1
3
PROFESSIONAL SUMMARY
Cybersecurity & Network Management, Military Veteran with over 6 years of proven experience in the United States Army. Possesses a comprehensive background in Team Leadership and Training derived from conducting domestic and international operations. Managed risks upon multiple lines to protect assets, property, and equipment valued over $10M.
Extensive knowledge in classroom instruction and operations. Recipient of multiple awards for outstanding performance and professionalism in the United States Army; career supported by a vast operational experience and formal leadership training.
· Secret Security Clearance
· Advanced Troubleshooting
· Training and mentoring
· Bi-Lingual (English/Spanish)
· Customer Service
· Security minded
· Leadership experience
· Detail oriented
· Exceptional Oral Communication
PROFESSIONAL EXPERIENCE
US ARMY – Fort Benning, GA Dec 2017 – Present
Information Technology Department Manager / Senior Systems Administrator
Managed administration, logistics, maintenance, and personnel management of 4 personnel; oversight of 12 Signal Team Supervisors
Applied innovative methods that increased the range of communications for the Organization; expanded operations
Implemented and maintained 380 military computer systems; enabled the Tactical Advanced Computer to disseminate information and provide Command & Control for over 20 operations
Selected to test the newest communications equipment; (WAN) system AN/PSC-15 The Global Rapid Information Package (GRRIP), The Mobile Broadband Kit (MBK), SIPR/NIPR Access Point (SNAP) terminals, Tracking radios TW-850-01 TSM Ghost, SHOUT nano GPS tracking, Tactical radios AN/PRC-117G Tactical Satellite (TACSAT), AN/PRC-119F (RT-1523), PRC-148C (IMBITR), AN/PRC-150C, AN/PRC-152A, DTCS RO tactical radio, End User Devices (EUD), Android Tactical Assault Kit (ATAK), Nett Warrior (NW), Nett Warrior Mission Planner (NMP), Platform AN/VIC-3, COMSEC Simple Key Loader (SKL), The Joint Enterprise Network Manager (JENM 3.3.x), Taclane (Micro KG-175D), Platform Encryption Device (PED) KGV-72, Joint Battle Command – Platform (JBC-P) and waveforms fielded due to expertise and aptitude
Standardized the organization’s Mission Command Standard Operating Procedures (SOP) and radio configuration in order to support a foreign military’s operations
Maintained accountability of over $1M worth of communications equipment without loss or damage
Performed Information Assurance (IA), provided the security services and attributes of availability, authentication, confidentiality, integrity and non-repudiation; Network Operations (NETOPS) Service Desk Management, which includes incident and problem processing, change request processing, availability management and user interaction. Assisted in the planning, configuration, management, and monitoring of the wide area network (WAN)
Provided system administration (SA) to Tactical Battle Com ...
1. Analyze the case and determine the factors that have made KFC a s.docxaulasnilda
1. Analyze the case and determine the factors that have made KFC a successful global business.
2. Why are cultural factors so important to KFC’s sales success in India and China?
3. Spot the cultural factors in India that go against KFC’s original recipe.
4. Why did Kentucky Fried Chicken change its name to KFC?
5. What PESTEL factors contributed to KFC’s positioning?
6. How does the SWOT analysis of KFC affect the future of KFC?
Points to be considered:
1. Please follow 6th edition of the APA Format.
2. On separate page, the word "Abstract,' centered on paper followed by 75-100 word overview.
3. References needs to be Peer Reviewed Articles.
4. This assignment should be 15-20 pages excluding the title and reference pages. The paper should contain at least one graph, figure, chart, or table.
5. Please use the questions as Headings for the topics in the Paper.
I have attached the case study document below.
.
1. A.Discuss how the concept of health has changed over time. B.Di.docxaulasnilda
1. A.Discuss how the concept of "health" has changed over time. B.Discuss how the concept has evolved to include wellness, illness, and overall well-being. C.How has health promotion changed over time? D.Why is it important that nurses implement health promotion interventions based on evidence-based practice?
2. A.Compare and contrast the three different levels of health promotion (primary, secondary, tertiary). B.Discuss how the levels of prevention help determine educational needs for a patient.
.
