Tim H.

Tim H.

United States
3K followers 500+ connections

About

My exuberant passion for cyber security spans different information security sectors. One…

Articles by Tim

Activity

Join now to see all activity

Experience

  • Computers 2 Kids Graphic

    Computers 2 Kids

    San Diego, California, United States

  • -

    Del Mar, CA

  • -

    Greater San Diego Area

  • -

    Greater San Diego Area

  • -

    Greater San Diego Area

  • -

    Greater San Diego Area

  • -

    Greater San Diego Area

  • -

    San Diego, CA

  • -

    San Diego, CA

  • -

    San Diego, CA

  • -

    San Diego, CA

  • -

    San Diego, CA

Education

  • UC San Diego Jacobs School of Engineering Graphic

    UC San Diego Jacobs School of Engineering

    "In the Data Science and Engineering program, engineering professionals combine the skills of software programmer, database manager, and statistician to create mathematical models of the data, identify trends/deviations, then present them in effective visual ways that can be understood by others.

    Data scientists unlock new sources of economic value, provide fresh insights into science, and inform decision makers by analyzing large, diverse, complex, longitudinal, and distributed data…

    "In the Data Science and Engineering program, engineering professionals combine the skills of software programmer, database manager, and statistician to create mathematical models of the data, identify trends/deviations, then present them in effective visual ways that can be understood by others.

    Data scientists unlock new sources of economic value, provide fresh insights into science, and inform decision makers by analyzing large, diverse, complex, longitudinal, and distributed data sets generated from instruments, sensors, internet transactions, email, video, and other digital sources. Students entering the MAS program for a degree in Data Science and Engineering will undertake courses in programming, analysis, and applications management and visualization." - About DSE, UCSD (https://jacobsschool.ucsd.edu/mas/dse)

  • The mentorship program is designed as a series of weekly mentor led discussion and review sessions along with various student support and communication methods, spanning a total of 9 weeks. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

    The Professionally Evil CISSP Mentorship program uses multiple…

    The mentorship program is designed as a series of weekly mentor led discussion and review sessions along with various student support and communication methods, spanning a total of 9 weeks. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

    The Professionally Evil CISSP Mentorship program uses multiple communication and knowledge sharing paths to build a comprehensive learning environment focused on both passing the CISSP certification and gaining a deep understanding of the CBK.

    Official study guide book
    Weekly live session with instructor(s)
    Live session will be recorded
    Private Slack team for students and instructors to communicate regularly
    Practice exams

  • Scholarship Award Details

    The self-paced e-learning path for this certification includes three courses and two exams, representing a significant monetary investment in your career:
    - "Introduction to Cybersecurity," a Cisco Networking Academy course
    - "Understanding Cisco Cybersecurity Fundamentals" (SECFND), first course in the CCNA Cyber Ops curriculum
    - "Implementing Cisco Cybersecurity Operations" (SECOPS), second course in the CCNA Cyber Ops curriculum
    -…

    Scholarship Award Details

    The self-paced e-learning path for this certification includes three courses and two exams, representing a significant monetary investment in your career:
    - "Introduction to Cybersecurity," a Cisco Networking Academy course
    - "Understanding Cisco Cybersecurity Fundamentals" (SECFND), first course in the CCNA Cyber Ops curriculum
    - "Implementing Cisco Cybersecurity Operations" (SECOPS), second course in the CCNA Cyber Ops curriculum
    - Two accompanying CCNA Cyber Ops exams (210-250 SECFND and 210-255 SECOPS)
    - Mentoring and coaching for all three of the above courses

    Cisco will deliver the program in partnership with key Cisco Authorized Learning Partners, which will provide the mentoring and coaching.

    The cost of all training, mentoring and coaching, and exam fees good toward completion of a CCNA Cyber Ops certification is included in the scholarship.

