Archives for dmsnyder

June 10, 2025 Climate Restoration Presentation

You won’t want to miss this presentation on Climate Restoration. It tells how a novel approach will be used to remove enough carbon dioxide from the air to reverse global warming. It uses a natural process that happens when dust and volcanic ash blow into the ocean.

Iron in this dust helps phytoplankton grow and this microscopic plant life captures carbon dioxide through photosynthesis.

The presentation will explain work underway to develop monitoring technology to guide the process and a pilot project planned for the near future. If all goes well, the process can be scaled up to operate worldwide. I’ll be announcing the launch of a new nonprofit organization to do this work.

On June 10, 2025 at 7:00 PM (Pacific), you can attend in person in Milpitas, CA or online via Zoom. Pre-registration is required as space is limited both in-person and online. See https://californiaconsultants.org/event/climate-restoration-using-natural-processes/.

If you cannot attend or listen in, check out these resources:

D. Snyder and P. Fiekowsky, “Implementing Climate Restoration This Decade,” https://42tek.com/wp-content/uploads/2025/05/SnyderFiekowsky_ClimateRestoration.pdf

https://www.onepercentbrighter.com/p/the-reason-youve-never-heard-of-ocean?utm_campaign=post

https://www.onepercentbrighter.com/p/fertilizing-the-ocean-does-two-things

Also see the book written by Peter Fiekowsky and Carole Douglis. https://www.rivertownsbooks.com/book-page/ebook-climate-restoration-by-peter-fiekowsky-with-carole-douglis 

and the essay at https://climaterestoration.substack.com/p/the-startling-math-of-ocean-iron 

‘want to talk about it? Contact me at david@42tek.com

Climate Restoration Presentations

This week, I presented three talks at the 12th IEEE Conference on Technologies for Sustainability (SusTech 2025) – “Inspiring Technology Solutions for Climate Sustainability” https://ieee-sustech.org in Santa Ana, CA: “The Dose Makes the Poison – Too Much Carbon Dioxide,” “Implementing Climate Restoration This Decade,” and “Carbon Dioxide Measurement for Climate Restoration.” 

The bottom line is this. It looks like we can replicate a natural process to remove carbon dioxide from the atmosphere to reverse global warming. A pilot study is proposed to confirm this. Contact me if you would like to help fund this.

The paper I co-authored with Peter Fiekowsky will be in the conference proceedings.

To read about Climate Restoration, see the book written by Peter Fiekowsky and Carole Douglis. https://www.rivertownsbooks.com/book-page/ebook-climate-restoration-by-peter-fiekowsky-with-carole-douglis and the essay at https://climaterestoration.substack.com/p/the-startling-math-of-ocean-iron.

Do you care about the climate?

Consider attending the April 20-24, 2025 12th IEEE Conference on Technologies for Sustainability (SusTech 2025) – “Inspiring Technology Solutions for Climate Sustainability” https://ieee-sustech.org In-person in Santa Ana, CA and online via Zoom. Early-bird registration is open now.

During the April 20 “Technologies for a Circular Economy” workshop, I’ll give a talk on “The Dose Makes the Poison – Too Much Carbon Dioxide.” On April 22, I’ll present a Keynote entitled “Carbon Dioxide Measurement for Climate Restoration.” Also during one of the sessions, I’ll present the paper I co-authored with Peter Fiekowsky entitled “Implementing Climate Restoration This Decade.” 

To read about Climate Restoration, see the book written by Peter Fiekowsky and Carole Douglis. https://www.rivertownsbooks.com/book-page/ebook-climate-restoration-by-peter-fiekowsky-with-carole-douglis and the essay at https://climaterestoration.substack.com/p/the-startling-math-of-ocean-iron.

Updates

IEEE World Technology Summit on AI Infrastructure, November 12-14, 2024 at the San Jose Convention Center

A lot of conferences are about the What of AI. This one was about the How – that is, the underlying infrastructure needed to support AI.  This means the silicon, systems, and applications, plus security, standards and regulations to provide the framework for success.

The event featured top executives from around the world discussing how to solve our immediate problems, focusing on these core areas:

  • Al applications and their required infrastructure
  • Silicon to support Al applications
  • Systems to support Al applications
  • Security & Standards & Laws

 I moderated the session on Security & Standards & Laws.

