Computer Science Jobs in Brentwood/Franklin Tennessee Summer 2017

Since I began studying computer science in 2014, I decided that I would keep myself informed for computer science related jobs. I live in Brentwood, Tennessee, so I figured that there would be some jobs that I may compare and contrast. Some three years or so later, the only jobs available to me are data entry and customer service jobs. At this stage in my academic career, my skills used for data entry and customer service would be contrapositive to my academic program outcomes. For clarity, my academic program involved conceptualization of purpose, and design, development, and implementation of application software, system software, and information systems solutions. Even the tutoring jobs in the area, an often suggested job opportunity for students with explicitly capable academic ability, are disparate. Attributed to King Solomon of Israel, the Book of Ecclesiastes (KJV) says, “The thing that hath been, it is that which shall be; and that which is done is that which shall be done: and there is no new thing under the sun” (1:9). Looking to a precept, a Psalm is, “And now Lord, what wait I for? my hope is in thee” (39:7). Therefore, approaching work in Brentwood, TN should be viewed with a historical context.

As I studied the job market for the past three years, my future plans for employment should involve trusting that statistical data related to jobs in the Brentwood area did not quantify areas of innovation that small and medium sized businesses would provide scientific and technology development. In this case, working towards starting my own business is a scenario in that I should invest because not doing so shall be a career limiter for realization of the maximization of my potential. The view that seeking an entrepreneurial path normatively consists of seeking a correct path for achieving career goals could be contrasted with job security. In particular, greater opportunity for career success reflects the threat of not getting a standard, or any, pay considerably encourages striving for multiple sources of income.

The Completion of the Spring 2017 Semester and the Beginning of the Summer 2017 Term

In the Regent University Spring 2017 term, I completed five undergraduate courses. Their course titles are Computer Architecture, Introduction to Information Systems, and Network & Telecommunication Concepts; and Data Structures & Algorithms; and Software Engineering. The mentioned courses involved learning my computer science major requirements, and them all quantifying as three-credit courses involved them scheduled as accelerated courses. In the Regent University College of Arts & Sciences, accelerated courses are equivalent in course load to fifteen-week courses for three-credits that are regionally accredited, but their duration is eight weeks. Thus, enrollment counselors and academic advisers typically suggest that I complete two three-credit courses per eight-week session. However, in my case, three completed in the second session of the Spring 2017 term because I seek completion of my undergraduate program by August. A couple Saturdays ago, I attended Commencement. Therefore, four courses remain in my academic program with anticipation for completing this program by the completion of the Regent Summer 2017 term.

Shaking hands with Dr. Morsen-Riano
Me shaking hands with Dr. Moreno-Riano, an honor.

For the Summer 2017, my courses mostly involve major requirements, though a recent introduction to the Regent University course catalog, Discrete Mathematics, is a general education requirement. My remaining courses are Mobile & Smart Computing, Linear Algebra, and Network Security. These mentioned courses will build on mathematical, computer science, and information systems skills. In addition, the Biblical integration required for every course challenges me as a student that I may consider the effects of applying my research to contemporary issues. Contexts of belief might be considered immaterial for results, but this is the distinction between theoreticians and Regent academic requirements based on the Biblical Scriptures. As the follower of Christ, James (KJV), said, “But be ye doers of the word, and not hearers only, deceiving your own selves” (1:22). Therefore, I should focus my computer science skills for a career based on ethics. There might be various spheres of knowledge in the world, but without seeing their applications, this knowledge are branches of logic without fruit or stagnant waters. In seeking software engineering as my career, I intend on learning cyber security at the graduate level so that I may understand mathematically scientific applications in contexts of ethical defensibility. As this is the case, I applied for admissions to the Regent University Masters of Science in Cybersecurity program, and Regent University approved my application for the Fall 2017 term.

Reflections on Recursion

In the Spring 2017 term, approximately one week remains until completion. Throughout studies, this semester, I learned computer architecture, management information systems, and data structures & algorithms; and software engineering; and networks & telecommunications concepts. These courses being mandatory for my academic program are among the final courses for my Bachelor of Science in Computer Science degree. After this semester, one term remains until August graduation. In that term, my final courses in my undergraduate program shall be mobile & smart computing, discrete mathematics, network security, and linear algebra. All of the aforementioned statements may be considered as recursive (Goodrich, Tamassia, and Goldwasser, p. 190).