  • Activities and Societies: Cyber Security Capture the Flag (CTF) Competitions

    • Evaluate the interaction and impact of human factors, processes and technology in CSIA infrastructures
    • Devise mitigation plan against external & internal vulnerabilities to computer infrastructures & sensitive digital assets
    • Support risk assessment strategies & processes to maximize effectiveness and minimize costs of CSIA in a high assurance information system.
    • Integrate systems-level-infrastructure thinking into problem identification and resolution, and effectively…

    • Evaluate the interaction and impact of human factors, processes and technology in CSIA infrastructures
    • Devise mitigation plan against external & internal vulnerabilities to computer infrastructures & sensitive digital assets
    • Support risk assessment strategies & processes to maximize effectiveness and minimize costs of CSIA in a high assurance information system.
    • Integrate systems-level-infrastructure thinking into problem identification and resolution, and effectively communicate the solution
    • Prescribe how to provide message privacy, integrity, authentication and non-repudiation using security practices and infrastructure hardening techniques.
    • Evaluate/contrast the impact of ethical perspectives, cultural customs and organizational political dynamics
    • Forecast the impact of advancing technology and national and international cyber-legislation.
    • Conduct in-depth research into a specific CSIA topic
    • Integrate project development skills in producing a security system

  • Activities and Societies: Association of Scientists, Engineers and Technologists (ASET)

    • Determined software requirements specifications, as well as designed and developed complex software systems
    • Evaluated computer security vulnerabilities and threats
    • Analyzed, designed and developed database solutions by translating database modeling theory into sound database design and implementation
    • Analyzed and designed complex front-end applications for cloud and client-server architectures and integrate them with backend databases
    • Compared & contrasted alternative…

    • Determined software requirements specifications, as well as designed and developed complex software systems
    • Evaluated computer security vulnerabilities and threats
    • Analyzed, designed and developed database solutions by translating database modeling theory into sound database design and implementation
    • Analyzed and designed complex front-end applications for cloud and client-server architectures and integrate them with backend databases
    • Compared & contrasted alternative systems for process and memory management
    • Conducted in-depth research, both individually as well as in teams, in a specific computer science area
    • Implemented critical thinking and ability to analyze and synthesize computer science concepts and skills with ethical standards.
    • Utilized the above skills to create a capstone project that helps students with capstone project

  • • Security and Risk Management: Confidentiality, integrity and availability concepts; legal and regulatory issues; threat modeling
    • Asset Security: Information and asset clarification, ownership (e.g., data owners, system owners)
    • Security Engineering: Engineering processes using design principles, security models fundamental concepts
    • Communication and Network Security: Secure network architecture design (e.g., IP and non-IP protocols, segmentation)
    • Identity and Access…

    • Security and Risk Management: Confidentiality, integrity and availability concepts; legal and regulatory issues; threat modeling
    • Asset Security: Information and asset clarification, ownership (e.g., data owners, system owners)
    • Security Engineering: Engineering processes using design principles, security models fundamental concepts
    • Communication and Network Security: Secure network architecture design (e.g., IP and non-IP protocols, segmentation)
    • Identity and Access Management: Physical and logical assets control, access control attacks
    • Security Assessment and Testing: Assessment and test strategies, security process data (e.g., management and operational controls), security control testing, test outputs (e.g., automated, manual)
    • Security Operations: Investigations support and requirements, provisioning of resources,, incident management
    • Software Development Security: Security in the software development lifecycle, development environment security controls

  • • Background: networking technologies (e.g. hardware, infrastructure), webtechnologies (e.g., web 2.0, skype), systems technologies
    • Analysis/Assessment: data analysis, systems analysis, risk assessments, and technical assessment methods
    • Security: systems security controls, application/fileserver, firewalls, cryptography, network security, physical security, threat modeling, verification procedures (e.g., false positive/negative validation), social engineering (human factors…

    • Background: networking technologies (e.g. hardware, infrastructure), webtechnologies (e.g., web 2.0, skype), systems technologies
    • Analysis/Assessment: data analysis, systems analysis, risk assessments, and technical assessment methods
    • Security: systems security controls, application/fileserver, firewalls, cryptography, network security, physical security, threat modeling, verification procedures (e.g., false positive/negative validation), social engineering (human factors manipulation), vulnerability scanners, security policy implications,
    • Tools/Systems/Programs: network/host based intrusion, network/wireless sniffers, access control mechanisms (e.g., smart cards), cryptography techniques (e.g., IPsec, SSL, PGP), programming languages, script languages
    • Procedures/Methodology: cryptography, public key infrastructure (PKI), Security Architecture (SA),
    • Regulation/Policy
    • Ethics

