banner ad

Deposition Designation Station
 

Computer Networking Consultants

Sort Non-Featured Profiles by
< 1 2 >
Check for SynapsUs
Brooks Hilliard
11811 North Tatum Boulevard
Phoenix AZ 85028
USA
phone: 602-264-9263
Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants.

Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.

Areas of Expertise:
  • Allegations of ERP and CRM system failures and/or defective business software/systems
  • Computer Forensics
  • Intellectual property
  • Valuation of computer hardware, software and services
  • Regulatory, Procurement and Tax matters
  • 4/7/2011 · Computers
    An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.

    2/21/2011 · Computers
    A distributor of products used in the health care industry invented a system and filed patents describing the system and associated methods.

    2/2/2011 · Computers
    A regional wholesale distributor of construction products was sold a manufacturing ERP system that the software developer and implementer claimed was capable of meeting its distribution needs.

    Check for SynapsUs
    Dr. Stephen Castell
    PO Box 334
    Witham CM8 3LP
    GBR
    phone: 44-1621-891-776
    stephen_castell_logo.jpg

    Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies. As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).

    6/28/2018 · Computers
    The Reg A Conference is the largest gathering of deal-makers and investors interested in Regulation A, a prime opportunity for companies to network with like-minded business executives, as well as financial professionals who assist in bringing capital to companies (https://theregaconference.com/presenting-companies/). Many such companies are today basing their new business ventures and projects, and their search and submissions for funding, on blockchain technology applications. So-called cryptocurrencies such as bitcoin are just one example of the use of this functionality. The business implications of this secure online record-keeping tech are huge – and not only in cryptocurrency. This presentation provides a probing and extensive expert critique of blockchain, its cryptocurrency, distributed ledger and smart contract applications, and argues for a cautionary, savvy approach to implementing and investing in such business systems, on grounds of professional due diligence, rigorous corporate governance and wide experience of past leading-edge ICT systems failures.

    8/18/2011 · Computers
    The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.

    6/23/2011 · Computers
    You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.

    10/9/2009 · Computers
    Synopsis of a Talk given to the Association of Independent Computer Specialists

    10/8/2009 · Computers
    Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?

    10/7/2009 · Computers
    The Negotiation Competition, now in its fifth year, is a contest open to all law students in England and Wales, designed to promote the skill of negotiation, a crucial component of ADR

    8/4/2004 · Computers
    I spent much of a whole year recently investigating why a major IT outsourcing deal broke down, and had given rise to the largest software contract dispute yet seen in the English High Court

    Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development

    Stephen Castell, PhD
    The Forensic Approach to assessing and dealing effectively with IT Projec Risks. TWO-DAY INTENSIVE SEMINAR, WORKSHOP AND CLINIC. NICE, CÔTE D'AZUR, FRANCE. 17th - 19th MARCH 2005
    12/7/2009
    Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
    10/8/2009
    The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
    Check for SynapsUs
    Ray Horak
    President
    1500A E. College Way, PMB 443
    Mt. Vernon WA 98273
    USA
    phone: 360-428-5747
    ray_horak_photo.jpg

    Ray Horak is an Independent Consultant with a General Practice in Wireline and Wireless Telecommunications and Related Fields such as the Internet and Voice over IP. His 45 years’ experience includes management and executive positions with Southwestern Bell, CONTEL, and Executone prior to forming The Context Corporation. Ray has authored the best-selling Communications Systems & Networks, (John Wiley & Sons, 1997, 2000, and 2002), Telecommunications and Data Communications Handbook (Wiley-Interscience, 2008), and Webster’s New World Telecom Dictionary (Webster’s New World, 2007). He was Senior Contributing Editor for Newton’s Telecom Dictionary (12th through 21st Editions). He has written hundreds of technical white papers, case studies, articles, and columns for major print and electronic publications such as CommWeb, Computer Telephony, Network World, The Prepaid Press, and Teleconnect. He also has served as Technical Editor for several book-length works, including Deploying Secure 802.11 Wireless Networks with Microsoft Windows (Microsoft Press, 2003). Ray has taught hundreds of public and private seminars and has spoken before tens of thousands of telecom and IT professionals in the US and abroad as a conference keynoter, seminar and tutorial leader, panel chair, and panelist at major industry conferences such as ComNet and Networld+Interop. He also has provided litigation support as a consulting expert and testifying expert in a number of cases involving product / service misrepresentation, intellectual property (patent; copyright, and trademark / service mark infringement), contract disputes, fees and taxes, and the Telephone Consumer Protection Act (TCPA). Those cases have involved a broad range of technologies, including Automatic Telephone Dialing Systems (ATDS), DSL, E911, fax, PBX, videoconferencing, VoIP, and voice processing. Ray Horak is known for his ability—both in print and in person—to translate highly complex technical subject matter into plain-English, commonsense, and thoroughly understandable terms for technical and lay audiences, alike.

    2/27/2010 · Telecommunication
    In an effort to address a growing number of telephone marketing calls and certain other telemarketing practices thought to be invasions of privacy, Congress enacted the Telephone Consumer Protection Act of 1991 (TCPA), codified at 47 U.S.C. § 227. We all know about the restrictions on unsolicited telemarketing calls..

    9/16/2008 · Communication
    Communications is a science, an art, and a field of study, depending on the context. In simplest terms, communications is the means by which people express ideas or information

    Ray Horak, Harry Newton, Mark A. Miller
    An instant classic and a best seller, with more than 65,000 in print. It served as the basis for Horak’s more contemporary works, Telecommunications and Data Communications Handbook (2008) and Webster’s New World Telecom Dictionary (2007).
    Ray Horak
    A comprehensive and authoritative telecommunications dictionary of more than 4,600 terms essential to a clear and thorough understanding of voice, data, video, and multimedia communications system and network technologies, applications, and regulations. Webster’s is an absolutely unimpeachable resource written by a recognized expert in the field. Webster’s enjoys great critical acclaim, as do all of Horak’s works.
    Ray Horak
    The one book you’ll need to understand the entire telecom landscape, from copper to fiber, wireline to wireless, LANs to MANs to WANs, TDM to IP, AAL to Zigbee and everything in between. Written in a plain-English, commonsense style by an authority on the subject, this critically acclaimed book is at just the right level for the serious professional who wants to get at the whole truth—without the math.
    Check for SynapsUs
    Ray Yepes
    Director of Forensics and Incident Response
    1205 Sam Bass Rd.
    Round Rock Texas 78681
    USA
    phone: 512-255-3700
    Cyberdefenses-Logo.gif
    Cyber Defenses, Inc. is uniquely positioned to provide the highest possible level of Cyber Security, Management, and Technology solutions to their clients. Founded in 2001 by a team of returning military, cyber security veterans, Cyber Defenses has a dual focus on the Government/Public Sector and Private Sectors. Team members hail from the Big 5 consulting firms, as well as top Fortune 500 companies and the US Military. They hold credentials from NSA, Endeca, SAP – BOBJ, Oracle – OBIEE, MicroStrategy, Microsoft, Cisco, Linux, and many others.

    Cyber Defenses, Inc. integrates cyber security oversight, comprehensive managed services, and cyber security training to provide security service on behalf of national security interests, domestically and abroad, as well as many of the nation’s leading commercial concerns. Such industries include Banking, Educational Institutions, Federal Healthcare Insurance, IT Services, Manufacturing & Packaged Goods, Oil & Gas, and many more.

    Consulting Services:
    • Organization Review
    • Incident Review
    • Data Protection
    • Defense Operations
    • Vulnerability and Patch Management
  • Extended Threat Intelligence
  • Continuous Monitoring
  • Threat Hunting and Response
  • Identity and Access Management (IAM)
  • Education and Training
  • Ray Yepes Security Expert PhotoRay Yepes, Director of Forensics and Incident Response at CyberDefenses, Inc., has over 21 years of experience as a Security Professional and Criminal Investigations Examiner. In addition to many forensic industry certifications, Mr. Yepes is a Diplomate member of the American Board of Forensic Examiners and the American Board for Certification in Homeland Security. He has been a licensed private investigator since 2006.

    As a security professional, Mr. Yepes has consulted, designed, maintained, and/or implemented security perimeters, network security architectures, and security policies for small, midsize, and large companies including Fortune 500, 200, 100, and 50 companies.

    As a criminal investigations examiner, Mr. Yepes has assisted and advised local and federal government agencies in national security matters and high profile criminal investigations. His first digital forensic investigation dates back to 1995 while assisting the FBI in a child pornography case.

    Mr. Yepes has conducted and managed numerous Cyber Security incidents, including but not limited to malware, phishing, password attacks, denial of service attacks (DoS), Man in the Middle attacks (MiTM), drive-by downloads, malvertising, rogue software, social media threats, advanced persistent threats (APT), and other incidents. In response, he has developed and executed information security strategies, advising business areas on security risks.

    View Ray Yepes' Expert Witness Profile.
    Check for SynapsUs
    Matthew Albee, CFCE, EnCE, SCERS
    Certified Forensic Computer Examiner
    19510 Van Buren Blvd., F3-131
    Riverside CA 95208
    USA
    phone: 951-780-7892
    Matthew-Albee-Computer-Forensics-Expert-Photo.jpg
    DataChasers, Inc. is a select, exclusive Computer Forensics and E-Discovery company. With Computer and Cell Phone Forensics and E-Discovery as their core focus, they offer strategies and provide alternatives so that clients are aware of all options to make more informed decisions.

    DataChasers, Inc. provides an initial evaluation at one rate regardless of hourly time/rate that includes a review of the initial reports, search warrants, written evidence, and a consultation regarding the strengths and weaknesses of each case.

    Services
    • Cell Phone and Device Forensics
    • Forensic Computer Examinations
    • E-Discovery Exams - Electronically Stored Information
    • Intellectual Property & Copyright
  • Employment Law & Civil Rights Cases
  • Family Law
  • Criminal Law
  • Probate
  • Computer Forensics Training - DataChasers, Inc. also provides California State Bar approved MCLE presentations for MCLE credits.Topics include Computer Forensics, Intellectual Property, Criminal Defense, Family Law, and Computer Forensics Presentations, Presenting Electronic Evidence at Court, and How to be an Expert Witness.

    Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.

    Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.

    View Matthew Albee's Expert Witness Profile.
    Check for SynapsUs
    Dr. David Lucantoni
    Principal Consultant
    10 Oak Tree Lane
    Ocean NJ 07712-3487
    USA
    phone: 908-433-1190
    fax: 732-493-4465
  • Dr. David Lucantoni is an internationally renowned Telecommunications Expert with over 30 years experience.

  • Expertise: Voice over IP (VoIP), Networking, Switching, Performance, ATM, IP, Wireless, Satellite, Telecommunications, Reliability, Statistics, Telecom Traffic Control.

  • Consulting clients include: AT&T Laboratories, Motorola, Lockheed-Martin, Intel, Telcordia, Allied Riser Communications, A.T. Kearney, AirNet Communications, Chiaro Networks.

  • Honors and Awards are listed on his CV.

  • Previous experience in Telecom litigation.

  • 5/23/2012 · Telecommunication
    The versatile Markovian point process was introduced by M. F. Neuts in 1979. This is a rich class of point processes which contains many familiar arrival process as very special cases. Recently, the Batch Markovian Arrival Process, a class of point processes which was subsequently shown tobe equivalent to Neuts' point process, has been studied using a more transparent notation.

    10/10/2011 · Telecommunication
    We study the performance of a statistical multiplexer whose inputs consist of a superposition of packetized voice sources and data. The performance analysis predicts voice packet delay distributions, which usually have a stringent requirement, as well as data packet delay distributions.

    6/10/2011 · Telecommunication
    Recent studies have shown that the superposition of packet sequences generated by packetized voice sources with speech detection exhibit high burstiness due to inherent correlations between successive interarrival times in the superposition stream.

    4/26/2011 · Telecommunication
    We present an overview of recent results related to the single server queue with general independent and identically distributed service times and a batch Markovian arrival process (BMAP).