In some cases, undergraduate programs are limited by total years since the program started while other in periods of semesters attended, and alternatives are limited by total credits allowed for the program. In any of these cases, requirements for completion encourage initiative from students as well as faculty. The Apostle Paul shared insights about the incentives of studying by approaching various topics with a single framework. The Apostle Paul (KJV) said, “All scripture is given by inspiration of God, and is profitable for doctrine, for correction, for instruction in righteousness: That the man of God may be perfect, thoroughly furnished unto all good works” (2 Tim 3:16-17).  If selected courses start soon to a semester start or session, or books are purchased similarly, then the threat of missing deadlines increases from the early engagement opportunity inverting. The growing threats might be, as I noticed, due to variations in recognition of relevant collaborative for collective goals. This might be a sort of circular logic in that there is an absence of perceived importance for deadlines because there is more time remaining, there is more time remaining because of extensions permitted, and the extensions permitted result in less relevance for deadlines. In contrast, James Rachels’ (2012) explained that cultural relativists would invite acceptance of the following: “The Greeks believed it was wrong to eat the dead, whereas the Callatians believed it was right to eat the dead. Therefore, eating the dead is neither objectively right nor objectively wrong. It is merely a matter of opinion, which varies from culture to culture” (p. 749).

Considering the cultural relativist argument, the invitation from the ‘Greeks and Callatians’ syllogism is implicit casting about the dead and the living, claiming that there is life after death in the physical world. A possible interpretation of the cultural, generations of men, women, and children may learn about the merits and faults of arguments with the comfort that there is the proverbial more that is expected. The sort of invitation to an impasse by implicit casting is essentially saying that societies may be recognized for eventually and irreducibly immutable components. Kenta Oono and Yuichi Yoshida (2016) describing a property being proportional to an irreducible character is one kind of generalization of linearity testing. Therefore, looking at study schedules in terms of irreducible start times and finish times for an academic course or program as white box testing might trend towards an unfinished academic program. Examples of this may be recognized as an additional day for every assignment missed passed a deadline, another semester for every course not passed, or an academic program not completed.  However, actively engaging in coursework day-by-day strengthens awareness of information. In agreement with Aristolean virtue, consistent study and action builds character over time thus understanding emerges. Even in the case of an unfinished program, considering it in terms of time that is complete and reviewing fewer and fewer times until prepared for another program attempt could ready the student for a more purposeful or explicit attempt at the program. Therefore, sometimes, focusing on the details of a program can be more effective than a topical overview for evaluating measures for success.


Cahn, S. M., & Markie, P. J. (2012). Ethics: History, theory, and contemporary issues (5th ed.). New York, NY: Oxford university press.

Goodrich, Michael T.; Tamassia, Roberto; Goldwasser, Michael H.. Data Structures and Algorithms in Java, 6th Edition (Page 190). Wiley. Kindle Edition.

Oono, K., & Yoshida, Y. (2016). Testing properties of functions on finite groups. Random Structures & Algorithms, 49(3), 579-598. doi:10.1002/rsa.20639


On Easter

While this might not be the exact day of the week originally believed as Christ’s resurrection, I think that reflecting on the reason for this event might encourage working for the right reasons. Forgoing the discussion of the heathen origins of the Easter bunny and the fertility cults associated with it, this comment is about the Biblical story of the resurrection of Jesus Christ. Technology might maximize happiness considered as pleasure in the short term as one usual result of civilization advancing technologically is replacing previous media. However, if structured by economic self-interest alone, user experiences will probably be perceived primarily as discordant rather than recognized as guided by a planned narrative. If recognized as rather lead in some way such as by a particular philosophy such as the Hegelian concept of a world spirit (8-Bit Philosophy), or Biblical theology, then work might be perceived beyond the importance of the self. In the case of Biblical theology, I think that Christ died for his friends so that his responsibility of fulfilling the law was accomplished because being the God-man, the everlasting Father gets the glory thus Christ gets the glory. However, being a man, Christ participated in lowly service so that man, both male and female, could recognize the significance of life beyond the self. Therefore, in Christ’s humility, giving God glory conquered sin thus man may live. This is the start of another week, and six of eight in my Spring term. In the case of my academic program, I should advance my projects in courses by considering the ethical significance of networks and telecommunications systems, software engineering solutions, and data structures & algorithms for more than what affects a single type of user.


