Im Fye

In: Other Topics

Submitted By TaijahTaijah
Words 843
Pages 4
I was walking to my car when I noticed my pants were on fire. I turned to my friend and said, "I think were going to need an oven and fast."
He grabbed me with his soggy fingers and said.. "Snap out of it, Man."
Then he proceeded to chant and walk in circles around me.
I looked down, My pants were still on fire, but by this time it had spread to my Uterus and three other ligaments. I was getting pretty agitated that no one seemed to care about my third degree burns, or my soon imminent death, but I went along with his plan still hoping he'd manage to save me through his voo-doo witchcraft.
After I came out of my trance from the fire I noticed that I was now in the kitchen of my grandma's house baking a cake..
I Screamed "WHAT THE F***?"
My Grandma ran in and slapped the s*** outta me for cursing.
Then she proceeded to say, "I swear if you talk like that 5 more times, I'll beat the living s*** outta you."
I was quite confused as to what was going on and what I did to deserve this true life mad lib. I just stood there in silence with a look of uttermost confusion.. and I starred at the women who had once been a kind sweet old lady, who wouldn't even kill a baby piglet, now turned into this vicious beast of a monster with veins protruding from her neck like a porcupines quills on a midsummer day.
She gasped, and then with the blink of an eye turned back into the sweet old lady I had once known.
"Would you like some cookies, dear?"
"Ummm Yes, grandma."
As she went to retrieve the cookies, I was planning my escape.. Looking around pondering what unimaginable thing would happen next if I stayed. As my grandma neared the corner with her plate of cookies, I ran to the door as fast as my burning legs would take me.
As I made my silent escape I heard grandma yell, "You forgot your cookies dear"
Little did she know I didn't give a s*** about those…...

Similar Documents

Handwerksgestaltung Im Mittleren Osten

...Geschichte Antike Im Griechenland der klassischen Zeit war die Handwerkskunst (téchnai banausikaí, daher auch unser heutiges Wort „Banause“) insbesondere in den größeren Poleis nicht besonders hoch angesehen. So schrieb Xenophon in seinem Werk Oikonomikós (4, 2-3): „Denn gerade die so genannten handwerklichen Berufe sind verrufen und werden aus gutem Grund in den Städten besonders verachtet. Sie schädigen nämlich die Körper der Arbeiter und Aufseher, indem sie diese zwingen, zu sitzen und unter einem Dach zu arbeiten; manche nötigen sie sogar dazu, den ganzen Tag vor dem Feuer zuzubringen. Sind die Körper aber erst verweichlicht (wörtlich: verweiblicht, d.h. mit der hellen Hautfarbe der im Haus Tätigen), werden auch die Seelen anfälliger für Krankheiten. Auch gewähren die so genannten handwerklichen Berufe die geringste freie Zeit, sich noch um Freunde oder die Stadt zu kümmern, so dass solche Leute unbrauchbar zu sein scheinen für geselligen Umgang und zur Verteidigung des Vaterlandes. Folglich ist es in einigen Städten, besonders aber in denen, die als kriegstüchtig gelten, auch keinem Bürger erlaubt, in handwerklichen Berufen zu arbeiten.“ Seine Hauptargumente gegen das Handwerk sind die Tätigkeiten im Inneren einer Werkstatt, was er mit Tätigkeiten einer Frau innerhalb des Hauses gleichsetzt. Das Ausüben eines Handwerks disqualifiziert also den Handwerker für den Kriegsdienst; er kann also seine Polis nicht verteidigen. Außerdem bleibe nach Xenophon bei einem Handwerk......

Words: 2868 - Pages: 12

Im-It Analysis

...RUNNING HEAD: IM/IT Analysis IM/IT Analysis Barbara C. Hagerman Dr. Chad Moretz Health Information Systems July 29, 2012 1. Discuss the five (5) major components of information management/information technology (IM/IT) governance with a focus on how they will collectively improve the quality of health care. IM/IT governance helps the organization make business decisions more accurately and in a timelier manner (Glandon, Smaltz, Slovensky, 2008). In order to complete this, five general guidelines were created. They are as follows: Develop a consistent IT strategy, Align IT Planning with Organizational Planning, Develop IT Infrastructure, Architecture and Policies, Set IT Project Priorities and Oversee Investments and Be able to assess IT’s contribution. In order to develop a consistent IT strategy, the plan created must apply across all operating units within the organization. Next, the plan must align with IT planning and organizational planning. Alignment would involve three essential elements for success. First, an alignment of purpose must be in place. IM/IT leadership and organizational leadership must agree that they are trying to achieve the same ends. Second, they must agree to work to develop goals and tactics jointly to meet those ends. Third, these two groups must share the responsibility and accountability to achieve the ends (Stacey, Skinner, 2005). Because plans may change over a period of time,......

