work samples
FULLERTON
offsite writings index
https://sites.google.com/view/thelittleenginethatprayed/home The Little Engine That Prayed interactive in progress children's story.
https://sites.google.com/view/we-miss-you-ezra/home We Miss You Ezra
https://sites.google.com/view/life-as-a-dog/home Life As A Dog
Work Instructions "Making Blueberry Pancakes" in Aerospace Manufacturing environment with warnings
Grant Visual to portray combining working parts from different cars to renew one shared car for many people...
Middle School Math Solving One Step Equations Presentation Style Lesson Plan
Business Case Tabletop Friosk
Titled as This: If You Only Knew Me (or 8 steps to save a life)
Go Paperless or Go Drone!
Potable for All Before the Emergency
Telecommunications - Beyond the Wires
Quality Management System Dashboard
Equipment Performance
CDC Chronic Disease Indicators Final Project - Statistics using SAS
Switch and Filter Installation Procedure
State of the Quality System
Grant Writing and Internet Research Work History
Following is a hypothetical Technical Writing Proposal to provide DATA PRIVACY and SECURITY...
Authentication system : Use Single Sign On which allows users to utilize pre-existing Social Network usernames and passwords. This can be used on the external company site and links can be established for the internal site to use as well. Additionally, Two-layer security will be installed such that users are required to furnish their phone number or other secondary security measure as well.
External website security: this is already addressed with username and password (encryption and authentication). Also, a keyring with moving temporary pin numbers, that self-destruct after a pre-determined time frame elapses will be used.
Internal website security: Two-layer authentication and key-ring security will be used.
Remote access solution: This is the same security protocol listed above: two-layer authentication, as well as set-time, self-destructing key ring pin.
Firewall and basic rules recommendations: firewall has blacklisted sites, a formal change request system in place, a process to test modification requests (branching), full validation of any and all new firewall settings.
Wireless security: all initial passwords must be reset upon initiation, 8-20 mixed character type (upper, lower case, special character all required), no common dictionary words, must be changed uniquely every 30 days, security is to use most advanced encryption available (at least WPA2), and not use WPS, Admin access on wireless is disabled, establish a special separate network for guests with limited access parameters. VLAN configuration recommendations, Avoid the value of 1 when configuring a VLAN ID value. TCP/IP A,B, and C are assigned VLAN 2,3, and 4.
Laptop security configuration: password required upon all login, no password single-click storage option, password protected screensaver and use screen lock, all data and drives double-encrypted, standard on-network backup and cloud redundant backups.
Application policy recommendations: all applications are packaged in a container, repeating and redundant automated application checking processes, use third party plug-ins and integrations for extra security.
Security and privacy policy recommendations: all data double-encrypted, two-layer security including password, key-ring, and self-destructing time sensitive pins, never SSN used, identity and access management tools utilized, fine-grained point access controls utilized with multiple single and double blind administrator controls, data recovery and disaster recovery pre-plans drawn up and in place.
Intrusion detection or prevention for systems containing customer data:: Use Open Source Security, host intrusion detection system, maintain a working dictionary of virus and malware, maintain full, incremental, and differential data backups.
Technical Writing Data Security
LIFE AS A DOG... And he looked at me and took care of it, as it was something he expected. The dog got off the leash, he moved unsafe to make safe. "I got this." "I expect this." The dog does not even know reparations, it merely understands, He has got this.
PRESSING ISSUES FACING CRIMINAL JUSTICE SYSTEM in the STATE of GEORGIA