Rox Burkey, MBA, CCXP

Rox Burkey, MBA, CCXP

Dallas, Texas, United States
3K followers 500+ connections

About

The process for increasing your Customers' Lifetime Value has diverse starting points…

Articles by Rox

Activity

Join now to see all activity

Experience

  • Zoom Graphic

    Zoom

    Texas, United States

  • -

    United States

  • -

    Dallas-Fort Worth Metroplex

  • -

    https://www.enigmaseries.com

  • -

    Southern Region United States

  • -

    North Texas focused

  • -

  • Company ghost image

    • -

      North America

    • -

      North America

    • -

      North America

    • -

      North America

  • Company ghost image

    • -

      North America

    • -

      North America

    • -

      North America

Education

  •  Graphic

    -

    -

    Activities and Societies: Worked full time, built a family, kept a home

  • -

Volunteer Experience

  • Member of the Board of Directors

    Dear Texas, Inc.

    Education

    D.E.A.R. was originally a part of a story line found in the book Ramona Quimby, Age 8 (pages 40-41) by Beverly Cleary. The book was first published by Harper Collins children’s division and they are the ones that crated the DEAR event that has been a part of schools and libraries for years. Texas Authors, Inc., a not for profit organization was inspired by the concept and added their own Texas touch to it, thus creating DEAR (Drop Everything and Read) Texas.

    The first DEAR Texas event…

    D.E.A.R. was originally a part of a story line found in the book Ramona Quimby, Age 8 (pages 40-41) by Beverly Cleary. The book was first published by Harper Collins children’s division and they are the ones that crated the DEAR event that has been a part of schools and libraries for years. Texas Authors, Inc., a not for profit organization was inspired by the concept and added their own Texas touch to it, thus creating DEAR (Drop Everything and Read) Texas.

    The first DEAR Texas event was held on April 12, 2015 with great success. They were able to raise funds that have helped get books into children’s hands through schools and libraries. Working on this success, DEAR Texas will be held on April 16 & 17, 2016 to open more avenues for outreach to the community and to help raise even more money for literacy programs. Since its initial event, the organizers have spun it off to create its own organization, which is currently incorporated as a 501.c.3 non-profit entity.

  • Formers - Member Board Of Directors

    Texas Authors, Inc

    - Present 7 years 3 months

    Arts and Culture

    The Texas Association of Authors is a non-profit organization dedicated to promoting literacy and supporting the work of Texas writers across the state, nation, and around the world. The Austin, Texas- based organization has drawn upon the knowledge and expertise of a diverse group of established authors to help others find success in the writing field. Currently, the membership includes more than 250 writers whose books span over 60 different genres.

    As of May 2018 this organization…

    The Texas Association of Authors is a non-profit organization dedicated to promoting literacy and supporting the work of Texas writers across the state, nation, and around the world. The Austin, Texas- based organization has drawn upon the knowledge and expertise of a diverse group of established authors to help others find success in the writing field. Currently, the membership includes more than 250 writers whose books span over 60 different genres.

    As of May 2018 this organization was changed to a corporation with no board of directors needed.

    Texas Authors, Inc. collaborates with other groups that promote literacy including Drop Everything And Read (DEAR) Texas and Super Readers which focuses on encouraging children to read. The membership routinely donates book to schools, libraries, and community partners. You can learn more at https://texasauthorsinc.wildapricot.org/

Licenses & Certifications

Publications

  • The Enigma Source

    ICABOD Press

    Today’s cryptocurrency world is packed with get-rich-now charlatans just waiting for you to ask, “Can I play too?” The Enigma Source, Book 10 of the award-winning The Enigma Series, delves into this digital technology and explores how cyber experts do digital combat with Dark Net thugs for a safe digital currency.

    Other authors
    See publication
  • The Enigma Broker

    Self Published via Create Space

    What would you do if the global markets for commodities went into free fall and national economies started to wobble?

    Many individuals and governments would panic, fearing that countries might destabilize and throw the world into chaos. But not the R-Group! Its members—technological whizzes dedicated to protecting civilization from cyber enemies—immediately start hunting for the culprit to blame for the markets’ gyrations.