Words: 1429 - Pages: 6

Im/It Analysis

...IM/IT Analysis Patricia D. Barringer Strayer University Health Services Administration HSA 599 Dr. Kadrie Mountasser April 29, 2012 IM/IT Analysis The issue of public health and its subsequent impact on society as a whole is becoming a very contentious issues for government. In the midst of an election year, public health issues such as Medicare, social security, and disease prevention are all becoming more prevalent. In the state of New Jersey, public health is no different in this regard. According to U.S. Public Health Service, over the last century, the average life span of an America grew by 30 years. 25 of those years are attributed to an increase in public health services. As such, decisions make by governments on the federal, state, and local level will have a profound impact on the community. First, as is the case with many communities, state governments rely heavily on tax revenue as their primary source of income. In the midst of a global recession, those entities that rely heavily on income tax revenue ultimately suffer as those who provide the tax revenue are unemployed. Further compounding this issue is that fact that many individuals who were formally employed full time are now employed part time. As such, their taxable income is significantly diminished. With this diminished revenue, budgets must ultimately be cut to correspond to the reduced inflow of revenue. Now in regards to expenditures two-thirds of spending is for personal......

Words: 1865 - Pages: 8

Ims Paper

...Dear Mayor Adam & Town Manager Smith, You, Sirs, Need IMS. You look out of your window at Town Hall to see the city in ruins, lone policemen cut off from the rest of their units, firefighters in burning rubble with no idea where they are, and worse, nobody knows they are lost in the fray. Riots have begun explode out of control, and when response to unrest by authorities is slow and uncoordinated, things turn ugly. Chain-of-command has completely broken down, US Army generals are being knocked off their feet by firefighters ordered to prevent them from entering the area, phone and power lines are down across the city hampering communication, and looters are running rampant in a state of anarchy. National Guardsmen unleash a hail of bullets toward a two-family home after a police officer yells ‘cover me!’. Are the levees compromised, or not? You can’t get a straight answer. Your emergency management plans provided one-stop solutions that weren't applicable, scalable, or adaptable to more complex situations, like the ones you are now facing. And eventually, the people are going to blame this lack of preparedness and proper response on you, putting an end to a fine career of public service. But it doesn't have to be this way. In fact, you can save your city and your career by supporting and implementing an Incident Management System – you might even be able to swing some extra federal funding your way in the form of emergency preparedness grants! Although we do......

Words: 2705 - Pages: 11

Jugend Im Dritten Reich

...Jugend im Dritten Reich Zwischen Anpassung und Widerstand Heutzutage sitzen wir vorr dem Fernseher, in unseren heilen Welten, sehen nur durch Nachrichten was auf der Welt passiert. Elend, Unterdrückung, Diktatoren, all das finden wir schrecklich, aber es ist zu weit weg, als dass wir uns wirklich vorstellen können, wie es sich anfühlt, mitten im Geschehen zu stehen. Vor etwa 75 Jahren ist in Deutschland etwas geschehen, dass unsere Geschichte massiv geprägt hat. Die Zahlen der Opfer sind unermesslich, unvorstellbar. Unvorstellbar ist ebenfalls, wie es dazu kommen konnte. Unvorstellbar ist, was man selber getan hätte. Auf welche Seite hätte man sich selbst geschlagen? Anpassung. Widerstand. Hans und Sophie Scholl – "Die weiße Rose" Unsere Facharbeit trägt den Titel: Jugend im dritten Reich – zwischen Anpassung und Widerstand. Das folgende Unterthema jedoch ist vom Vorausgegangenen zu unterscheiden. Die Bewegung um Hans und Sophie Scholl gibt dem Wort Widerstand eine neue Bedeutung. Während es den anderen Jugendoppositionen, wie den Swing Kids zum Beispiel, hauptsächlich darum ging, "anders" zu sein und den Konventionen der Konservativen zu trotzen, was zweifellos nicht weniger zu honorieren ist, formulierte die "Weiße Rose" konkret den Aufruf zum Widerstand, es gab einen Plan, ein Konzept, eine politische Zielsetzung: ein Deutschland ohne Hitler. Die Weiße Rose – eine Widerstandsgruppe, die zusammen mit der Stauffenbergbewegung wohl am Bekanntesten ist. ...

