work samples

FULLERTON

offsite writings index

https://sites.google.com/view/thelittleenginethatprayed/home The Little Engine That Prayed interactive in progress children's story.

https://sites.google.com/view/we-miss-you-ezra/home We Miss You Ezra

https://sites.google.com/view/life-as-a-dog/home Life As A Dog

proof_resources_grant100.rtf

Grant Sample

MakingBlueberryPancakesSampleZero_Fullerton_20171218.pdf

Work Instructions "Making Blueberry Pancakes" in Aerospace Manufacturing environment with warnings

Grant Visual to portray combining working parts from different cars to renew one shared car for many people...

MSM ONE STEP EQUATIONS

Middle School Math Solving One Step Equations Presentation Style Lesson Plan

CHIPS - Business Case Tabletop Friosk - 20130725.pdf

Business Case Tabletop Friosk

titled as this + If you really knew me (or 8 Things to find the way)

Titled as This: If You Only Knew Me (or 8 steps to save a life)

barcodes.docx

Go Paperless or Go Drone!

Potable for All Before the Emergency

CHIPS - _Custom_er Health Innovation Product - 20130629.pptx
beyondthewires-110211205324-phpapp02.ppt

Telecommunications - Beyond the Wires

Quality Management System Dashboard

Equipment Performance

danfullerton-sas-finalproject-130319101605-phpapp01.doc

CDC Chronic Disease Indicators Final Project - Statistics using SAS

switchandfilterinstallationprocedureedit-110217110226-phpapp01.doc

Switch and Filter Installation Procedure

dansstaterepairsandproduction-130327082600-phpapp02.doc

State of the Quality System

Dan Grant Genericized 2019

Grant Writing and Internet Research Work History

Following is a hypothetical Technical Writing Proposal to provide DATA PRIVACY and SECURITY...

Authentication system : Use Single Sign On which allows users to utilize pre-existing Social Network usernames and passwords. This can be used on the external company site and links can be established for the internal site to use as well. Additionally, Two-layer security will be installed such that users are required to furnish their phone number or other secondary security measure as well.

External website security: this is already addressed with username and password (encryption and authentication). Also, a keyring with moving temporary pin numbers, that self-destruct after a pre-determined time frame elapses will be used.

Internal website security: Two-layer authentication and key-ring security will be used.

Remote access solution: This is the same security protocol listed above: two-layer authentication, as well as set-time, self-destructing key ring pin.

Firewall and basic rules recommendations: firewall has blacklisted sites, a formal change request system in place, a process to test modification requests (branching), full validation of any and all new firewall settings.

Wireless security: all initial passwords must be reset upon initiation, 8-20 mixed character type (upper, lower case, special character all required), no common dictionary words, must be changed uniquely every 30 days, security is to use most advanced encryption available (at least WPA2), and not use WPS, Admin access on wireless is disabled, establish a special separate network for guests with limited access parameters. VLAN configuration recommendations, Avoid the value of 1 when configuring a VLAN ID value. TCP/IP A,B, and C are assigned VLAN 2,3, and 4.

Laptop security configuration: password required upon all login, no password single-click storage option, password protected screensaver and use screen lock, all data and drives double-encrypted, standard on-network backup and cloud redundant backups.

Application policy recommendations: all applications are packaged in a container, repeating and redundant automated application checking processes, use third party plug-ins and integrations for extra security.

Security and privacy policy recommendations: all data double-encrypted, two-layer security including password, key-ring, and self-destructing time sensitive pins, never SSN used, identity and access management tools utilized, fine-grained point access controls utilized with multiple single and double blind administrator controls, data recovery and disaster recovery pre-plans drawn up and in place.

Intrusion detection or prevention for systems containing customer data:: Use Open Source Security, host intrusion detection system, maintain a working dictionary of virus and malware, maintain full, incremental, and differential data backups.

Technical Writing Data Security


LIFE AS A DOG... And he looked at me and took care of it, as it was something he expected. The dog got off the leash, he moved unsafe to make safe. "I got this." "I expect this." The dog does not even know reparations, it merely understands, He has got this.

Fullerton PRESSING CRIMINAL ISSUES STATE OF GEORGIA.GDOCS

PRESSING ISSUES FACING CRIMINAL JUSTICE SYSTEM in the STATE of GEORGIA