All of the speakers were from industry, except one from UC Berkeley and one from the National Science Foundation.

Attendees came away with increased understanding of challenges and solutions in providing the infrastructure needed to support the fast-growing AI industry.

TUESDAY November 12

Event Reception

WEDNESDAY November 13

Morning:

Welcome & Keynote

AI Applications

Applications utilizing Artificial Intelligence are growing rapidly but to enable them the suitable infrastructure must be there. Key growing areas including Large Language Models, Medical applications (consumer and professional), Electronic Design Automation, and Digital Twins are greatly influencing the requirements for infrastructure. This session will examine these and other topics to understand their possible growth and infrastructure needs. 

Afternoon:

Silicon

The underlying silicon is a critical enabler for computing in Artificial Intelligence and its infrastructure.  This session illustrates multiple perspectives on challenges in silicon technologies for AI/ML and its impact on AI/ML solutions.  We will consider different aspects including silicon architectures, development and verification challenges, packaging, and aspects of energy consumption and cooling.

THURSDAY November 14

Morning:

Systems

Although there are many elements to providing AI solutions from servers to edge to client, one of the key current challenges rests in the server technology.  Servers provide the backbone necessary for complex computation and data management that AI needs to provide its services.  Both power and cooling are critical elements that if not available and managed, we will not be able to provide the computational power needed to make them happen.  This session considers the challenges spanning from server to edge to client, but the primary focus is keeping the servers operating.

Afternoon:

Security & Standards

There are concerns about risks involving both the development and use of AI. Everyone working on AI Infrastructure needs to be mindful of these concerns. With respect to Security, this session considers cybersecurity risks affecting the computation involved in providing AI products and services and also possible adverse impacts from the use or abuse of AI. With respect to Standards, this session includes work by IEEE on the development of standards for AI and also covers international, national, and state government activity to create laws and regulations to guide and control AI.

Details are available at https://wts.ieee.org  

Upcoming CNSV Meetings

See https://californiaconsultants.org/events/

CNSV Video

Communications, Computing, and Power during Disaster Response

Date: Sep 9, 2022

MOVE Community Outreachan IEEE-USA Initiative, is an emergency relief program committed to assisting victims of natural disasters with short-term communications, computer, and power solutions. Services include phone charging, internet & communications support, and lighting to disaster victims. MOVE also offers educational outreach.

In conjunction with the presence of the MOVE  truck at the IEEE Global Humanitarian Technology Conference (GHTC), this is a panel discussion among representatives from organizations involved with emergency response and disaster recovery. The focus is on communications, computing, and power, but expanded from there. After a brief description of the MOVE truck, the emphasis is on stories about what works and lessons learned.

  • see link above for photos and biographical paragraphs for moderator and panelists.
  • this video from Zoom contains
    • first few minutes: introduction about the Consultants’ Network of Silicon Valley (CNSV)
    • speaker presentations starting at about 4 minutes
    • panel discussion starting at about 59 minutes
  • use link below to access video
Link

This event was organized by the ConsultantsNetwork of Silicon Valley (CNSV) as part of its sponsorship of the GHTC, which was held September 8-11, 2022 at Santa Clara University.

August 2022

Defcon 30, Black Hat, and BSides Las Vegas are all happening August 9-14 in Las Vegas! The Diana Initiative, too. Check out these links to read about “Hacker Summer Camp.” Great opportunities to keep up-to-date on cybersecurity and network.

Closer to home, check out the IEEE Global Humanitarian Conference September 8-11, 2022 at Santa Clara University. See my Presentations page for links to the sessions I am helping to organize.

April 2022 Update

A lot continues to happen in the cybersecurity field and here are a few things I think are worth highlighting, plus some notes on my current activities.

– As of the writing, the situation in Ukraine is awful and still could have cybersecurity implications for the U.S., as well as Ukraine. See DHS bulletin at https://publicintelligence.net/dhs-ukraine-invasion-cyber-attacks/.