Words: 1037 - Pages: 5

Musik Im Buddhismus Handout

...Musik im Buddhismus Definition: Musik, die bei buddhistischen Ritualen und Zeremonien gespielt wird, bzw. eine Ausdrucksform der buddhistischer Lehren (über die Rezitation von Sutren (=Gebetstexten)). Diese Musik unterscheidet sich jedoch in den verschiedenen Gebieten des Buddhismus, sodass es regionale Unterschiede z.B. in der Wahl der Instrumente gibt. Gemein ist ihnen jedoch allen, das die Unterhaltung keinerlei Rolle spielt, sondern die Musik ein Mittel auf dem Weg zur Erleuchtung ist. Berühmtes Mantra: Om Mani Padme Hum Geschichte der buddhistischen Musik: Zur Zeit Siddhartha Gautamas (des historischen Buddhas; =5. Jhdt. vor Christus): - Musik im Brahmanismus (=Religion vor dem Buddhismus) wichtige Rolle, ABER: - Musik&Tanz von Buddha als weltlich und leidenschaftlich verbannt - Musikalische Wettbewerbe als Quelle der Befriedigung von Selbstsucht und Eitelkeit angesehen - Rezitationen müssen besonnen und ohne große Intervallsprünge sein Zeit nach Siddhartha Gautama: - Musik erobert schon bald wieder ihren Platz in der Religion - Einsatz von Musikinstrumenten - Musik als Mittel der Verehrung und Andacht - In China wichtiger Bestandteil, großer Einsatz von Musikinstrumenten - In Japan Bildung des Shōmyō → extrem langgezogener Rezitationsgesang ohne Begleitung - In Tibet nach wie vor sehr hohe Bedeutung Merkmale der buddhistischen Musik: Instrumente: - Stimme (Unterton- und Obertongesang, Rezitationen) - Schlaginstrumente (Becken, Zimbeln, Glocken,...

Words: 259 - Pages: 2

Im/It Analysis

...will determine, within the healthcare setting, the main features, capabilities, and operational benefits to a health care organization using the following: patient care applications, management and enterprise systems, e-Health applications, and strategic decision-support application, I will assume the responsibility of a healthcare administrator for the health information systems within my organization and create an argument to be presented to the leaders with the organization that a strategic plan is essential for the IM/IT, assess the importance of a system development life cycle as it pertains to both the development of a custom application, coupled with the selection of proprietary systems, recommend the key element necessary to ensure secure access to health care patient information within a health care management electronic system, and make two recommendations for improving the application of systems theory to health care IM/IT governance and planning. IM/IT ANALYSIS Determine, within the healthcare setting, the main features, capabilities, and operational benefits to a health care organization using the following: patient care applications, management and enterprise systems, e-Health applications, strategic decision-support applications. A patient care application has improved the health care efficiency, quality, safety, and cost. As a nurse, I know that the technology over the years has made nursing a lot easier. Nurses who have come before me have stated that it......