    Team members Jacob, Petra, Quip, EZ, and others use their…

    What would you do if the global markets for commodities went into free fall and national economies started to wobble?

    Many individuals and governments would panic, fearing that countries might destabilize and throw the world into chaos. But not the R-Group! Its members—technological whizzes dedicated to protecting civilization from cyber enemies—immediately start hunting for the culprit to blame for the markets’ gyrations.

    Team members Jacob, Petra, Quip, EZ, and others use their special expertise to investigate the price manipulations in the commodities markets. Their goal is to identify the “dark matter organization” responsible and stop it before it’s too late.

    As the team members start uncovering clues, there are kidnappings, romances, and run-ins with a sinister computer genius who keeps a samurai sword ready in his office for heated discussions.

    Packed with thrills and intrigue, The Enigma Broker is a thought-provoking cautionary tale for our technology-obsessed society.

    Other authors
    See publication
  • The Enigma Gamers - A CATS Tale

    Self-Published via CreateSpace

    Gone are the days of pixelated sprites and simple wired controllers. It’s the twenty-first century, and video game playing has undergone a complete evolution. With high-def graphics and intuitive sensory controls, gamers are enjoying a level of realism and immersion never before experienced.

    However, when the line between the real and cyber worlds becomes blurred, this digital landscape provides new social predators with opportunities to unleash terror and pain on unsuspecting…

    Gone are the days of pixelated sprites and simple wired controllers. It’s the twenty-first century, and video game playing has undergone a complete evolution. With high-def graphics and intuitive sensory controls, gamers are enjoying a level of realism and immersion never before experienced.

    However, when the line between the real and cyber worlds becomes blurred, this digital landscape provides new social predators with opportunities to unleash terror and pain on unsuspecting victims.

    Businesses, cities, and commonly used services might believe they are immune, but then their world goes sideways as a grotesque ransom demand is spilled across their data screen. The fledgling CATS—Cyber Assassins Technology Services—team is mobilized to find the root causes.

    Led by Julie and Juan, the CATS team is committed to avenging and administering justice to evil doers in every corner of the real and virtual worlds. The CATS team is the next generation of hunters in the cat and mouse game of cyber warfare.

    Within the Enigma series, the CATS team continues to evolve and uses front-line techniques, which stretches every resource at their disposal to face off against a sinister new world of high-tech crimes.

    Other authors
    See publication
  • The Enigma Always

    Self-Published via CreateSpace

    A thrilling exploration of the intersection of cyber technology, medical science, and human greed, The Enigma Always incorporates technical facts, big data analytics, and real-world hacking techniques into a fast-paced story with elements of romance and intrigue.

    The R-Group is fighting at the forefront of the cyber wars, battling against an evil force seeking to harness supercomputer technology to reengineer humans at the cellular level. In parallel, returning cyber-thugs are…

    A thrilling exploration of the intersection of cyber technology, medical science, and human greed, The Enigma Always incorporates technical facts, big data analytics, and real-world hacking techniques into a fast-paced story with elements of romance and intrigue.

    The R-Group is fighting at the forefront of the cyber wars, battling against an evil force seeking to harness supercomputer technology to reengineer humans at the cellular level. In parallel, returning cyber-thugs are interjecting their brand of technology domination, which must be thwarted.

    Dr. Xavier Pekoni has morally-devoid and ethically-challenged intentions regarding his fountain of youth project. Using nanotechnology and DNA mapping, Pekoni is close to reaching his goal of extending human life ten-fold and will stop at nothing to achieve his objectives.

    Pekoni’s scientific advancements are all-consuming for him, regardless of the immoral implications or the resulting negative consequences. The team must go to great lengths to make sure this technology isn’t unleashed, as it would have devastating penalties for society.

    R-Group and the CAT teams must use the full range of their intelligence and technological savvy to fight Pekoni. But two top team members, Petra and Jacob, are missing from the action as they fight to vanquish their personal demons.

