Menu

(202) 293-5003 info@madwolf.com

Biography

Nelson Butler

IT Project Manager

IT Project Manager & Senior Systems Integrator with over 19 years of IT Project Management and System Engineering. Areas of expertise include (but not limited to) project management and execution of on premise to cloud based environments from Amazon Web Services to Microsoft Azure Cloud Services, on premise systems planning, design and implementation, virtualization and core network infrastructure planning, design, implementation and optimization. 
    
TECHNOLOGY
Microsoft Azure fabric, Amazon Web Services fabric, Microsoft Exchange 2010, 2013 & 2016, Windows Server (all versions to current), Microsoft SQL, MySQL, Managed Services NOC platform, Microsoft Office 365

 

CERTIFICATION
MCNE, MCP, MCSA (Office 365), MCSE (Messaging)
 

   

Related Items

Blogs


Blogs
The Strangest Exchange

For all of my Exchange admins and engineers that toil daily on maintaining their Exchange organizations, do you ever find yourself cringing at the thought of performing a service pack, update rollup or cumulative update for your Exchange servers?

When Disaster Strikes

I have found that there is a large swath of small and mid-sized organizations that will spend a lot of money on the decorum in their office space. At the same time, they will fight tooth and nail to NOT put money into a viable and reliable backup of their organizations critical data.

The Strangest Exchange

For all of my Exchange admins and engineers that toil daily on maintaining their Exchange organizations, do you ever find yourself cringing at the thought of performing a service pack, update rollup or cumulative update for your Exchange servers?

News


News

Protect yourself against the new Adobe Flash zero-day exploit

Our researchers have discovered a new zero-day exploit in Adobe Flash used in malvertisement attacks. The exploit affects the most recent version of Adobe Flash, and is now identified as CVE-2015-0313. Our initial analysis suggests that this might have been executed through the use of the Angler Exploit Kit, due to similarities in obfuscation techniques and infection chains.