Profiles from Search

Profile photo

Mike Schneider

2nd

Previous positions

  • Research Programmer at The University of Arizona
  • Owner at Organik Designs

Education

University of Arizona, , Economics

90

Background

Summary

Proficient software engineer with several years of .NET (C#, C++) and Python experience. Focused on internal tools development. Familiarity with enterprise-level IDEs and algorithmic libraries. Productive in self-managed and team-oriented settings. Practiced in unit testing with high levels of code coverage. Thorough code documenter. Self-motivated in expanding industry knowledge. Also, vim > emacs.

Experience

  • Software Engineer

    Rubio’s Restaurants, Inc.

    September 2015 – Present(4 years 1 month)Carlsbad, CA

    • Developed a low-memory database synchronization service to combat vendor instability, reduce network saturation, and offload processing power from production transaction system • Designed and implemented a Kimball-style dimensional data model to provide a single source of truth for reporting systems, ad-hoc analytics, and fast reprocessing of unstable data sets (ongoing) • Analyzed and fine-tuned SQL Server and data warehouse to balance speed with resource constraints • Championed a container-based development and deployment story to help facilitate company transition to public cloud services, multi-OS environments, and horizontally scaling solutions • Programmed and maintained several internal sites for reporting and data delivery • Implemented tooling for technical support to diagnose Point-of-Sales and distributed databases

  • Research Programmer

    The University of Arizona

    March 2012 – April 2015(3 years 1 month)Tucson, Arizona Area

    I work on the NETVUE project which is a US Navy contract awarded to the University of Arizona. The aim of NETVUE is to design an intuitive realtime visualization system using a simple unified metaphor—the geographic map—to readily visualize network activity of interest. The proposed visualization system will be used in conjunction with a distributed Intrusion Detection System (DIDS) to rapidly identify network intrusions such as port scans, denial-of-service attacks, and topological attacks in mobile networks. Notable tasks: • Implemented a C# backend server and front-end controller for network visualization • Simplified schema and streamlined internal data access layer of network metadata • Analyzed and fine-tuned SQL Server database schema to increase performance by 40% • Designed a C++/C# communication platform using Google protobuf with ZeroMQ • Performed thorough C# unit testing to achieve complete code coverage of internal libraries • Integrated an array of heterogeneous C++ and C# projects into a Windows installer • Authored server-side software design documents and software test plans

  • Owner

    Organik Designs

    May 2008 – May 2012(4 years)Poway, CA

    • Employed and integrated a variety of web frameworks and content management systems • Engineered and deployed a multitude of customizable and easily maintainable websites • Enhanced user experience via a steadfast philosophy of clean design and simple navigation • Delivered robust hosting with dynamic resource allocation for stable and consistent access • Provided e-commerce functionality with enterprise-level security features • Designed database schemas to allow for scalable data storage and rapid data retrieval

  • Technical Lead

    University of Arizona

    April 2008 – March 2012(3 years 11 months)Tucson, Arizona Area

    • Implemented a dependency manager for Win32 applications in Python and C++ • Managed OS X application access to license key server using customized Python tool • Developed a constraint-based scheduler to assign employee shifts and staffing locations • Created automated Bash scripts to deploy images, configure systems, and install programs • Maintained internal wiki of technical, procedural, and policy documents using Confluence • Provided ongoing second-tier support to achieve consistent levels of client satisfaction

Education

Publications

  • Collection and visualization of dietary behavior and reasons for eating using a popular and free social media software application

    Journal of Medical Internet Research (JMIR), Vol. 15, no. 6, p.125-145, 2013.

    2013

    Increasing an individual’s awareness and understanding of their dietary habits and reasons for eating may help facilitate positive dietary changes. Mobile technologies allow individuals to record diet-related behavior in real time from any location; however, the most popular software applications lack empirical evidence supporting their efficacy as health promotion tools. The purpose of this study was to test the feasibility and acceptability of a popular social media software application (Twitter) to capture young adults’ dietary behavior and reasons for eating. A secondary aim was to visualize data from Twitter using a novel analytic tool designed to help identify relationships among dietary behaviors, reasons for eating, and contextual factors.

    Authors (7):
    • Mike Schneider,
    • Randy Burd, Ph.D.,
    • Mike Schneider,
    • Mike Schneider,
    • Mike Schneider,
    • Mike Schneider,
    • Mike Schneider
  • IMap: Visualizing Network Activity over Internet Maps

    Visualization for Cyber Security Conference (VizSec)

    2014

    We propose a novel visualization, IMap, which enables the detection of security threats by visualizing a large volume of dynamic network data. In IMap, the Internet topology at the Autonomous System (AS) level is represented by a canonical map (which resembles a geographic map of the world), and aggregated IP traffic activity is superimposed in the form of heat maps (intensity overlays). Specifically, IMap groups ASes as contiguous regions based on AS attributes (geo-location, type, rank, IP prefix space) and AS relationships. The area, boundary, and relative positions of these regions in the map do not reflect actual world geography, but are determined by the characteristics of the Internet’s AS topology. To demonstrate the effectiveness of IMap, we showcase two case studies, a simulated DDoS attack and a real-world worm propagation attack.

    Authors (7):
    • Mike Schneider,
    • Thienne Johnson,
    • Mike Schneider,
    • Mike Schneider,
    • Mike Schneider,
    • Mike Schneider,
    • Mike Schneider

Skills & Expertise

  • Leadership
  • Software Design
  • Data Analysis
  • Project Management
  • C#
  • Databases
  • Python
  • Cross-platform deployment
  • Management
  • Linux
  • Graph Drawing
  • C++
  • Access
  • Software Engineering
  • Agile Methodologies
  • Programming
  • Java
  • .NET Development