    Other authors
    See publication
  • The Enigma Stolen

    Self-Publsihed via CreateSpace

    Human behavior appears erratic and unpredictable only because humans are too close to the action. To the cold, impartial circuits of a modern supercomputer, human behavior is simply a complex set of algorithms to be compiled, analyzed, and predicted.

    Control the flow of human behavior, and you control the future. Cut a nervous investor off in traffic, and you initiate a stock market crash. Engineer a love affair, and you destabilize a nation. All you need is unlimited computing power—and…

    Human behavior appears erratic and unpredictable only because humans are too close to the action. To the cold, impartial circuits of a modern supercomputer, human behavior is simply a complex set of algorithms to be compiled, analyzed, and predicted.

    Control the flow of human behavior, and you control the future. Cut a nervous investor off in traffic, and you initiate a stock market crash. Engineer a love affair, and you destabilize a nation. All you need is unlimited computing power—and the ethical nihilism to manipulate lives.

    The R-Group, a high-level information gathering and security team, believes at least one group—possibly several—are using data analysis to customize the future in their image.

    Powerful and mysterious, these groups are very good at what they do—possibly as good as the R-Group themselves. And even as Petra, Jacob, Quip, and the rest of R-Group battle to identify their foes, a hidden threat lurks within the team itself.

    Unless the R-Group can neutralize the threat, humanity’s future will be determined by a select few, feeding an ever-growing stream of information into increasingly sophisticated computer systems. Which begs the question: who controls whom?

    Other authors
    See publication
  • The Enigma Wraith

    Self-published via CreateSpace

    When an Irish financial institution, a Brazilian hydroelectric plant, a NATO base, and a smart car traveling through the European countryside are each hacked by the same sinister force, the world is introduced to the first glimpse of the potential damage that the Ghost Code can inflict—on both a personal and an industrial level.

    Introduced by a mysterious pair of cyber pirates known only as Mephisto and Callisto, this destructive code is nearly impossible to find and even harder to…

    When an Irish financial institution, a Brazilian hydroelectric plant, a NATO base, and a smart car traveling through the European countryside are each hacked by the same sinister force, the world is introduced to the first glimpse of the potential damage that the Ghost Code can inflict—on both a personal and an industrial level.

    Introduced by a mysterious pair of cyber pirates known only as Mephisto and Callisto, this destructive code is nearly impossible to find and even harder to remove. And while their agenda appears to be a blackmail plot for financial gain, their true aims could be of a far more menacing and expansive nature.

    In an intriguing game of digital cat and mouse, the R-Group’s Jacob, Petra, and Quip find themselves pitted against their most nefarious enemies to date. Stretching their considerable talents to the max, they struggle to track down the source of the problem and craft a solution that can secure the world’s technology infrastructure before it completely collapses.

    Other authors
    See publication
  • The Enigma Ignite

    Self-published via CreateSpace

    As the world’s biggest powers compete for superiority, it’s not larger weapons or greater numbers of soldiers that top their wish lists. Instead, it’s the latest and greatest technological advances: nanotechnology, dynamic programming algorithms, and drones, working together to build the next generation of military communications.

    When a professor at a Texas university begins researching ways to improve animal husbandry and boost global food supplies, her results catch the eye of…

    As the world’s biggest powers compete for superiority, it’s not larger weapons or greater numbers of soldiers that top their wish lists. Instead, it’s the latest and greatest technological advances: nanotechnology, dynamic programming algorithms, and drones, working together to build the next generation of military communications.

    When a professor at a Texas university begins researching ways to improve animal husbandry and boost global food supplies, her results catch the eye of inquisitive engineer Keith Austin Avery—whose interests have nothing to do with solving world hunger.

    But as Avery works on potential new uses for this technology, his research draws the attention of a powerful terrorist group, with traumatic results for him and his subcontractor Eilla-Zan Marshall.

    Now it’s up to the members of the R-Group to find the terrorists and their captives, using all the data and analytics at their disposal to leverage each and every piece of information.

    The fast-paced third installment of the Enigma Series has R-Group’s Jacob working closely with a powerful and talented team—with results that incorporate a satisfying balance of technology, surprisingly sensitive romance, and the blurred lines that surround the age-old conflict between good and evil.