More Related Content
Similar to 13PROFESSIONAL SUMMARYCybersecurity & Network .docx
1. Analyze the case and determine the factors that have made KFC a s.docxaulasnilda
1. Analyze the case and determine the factors that have made KFC a successful global business.
2. Why are cultural factors so important to KFC’s sales success in India and China?
3. Spot the cultural factors in India that go against KFC’s original recipe.
4. Why did Kentucky Fried Chicken change its name to KFC?
5. What PESTEL factors contributed to KFC’s positioning?
6. How does the SWOT analysis of KFC affect the future of KFC?
Points to be considered:
1. Please follow 6th edition of the APA Format.
2. On separate page, the word "Abstract,' centered on paper followed by 75-100 word overview.
3. References needs to be Peer Reviewed Articles.
4. This assignment should be 15-20 pages excluding the title and reference pages. The paper should contain at least one graph, figure, chart, or table.
5. Please use the questions as Headings for the topics in the Paper.
I have attached the case study document below.
.
1. A.Discuss how the concept of health has changed over time. B.Di.docxaulasnilda
1. A.Discuss how the concept of "health" has changed over time. B.Discuss how the concept has evolved to include wellness, illness, and overall well-being. C.How has health promotion changed over time? D.Why is it important that nurses implement health promotion interventions based on evidence-based practice?
2. A.Compare and contrast the three different levels of health promotion (primary, secondary, tertiary). B.Discuss how the levels of prevention help determine educational needs for a patient.
.
1. Abstract2. Introduction to Bitcoin and Ethereum3..docxaulasnilda
1.
Abstract
2.
Introduction to Bitcoin and Ethereum
3.
Background
a. How do we understand Ethereum and Smart Contracts?
b. Blockchain Cryptocurrency and Smart Contracts
c. What are Pros and Cons of using Ethereum?
d. Ethereum Virtual Machine
4.
Platforms or Programming for Smart Contracts
5.
Smart Contract Applications
6.
Research Methodology
a. Current Smart Contract Applications
b. Security Issues
c. Privacy Issues
d. Performance Issues
7.
Ethereum System and Solidity Smart Contracts
a. What do we understand about Ethereum and the Likes?
b. How does Ethereum and the likes work?
8.
Ethereum and Hyperledger in Smart Contracts
9.
What can we get by the term Scalability?
10.
Smart Contracting Programming and High-Level Issues
a. Usability
b. Ethical and Legal Issues
11.
Specifications and Implementations
12.
Pros and Cons of using Ethereum Smart Contracts
13.
Current Trends on Ethereum
14.
Future State of Ethereum Smart Contracts or Virtual Machines
15.
Conclusion
Note: Paper about Ethereum
20 pages
ppt 12-14 slides.
No plagiarism,
APA , Citations, and references.
.
1. A. Compare vulnerable populations. B. Describe an example of one .docxaulasnilda
1. A. Compare vulnerable populations. B. Describe an example of one of these groups in the United States or from another country. C.Explain why the population is designated as "vulnerable." Include the number of individuals belonging to this group and the specific challenges or issues involved. D. Discuss why these populations are unable to advocate for themselves, the ethical issues that must be considered when working with these groups, and how nursing advocacy would be beneficial.
2. A. How does the community health nurse recognize bias, stereotypes, and implicit bias within the community? B. How should the nurse address these concepts to ensure health promotion activities are culturally competent? C. Propose strategies that you can employ to reduce cultural dissonance and bias to deliver culturally competent care. D. Include an evidence-based article that addresses the cultural issue. E. Cite and reference the article in APA format.
.
1. A highly capable brick and mortar electronics retailer with a l.docxaulasnilda
1. A highly capable brick and mortar electronics retailer with a loyal regional customer base (such as Fry's) should adopt which of the following medium term strategies?
