“I worked with Douglas Waller for over two years in Afghanistan, in some of the worst conditions imaginable. He was consistently the best performing, most dependable person in our department. His IT skills coupled with his can-do attitude made him the go-to person in our department for issues with computers, the network, database issues, and his knowledge of policy and procedures made him invaluable in making decision that followed our directives. He used his downtime to keep up to date on new software and database management systems, and also kept striving to complete certifications related to our assignments. His proactive approach kept our department effective and efficient while the scope of our operations were ever changing and growing. Because he wants to deliver his best he exudes professional excellence wherever he works and provides a positive example for his co-workers. Because of his positive influence Doug and I have developed a friendship that has lasted beyond the office. It would be a pleasure to work with him again.”
About
Contributions
-
You're drowning in surplus spare parts for computer repair. How do you avoid unnecessary inventory costs?
Using all of these to manage inventory to control cost is recommended. Inventory is a cost of doing business whether it's office supplies or regular consumables. Knowing what you actually need when you need it rather than ad-hoc ordering and warehousing costs a lot less in usable space.
-
What are the best ways to maintain computer health?
Two things: Keep your software up to date with the latest security patches. Keeping software and firmware up to date reduces the possibility of zero day exploits and older vulnerabilities. Don't download attachments or click on messages that you don't recognize or that have noticeable errors. Phishing or Vishing messages are one of the primary vectors for malware. These messages can contain links that take you to websites that can download viruses.
Activity
-
Microsoft Azure and Office365 is down. Government services are infected likely due to a different patch schedule and sandbox testing protocols. My…
Microsoft Azure and Office365 is down. Government services are infected likely due to a different patch schedule and sandbox testing protocols. My…
Shared by Douglas Waller
-
Cisco has yet another vulnerability involving RADIUS protocol. This is a serious issue now that remote and hybrid work is more common. This…
Cisco has yet another vulnerability involving RADIUS protocol. This is a serious issue now that remote and hybrid work is more common. This…
Shared by Douglas Waller
-
Cross Site Scripting is not a new attack and should be easy to mitigate. But, more and more sites are vulnerable. Injecting code into a website is…
Cross Site Scripting is not a new attack and should be easy to mitigate. But, more and more sites are vulnerable. Injecting code into a website is…
Shared by Douglas Waller
Experience & Education
Licenses & Certifications
Languages
-
English
Native or bilingual proficiency
Recommendations received
1 person has recommended Douglas
Join now to viewMore activity by Douglas
-
NIST releases a tool to test AI models to see if they've been poisoned by erroneous data. #ai #nist #data
NIST releases a tool to test AI models to see if they've been poisoned by erroneous data. #ai #nist #data
Shared by Douglas Waller
-
Card skimmers are easy to install and hard to detect. But if you do these five things every time you swipe or insert a card, you’ll be fine…
Card skimmers are easy to install and hard to detect. But if you do these five things every time you swipe or insert a card, you’ll be fine…
Shared by Douglas Waller
-
Here's a list of vulnerable VPN routers and devices produced by Cisco that are vulnerable to attack. #cisco #vpn #smallbusiness #vulnerability
Here's a list of vulnerable VPN routers and devices produced by Cisco that are vulnerable to attack. #cisco #vpn #smallbusiness #vulnerability
Shared by Douglas Waller
-
3rd party vendors have been responsible for multiple breaches in the last 12 months. review policy and practices to secure client data. #leidos…
3rd party vendors have been responsible for multiple breaches in the last 12 months. review policy and practices to secure client data. #leidos…
Shared by Douglas Waller
-
Port Shadow technique allows attackers to see everything you do over VPN using Man in the Middle attack. An attacker would be using the same VPN…
Port Shadow technique allows attackers to see everything you do over VPN using Man in the Middle attack. An attacker would be using the same VPN…
Shared by Douglas Waller
-
Threat Actors are using deprecated Windows Internet Explorer to install ransomware, backdoor programs, and other types of malicious malware. Keep…
Threat Actors are using deprecated Windows Internet Explorer to install ransomware, backdoor programs, and other types of malicious malware. Keep…
Shared by Douglas Waller
-
Defeating Wi-Fi IoT devices is getting easier and those that would exploit them are taking notice and making sure to abuse it. If you have to use…
Defeating Wi-Fi IoT devices is getting easier and those that would exploit them are taking notice and making sure to abuse it. If you have to use…
Shared by Douglas Waller
-
Check official domains and make sure to check the fonts for Cyrillic characters in urls. #pharming #cybersecurity #hack
Check official domains and make sure to check the fonts for Cyrillic characters in urls. #pharming #cybersecurity #hack
Shared by Douglas Waller
Other similar profiles
-
Jaymie Kennedy
Area Manager ll @ Amazon|Inclusive People Leader|B2C Customer Experience|BSBA
Connect -
Larry Matyas
Area Manager II at Amazon | People Driven Leader & Tech Enthusiast
Connect -
Brianna Blankenship
Human Resources
Connect -
Nathan Henige
Connect -
Abbie Lyon
Assistant Transportation Manager, human and cat mom, sports fan, coffee addict.
Connect -
Patrick Wilkins, MBA, MS
Connect -
chrystelle Leonard
conseillère gestion chez SQUARE HABITAT Charente Périgord
Connect -
Jisu Oh
Laboratory Manager at Washington University School of Medicine
Connect -
Marcin Jakubowski
Wiceprezes zarządu, Full Stack Developer
Connect -
Robert Bowman
L6 Operations Manager, Amazon
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Douglas Waller in United States
-
Douglas Waller
Senior Product Manager | Axon
-
Douglas Waller
-
Douglas Waller
Quality Assurance Manager at Headquarters Army Contracting Command
-
Douglas Waller
Retired :0) DuPont Co. Training & Development Leader
47 others named Douglas Waller in United States are on LinkedIn
See others named Douglas Waller