Computer scientist with more than fifteen years of programming experience developing large scale distributed high-performance systems. Also an expert in computer security and reverse engineering of complex systems to locate and assess their vulnerability to hacking. Hands-on experience designing networked safety- and mission-critical systems as well as programming real-time embedded systems. Technical specializations in database architectures, network protocols, user interfaces, and operating systems including Linux and Windows. Also familiar with commercial cloud computing platforms.

Formal Education

  • M.S. in Computer Science, Johns Hopkins University
  • B.S. in Math and Computer Science, University of Maryland

Career Highlights

  • Developed multiple Java VM-based distributed systems utilizing distributed storage technologies to analyze and present real time information to business analysts
  • Certified in reverse engineering with industry-standard tools and co-creator of an open cloud-based disassembler platform with similar applications in reverse engineering of binary software and analysis of malware
  • Built software systems capable of storing tens of millions of indexed documents as well as handling up to 100 million transactions per day
  • While a scientist at a major U.S. military research facility, developed embedded ballistic routines for 5-inch and 57mm naval gun systems (on a real-time operating system) as well as associated real-time data analytics software (in Java for a commercial operating system)
  • Developer of a flexible testing harness for embedded systems using a dynamic language and C#

Expert Qualifications

  • As a consulting expert for the plaintiff in software copyright and trade secrets litigation before a U.S. District Court, reviewed source code for high-performance enterprise database architectures

Related Experts

Frequently Asked Questions

What types of cases can this expert support?

This expert has consulted on software copyright and trade secrets disputes in federal court. They can handle cases involving cloud systems, security vulnerabilities, enterprise databases, or embedded firmware where they have direct technical experience.

What is this expert's technical background?

This expert has a master's degree in Computer Science from Johns Hopkins and fifteen years of production systems experience. They've built systems handling 100 million transactions per day, worked on embedded ballistic software at the Naval Surface Warfare Center, and are certified in reverse engineering with IDA Pro.

What technologies does this expert specialize in?

This expert codes in C, C#, Python, Java, and assembly across Linux, Windows, RTOS, and AWS platforms. They specialize in database architectures, network protocols, and embedded systems. Reverse engineering of binaries and white hat security analysis are also core strengths.