    Other authors
    See publication
  • The Enigma Rising

    Self-published via CreateSpace

    The R-Group is the single most advanced information-gathering organization on the planet, providing services to the intelligence community on a contract basis. Their cutting-edge application of technology keeps their ability to gather, analyze, and use information well ahead of most major governments.

    Carlos and Juan are entrepreneurs, although even the most generous observer would question the legality of their business model. The two brothers have discovered a way to covertly access…

    The R-Group is the single most advanced information-gathering organization on the planet, providing services to the intelligence community on a contract basis. Their cutting-edge application of technology keeps their ability to gather, analyze, and use information well ahead of most major governments.

    Carlos and Juan are entrepreneurs, although even the most generous observer would question the legality of their business model. The two brothers have discovered a way to covertly access satellite communications. Mostly, they're putting their skills to work relocating drug lords targeted by the authorities, along with their cash, gold, artwork, and other assets—for a modest fee, of course.

    When a valued private client hires the R-Group to track down a missing heiress, chance circumstance brings the technology leaders into contact with Carlos and Juan's fly-by-night operation. The two brothers have skills the R-Group can use, so they offer them a chance to go legit. Presuming, of course, the brothers can rein in their contempt for societal rules.

    A sequel to Breakfield and Burkey's The Enigma Factor, The Enigma Rising continues their exploration of the high-stakes and high-tech world of information brokering as an engaging thriller of lost and found, loving and growing, and despicable greed.

    Other authors
    See publication
  • The Enigma Factor

    Self-published via CreateSpace

    Jacob Michaels is a brilliant programmer who has spent his life in the field of information protection, considering it his mission to protect major organizations from the horrific damage cyber criminals can inflict.

    But it is his own life he finds in danger when rogue cyber-criminals target Jacob for inclusion in their nefarious activities. Determined, he sets off on a mission that takes him into the furthest reaches of cyber technology and is provided support through unknown…

    Jacob Michaels is a brilliant programmer who has spent his life in the field of information protection, considering it his mission to protect major organizations from the horrific damage cyber criminals can inflict.

    But it is his own life he finds in danger when rogue cyber-criminals target Jacob for inclusion in their nefarious activities. Determined, he sets off on a mission that takes him into the furthest reaches of cyber technology and is provided support through unknown protectors.

    With his best friend in tow, as well as a distractingly beautiful encryptionist, Jacob’s journey ultimately sets off a chain reaction involving cyber theft, international hackers, romance, and more danger than he could have ever imagined.

    As Jacob closes in, however, he soon learns that the line between good guys and bad guys is increasingly blurry.

    The next in the series The Enigma Rising will be available soon.

    Other authors
    See publication
  • Managing Systems, Migrations, and Upgrades

    Auerbach

    The processes and practices that should be addressed with technology upgrades for enterprises.

    Other authors
    See publication
  • Designing a Total Data Solution

    Auerbach

    Provides a summary of Best Practices for technology solution designs for enterprises.

    Other authors
    See publication

Projects

  • The Enigma Series - Fictional technology thrillers

    - Present

    Ongoing stories about a multi-generation family business that was founded at the end of World War II as two families escaped from Poland with an Enigma Machine and began a financial and information brokerage business. Stories that take readers all over the world looking for the sources that want to control and compromise people through misuse of technology. Tales that share intrigue, humor, romance, and technical possibilities with a rich character universe.

    Other creators
    See project
  • The Enigma Series

    This is the Author Facebook for The Enigma Series. It houses information about the book fairs, author events, book signings, and the videos for the series. You can also get more information at www.enigmabookseries.com

    Other creators
    See project

Honors & Awards

  • 2011 SI/SP Top SE

    Avaya

    Received top honors award for 2011 achievements on the Avaya SI/SP team. The Power of We works on this team!

Languages

  • English

    -

Organizations

  • CCXP

    -

Recommendations received

33 people have recommended Rox Join now to view

View Rox’s full profile

  • See who you know in common
  • Get introduced
  • Contact Rox directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses