GanaLila LLC - Philadelphia, PA since Jul 2011
Co-Founder
The Children's Hospital of Philadelphia - Philadelphia, PA Jul 2010 - Apr 2011
Technology Transfer Intern
Penn Biotech Group, Wharton - Greater Philadelphia Area May 2010 - Apr 2011
VP, Marketing & Communications
Penn Biotech Group, Wharton - Greater Philadelphia Area Jan 2010 - Apr 2010
Project Manager, Healthcare Consulting
Penn Biotech Group, Wharton - Greater Philadelphia Area May 2009 - Apr 2010
VP, Entrepreneurship
Education:
University of Wisconsin-Madison 2004
University of Illinois at Urbana-Champaign 2000
Indian Institute of Technology, Bombay 1992 - 1997
Skills:
Entrepreneurship Innovation Project Management Cross-functional Team Leadership Product Development Market Research Healthcare Microtechnology Medical Diagnostics
Interests:
Games, Gamification, Healthcare, Education.
Honor & Awards:
"Science as Art" Finalist at the Materials Research Society, 2005
GanaLila LLC - Philadelphia, PA since Jul 2011
Co-Founder
The Children's Hospital of Philadelphia - Philadelphia, PA Jul 2010 - Apr 2011
Technology Transfer Intern
Penn Biotech Group, Wharton - Greater Philadelphia Area May 2010 - Apr 2011
VP, Marketing & Communications
Penn Biotech Group, Wharton - Greater Philadelphia Area Jan 2010 - Apr 2010
Project Manager, Healthcare Consulting
Penn Biotech Group, Wharton - Greater Philadelphia Area May 2009 - Apr 2010
VP, Entrepreneurship
Education:
University of Wisconsin-Madison 2004
University of Illinois at Urbana-Champaign 2000
Indian Institute of Technology, Bombay 1992 - 1997
Skills:
Entrepreneurship Project Management Biotechnology Market Research Healthcare Cross Functional Team Leadership Product Development Analysis Biomedical Engineering Strategy Commercialization Medical Diagnostics Strategic Planning Innovation Microtechnology Medical Devices Management Mobile Games User Interface Design Swift
Interests:
Health and Amp Health and Nutrition Nutrition Education Games and Gamified Solutions Games and Gamification Solutions
Certifications:
Gamification Financial Accounting (With Distinction) Operations Management The Wharton School / Coursera
Us Patents
Method For Monitoring The Environment Within A Microfluidic Device
A method and apparatus is provided for monitoring the environment within a microfluidic device. The microfluidic device includes a body defining a channel for accommodating flow of fluid therethrough. A monitor structure is disposed in the channel of the body in the flow of fluid. The monitor structure changes color and/or dimension in response to various parameters of the fluid having predetermined values.
David J. Beebe - Monona WI, US Jaisree Moorthy - Madison WI, US Richard R. Burgess - Madison WI, US
Assignee:
Wisconsin Alumni Research Foundation - Madison WI
International Classification:
C12N 5/00
US Classification:
435325, 422 681, 422 8207
Abstract:
A platform and method for mimicking the environment within a cell is provided. The platform includes a microfluidic device defining a chamber. At least one hydrogel post is positioned within the chamber of the microfluidic device. Each hydrogel post defines a corresponding pore for receiving a first molecule therein. Second molecules are introduced into the pores of the hydrogel posts and the interactions between the first and second molecules are observed.
Method Of Fabricating A Flow Constriction Within A Channel Of A Microfluidic Device
David Beebe - Madison WI, US Jeffrey Moore - Savory IL, US Jaisree Moorthy - Madison WI, US
International Classification:
F15C001/04
US Classification:
137/828000
Abstract:
A method is provided for fabricating a constriction region in a channel of a microfluidic device. The method includes the steps of introducing a pre-polymer mixture including a monomer, cross-linking agent and photoinitiator into the channel. The pre-polymer mixture is polymerized at a localized area of the channel so as to shrink and solidify the liquid mixture. The solidified and shrunken liquid mixture provides the constriction region in the channel.
Systems And Methods For Providing Security Via Interactive Media
- Pleasanton CA, US Jaisree Moorthy - Dublin CA, US
International Classification:
H04L 29/06 G06F 21/31 A63F 13/537 G06F 3/0484
Abstract:
Methods and systems for providing security and verifying a human user and/or an authorized user are described. A system may include a processor and a non-transitory, processor-readable storage medium. The non-transitory, processor-readable storage medium may include one or more programming instructions that, when executed, cause the processor to receive a request to access a secured resource, provide a verification challenge to a user via a user interface, receive at least one input from the user in response to the verification challenge, and determine that the at least one input corresponds to at least one parameter indicative of a human user. The verification challenge may include a game.
Systems And Methods For Providing Security Via Interactive Media
Methods and systems for providing security and verifying a human user and/or an authorized user are described. A system may include a processor and a non-transitory, processor-readable storage medium. The non-transitory, processor-readable storage medium may include one or more programming instructions that, when executed, cause the processor to receive a request to access a secured resource, provide a verification challenge to a user via a user interface, receive at least one input from the user in response to the verification challenge, and determine that the at least one input corresponds to at least one parameter indicative of a human user. The verification challenge may include a game.
Systems And Methods For Presenting And Discovering Relationships Between Information Units
Systems and methods for presenting data to one or more users in a visualizable format and obtaining information based upon the user's interaction with the data are disclosed. A system may include a processor and a non-transitory, processor-readable storage medium. The non-transitory, processor-readable storage medium may include one or more programming instructions that, when executed, cause the processor to provide data to at least one user via a user interface, receive one or more inputs from the at least one user, and direct a storage medium to record the one or more inputs. The data may be arranged in a user-visualizable format. The one or more inputs may correspond the user's interaction with the user interface that causes manipulation of the data.
Systems And Methods For Providing Security Via Interactive Media
Methods and systems for providing security and verifying a human user and/or an authorized user are described. A system may include a processor and a non-transitory, processor-readable storage medium. The non-transitory, processor-readable storage medium may include one or more programming instructions that, when executed, cause the processor to receive a request to access a secured resource, provide a verification challenge to a user via a user interface, receive at least one input from the user in response to the verification challenge, and determine that the at least one input corresponds to at least one parameter indicative of a human user. The verification challenge may include a game.