Fully Customizable and modular, combined with database driven content pages generated on the fly, or from cached pages. Designed to be flexible for the needs of any client with everything possible from the generation of simple blogs, podcasts, portfolios, and store fronts.
User Account Program which is highly customizable and modular with a singular primary focus, user data security. All user accounts from creation to confirmation are maintained in a perpetual encrypted state with built in two-factor authentication that cannot be disabled. Multi-location sign-on like many websites is possible and more functionality can be developed for clients on a per need basis.
Artificially intelligent replacement for Captcha designed to allow any user, regardless of ability, access to a website, while preventing issues with bots through a process that can filter attempts pre-emptively, in real-time, or after the fact, through a process that is capable of using specific vectors of determination, such as, access to previous stored attempts, allowing the code to become smarter with time. The program in v2.0 was given more abilities to distinguish between natural language and modified text used by groups to circumvent filters and has risk mitigation abilities that can specifically and or broadly deny access based on a set of predetermined vectors of risk.
I have more than 20 years of experience in sales and customer service. An important result of the many years of years I have accrued is that I can anticipate most needs of clients. I've sold everything from produce, websites, computer parts and entire computer builds. I am comfortable with small value transactions and high value transactions. I have experience with hourly wage, and commission style sales structures.
Traditionally educated using chemical means of negative and photographic development processes. I work with negative based cameras and digital cameras. As part of my traditional photography education background I am both adept at lighting scenes for photographic and filmographic purposes using various forms of lighting, both direct and indirect, and controlling the intensity with reflectors and diffusers.
I am proficient in the use of Adobe Photoshop, Adobe illustrator, Adobe After Effects, Gimp, Blender and Daz Studio to create a whole host of different projects meant for online consumers as video, graphics and photography.
Having edited hundreds of videos for podcasts, I am more than proficient in the use of Adobe Premiere Pro, Adobe After Effects, and Pinnacle Studio. As part of my experience, I have, also, obtained valuable skills in the area of audio editing.
Having programmed for more than 2 decades in the area of web development, I am both experienced and adaptive when it comes to both client side and server-side programming understanding important concepts such as interactivity with user interfaces, load time efficiency, data security, risk assessment and mitigation, etc. I program using languages such as PHP, JavaScript, HTML5, Perl, CGI, ASP, MySQL, etc. I, also, use frameworks such as jQuery, Bootstrap, etc. And compliment my code by use of XML, RSS, CSS, etc. I am always refining my craft and challenging my own skillsets by creating code that does not practice the traditional methods indicated in guidebooks allowing for better problem solving, cleaner and more concise programming resulting fewer bugs, writing code focused on being resistant to XSS vulnerabilities, etc.
As part of my formal education, I have been instructed in the proper and full usage of Microsoft Word, Excel, PowerPoint, Access, Outlook, etc. I am, also, adept at using alternatives such as LibreOffice and OpenOffice. I am, also, capable of operating on any platform including any variation of Windows, Linux, BSD, Unix and Mac.
Furthermore, as part of extensive professional career I have obtained skill sets required for diagnostic problem solving in areas that require immediate attention. These include the prevention of security threats such as viruses in workplace computers, mitigation of risks related to directed spearfishing attempts, and many other kinds of possible risks to office systems infrastructure, including the ability to adapt office operating system environments to both be usable, reliable, and secure, regardless of the end user’s ability.