"50% off" sale every month
Divest
Niche or harvest
Invest in R&D
2. Amazon's strategy involves offering expanded variety but at very competitive prices. This is primarily achieved through
Economies of scope
Focus on international markets
Economies of scale
Innovative products
3. Uber is an example of industry chaining in which of the following ways?
Economies of scale for service providers
Economies of scope for customers
Improving access and reduced search costs for customers and service providers
Lower wages for service providers and lower prices for customers
4. Shareholder returns are primarily derived from
Growth in share value and dividend payments
dividend payments only
Growth in company profits
Growth in the share value only
5. Strategy is defined best as:
A unique value proposition supported by sound financial decisions
A unique value proposition supported by synergies in operations
A unique value proposition supported by aggressive marketing
A unique value proposition supported by a complex supply chain
6. The cost of attracting new customers is the highest with which of the following groups?
Early adopters
Late majority
Laggards
Innovators
7. In the context of the Differentiation (Quality) vs Efficiency trade-off curve, the efficient frontier refers to:
The company that provides maximum quality for a given cost
The company that provides minimum cost
The company that provides maximum quality
The company that maximizes efficiency
8. Nike hiring sports stars to be brand ambassadors is an example of which of the following mechanisms?
Market development
Customer segmentation
Product development
Market penetration
9. Which of the following is an indication of strategic committment of a company in an industry
Lowering wages of the workforce
Increased technology investment
Acquiring real-estate in an urban location of demand
Increased divident payments for two years in a row
10. A pharma company with a deep roster of capable engineers and scientists and that is the market leader is best advised to begin development of a new drug as:
A partnership with smaller competitors
License its innovation from other laboratories
An independent venture
Smaller scale effort
11. The most valuable competency in the declining phase of an industry is:
Resposiveness
Innovation
Efficiency
Quality
12. There is often limited capacity relative to demand in the early growth period of an industry because:
Capacity is very expensive in the later stages of an industry
Only few companies have products or technologies in a budding industry
Prices tend to be low in the embryonic stage
Many companies compete for early advantage in an emerging industry
13. If the willingness to pay of .
1. A. Research the delivery, finance, management, and sustainabili.docxaulasnilda
1. A. Research the delivery, finance, management, and sustainability methods of the U.S. health care system.
B. Evaluate the effectiveness of one or more of these areas on quality patient care and health outcomes.
C.Propose a potential health care reform solution to improve effectiveness in the area you evaluated and predict the expected effect.
D. Describe the effect of health care reform on the U.S. health care system and its respective stakeholders.
E.Support your post with a peer-reviewed journal article.
2. The Affordable Care Act was signed into law by President Barack Obama in March 2010. Many of the provisions of the law directly affect health care providers. Review the following topic materials:
"About the Affordable Care Act"
"Health Care Transformation: The Affordable Care Act and More"
What are the most important elements of the Affordable Care Act in relation to community and public health? What is the role of the nurse in implementing this law?
.
1. All of the following artists except for ONE used nudity as part.docxaulasnilda
1. All of the following artists except for ONE used nudity as part of her/ his work:
a) Ana Mendieta
b) Carolee Schneeman
c) Yoko Ono
d) Judy Chicago
e) Robert Mapplethorpe
2. All of the following except ONE are features of Conceptualism (though not all apply to every Conceptualist work)
a) Audience participation
b) Use of text/language within visual works
c) Direct criticism of the art museum
d) Very expensive artworks
e) Sets of instructions to follow
f) Temporary or fleeting projects
3. Please match the following description with correct art movement or tendency:
1) Minimalism
2) Fluxus
3) Abstract Expressionism
4) Feminist practices
5) Conceptualism
A. Created action paintings that blurred the line between art and life
B. Included works drawing attention to the unethical actions of art museums
C. An idealistic to recalibrate the human senses
D. A loose knit international group of artists that made performances and other unconventional works
E. Argued that the criteria for determining historical value in visual art has been too narrow
4. The following art movement or tendencies except for ONE can be considered to have been responses to Abstract Expressionism (through sometimes for very different reasons)
a) Conceptualism
b) Pop Art
c) Earthwork
d) Surrealism
e) Minimalism
.
1. According to the article, what is myth and how does it functi.docxaulasnilda
1. According to the article, what is myth and how does it function as a naturalizing agent?
2. What is a sign?What is its relation to myth?
3. If advertising “is not an attempted sale of products – evidence shows that consumers are able to resist ‘advertising in the imperative’(12.) – but a ‘clear expression of a culture’ and cultural beliefs” then what does the iPod advert express about current culture?
