood) and expand on them later on.  The interviewer might upload a picture of the author into her computer and it would be tagged as hashtag author_pic (#author_pic).
     The journalists of that magazine that I just attempted to describe, might not use computer inputs right away, but each of them will probably will have worked with a software engineer at some point to organize all of the information they will amass.  The key is that with each tag, some form of metadata that talks about what is being filed away.  This staging technique that some software engineers use to first analyze each incoming information bit about each user on the other end (behind the computer scenes), will save time and money in the long run for each company.

     In time, eventually, even computer programmers (now called software engineers) move onto other projects, but as long as they know the basics of how to file user information electronically, they can make their way out into the financial world. 
      After all that programming, let’s pretend that there is coffee house where everything is a two-sided deal.  There is the special and the regular.  For example, there is the regular blended coffee drink and then there is the special version which is mixed in with chocolate bits plus a few special ingredients.  They also sell regular cinnamon rolls and special cinnamon rolls with chocolate syrup drizzled in the frosting along with the few select list of special ingredients.
     That is an example of where a backup computer program, that will be working in the background can help tally up all that was sold along with saved, electronic versions of all the receipts.  Each time a customer orders something, the cash register, that is connected to a computer, might file what was bought in a staging area, where it is then tagged as regular or special.  If the order is tagged as regular, then the filing system in computer memory, spreadsheet memory and database memory would reflect that it was a regular and not a special one.  Therefore, their filing system would be a two-sided computerized tracking system of all of their daily sales. 
     To become so organized business-wise would help so much for job security.  However, there is always a learning curb (here, I’m not sure if it is curb or curve).  In such instances hands-on training at learning institutions (community colleges, vocational schools), online classes and networking with your fellow employees will make a person that much wiser about their job duties.
     Another mantra of Cheryl Rudolph’s might be Reward yourself with chocolate.  This one she could enter into  Upon using chocolate as a reward for completing errands and odd jobs for herself and those around her, she might take pictures of the different varieties of chocolates and post them just for fun!
     She might also browse through the different mantras that other people have shared and make a list (just for fun) of which mantra might match people she knew.  She might jot these match-ups of hers in her journal or notebook.  She might match the mantra Life is Full of Surprises with a lady friend named Sue who was expecting her first child.
     Another mantra she might have found on the site might be We all have to stick together.  This one she might match up with a friend who is part of a football team.  Cheryl also knows people who like to dabble in arts and crafts.  Involving them could mean an early Christmas.  She could match up each family member with a mantra, then ask the creative members of her circle to print the mantras on T-shirts or posters or personalized greeting cards and calendars.
     A mental trip into the current technology that has a finger in every conceivable product-making pie is fun, that is, if you have the time to analyze everything that the software engineer wanted to program into their code.  However, a little bit of reading here and maybe an online class or two there, and each person will begin to feel connected to what others are working on.
     In Silicon Valley, there seems to be a lot of paradigms of how to handle computer data.  The concept of a paradigm of having a unique memory space for staging incoming data makes it so that each input can be analyze and put to good use by tagging them.  That, along with metadata to explain each input completes a paradigm that is invisible to the regular computer user.  However, to the programmer, it’s like an author using a third person omniscient voice, to tell her story.  They have a view of what is taking place with their characters, it’s as if they were on Mount Olympus and they had a God-like view of everything.

Saturday, November 19, 2016

A Dash of this, A Dash of that

A Dash of this, A Dash of that
     In my novel Alecner, there is a sprinkling if unique things that I add to it – you could say a dash of this and a dash of that.  For example, the antagonist’s father was a military man and when his wife asked him to save the people from her planet,  so he turned them into soldiers.  He was a military man after all, and that was his way of giving a group of hopeful people a sense of self.
      Another example is when the female protagonist Eden went home to her planet Alecner and we are treated to the way her mother had decorated her childhood home/dwelling.  The walls of the house were made of clear, crystal stones filled with (a fictitious compound) freesia, keeping it just the right temperature inside.  Although the dwelling was cozy, comfortable and accommodating, there were just enough pieces of ornate objects here and there to impress the visiting Chancellor Riley Sinclaire.
     Another added touch to the novel, is the presence of the Voltairian military compound in the sky.  Unless you knew well ahead of time of its existence,  it would be just another invisible and undetectable compound.  Of course, the male protagonist Riley Sinclaire pretty much decided not to destroy Eden’s planet of Alecner because by getting to know her, he realized the she and the rest of her population were keeping up with the re-emergence or computer technology.
     Personally, I stumbled on a rock in my computer studies when I came across pointers.  The pointer technology is something that I have embraced in learning about.  I also write about it in the website under Cynthia Cordell.  Writing about pointers has clarified my understanding of them.  Hopefully the inclusion of them in my everyday prose, can improve my novel writing.