.
Visual explanations
of complex concepts can
speed the learning process.

Experience includes:

Enterprise Systems - Configuring and managing enterprise applications can involve complex decisions by system architects and administrators. Clear, efficient information presented in the optimal format helps your customers succeed as quickly as possible with fewer help desk calls.

Distributed Systems - Networked application components rely on configuration information to find other components. These bindings (associations of names with the locations of objects they represent) reside in repositories within the system. System installers, administrators, and programmers must understand the behavior of repositories and other elements to make the system work.

Security - EAP, PEAP, 802.1x and wireless network security, federated identity, RADIUS, public key technologies, digital certificates, authentication systems and protocols, SSL (secure sockets layer) and TLS (transport layer security) secure transport protocols, cryptographic algorithms and security functions.

FIPS and NIAP/Common Criteria Certification Documentation - FIPS security policy, vendor evidence, Crypto Officer's manuals, testing documentation, Common Criteria security targets, design documents, functional specifications, secure delivery procedures, guidance documents, vulnerability assessment.

CONTACT WARD ROSENBERRY
Email

HOME || RESUME || TECHNOLOGIES || RESOURCES || PUBLISHED WORKS || ABOUT RAI

© 2003-2007 Ward Rosenberry All rights reserved.