Words: 1407 - Pages: 6

Jazz Im Totalitarismus

...Einführung: Im folgenden werde ich mich mit dem Musikgenre Jazz in der UDSSR befassen. Nach dem Versuch einer kurzen und nicht den Anspruch an Vollständigkeit nachkommenden Begriffsklärung, interessieren mich die Wurzeln des freiheitsliebenden Jazzes in einem Land, das unter der totalitären Umständen regiert wurde. Wie kam diese Musikart in die Sowjetunion? Wie wurde sie zu einem Erfolg? Wie erging es den Künstlern, den Komponisten des neuen genres. Am Beispiel des wohl bekanntesten dieser Generation Alexandre Tfasman und seinem musikalischen Lebenswerk, möchte ich diesen Fragestellungen näher kommen. Natürlich ist seine Person und sein Schaffen nicht unabhängig von seiner Herkunft und den kulturellen und politischen Einflüssen zu sehen. Daher werde ich nach einer Einführungen in die Anfänge der Musikrichtung Jazz, versuchen, die Usprünge des Jazz in der damaligen UDSSR zu beschreiben. Dabei kann eine historische Auseinandersetzung mit der Zeit 1920 bis 1945 nicht fehlen. In weiteren Ausführungen wird Tfasmans bezeichnender Einfluss auf das damalige Musikgeschehen deutlich. Der Jazzbegriff – was ist eigentlich Jazz? Jazz entstand im frühen 20ten Jahrhundert in den United States of America aus der Begegnung der afroamerikanischen Volksmusik (Blues, Worksong, Negro Spiritual) und der europäisch-amerikanischen Marsch-, Tanz- und Populärmusik. „Rhytmik, Phrasierungsweise und Tonbildung sowie Elemente der Blues-Harmonik entstammen der afrikanischen Musik und dem......

Words: 3511 - Pages: 15

Ims Service

...IMSService Innovation Claude Florin Multimedia Marketing Manager HP OpenCall Business Unit © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice IMS service innovation • 3G/IMS opportunities − 3G adoption trends − Users and services • 3G/IMS video services − Experiences in Europe − 3G video service portfolio • Innovation approaches − Business strategy − HP OpenCall IMS services 3 March 14, 2007 Copyright © 2007 HP - Claude Florin - HP OpenCall Business Unit Surfing on waves Communities and multimedia 1980s 4 March 14, 2007 1990s 2000s 2010s Copyright © 2007 HP - Claude Florin - HP OpenCall Business Unit Surfing on waves Data Rates (Mb/s) Mobile broadband technologies t c as d roa / b bs.) A u WB 0M s / WiMAX AN : 20 L 6 WiBRO W 0 (20 DVBH DMB EV-DO Rev A EV-DO Rev 0 GPRS 2003 2004 2005 100 Mobile IP network Video Quality 10 OFDM FLO WCDMA MBMS HSxPA Rel 6 HSUPA WLAN 5 EV-DO Rev B Rel 5 HSDPA 2 0.5 WCDMA 3G ( bile mo 2 6 00 : M 00 1 ) bs. su CIF 15 f/s 800 kb/s QCIF 5 f/s 128 kb/s SQCIF 5 f/s 48 kb/s time 2008 2009 2010 5 March 14, 2007 Copyright © 2007 HP - Claude Florin - HP OpenCall Business Unit 2006 2007 Surfing on waves US consumers interest in mobile video 20 Americas mobile video starting The rise of communities 15 on-line accesses 100 80 60 40 20 0 ...

Words: 1721 - Pages: 7

Im Profolio

...both cases as a personal was trying to organize information in a deliverable manner to others or his/herself. The term “information management” may be quite unfamiliar to general public. People would think that it might be related to computer science and information technology, which are newly brought out in this century. By the Dr. T.D. Wilson (University of Sheffield), information management refers to how information is acquired, organized, controlled and disseminated (Wilson). Indeed, information management has long been existed and “living” with us. Experts have different comments on Information management models. Some said models are typically wrong in nature but somehow useful (Box & Draper 1987). To summarise the features of IM model, it could be the representation of structure or diagnostic tool (HKU). This essay introduces four information management models and how they are involved in daily life. Each model would be illustrated with certain examples to let readers have a better understanding. In this essay, four information management models are discussed, namely Shannon Weaver Communication Model, 5 Rings Information Model, Kuhlthau’s Research Model and Information Transfer Cycle. A. Shannon Weaver Communication Model Shannon Weaver Communication Model is a cycle with several stages and steps published in 1948, titled “A Mathematical Theory of Communication”. It became an important finding in communication studies. The graph below shows the detail of...