  • • Described the security threats facing modern network infrastructures
    • Secured Cisco routers
    • Implemented AAA on Cisco routers using a local router database and external server
    • Mitigated threats to Cisco routers and networks using ACLs
    • Implemented secure network design, management, and reporting
    • Mitigated common Layer 2 attacks
    • Implemented the Cisco IOS® firewall feature set
    • Deployed the Cisco ASA for firewalling and NAT/PAT services
    • Implemented the Cisco…

    • Described the security threats facing modern network infrastructures
    • Secured Cisco routers
    • Implemented AAA on Cisco routers using a local router database and external server
    • Mitigated threats to Cisco routers and networks using ACLs
    • Implemented secure network design, management, and reporting
    • Mitigated common Layer 2 attacks
    • Implemented the Cisco IOS® firewall feature set
    • Deployed the Cisco ASA for firewalling and NAT/PAT services
    • Implemented the Cisco IOS IPS feature set
    • Implemented a site-to-site VPN
    • Implemented a remote access VPN

  • Activities and Societies: Learning Labs

    CCNA Routing & Switching: Connecting Networks
    • Understood and described different WAN technologies and their benefits
    • Understood and described the operations and benefits of virtual private networks (VPNs)
    and tunneling
    • Understood, configured, and troubleshot serial connections
    • Understood, configured, and troubleshot broadband connections
    • Understood, configured, and troubleshot tunneling operations
    • Understood, configured, and troubleshot Network Address…

    CCNA Routing & Switching: Connecting Networks
    • Understood and described different WAN technologies and their benefits
    • Understood and described the operations and benefits of virtual private networks (VPNs)
    and tunneling
    • Understood, configured, and troubleshot serial connections
    • Understood, configured, and troubleshot broadband connections
    • Understood, configured, and troubleshot tunneling operations
    • Understood, configured, and troubleshot Network Address Translation (NAT) operations
    • Monitored and troubleshot network operations using syslog, SNMP, and NetFlow
    • Understood and described network architecture

  • Activities and Societies: Learning Labs

    CCNA Routing & Switching: Scaling Networks
    • Understood, configured, and troubleshot enhanced switching technologies such as
    VLANs, Rapid Spanning Tree Protocol (RSTP), Per VLAN Spanning Tree Plus Protocol
    (PVST+), and EtherChannel
    • Understood, configured, and troubleshot first hop redundancy protocols (HSRP) in a
    switched network
    • Understood, configured, and troubleshot wireless routers and wireless clients
    • Configured and troubleshot routers in a complex routed IPv4…

    CCNA Routing & Switching: Scaling Networks
    • Understood, configured, and troubleshot enhanced switching technologies such as
    VLANs, Rapid Spanning Tree Protocol (RSTP), Per VLAN Spanning Tree Plus Protocol
    (PVST+), and EtherChannel
    • Understood, configured, and troubleshot first hop redundancy protocols (HSRP) in a
    switched network
    • Understood, configured, and troubleshot wireless routers and wireless clients
    • Configured and troubleshot routers in a complex routed IPv4 and IPv6 network using
    single-area OSPF, multiarea OSPF, and Enhanced Interior Gateway Routing Protocols
    (EIGRP)
    • Managed Cisco IOS® Software licensing and configuration files

  • Activities and Societies: Learning Labs

    CCNA Routing and Switching: Routing and Switching Essentials
    • Understood and described basic switching concepts and the operation of Cisco switches
    • Understood and described enhanced switching technologies
    • Understood and described dynamic routing protocols, distance vector routing protocols, and link-state routing protocols
    • Configured and troubleshot basic operations in a small switched and routed network
    • Configured and troubleshot VLANs and inter-VLAN routing
    •…