4. What does the iPod advert presented in the article “sell”?
Attachments have resources
.
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docxaulasnilda
1. 6 Paragraph Overview/Reflection on Reading Assigbnment Due Before Class Commences
The Critical Theorists: Critical Legal Theory, Critical Race Theory, Critical Feminist Theory, & Critical Latinx Theory
Wacks Chapters 13 & 14
Bix Chapter 19
2.6 Paragraph Overview/Reflection on Reading Assigbnment Due Before Class Commences
Why Obey the Law & Why Punish?
Wacks Chapters 11 & 12
Bix Chapters 9 & 16
3.6 Paragraph Overview/Reflection on Reading Assigbnment Due Before Class Commences
Wacks Chapter 10
Bix Chapter 10
.
1. A.Compare independent variables, B.dependent variables, and C.ext.docxaulasnilda
1. A.Compare independent variables, B.dependent variables, and C.extraneous variables. D.Describe two ways that researchers attempt to control extraneous variables. E.Support your answer with peer-reviewed articles.
2. A.Describe the "levels of evidence" B. and provide an example of the type of practice change that could result from each.
.
1. According to the Court, why is death a proportionate penalty for .docxaulasnilda
1. According to the Court, why is death a proportionate penalty for child rape? Do you agree? Explain your reasons.
2. Who should make the decision as to what is the appropriate penalty for crimes? Courts? Legislatures? Juries? Defend your answer.
3. In deciding whether the death penalty for child rape is cruel and unusual, is it relevant that Louisiana is the only state that punishes child rape with death?
4. According to the Court, some crimes are worse than death. Do you agree? Is child rape one of them? Why? Why not?
THE RESPONSE TO THE FOUR QUESTIONS ALL TOGETHER SHOULD LEAD ADD UP TO 400 WORDS IN TOTAL.
.
1- Prisonization What if . . . you were sentenced to prison .docxaulasnilda
1- Prisonization?
What if . . . you were sentenced to prison? Do you believe you would become a more seasoned criminal or would learning criminal ways from those who were caught make you a worse criminal? Explain
2- Gangs of Prison?
What if . . . you were appointed as warden at a medium security prison which had a terrible problem with gang affiliations? What methods would you employ to combat the problem? Explain.
3-The solidarity of inmate culture (Big House era) developed through several characteristics. Name them?
.
1. 250+ word count What is cultural and linguistic competence H.docxaulasnilda
1. 250+ word count
What is cultural and linguistic competence? How does this competency apply to public health? Why is this important to the practice of public health?
2. 250+ word count
Reflect on your own cultural and linguistic competence. How confident are you in your ability to address the needs of diverse communities? How do you think you could improve your level of cultural and linguistic competence?
.
1. 200 words How valuable is a having a LinkedIn profile Provid.docxaulasnilda
1. 200 words How valuable is a having a LinkedIn profile? Provide example to support your statement.
2. 200 words What benefits does it add your academic and professional development? Provide example to support your statement.
3. 200 words How does having this profile contribute to networking as healthcare and public health professionals? Provide example to support your statement.
4. 200 words What other social media and networking platforms are available to network with other healthcare and public health professionals? Provide example to support your statement.
.
1. According to recent surveys, China, India, and the Philippines ar.docxaulasnilda
1. According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
2.) Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why?
.
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docxaulasnilda
1. Addressing inflation using Fiscal and Monetary Policy tools.
Scenario - The US economy is currently experiencing high rates of inflation. You
have Fiscal and Monetary policy tools available to address this problem:
a. To attack the problem of inflation you must select one Monetary Policy
tool and one Fiscal Policy tool. Write down the name of your Fiscal Policy
tool and your Monetary Policy tool.
i. Think the options through and write down your choices.
b. Please explain why you selected the tools that you selected and why you did
not select the other choices? Do this for both monetary and fiscal policy
tools!
i. Specifically, explain what is so good about the tool you selected and what is not so
good about the tools you did not select? Do this for both the Monetary Policy tool
and the Fiscal Policy tool. The key here is to use some decision criteria in making
your choice.
c. Thoroughly and completely explain how your solution (both the monetary
and the fiscal policy tool) would work to solve the problem of inflation, and
indicate the impact your solution would have on at least 5 key economic
variables. Be specific.
i. Present this using the chain of events format with up or down arrows to indicate the
direction of impact on each variable. I need to see the detail.