8-Bit Philosophy. (2014, July 20). Will History END? – 8-Bit Philosophy [Video file]. Retrieved from

Faith, Honor, and Tradition

Samuel, a Hebrew Israelite, expressed a lesson in ancient times about faith. The first book of Samuel (KJV) says, “And Samuel said, Hath the LORD as great delight in burnt offerings and sacrifices, as in obeying the voice of the LORD? Behold, to obey is better than sacrifice, and to hearken than the fat of rams” (15:22). A possible interpretation of this is that a chosen people acknowledging the right purpose requires accepting that ritual is not the purpose, but rather the practice. This can be applied to those granted privileges from being selected for membership to a group based on academic merit, leadership potential, community service, and likelihood for future career success. With such criteria each being a basis for inclusion to a group, an honor society might be deduced. In contemporary times, when man works towards a goal, sometimes recognition is sought for career or personal advancements. In my experience, focusing on the stylishness and how fashionable an activity essentially has risks that provide opportunity for aesthetic beauty and refinement of a personal pathos. Further, a styled pathos with ethics and logic can show the merits of an activity. However, there are also threats from respecting the customized style of man or the traditions of man more than building traditions based on faith that is beyond the finite. Therefore, I think that honor is earned, but faith is gained through study. When considering the variety of faiths that people in the United States have as a pluralistic civilization, sometimes honoring how something feels like a good thing can help in building networks. Even so, building networks for future stability might require doing something even if there are perceptions that contradict those goals. The common saying “go with your gut” is similar in context and applications; relying on the physical world for actions comes with risks. The same may be said with having faith in the supernatural. That said, the supernatural proposing more than what man may consider, alone, is a structure for getting things done beyond an isolated part of history. Therefore, honor rather built in a teleological sense might extend the benefits of an ethic to morally significant events.

For example, consider doing business with a hotel manager, who for the purpose of this discussion, will be renamed Alice R. The reader may seek a hotel room for a future event, but there is an error in the process of booking it. When seeking a resolution to this, the reader could call and express a disregard for the feelings of Alice and the reputation of the hotel that she represents. However, there might be a notion of honor in the context of horizontal honor while the reader may work for another company or study with an alternative faith. However, in this situation, the request from the reader is treated with disrespect by Alice for possible reasons such as not studying the importance of respecting others, or perhaps forgetting about it. Therefore, Alice does a disservice to herself by caring more about vain works than building a relationship with a paying client that might extend to future business opportunities. As a result, the reader would be disrespected in the short term, but there are substitutes for businesses with activities that aggregate to trending company policies in Alice’s industry. Therefore, a substitute for tradition is right thinking. In exposition, business trends building up those who conserve what is respectable is probably more sustainable than how organizational leadership would progress. By focusing on political motivations at the cost of customer loyalty, company advancements are probably reduced.

Considering Business and Organizational Applications

As the latter half of the second week in the final Spring 2017 session transpires, studying the fundamentals of computer science and information systems enables future research opportunities. In my Networks & Telecommunication Concepts course, study topics expressed with descriptive brevity offers a challenge for interpretations because observations are expressed mathematically and empirically; essentially, a personal view can be accurate if and only if the observations are accurate. When learning a subject previously not understood from study, there is a requirement that trusting education material is acceptable. An introductory ethics course will probably offer information describing the aspects of the triple-sided argument: ethos, logos, and pathos. In the experience of this writer, mathematically scientific concepts require logic, yes, but in a world where every action is a choice, right bias thus a beneficial ethic is necessary. Further, emotional content being a part of life is a risk, but vision for improving from previous choices demands that the threat of emotional dysfunctionality be addressed for realizing opportunity.

With a particular relation to contemporary notions of emotional desensitization because of the exponential rate of information development is the threat of refracting on lessons learned rather than reflecting, so to speak; data received, but not processed with intentional vision threatens integrity in a way sort of similar to the Aristolean notion of recklessness as an extreme against the metric of virtue.  The Apostle Paul (KJV) said to the Colossians, “Beware lest any man spoil you through philosophy and vain deceit, after the tradition of men, after the rudiments of the world, and not after Christ” (2:8). In exposition to organizational risk assessment, a normative design of a system built for social integrity would involve a derivation model of data conceptually applicable to integration onto economically beneficial unstructured decisions; that normalizing discernment for an organization is encouraged. Thus, Software Engineering as well as Data Structures & Algorithms being the two additional courses for the session that this writer is enrolled in might enable accurate understanding for business and organizational solutions.