    3/10/2011 · Telecommunication
    We develop an algorithm for numerically inverting multi-dimensional transforms.

    11/13/2010 · Telecommunication
    Much energy is being devoted to studying the promising new asynchronous transfer mode (ATM) technology for supporting multiservice high-speed communication networks-e.g., see Roberts [39]. As indicated in [39], interest in ATM is stimulated by two factors: First, by new technology making it possible to transmit and switch at very high bandwidths; and, second, by the growing demand for more sophisticated and powerful communication services.

    11/13/2010 · Telecommunication
    Two of the many many applications of queueing models in communications networks are sizing links in transport networks and buffers in routers. A fundamental part of a queueing model is the arrival process. A Markov-modulated Poisson process (MMPP) is an attractive model for describing backbone packet traffic.

    Check for SynapsUs
    Erik Laykin, CHFI, CEDS
    Managing Director
    10100 Santa Monica Blvd
    11th Floor
    Los Angeles CA 90067
    USA
    phone: 310-245-2902
    erik-laykin-photo.jpg
    Erik Laykin, CHFI, CEDS is an internationally recognized Electronic Discovery and Computer Forensic Consultant and Expert. He is the Managing Director in the Los Angeles office of Duff & Phelps and part of the firm's Dispute and Legal Management Consulting practice. In addition to his eDiscovery credentials, Mr. Laykin is an internationally recognized authority on complex information technology disputes, which include white collar and cyber crime, theft of trade secrets, privacy and data loss, internet, software, hardware systems failures, intellectual property disputes and other emerging challenges of the Information Age.

    Prior to joining Duff & Phelps, Mr. Laykin was the Chair of the Information Technology Investigations practice at Navigant Consulting. While he regularly comments on legal and technology matters at international conferences and for the media, Mr. Laykin is also the past president and Pacific rim chair of the FBI Infragard Program.

    Mr. Laykin is active with various committees of the American Bar Association, the Sedona Conference, the Academy of Court Appointed Masters, the Forensic Expert Witness Association, the Electronic Commerce Council and the High Tech Crime Investigators Association.

    Consulting Services:
    • Information Technology Disputes Consulting
    • Fraud, Forensic and Investigative Services
    • Accounting Irregularities
    • Intellectual Property / Trade Mark Disputes
    • Forensic Technology and Analytics
    • Electronic Discovery
    • Cyber Crime, Data Breaches, Hackers
    View Expert Witness Profile.
    Erik Laykin
    Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.
    Check for SynapsUs
    Monty G. Myers, PE
    3305 Northland Drive
    Suite 305
    Austin TX 78731
    USA
    phone: 512-459-9292
    Eureka-Software-logo.jpg
    Eureka Software Solutions, Inc. is a Software Development and Consulting business with over 30 years of hands-on experience in the Computer, Software, and Technology industries. Eureka and its team of professionals provide an unparalleled understanding of nearly every facet and factor involved in a complex software or computer related litigation scenario. Eureka's clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.

    Eureka Services and Practical Implementation of Expertise:
    • Review and comparison of software source code and functionality in relation to contractual commitments and requirements and/or protected intellectual property including, trade secrets, copyrights and patents
    • Computer / Software Forensics – able to reverse engineer and reconstruct hardware and software environments from backups, remnants and fragments of deprecated software. Eureka IT and Software development team is skilled at re-creating historical hardware and software environments
    • Investigation and assessment of software project bidding, planning and performance with particular attention to adequacy of discovery, specifications, cost estimates, schedules, and deliverables
    • Functional and performance testing of software against applicable specifications, warranties or industry standards using proprietary and commercial testing tools and techniques
    • Evaluation and use of both traditional and modern software development techniques and strategies, including creative payment structures related to software application/effort valuation and intellectual property licensing and ownership
    • Reviewing and exercising software applications and IT networks to expose and correct security issues and weaknesses
    Monty Myers Computer Software Expert PhotoFounder and CEO, Monty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience. Mr. Myers is involved in all aspects of the daily management and operation of Eureka, including business development, contracts, customer relations, project scope, execution and oversight, strategy and management, hiring, and finance.