– federal Cybersecurity and Infrastructure Security Agency (CISA) (https://www.cisa.gov) continues to generate advice, including a series of insights at https://www.cisa.gov/insights

– ECRI Top 10 Health Technology Hazards for 2022 – https://www.ecri.org/top-10-health-technology-hazards-2022-executive-brief. (Number 1 is “Cybersecurity Attacks Can Disrupt Healthcare Delivery, Impacting Patient Safety”)

– I’m assisting a medical software startup with setting up its cybersecurity program for its Software as a Medical Device (SaMD) product. 

– I’m doing program management work related to Public Key Infrastructure for a large Silicon Valley technology company. Lots to do to maintain compliance with WebTrust and CAB Forum requirements.

– RSA Conference (https://www.rsaconference.com/usa) and BSidesSF (https://bsidessf.org) in San Francisco are deferred from February to June 2022. I’ll probably volunteer again at BSidesSF, assuming it is reasonably safe with respect to COVID-19. Maybe hang out on the exhibit floor at RSA for a day.

This Spring and Summer there’s a lot going on relative to cybersecurity for medical devices. Check these out…

FDA Document Details Cyber Expectations for Device Makers – https://www.govinfosecurity.com/fda-document-details-cyber-expectations-for-device-makers-a-18863

Senators Introduce PATCH Act to Ensure Medical Device Security – https://healthitsecurity.com/news/senators-introduce-patch-act-to-ensure-medical-device-security

Model Contract-Language for Medtech Cybersecurity (MC2) – https://healthsectorcouncil.org/model-contract-language-for-medtech-cybersecurity-mc2/

CyberMed Summit: Policy Prescriptions & Pandemic Lessons Learned (April 14) – https://www.cybermedsummit.org

Defcon 30 Biohacking Village – is targeted for August 11-14 in Las Vegas. We’ll see whether that actually happens and how risky it may be to attend, depending on the status of COVID-19. https://www.villageb.io

Defcon29 & HIMSS 2021

It’s been a whirlwind week and it’s not over, yet. Defcon29 (aka “hacker summer camp”) was August 5-8 in Las Vegas. HIMSS21 (the Health Information Management Systems Society’s global conference) started August 9 and runs through August 13, also in Las Vegas. Temperatures have been as high as 108 degrees F. Both have been hybrid conferences with some online and some in person.

I volunteered with the Biohacking Village at Defcon29, which this year mainly involved monitoring the online discussion boards in case there was any inappropriate behavior. The in person things included villages regarding IoT Hacking, Car Hacking, Voting Machines, Cryptocurrency, Satellite Hacking, and a new group called Security Leaders. There were also some good sessions on Public Policy pertaining to cybersecurity.

I co-authored and co-presented a short talk at HIMSS21…

Cybersecurity in a Complex Healthcare Ecosystem
David Snyder, 42TEK, Inc. & Mitch Parker, Indiana University Health

Managing cybersecurity risk for supply chains with multiple vendors is complicated. Each vendor is clearly responsible for its own system, but who minds the overall end-to-end concerns? These concerns affect both products, such as medical devices, and services, such as telehealth platforms. Healthcare delivery organizations can have over a thousand vendors, many of which connect to the organization’s network. Cybersecurity attackers can invade a supplier’s network, interrupt service, steal information, upload malware, and even get into the healthcare delivery organization’s network to do damage, install ransomware, or steal information. In this presentation, best practices were described for assessing risks, avoiding cybersecurity vulnerabilities, and for network-connected vendors and business partners to maintain security. Special attention was given to hospitals and remote patient monitoring. Containerization, Application Programming Interfaces, and modern virtualization techniques were also covered.

This talk was based on the paper posted elsewhere on this web site.

Key takeaways…

  • equally important with designing, implementing, and maintaining online systems securely is the need to anticipate and expect failures and malicious attacks that will require response and recovery. Sure, cyber defense, but plan for cyber resilience [recover quickly]. Offline backups, emergency contact lists, contingency plans, legal and technical consulting standby contracts, and table top practice session are essential.
  • there is a shortage of trained cybersecurity professionals, so start investing in training for your existing staff while continuing to seek the expertise you need
  • <probably more – I may edit the to add items…>

Network-Connected Medical Devices in Remote Patient Monitoring

More and more RPM devices are being introduced for healthcare providers to use in managing post-acute and chronic care patients. The diagram below shows the variety of ways in which these devices may transmit information from the patient’s home to the clinician. Other posts on this site discuss cybersecurity relative to RPM.