    CCNA Routing and Switching: Routing and Switching Essentials
    • Understood and described basic switching concepts and the operation of Cisco switches
    • Understood and described enhanced switching technologies
    • Understood and described dynamic routing protocols, distance vector routing protocols, and link-state routing protocols
    • Configured and troubleshot basic operations in a small switched and routed network
    • Configured and troubleshot VLANs and inter-VLAN routing
    • Understood and described the purpose and types of access control lists (ACLs)
    • Configured, monitored, and troubleshot ACLs for IPv4 and IPv6
    • Understood and described the operations and benefits of Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) for IPv4 and IPv6
    • Understood, described, configured and troubleshot the operations of Network Address Translation (NAT)

  • Activities and Societies: Cisco Live 2012 San Diego

    CCNA Exploration: LAN Switching and Wireless
    • Explained basic switching concepts and the operation and configuration of Cisco switches
    • Described enhanced switching technologies such as VLANs, VLAN Trunking Protocol (VTP), Rapid Spanning Tree Protocol (RSTP), Per VLAN Spanning Tree Protocol (PVSTP), and 802.1q
    • Identified and described the purpose of the components in a small wireless network, such as Service Set Identification (SSID), Basic Service Set (BSS), and Extended Service…

    CCNA Exploration: LAN Switching and Wireless
    • Explained basic switching concepts and the operation and configuration of Cisco switches
    • Described enhanced switching technologies such as VLANs, VLAN Trunking Protocol (VTP), Rapid Spanning Tree Protocol (RSTP), Per VLAN Spanning Tree Protocol (PVSTP), and 802.1q
    • Identified and described the purpose of the components in a small wireless network, such as Service Set Identification (SSID), Basic Service Set (BSS), and Extended Service Set (ESS)
    • Configured, verified, and troubleshot VLANs, trunking on Cisco switches, interVLAN routing, VTP, and RSTP
    • Identified, prescribed, and resolved common switched network media issues, configuration issues, autonegotiation, and switch hardware failures

  • Activities and Societies: Cisco Networking Academy

    CCNA Exploration: Accessing the WAN
    • Described the impact of Voice Over IP and Video Over IP applications on a network
    • Described the components required for network and Internet communications
    • Implemented basic switch security measures such as port security, trunk access, and management VLANs
    • Configured, verified and troubleshot DHCP and DNS operations on a router
    • Described the functions of common security appliances and applications
    • Described, configured, applied…

    CCNA Exploration: Accessing the WAN
    • Described the impact of Voice Over IP and Video Over IP applications on a network
    • Described the components required for network and Internet communications
    • Implemented basic switch security measures such as port security, trunk access, and management VLANs
    • Configured, verified and troubleshot DHCP and DNS operations on a router
    • Described the functions of common security appliances and applications
    • Described, configured, applied, monitored, and troubleshot Access Control Lists based on network requirements
    • Explained, configured, verified, and troublesoot Network Address Translation (NAT) for given network requirements
    • Configured and verified basic WAN serial connections including serial, Point-to-Point, and Frame Relay
    • Described the importance, benefits, role, impact, and components of VPN technology
    • Described recommended security practices to secure network devices

  • Activities and Societies: Cisco Live 2012 San Diego

    CCNA Exploration: Networking Fundamentals
    • Used network protocol models to explain the layers of communications in data networks
    • Designed, calculated, and applied subnet masks and addresses
    • Built a simple Ethernet network using routers and switches
    • Employed basic cabling and network designs to connect devices
    • Used Cisco CLI commands to perform basic router and switch configuration and verification
    CCNA Exploration: Routing Protocols and Concepts
    • Configured and…

    CCNA Exploration: Networking Fundamentals
    • Used network protocol models to explain the layers of communications in data networks
    • Designed, calculated, and applied subnet masks and addresses
    • Built a simple Ethernet network using routers and switches
    • Employed basic cabling and network designs to connect devices
    • Used Cisco CLI commands to perform basic router and switch configuration and verification
    CCNA Exploration: Routing Protocols and Concepts
    • Configured and verified router interfaces
    • Identified the characteristics of distance vector routing protocols
    • Demonstrated comprehensive RIP configuration skills
    • Designed and implemented a classless IP addressing scheme for a given network
    • Used advanced configuration commands with routers implementing EIGRP
    • Described the basic features and concepts of link-state routing protocols
    • Described and configured basic OSPF

Licenses & Certifications

Volunteer Experience

  • Wild West Hackin'​ Fest Graphic

    Volunteer

    Wild West Hackin'​ Fest

    - 1 month

    Wild West Hackin' Fest - Way West 2022 (San Diego)
    • Moderated training course for virtual attendees and ensured that everyone knew that technical issues would be resolved as quickly as possible.
    • Ensured that virtual attendees received the information needed during the talks in Track 2 via utilizing a video camera to capture the movements of the speakers.
    • Engaged in pre-conference planning to ensure successful preparation of the conference.

