SlideShare a Scribd company logo
1 of 11
Summer Internship Overview
August 6, 2015
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection.
Dustin Taylor
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 2August 6, 2015
Agenda
Introduction
Project Accomplishments
Challenges
Accomplishments
Questions
3
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection.August 6, 2015
Introduction
4
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection.August 6, 2015
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 5August 6, 2015
• Install and remove software for tablets
• Construct boxes with all devices
• Pair Bluetooth devices
• RQ configuration/ pairing
• QA each box before shipment
POS in a Box
My Role In Project
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 6August 6, 2015
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 7
My Role In Project
August 6, 2015
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 8August 6, 2015
Traffic Counter
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 9August 6, 2015
Overwhelming the first two weeks
Comprehending what my role was in my group
Internship activity communication
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection. 10
 My team made me feel welcome and at home
 Getting to know how a large scale company works
 Networking through the company
 Looks great on my resume
 Received offer for Cricket retail position
August 6, 2015
Accomplishments
Thank you
Questions?
Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements
for specific data categories predefined in Company security standards for Information Classification and Protection.

More Related Content

Similar to InternshipPreso

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testB2BContact
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...B2BContact
 
Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...
Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...
Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...mfjennin777
 
2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...
2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...
2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...mfjennin777
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
PPT-How to Build Your PA on a Strong Data Foundation
PPT-How to Build Your PA on a Strong Data Foundation PPT-How to Build Your PA on a Strong Data Foundation
PPT-How to Build Your PA on a Strong Data Foundation Natasha Ramdial - Roopnarine
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
Harmonizing Data for the Warehouse
Harmonizing Data for the WarehouseHarmonizing Data for the Warehouse
Harmonizing Data for the WarehouseKalido
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015ldangelo0772
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
How biotech companies can get started with cloud for clinical trials?
How biotech companies can get started with cloud for clinical trials?How biotech companies can get started with cloud for clinical trials?
How biotech companies can get started with cloud for clinical trials?ClinCapture
 
SVI Pitchbook
SVI PitchbookSVI Pitchbook
SVI PitchbookSVI2014
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
NetApp Insight 2013 Activities & Track Leaders
NetApp Insight 2013 Activities & Track LeadersNetApp Insight 2013 Activities & Track Leaders
NetApp Insight 2013 Activities & Track LeadersNetApp Insight
 

Similar to InternshipPreso (20)

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture test
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...
 
Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...
Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...
Mar-10 Improving Data Management through utilizing Big Data - Mapping a Techn...
 
2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...
2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...
2015 Mar-10 Improving Data Management through Utilizing Big Data - Mapping a ...
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisionsC-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisions
 
PPT-How to Build Your PA on a Strong Data Foundation
PPT-How to Build Your PA on a Strong Data Foundation PPT-How to Build Your PA on a Strong Data Foundation
PPT-How to Build Your PA on a Strong Data Foundation
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
Harmonizing Data for the Warehouse
Harmonizing Data for the WarehouseHarmonizing Data for the Warehouse
Harmonizing Data for the Warehouse
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
How biotech companies can get started with cloud for clinical trials?
How biotech companies can get started with cloud for clinical trials?How biotech companies can get started with cloud for clinical trials?
How biotech companies can get started with cloud for clinical trials?
 
SVI Pitchbook
SVI PitchbookSVI Pitchbook
SVI Pitchbook
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
NetApp Insight 2013 Activities & Track Leaders
NetApp Insight 2013 Activities & Track LeadersNetApp Insight 2013 Activities & Track Leaders
NetApp Insight 2013 Activities & Track Leaders
 

InternshipPreso

  • 1. Summer Internship Overview August 6, 2015 Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. Dustin Taylor
  • 2. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 2August 6, 2015 Agenda Introduction Project Accomplishments Challenges Accomplishments Questions
  • 3. 3 Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection.August 6, 2015 Introduction
  • 4. 4 Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection.August 6, 2015
  • 5. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 5August 6, 2015 • Install and remove software for tablets • Construct boxes with all devices • Pair Bluetooth devices • RQ configuration/ pairing • QA each box before shipment POS in a Box My Role In Project
  • 6. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 6August 6, 2015
  • 7. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 7 My Role In Project August 6, 2015
  • 8. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 8August 6, 2015 Traffic Counter
  • 9. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 9August 6, 2015 Overwhelming the first two weeks Comprehending what my role was in my group Internship activity communication
  • 10. Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection. 10  My team made me feel welcome and at home  Getting to know how a large scale company works  Networking through the company  Looks great on my resume  Received offer for Cricket retail position August 6, 2015 Accomplishments
  • 11. Thank you Questions? Cricket Wireless Proprietary (Sensitive Personal Information). Only for use by authorized individuals in accordance with requirements for specific data categories predefined in Company security standards for Information Classification and Protection.