2. Addressing recession using Fiscal and Monetary Policy tools.
Scenario - The US economy is currently experiencing recession. You have Fiscal
and Monetary policy tools available to address this problem:
a. To attack the problem of recession, you must select at least one Monetary
Policy tool and one Fiscal Policy tool. Write down the name of your Fiscal
Policy tool and your Monetary Policy tool.
i. Think the options through and write down your choices.
b. Please explain why you selected the tools that you selected and why you did
not select the other choices? Do this for both monetary and fiscal policy
tools!
i. Specifically, explain what is so good about the tool you selected and what is not so
good about the tools you did not select? Do this for both the Monetary Policy tool
and the Fiscal Policy tool. The key here is to use some decision criteria in making
your choice.
c. Thoroughly and completely explain how your solution (both monetary and
fiscal policy tools) would work to solve the problem of recession, and
indicate the impact your solution would have on the key economic
variables. Be specific.
i. Present this using the chain of events format with up or down arrows to indicate the
direction of impact on each variable. I need to see the detail.
3. Please list and explain the 4 key supply side growth factors we discussed, and
discuss the viability (do-ability) of each in terms of getting our economy growing
again, given that today our economy is not growing.
a. The slides should provide you with what you need here.
b. The issue of viability – if the economy is growing slowly or not at all, do we have any chance
of achieving suc.
1. A vulnerability refers to a known weakness of an asset (resou.docxaulasnilda
1. A vulnerability refers to a
known
weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.
For example, when a team member resigns and you forget to disable their access to external accounts, change logins, or remove their names from company credit cards, this leaves your business open to both intentional and unintentional threats. However, most vulnerabilities are exploited by automated attackers and not a human typing on the other side of the network.
Testing for vulnerabilities is critical to ensuring the continued security of your systems. Identify the weak points. Discuss at least four questions to ask when determining your security vulnerabilities.
2.
Topic:
Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan. 200-300 words.
.
1. According to the readings, philosophy began in ancient Egypt an.docxaulasnilda
1. According to the readings, philosophy began in ancient Egypt and then spread to Greece.
True/False
2. This question is based on the presentation of logical concepts in the first reading.
Consider the following argument: "All chemists are Lutheran. Rita is Lutheran. So, Rita must be a chemist."
Is the argument …
Deductive & Invalid
Inductive & Valid
Deductive & Strong
Inductive & Weak
3. Would Socrates agree or disagree with the following statement:
Each of us invents his or her own truth and if you feel it in your heart and really want it to be true then don't listen to those who criticize your belief.
He would agree
He would disagree
4. According to the first reading, Thales asked some important "gateway" questions. Which of the following is not one of the gateway questions discussed in the reading:
Does the diverse range of things we experience have a single common explanation or cause?
Does God exist?
Is the universe intelligible?
5. Scientism is the belief that science is one of many paths to truth about the world.
True/False
6. Deductive arguments always aim to show
The conclusion is probably true
The conclusion must be true
7. In the type of argument known as _____, we begin with premises about a phenomenon or state of affairs to be explained; then we reason from those premises to an explanation for that state of affairs.
deduction
inference to the best explanation
syllogism
anaological induction
8. In the online lecture, the multiverse hypothesis is put forward by Stenger in support of theism.
True/False
9. According to the reading, the cosmic coincidences were known in ancient times.
True/False
10. According to the reading, the problem with Darwin's claim that his theory of natural selection explains all the order in nature is that no evolutionary process of natural selection is possible unless a background system of amazing complexity already exists; but since it must exist prior to any evolutionary process, it cannot be explained as the result of an evolutionary process.
True/False
11. Suppose we have two highly improbable hypotheses: H1 and H2. Suppose H2 is slightly less improbable than H1, all else equal.
According to the presentation of best explanation arguments in the reading, H2 presents a more reasonable explanation than H1.
True/False
12. According to the reading, the fine tuning argument shows that we can know with certainty that an intelligent designer exists.
