- Move, Inc.Informtation Security, presentHead of Cyber Security
- Jacobs EngineeringSenior Security Architect, 2000 - 2006
- Fox TechnologiesSenior Presales Engineer, 2006 - 2007
- El Camino ResourcesSenior Systems Engineer, 1995 - 1998
- Real ApplicationsSenior Systems Engineer, 1998 - 1999
- TechKnowledge SystemsTechnology Manager, 1999 - 1999
Joshua hasn't shared anything with you.
People are more likely to share with you if you add them to your circles.
Load Balanced Test Bed Part 3-Creating the Nodes - Tim's blog - Site Hom...
Tim's blog. A Microsoft Field Consultant's Notes. Translate This Page. Translate this page Powered by Microsoft® Translator. Options
How To Turn A Personal Domain Into Your Own Personalized Link Shortener
Link shorteners are a dime a dozen. Even Google and StumbleUpon have joined the fray, because a shortened URL doesn’t just look good. They a
Make Switching From Windows To Linux Easier With Zorin OS
Linux is not hard to use or understand, but it simply doesn't fit the Windows mindset that most people have. Expecting to do everything in L
InfoPath 2010: Pre-populate the People Picker - Laura Rogers @WonderLaura
How To Find Out Who Recently Unfriended You On Facebook
Facebook lets you do many, many things. Whether you love it or hate it, you can’t deny the fact that it has opened doors to things we previo
Highly Customizble Minimit Gallery jQuery Plugin | Web Resources | WebAp...
Highly Customizble Minimit Gallery jQuery Plugin - Open Source Resources for Web Developers
Recently a large part of a lawsuit brought against Sony was thrown out because they had stated that their security is 100% when it comes to
Service Account best practices - Part 2: Least Privilege implementation
In my previous article, we defined services and service accounts and also examined what options there are for selecting a service account fo
Create list relationships by using lookup and unique columns (SharePoint...
blogger hit counter. You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Automating Group Policy Preferences Drive Mapping with PowerShell | SDM ...
One of the cool things I like about our Group Policy Automation Engine product is the scenarios that it's open up by providing what is essen
Troubleshooting Group Policy - Part 6: Common problems
DNS Your DCs should be pointing to each other for DNS and your clients should be pointing to the DCs. If your clients are using other DNS s
How to use a Proxy Server with the EWS Managed API and PowerShell
How to use a Proxy Server with the EWS Managed API and PowerShell. by Mike Pfeiffer on December 11, 2011. You might work in an environment w
Google Maps Pricing Sends Real Estate Site to Open Source
ProgrammableWeb.com keeps you up to date with web mashups and APIs: what's new, interesting, useful and important. Hundreds of mashups and A
Rapid7 Community: Metasploit: How to leverage the command line in Metasp...
Skip navigation. Rapid7 Home | Metasploit Home. Welcome, Guest | Login | Register | Username: (?) Password: (?) Remember Me. Search Search.