  • BSides San Diego Graphic

    Castle Defense Track Coordinator

    BSides San Diego

    - 6 months

    Science and Technology

    Helping the BSides San Diego organization with getting everything ready for the BSides San Diego 2020 Information Security conference in March 2020 at National University.

    Managing the Castle Defense Track where speakers discuss topics relating to Blue Teaming (Defensive Operations - vulnerability scanning, incident response, Security Operations Center (SOC), etc.)

  • OUTCERT Graphic

    Volunteer

    OUTCERT

    - 1 month

    Open Source Summit & Embedded Linux Conference 2019
    • Helped founder with promoting the company via the Sponsor Showcase Expo at the OSS & ELC 2019
    • Encouraged attendees to gain information via the OutCert website if they are working towards certifications.
    • Supported founder in gaining sponsors and partners for OutCert

  • National Cyber League Graphic

    Participant

    National Cyber League

    - 2 months

    The NCL was founded in May 2011 to provide an ongoing virtual training ground for collegiate students to develop, practice, and validate their cybersecurity skills. Using lab exercises designed around industry recognized performance-based exam objectives and aligned with individual and team games, the NCL is a first-of-its-kind ongoing experiment in learning and gaming using next-generation high-fidelity simulation environments. Learn more about the NCL at www.nationalcyberleague.org. If you…

    The NCL was founded in May 2011 to provide an ongoing virtual training ground for collegiate students to develop, practice, and validate their cybersecurity skills. Using lab exercises designed around industry recognized performance-based exam objectives and aligned with individual and team games, the NCL is a first-of-its-kind ongoing experiment in learning and gaming using next-generation high-fidelity simulation environments. Learn more about the NCL at www.nationalcyberleague.org. If you are interested in validating the information in this report, explore the 2016 Fall season at www.nationalcyberleague.org/seasons.shtml or inquire at [email protected].

  • National Cyber League Graphic

    Participant

    National Cyber League

    - 2 months

    Science and Technology

    The NCL was founded in May 2011 to provide an ongoing virtual training ground for collegiate students to develop, practice, and validate their cybersecurity skills. Using lab exercises designed around industry recognized performance-based exam objectives and aligned with individual and team games, the NCL is a first-of-its-kind ongoing experiment in learning and gaming using next-generation high-fidelity simulation environments. Learn more about the NCL at www.nationalcyberleague.org. If you…

    The NCL was founded in May 2011 to provide an ongoing virtual training ground for collegiate students to develop, practice, and validate their cybersecurity skills. Using lab exercises designed around industry recognized performance-based exam objectives and aligned with individual and team games, the NCL is a first-of-its-kind ongoing experiment in learning and gaming using next-generation high-fidelity simulation environments. Learn more about the NCL at www.nationalcyberleague.org. If you are interested in validating the information in this report, explore the 2015 Fall season at www.nationalcyberleague.org/seasons.shtml or inquire at [email protected].

    The 2015 NCL Fall season was designed to develop and validate player knowledge and skills in preparation for further learning, career readiness, industry certifications, and other cybersecurity competitions. Hosted lab exercises in the NCL Gymnasiums were made available to all players and coaches and aligned to the games. Both the lab exercises and games were designed around performance-based exam objectives of the CompTIA Security+™ and EC-Council Certified Ethical Hacker (CEH™) certifications.

