Skip to main content

Season of Giving

I'd like to recount you a story.   It occurred tonight.

We got mail, from my father-in-law.  Inside were 2 gift cards, one for the birth of our son (the Turtle, which happened 15 months ago) and the other one for Christmas for the two kids.   It was for $100 at Walmart, and that meant they each had $50 to spend.

We finished dinner quickly tonight, I'm not sure how, with my two.  Both could be in the title run for world's slowest eater.  We decided to go to Walmart so the Toad (she's 4) could pick out something for herself.

On the way over, she was talking about how we had to take our donations over to Toy Mountain.  My wife mentioned that Toy Mountain was looking for toys for 7-9 year-olds at the moment.

We walked up and down aisles, throughout the entire toy section at Walmart.  The Toad knew she had $50 that she could buy herself something with.  She picked out 3 things and handed the gift card to the cashier with pride.  She bought bubble bath, Silly Bands and Meccano.

Bubble bath for the Turtle.

Silly Bands for herself.

And the Meccano.   It was for Toy Mountain.  Because it had an '8+' on the side.  And Toy Mountain needed toys for 7-9 year-olds.

I knew my daughter was a giving person, but I never really knew how much.  It makes me so proud of her, and it brought a tear to my eye.

Toad, someday, I hope you'll read this and know how much this meant to me.

Love Daddy.


Popular posts from this blog

Policies and Controls are King in the IT Security world

I came across an article by Roger Grimes over at Infoworld on how security policies and controls are the real power when it comes to IT security. Roger mentions the SANS 20 Critical Security Controls for Effective Cyber Defence , which are a great read for anyone looking at updating or auditing your policies for completeness. The SANS top 20 controls are a must for any organization: Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Boundary Defense Maintenance, Monitoring, and Analysis of Security Audit Logs Application Software Security Controlled Use of Administrative Privileges Controlled Access Based on the Need to Know Continuous Vulnerability Assessment and Remediation Account Monitoring and Control Malware Defenses Limitation and Control

Error 217 - Error creating product object on Domino 64 bit

I'd like to share something with you.   An error that you'll get if you are trying to use ODBC with Domino 8.5.1 64bit. It starts out with an agent error of Error 217.  The text of the error is "Error creating product object" You can read about it here on the Notes/Domino forum . You can find the solution here as well . I guess I'm now waiting for Domino 8.5.2 for a solution for this.   It would have been nice to have had this in the release notes.  It would have help me greatly.

Reminder: Increase the maximum available memory on your Lotus Notes client JVM today!

Yup, that's right.  Public Service Announcement time. If you haven't increased the maximum memory available to your Lotus Notes JVM yet, what are you waiting for? By default, the Notes JVM only has 256mb of memory available to it.  On a system with 4GB+ of memory, you should be easily able to increase it to 1/4 to 1/3 of the system memory and improve the end user performance. Here's how: Shut down Lotus Notes. In order to make sure that all processes are stopped, run this command:  Start -> Run Type: C:\Program Files (x86)\IBM\Lotus\Notes\nsd.exe -kill Open: C:\Program Files (x86)\IBM\Lotus\Notes\framework\rcp\deploy\ Open the "" file in a text editor like notepad.  You will possibly require Administrator permissions. At the beginning of the file, you will see text surrounded by a lot of pound signs ####. The first ‘property’ after the last # sign is: vmarg.Xmx=-Xmx256m Change 256m to 1024m so that the line reads: vmarg.X