- Research Programmer at The University of Arizona
- Owner at Organik Designs
University of Arizona, , Economics
• Developed a low-memory database synchronization service to combat vendor instability, reduce network saturation, and offload processing power from production transaction system • Designed and implemented a Kimball-style dimensional data model to provide a single source of truth for reporting systems, ad-hoc analytics, and fast reprocessing of unstable data sets (ongoing) • Analyzed and fine-tuned SQL Server and data warehouse to balance speed with resource constraints • Championed a container-based development and deployment story to help facilitate company transition to public cloud services, multi-OS environments, and horizontally scaling solutions • Programmed and maintained several internal sites for reporting and data delivery • Implemented tooling for technical support to diagnose Point-of-Sales and distributed databases
March 2012 – April 2015(3 years 1 month)Tucson, Arizona Area
I work on the NETVUE project which is a US Navy contract awarded to the University of Arizona. The aim of NETVUE is to design an intuitive realtime visualization system using a simple unified metaphor—the geographic map—to readily visualize network activity of interest. The proposed visualization system will be used in conjunction with a distributed Intrusion Detection System (DIDS) to rapidly identify network intrusions such as port scans, denial-of-service attacks, and topological attacks in mobile networks. Notable tasks: • Implemented a C# backend server and front-end controller for network visualization • Simplified schema and streamlined internal data access layer of network metadata • Analyzed and fine-tuned SQL Server database schema to increase performance by 40% • Designed a C++/C# communication platform using Google protobuf with ZeroMQ • Performed thorough C# unit testing to achieve complete code coverage of internal libraries • Integrated an array of heterogeneous C++ and C# projects into a Windows installer • Authored server-side software design documents and software test plans
• Employed and integrated a variety of web frameworks and content management systems • Engineered and deployed a multitude of customizable and easily maintainable websites • Enhanced user experience via a steadfast philosophy of clean design and simple navigation • Delivered robust hosting with dynamic resource allocation for stable and consistent access • Provided e-commerce functionality with enterprise-level security features • Designed database schemas to allow for scalable data storage and rapid data retrieval
• Implemented a dependency manager for Win32 applications in Python and C++ • Managed OS X application access to license key server using customized Python tool • Developed a constraint-based scheduler to assign employee shifts and staffing locations • Created automated Bash scripts to deploy images, configure systems, and install programs • Maintained internal wiki of technical, procedural, and policy documents using Confluence • Provided ongoing second-tier support to achieve consistent levels of client satisfaction
2006 – 2010
Collection and visualization of dietary behavior and reasons for eating using a popular and free social media software application
Journal of Medical Internet Research (JMIR), Vol. 15, no. 6, p.125-145, 2013.
Increasing an individual’s awareness and understanding of their dietary habits and reasons for eating may help facilitate positive dietary changes. Mobile technologies allow individuals to record diet-related behavior in real time from any location; however, the most popular software applications lack empirical evidence supporting their efficacy as health promotion tools. The purpose of this study was to test the feasibility and acceptability of a popular social media software application (Twitter) to capture young adults’ dietary behavior and reasons for eating. A secondary aim was to visualize data from Twitter using a novel analytic tool designed to help identify relationships among dietary behaviors, reasons for eating, and contextual factors.
IMap: Visualizing Network Activity over Internet Maps
Visualization for Cyber Security Conference (VizSec)
We propose a novel visualization, IMap, which enables the detection of security threats by visualizing a large volume of dynamic network data. In IMap, the Internet topology at the Autonomous System (AS) level is represented by a canonical map (which resembles a geographic map of the world), and aggregated IP traffic activity is superimposed in the form of heat maps (intensity overlays). Specifically, IMap groups ASes as contiguous regions based on AS attributes (geo-location, type, rank, IP prefix space) and AS relationships. The area, boundary, and relative positions of these regions in the map do not reflect actual world geography, but are determined by the characteristics of the Internet’s AS topology. To demonstrate the effectiveness of IMap, we showcase two case studies, a simulated DDoS attack and a real-world worm propagation attack.
Skills & Expertise
- Software Design
- Data Analysis
- Project Management
- Cross-platform deployment
- Graph Drawing
- Software Engineering
- Agile Methodologies
- .NET Development