True/False
13. According to the readings, science cannot possibly explain the source of the order in the universe.
True/False
14. The design argument is presented in the readings as an analogical argument and it is also presented as an inference to the best explanation.
True/False
15. According to the online readings, Ockham's Razor favors the multiverse theory over theism,
True/False
16. The proposition that Mount Rainier has snow on its peak would be an example of a proposition known to be true a priori.
True/False
17. Which of the foll.
1-Explain what you understood from the paper with (one paragraph).docxaulasnilda
1-Explain what you understood from the paper with (one paragraph)
2-What is a Lorenze curve and how is it disputed by Paglin
3-What is the method used in the paper and what can you say about the data used and the empirical aspect of the paper.
4-What other common measurements out there for measuring income inequality, poverty, and development gap.
.
1-Explanation of how healthcare policy can impact the advanced p.docxaulasnilda
1-Explanation of how healthcare policy can impact the advanced practice nurse profession
2-Explanation of why advocacy is considered an essential component of the advance practice nurse's role
3- Discuss the four pillars of Transformational leadership and the effect it may have on influencing policy change
Description
Explanation of how healthcare policy can impact the advanced practice nurse profession
Research healthcare policy for APNs on a state and national level and the impact on the APN profession
Explanation of why advocacy is considered an essential component of the advance practice nurse's role
Describe advocacy in healthcare terminology.
Discuss how advocacy is an essential role of the APN and the impact on patient care.
Discuss the four pillars of Transformational leadership and the effect it may have on influencing policy change
Define Transformational leadership.
Discuss how Transformational Leadership may have an effect on influencing policy change
Critically analyze how healthcare systems and APRN practice are organized and influenced by ethical, legal, economic and political factors.
Demonstrate professional and personal growth concerning the advocacy role of the advanced practice nursing in fostering policy within diverse healthcare settings.
Advocate for institutional, local, national and international policies that fosters person-centered healthcare and nursing practice.
All writing submitted should reflect graduate student quality and APA writing rules. All writing informed by outside sources should include APA formatted citations and associated scholarly, current references. 1500 words
.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
1. 1
3
PROFESSIONAL SUMMARY
Cybersecurity & Network Management, Military Veteran with
over 6 years of proven experience in the United States Army.
Possesses a comprehensive background in Team Leadership and
Training derived from conducting domestic and international
operations. Managed risks upon multiple lines to protect assets,
property, and equipment valued over $10M.
Extensive knowledge in classroom instruction and operations.
Recipient of multiple awards for outstanding performance and
professionalism in the United States Army; career supported by
a vast operational experience and formal leadership training.
· Secret Security Clearance
· Advanced Troubleshooting
· Training and mentoring
· Bi-Lingual (English/Spanish)
· Customer Service
· Security minded
· Leadership experience
2. · Detail oriented
· Exceptional Oral Communication
PROFESSIONAL EXPERIENCE
US ARMY – Fort Benning, GA
Dec 2017 – Present
Information Technology Department Manager / Senior Systems
Administrator
Managed administration, logistics, maintenance, and personnel
management of 4 personnel; oversight of 12 Signal Team
Supervisors
Applied innovative methods that increased the range of
communications for the Organization; expanded operations
Implemented and maintained 380 military computer systems;
enabled the Tactical Advanced Computer to disseminate
information and provide Command & Control for over 20
operations
Selected to test the newest communications equipment; (WAN)
system AN/PSC-15 The Global Rapid Information Package
(GRRIP), The Mobile Broadband Kit (MBK), SIPR/NIPR
Access Point (SNAP) terminals, Tracking radios TW-850-01
TSM Ghost, SHOUT nano GPS tracking, Tactical radios
AN/PRC-117G Tactical Satellite (TACSAT), AN/PRC-119F
(RT-1523), PRC-148C (IMBITR), AN/PRC-150C, AN/PRC-
152A, DTCS RO tactical radio, End User Devices (EUD),
Android Tactical Assault Kit (ATAK), Nett Warrior (NW), Nett
Warrior Mission Planner (NMP), Platform AN/VIC-3, COMSEC
Simple Key Loader (SKL), The Joint Enterprise Network
Manager (JENM 3.3.x), Taclane (Micro KG-175D), Platform
Encryption Device (PED) KGV-72, Joint Battle Command –
3. Platform (JBC-P) and waveforms fielded due to expertise and
aptitude
Standardized the organization’s Mission Command Standard
Operating Procedures (SOP) and radio configuration in order to
support a foreign military’s operations
Maintained accountability of over $1M worth of
communications equipment without loss or damage
Performed Information Assurance (IA), provided the security
services and attributes of availability, authentication,
confidentiality, integrity and non-repudiation; Network
Operations (NETOPS) Service Desk Management, which
includes incident and problem processing, change request
processing, availability management and user interaction.
