Back in 2011, I thought it would only be a question of time before we have a drive by execution of a politician with an ICD (implanted cardiac device).
There was a flurry of excitement about this sort of remote-control exploit that sort of died out although the vulnerabilities continue to surface.
There was even an episode of CSI New York that used the concept of an EMP to kill a person with an ICD.
In fact, a radio exploit of an ICD or embedded insulin pump might be almost impossible to identify unless the device itself was logging external…
4 reasons why electronic health record systems need to go
When you have a non-value added activity or an activity with negative ROI, the first thing to do is to eliminate it. A policy started by the Obama administration of stimulating adoption of electronic health records created a Golem who destroyed his creator.
For every 8 hours of scheduled patient time, ambulatory physicians spend more than 5 hours on the EHR... …
Why drug companies miss their data and safety targets
It’s been a long time since I posted; but this is one I’ve been wanting to share for a while. I have a sign over my desk in the office :
Never mistake activity for achievement — John Wooden
John Wooden was the legendary UCLA basketball coach who won NCAA national championships in a 12-year period as head coach for the UCLA Bruins, including a record seven in a row. Wooden coached players at UCLA who would later become stars — players like layers Kareem Abdul-Jabbar and Bill Walton. …
and you need to stop guessing.
I honestly don’t know where or how to start this post.
I have more questions than answers.
It all started almost a year ago with an idea to create an API service that takes data from clinical trials and automate anomaly detection.
The what (“Anomaly detection of structured high-dimensional time-series data”) was clear. Build an online service to detect anomalies in clinical data; send a JSON structure and we’ll tell you what data samples are suspicious.
The why and who was also clear — help democratize clinical data anomaly detection and make devices and…
This is an essay I started writing over a year ago.
I just discovered it in my folder of drafts.
Today — one might claim that the essay is no longer relevant. After all — look how Pfizer and Moderna ramped up RNA technology into a vaccine in less than 12 months.
Then again — look how AstraZeneca, one of the great life science companies didn’t make it to the finish line and mis-dosed 20% of their patients in their pivotal clinical trial.
The CRO outsourcing model and high US hospital prices result in higher total CRO profits via higher…
We are bombarded on social media with people posting on how to start, develop and run a tech startup.
I’m not sure, but I think that we have reached a tipping point in lack of relevance on LinkedIn.
The general vibe goes something like this:
He Started At 52 And Just Raised $100M To Disrupt The Health Insurance Industry
This is a founder who has taken a startup full cycle and is now on his second big adventure. During our time on the Podcast, Mark shared how he found his sweet spot in business, the differences between starting a company…
I started thinking about the constraints on technology for automating protocol compliance detection and response in connected wearable devices.
The best anomaly detection technology will not help you get a killer product to market if the engineering team is dysfunctional.
The latest and greatest real-time streaming analytics on your micro-services performance can help an engineer whip through debugging a performance bottleneck in the system.
But, what about performance bottlenecks in the team?
When an engineer on the team goes off into a black-hole to do her own thing, the speed of real-time analytics and the cost of losing a team…
A recent NY Times article speaks about a Swiss cheese model of protecting people from the SARS-COV-2 virus.
A layered defense model for Corona makes eminent sense.
SARS-COV-2 is going to be around for a long time. Forward defense and defense-in-depth were used in Roman times and are the standard for the past 50 years for network and application security.
In this post, I’ll do a threat analysis and suggest 6 reasons why the Swiss-cheese defense is not effective for SARS-COV-2.
I’ll conclude this essay with some thoughts on distributed defenses independent of central control.
The first reason is fundamental…
Once upon a time, there was a princess. She went to Stanford and studied medicine and then did a PhD in computer science after getting her MD.
Her father, the king; said “go out and do something useful with your life”.
The princess said:
“I will change the world and make a mobile personal health record that will empower patients by connecting them seamlessly with their healthcare providers’ EHR using FHIR and package it in a mobile app with a beautiful UX for Apple IOS. Patients will be able to share and engage on Instagram”
The queen told her:
I am a physicist by training, serious amateur musician and everyday biker. Working in cybersecurity and AI-driven monitoring of clinical trials.