Reflections on the First Spring 2017 Session

Within the previous eight weeks, two courses were completed: Computer Architecture and Introduction to Information Systems. Since my first session involved two courses, CSCI 210 and ISYS 204 that were three credit courses within the Regent University course offerings, the format was accelerated; as the previous and future courses fitting the description mentioned are identified as such, they require more percentages of weekly study time periods in shorter total course durations. ISYS 204 being an introductory course consisted of learning business and analytical knowledge about information systems, and Biblical ethics remain significant since this was a Regent University course, a Christian university. As sister to Oxford University, Regent University emphasizes the integration of the faith described and urged by the Bible with reason related to contemporary issues; ISYS 204 involving this demand on students was consistent with previous courses in my academic program.

In ISYS 204, there was an emphasis on the economics related to businesses using information systems as well; since contemporary economic theory in secular settings approves of utilitarianism, accepting this emphasis within course textbook titled Essentials of Management Information Systems by Laudon and Laudon (2017) as a challenge for the liberal arts encouraged confidence. The writing attributed by critical scholars to the Apostle Luke, the Book of Acts in the King James Bible expresses the basis that the Apostle Paul had for confidence. The Book of Acts (KJV) says about Paul, “And Paul dwelt two whole years in his own hired house, and received all that came in unto him. Preaching the kingdom of God, and teaching those things which concern the Lord Jesus Christ, with all confidence, no man forbidding him” (28:30-31). An interpretation of this passage is the recognition that any coming unto followers of Christ and not bringing the truth should be denied entry into our place of rest and encouragement for the rate of action that faith in the God of Israel provides (2 John 10:10). In exposition, the Laudon and Laudon (2017) text discusses the Golden Rule of the Biblical Scriptures; that a candidate ethical principle for business practices involves doing unto others as you would have them do unto you (p.127). Theologically speaking, although Laudon and Laudon are not literally in my home when studying the course text, the thoughts written to the text can be challenged; the form of written communication on the Internet Web provides a domain for capturing thoughts so that they are for Christ (2 Cor 10:5) rather than every wind of doctrine (Eph 4:14).

In my view as a Regent University student, the applications of the Biblical Scriptures mentioned was a learning outcome of CSCI 210 and ISYS 204, though not explicitly mentioned as such in them. My basis for the applications of the Bible for CSCI 210 and ISYS 204 is my experience with CSCI 220, Ethics for Computer Science: supporting the divine command theory was encouraged by my course instructor while rejected by the writers of the course texts called Ethics in a Computing Culture, Bo Brinkman and Alton F. Sanders (2013, p. 10). In contrast, the relevant Stallings (2016) text for CSCI 210, Computer Organization and Architecture: Designing for Performance, did not suggest or recommend any ethical arguments for computer architecture, so the Biblical integration related to that text was more relatable to transcendentals in mathematics than approval of utilitarianism by contemporary economists; conflicting interpretations of ethics were researched outside the CSCI 210 by Stallings for reasonable exposition. Having said that, there were much descriptions about computer architecture and low-level programming helped with programming skills; instructions on binary, hexadecimal, and assembly language programming emphasized allowed for studying applications related to computer architecture. Describable as essentially a game, one in particular, Core Wars, involved programs that combat a separate program for processing capability was useful for study; this was not played, so to speak, as the concept of play is about action without reason.

With two courses in the Spring 2017 term concluded, there are seven courses that remain in my academic program. Looking forward to my future challenges, my view remains that Regent University has much that may be offered to students, and online courses require commitment to significant periods of self-study that might build confidence in a power beyond the intelligence of mankind. Hopefully, my future academic studies will involve more Biblical integration for scientific and scientifically analytical theories and applications for continued research opportunities and the blessings of family and friendships.


Brinkman, B., & Sanders, A. F. (2013). Ethics in a Computing Culture. Boston, MA: Cengage Learning.

Laudon, K. C., & Laudon, J. P. (2017). Essentials of Management Information Systems (12th ed.). Pearson Education.

Stallings, W., Zeno, P., & Jesshope, C. (2016). Computer Organization and Architecture: Designing for Performance (10th ed.). Hoboken, NJ.