Assisted in the planning, configuration, management, and
monitoring of the wide area network (WAN)
Provided system administration (SA) to Tactical Battle
Command Servers (TBC Server) in the tactical operations center
(TOC).
Performed network administration (NA); installed, configured
and maintained network equipment within the LAN.
Performed system administration (SA) and maintained
computers and servers within the computing environment (CE)
and the network environment (NE).
Maintain Active Directory content. Create user accounts and set
up necessary user workstation application software.
Performed Information Systems Security Officer (ISSO) duty
for the organization
US ARMY – Hunter Army Air Field, GA
Mar 2016 – Dec 2017
Communication Supervisor / SharePoint Administrator
Managed administration, logistics, maintenance, and personnel
management of 22 personnel
Recognized by the Senior Organization's Personnel Director for
4. Excellence and outstanding performance during a high-risk
training exercise
Dedicated over 500 volunteer hours preparing and executing a
JROTC obstacle course for over 60 cadets; trained, and molded
our future leaders
Mentored 3 teams of 5 personnel to perform Army Warrior
Tasks and 25 Career Management Fields, related tasks during
Signal Stakes Competition; placed first out of 4 teams in the
organization
Trained, tested, and certified 15 personnel on SINCGARS
AN/PRC-119F (RT-1523), (Combat net radio), AN/PRC-150C
High Frequency radio (HF), Platform Encryption Device (PED)
KGV-72, Joint Battle Command – Platform (JBC-P), COMSEC
Simple Key Loader (SKL) and waveforms operations;
significantly increased the company's RETRANS Team
capabilities
Maintained strict accountability of all assigned equipment
valued at over $900k with 0% loss or damage
Audited existing permissions and created security matrix to re-
permission to organization SharePoint site in a more concise,
logical, and secure manner
Architected numerous team- and project-specific sub-sites, lists,
and libraries in order to track projects’ progress, store
documentation, and provide portals to report statuses to the
client
Radically enhanced a formerly barren site and encouraged
adoption and implementation to improve the way our teams
worked and interacted with clients
Designed a multitude of workflows allowing for automation of
certain site features and functions, saving time for team
members, limiting potential mistakes by users, and facilitating
the metric gathering
Created and designed the Master Projects List, through which
all company projects (100+ active, 1000+ total) can be tracked
and viewed by the client, providing greater transparency and
accountability and leading to increased client satisfaction
5. Managed ad hoc access requests, permissions considerations for
staff onboarding and offboarding
US ARMY – Hunter Army Air Field, GA
May 2014 – Mar 2016
Team Chief / IASO/Systems Administrator
· Troubleshot network to include connectivity, hardware, and
software issues. Responsible for troubleshooting the KU/KA
Band Satcom transportable terminal (STT), Command post node
(CPN), Joint network node (JNN), IP address-based radios, Call
managers, TACLANE (KG-175D).
· Responsible for configuring, aligning, testing, and maintaining
satellite communications equipment and other technology
devices and equipment.
· Evaluated complex telecommunications issues and problems
· Submitted Gateway Access Requests, Satellite Access
Requests, and Requests for Service
· Tasked to document and maintain records pertaining to
satellite communications systems and to ensure the availability
of all resources pertaining to all technology equipment
· Served as the subject matter expert in all technology issue to
help the integration and management of satellite
communications resources
· Conducted network operations, performed quality control tests
on equipment, prepared system and equipment forms and
reports, and assisted my organization in modifying and
upgrading assigned satellite communications systems as
required by the Director
· Installed satellite communications and associated support
equipment for training, operational missions, and regularly
scheduled maintenance and experience preventive maintenance
on all unit assigned satellite and non-satellite communications
equipment
· Performed duties as a Desktop/Laptop Technician installing,
6. configuring, maintaining, and troubleshooting Hardware and
Software components
· Developed, prepared, coordinated, and consolidated annexes
for deployable and fixed based communications operational
plans
· Tasked to document and maintain records pertaining to
satellite communications systems and to ensure the availability
of all resources pertaining to all technology equipment.