    The 2015 Fall season began with the Preseason round to group players into one of three competition brackets based on skill level: Gold (top 15% of all players nationally - 232 players), Silver (the next 35% of all players nationally - 503 players) or Bronze (the next 50% of all players nationally - 715 players). This made the Regular season more fun and engaging by grouping players with similar knowledge and skill levels and providing them with appropriate challenges. At the beginning of the 2015 Fall season, 2,153 students/players (up from 1,368 in 2014) and 298 faculty/coaches (up from 233 in 2014) from 120 two- and four-year schools in 41 U.S. states (up from 35 in 2014) registered to play.

Honors & Awards

  • 2021 Cisco Champion

    Cisco Systems

    Cisco Champions are passionate experts who share their perspectives with the community.

  • 2020 Cisco Champion

    Cisco Systems

    Cisco Champions are passionate experts who share their perspectives with the community.

  • 2019 Cisco Champion

    Cisco Systems

    Cisco Champions are passionate experts who share their perspectives with the community.

  • 2018 Cisco Champion

    Cisco Systems

    Cisco Champions are passionate experts who share their perspectives with the community.

  • 2017 Cisco Champion

    Cisco Systems

    Cisco Champions are passionate experts who share their perspectives with the community.

  • 2016 Cisco Champion

    Cisco Systems

    Cisco Champions are passionate experts who share their perspectives with the community.

Languages

  • English

    -

Organizations

  • Information Systems Security Association (ISSA)

    https://www.issa.org/

    - Present

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Mission Statement ISSA is a nonprofit organization for the information security profession committed to promoting effective cyber security on a global basis. a) Being a respected…

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Mission Statement ISSA is a nonprofit organization for the information security profession committed to promoting effective cyber security on a global basis. a) Being a respected forum for networking and collaboration b) Providing education and knowledge sharing at all career lifecycle stages c) Being a highly regarded voice of information security that influences public opinion, government legislation, education and technology with objective expertise that supports sound decision-making

  • Open Web Application Security Project (OWASP) San Diego

    https://www.owasp.org/index.php/SanDiego

    -

    The OWASP Foundation came online on December 1st 2001 it was established as a not-for-profit charitable organization in the United States on April 21, 2004 to ensure the ongoing availability and support for our work at OWASP. OWASP is an international organization and the OWASP Foundation supports OWASP efforts around the world. OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP…

    The OWASP Foundation came online on December 1st 2001 it was established as a not-for-profit charitable organization in the United States on April 21, 2004 to ensure the ongoing availability and support for our work at OWASP. OWASP is an international organization and the OWASP Foundation supports OWASP efforts around the world. OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas. We can be found at www.owasp.org. OWASP is a new kind of organization. Our freedom from commercial pressures allows us to provide unbiased, practical, cost-effective information about application security. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. Similar to many open-source software projects, OWASP produces many types of materials in a collaborative and open way. The OWASP Foundation is a not-for-profit entity that ensures the project's long-term success.

  • San Diego Cisco User Group (SDCUG)

    https://www.meetup.com/San-Diego-Cisco-User-Group/

    -

    The San Diego Cisco User Group (SDCUG) aims to improve a network professional’s life and professional career. This means getting your Cisco certification to enhance your job prospects, skills and overall performance (and still have a personal life). This group is designed to focus on helping people study for and obtain Cisco certifications and develop a solid foundation on networking technology.

  • Association of Scientists, Engineers and Technologists (ASET)

    http://asethome.org/

    -

    ASET is an interdisciplinary professional organization dedicated to promoting collaborations among engineers, scientists and technologists in order to build the future societies with innovations. Quality of life has come to depend on Science, Engineering and Technology to a great extent and their impacts on all walks of life are likely to increase exponentially. The mission of ASET is to sponsor forums for exchange of ideas among faculty members and practitioners in Science, Engineering and…

    ASET is an interdisciplinary professional organization dedicated to promoting collaborations among engineers, scientists and technologists in order to build the future societies with innovations. Quality of life has come to depend on Science, Engineering and Technology to a great extent and their impacts on all walks of life are likely to increase exponentially. The mission of ASET is to sponsor forums for exchange of ideas among faculty members and practitioners in Science, Engineering and Technology in order to achieve greater cooperation. http://asethome.org/

Recommendations received

More activity by Tim

View Tim’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tim directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Tim H. in United States