Words: 2804 - Pages: 12

Im/It Service Management

...Introduction Only the most progressive organizations are adopting best practices in IM/IT service management, while many IM/IT departments continue to rely on informal, “seat of the pants, “ error-prone processes. This leads to reactive “fire fighting” operating norms within IM/IT departments, when formal, proactive approaches would be more effective. Recent studies suggest that one of the most accurate indicators of IM/IT departmental effectiveness in delivering quality services is the percentage of unplanned work in which the departments is engaged (Glandon, Smaltz, and Slovensky, 2008, p. 170). Why does unplanned IM/IT work increase costs? Glandon et al. (2008) describes unplanned work as any activity in the IM/IT organization that cannot be mapped to an authorized project, procedure, or change request. While unplanned work can never be entirely eliminated from an IM/IT department, the nature of the unplanned work is very different for high- and low- performing IM/IT departments. In a low performing IM/IT department, low-performing unplanned work includes the following: 1) Failed changes: The production environment is used as a test environment, and the customer is the quality assurance team. 2) Unauthorized changes: Engineers do not follow the change management process, making mistakes harder to track and fix. 3) No preventive work: Failing to conduct preventive work makes repeated failures inevitable. Mean time to repair may be improving, but without......

Words: 1910 - Pages: 8

Im Maturity Case Study

...Finance; with the big data boom executives are encouraging the incorporation of unstructured data into planning processes for more accurate forecasts. 4. Industry analysts are bullish about cloud adoption, with IDC Research predicting that public cloud spending will surpass $100 billion during 2014.Concerns about security and privacy has subsided during the last years, and executives are looking got moving certain functions to the cloud to reduce on capital investments and increase the agility. Architecture Principles Principle 1. Information Management is Everybody's Business Statement: All organizations in the enterprise participate in information management decisions needed to accomplish an Information management strategy (IM). Rationale: Information represents a valuable corporate resource, with actual and measurable value. Information is the basis of the decision-making process Therefore, it must be carefully managed to ensure constant awareness of its location, reliability of its contents, and access whenever and wherever necessary. Implications: 1. To operate as a team, every stakeholder will need to accept responsibility for developing the information environment. 2. Commitment of information owners & producers will be required to implement this principle. Principle 2. Information Security Statement: 1. Information is protected based on confidentiality, integrity, and availability (CIA). 2. Security traceability......

Words: 4774 - Pages: 20

Im Handsome

...im handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim handsomeim......

Words: 334 - Pages: 2

Ims Software Company: Ibm

...IMS Software Company: IBM Information management system (IMS) helps in making the strategic decisions by effectively and efficiently managing the information. IBM is the one of the company which provides the IMS software and is one of the oldest company to provide IMS software since 1966. The company is known for its reliable, secure and solid performance of the high volume transaction system. IBM provides the management solutions to run the business processes such as supply chain management, order processing, shipping, inventory control, invoicing and so many others. But now a days it’s not possible that single technology can satisfy all the customer needs, so in order to meet this IBM has invested significant amount of resources to enhance the technology of IMS to increase the performance and to meet the customer requirements. Big data, cloud computing, mobile platforms and relational data base system are some of the new technologies introduce by IBM to support IMS. IBM has a following product line to serve their customers: 1. IMS 14 2. IMS 13 3. IMS Transaction Manager Value Unit Edition 4. IMS Database Value Unit Edition 5. IMS Enterprise Suite IBM provides the highly secured products at the lowest cost with highest level of performance and availability. IBM ensures data security by providing the capability of online updating with complete integrity and recovery conveniences for its credit card processing system can be used as an example.......

Words: 312 - Pages: 2

Ims Restoration

...The procedures of this subclause are general to all requests and responses, except those for the REGISTER method. Where a security association or TLS session exists, the UE shall discard any SIP request that is not protected by the security association or TLS session and is received from the P-CSCF outside of the registration and authentication procedures. The requirements on the UE within the registration and authentication procedures are defined in subclause 5.1.1. If an initial request contains an Accept-Contact header field containing the g.3gpp.icsi-ref media feature tag with an ICSI value, the UE should invoke the IMS application that is the best match for the ICSI value. If an initial request contains an Accept-Contact header field containing the g.3gpp.iari-ref media feature tag with an IARI value the UE should invoke the IMS application that is the best match for the IARI value. The UE can receive multiple ICSI values, IARI values or both in an Accept-Contact header field. In this case it is up to the implementation which of the multiple ICSI values or IARI values the UE takes action on. NOTE 1: The application verifies that the contents of the request (e.g. SDP media capabilities, Content-Type header field) are consistent with the the ICSI value in the g.3gpp.icsi-ref media feature tag and IARI value contained in the g.3gpp.iari-ref media feature tag. If an initial request does not contain an Accept-Contact header field containing a g.3gpp.icsi-ref media......

Words: 910 - Pages: 4