· Recognized as a subject matter expert in integration concepts,
network topology, integrative and STT, HCLOS, JNN, SNAP,
and CPN.
· Supervised the deployment, installation, operation, and unit
level maintenance of multi-functional/multi-user information
processing systems.
· Determined requirements, assigned duties, and coordinated
activities of personnel engaged in information system analysis
and maintenance.
· Developed and administered on-site training programs.
· Compiled output reports in support of operations.
· Performed system studies using established techniques to
develop new or revised system applications and programs.
· Wrote final design programs, operational manuals, procedures,
and requirements documents.
· Analyzed telecommunications information management needs,
and requested logistical support and coordinated systems
integration
· Performed duties as Mid-level Manager and Supervisor;
performed Information Assurance (IA) functions.
· Supervised, performed maintenance management and
administrative duties related to facility operations, maintenance,
security, and personnel.
· Performed IASO/Systems Administrator (SA) duties.
· Provided technical assistance, resolved problems for
information services support personnel, functional users, and
functional staff.
· Supervised subordinate employees
7. US ARMY – Hunter Army Air Field, GA
Sep 2013 – May 2014
Radio Retransmission Operator
· Supervised, installed, employed, maintained, troubleshot and
assisted users with battlefield signal support systems, terminal
devices, satellite communications equipment, and automated
telecommunications computer systems, to include local area
networks, wide area networks, and routers
· Integrated signal systems and networks; performed unit level
maintenance on authorized signal equipment and associated
electronic devices; trained and provided technical assistance to
users of signal equipment; and operated and performed
preventive maintenance checks and services (PMCS) on
assigned vehicles and power generators.
· Installed, maintained and troubleshot signal support equipment
and terminal devices. Installed, operated and maintained
designated radio, wire, cable, and data distribution systems.
· Maintained selected electronic devices.
· Performed signal support functions, to include providing
technical assistance and training for user owned and operated
automated telecommunication computer systems, local area
networks, and routers; signal communications and support
electronic equipment and satellite radio and communications
equipment.
· Prepared maintenance and supply requests for a unit level
signal support
· Supervised, installed, maintained, and troubleshot signal
support systems and battlefield automated systems (BAS).
· Provided technical assistance and unit level training for
automation, communication, and user owned and operated
automated telecommunications computer systems, to include
local area networks and routers; signal communications support
electronic equipment, and satellite radio communications
equipment.
8. · Disseminated information services policy.
ENCANTOS RESTAURANT – Manati, PR
May 2010 - Sep 2013
Shift Supervisor
· Versed in planning daily operations, staffing, and inventory
management. Organized and detail-oriented with high -
performing nature.
· Promoted a positive atmosphere and go above and beyond to
guarantee each customer received exceptional service
· Clearly and promptly communicated pertinent information to
staff, such as large reservation or last-minute menu changes
· Organized special events in the restaurant, including
receptions, promotions, and corporate luncheons
· Recognized and formally acknowledged outstanding staff
performance to boost company morale and productivity
· Carefully developed a lucrative annual food and beverage
marketing plan for restaurant and strict budget to maximize
profit
EDUCATION
· Bachelor of Science in Computer Networks & Cybersecurity
(73 credit hours completed)
PROFESSIONAL MILITARY EDUCATION
· Advanced Leadership and Management Development Course
· Basic Leadership Development Course
· Military Advisor Training Academy
· Signal Support System Specialist Course
· Equal Opportunity Course
· Sexual Harassment/Assault Response Program Course
· First Responder Course
9. AWARDS
· Army Commendation Medal with “C” Device
· Army Commendation Medal
· Army Achievement Medal (4)
· Army Good Conduct Medal
· Driver/Mechanic Badge – Wheeled Vehicle (Safety Award)
· German Proficiency Badge