    Mr. Myers has negotiated and performed hundreds of real-world software and technology contracts and statements of work involving complex software project and licensing terms and conditions including material intellectual property aspects. He is actively engaged in handling and protecting the confidential, proprietary, and trade secret information and technology of Eureka and its clients.

    View Monty Myers' Expert Witness Profile.

    Eureka Software Client Logos
    Check for SynapsUs
    C. Matthew Curtin, CISSP
    Founder and CEO
    Columbus Headquarters
    5 E. Long St., 9th Floor
    Columbus OH 43215
    USA
    phone: 614-545-4225
    matt-curtin-photo.jpg

    Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense. 

    Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully. 

    Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe. 

    Interhack's Cybersecurity Practice helps you to defend your organization

    Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets. 

    The Interhack system of Cybersecurity Services has six parts. 

    Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities. 

    Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize. 

    Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards. 

    Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation. 

    Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have. 

    Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.

    View Mr. Curtin's Expert Witness Profile.

    Matthew Curtin
    This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
    Matthew Curtin, Peter G. Neumann
    Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
    Check for SynapsUs
    Kurt D. Humphrey
    Managing Director, Principal Technologist
    3780 Masters Drive
    Colorado Springs CO 80907
    USA
    phone: 719-331-9788
    Kurt-Humphrey-Intellectual-Property-Expert-Photo.jpg
    IP Enginuity (IPE) was established to meet the growing demand for expert engineering services in the Intellectual Property (IP) and Patent Licensing and Litigation sectors. Their clients include Global Top 10 high-tech OEMs, intellectual property / patent owners, patent brokers, NPEs, and leading IP law firms.

    IPE Services:
    • SME Patent Analysis and Technology Landscaping
      • Patent Portfolio Mining
      • Patent Evaluation
      • Prior Art, Freedom to Operate, Patentability and Invalidity Searches
      • M&A IP Due Diligence
      • Technology Landscaping and Competitive Intelligence
    • Patent Litigation, Licensing, and Enforcement
      • Evidence of Use and Infringement Claim Charting
      • Product / Material / Protocol Analyses and Technical Investigations
      • Reverse / Forensic Engineering and Failure Analyses
      • PTAB Actions: IPR and PGR Petitions and Responses, SME Trial Support
      • Expert Reports
      • Subject Matter Expert Witness Services
    Managing Director and Principal Technologist, Kurt D. Humphrey, has over 30 years of commercial Process Development and Engineering, Corporate R&D, Reverse Engineering / Failure Analysis and Patent / SME Consulting experience. With access to the best research tools, databases, labs and test equipment available, he and his team of SMEs are able to solve the mostdemanding and complex Intellectual Property technology issues.

    An accomplished inventor, Mr. Humphrey holds patents in the areas of oxygen sensors, MEMS, and semiconductor process technology as a result of his innovative work with General Motors Corporation, United Technologies, and Rockwell Science Center. In his previous position as Director of Engineering Programs at TAEUS International, he managed numerous patent evaluation and product investigation projects for many Global 100 high-tech companies in the U.S., Europe, Japan, and Korea.

    View Kurt Humphrey's Expert Witness Profile.
    Check for SynapsUs
    Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE
    Victoria MN USA
    phone: 952-679-4604
    Isaak-Technologies-Logo.jpg
    Isaak Technologies provides expert witness, consulting & training services in the areas of design, construction, procurement, implementation, commissioning and operations of information technology, telecommunications, network systems and critical data center facilities. Isaak Technologies provides clear solutions to complex challenges using best-practice forecasting, strategy & risk mitigation.

    Philip Isaak Data Center Infrastructure Expert PhotoPhilip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, has over 20 years of experience as a design & operations consultant & training provider, with a focus in the information technology, telecommunications & critical data center facility industries.

    In recognition of Mr. Isaak’s professional standing, the Officers & Board of Directors of the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified his election to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold.



    Professional Services:

    LitigationIT & TelecommunicationsCritical Facilities
    • IP, Trade Secrets, Contracts
    • Design, Construction, Implementation Claims, Damages, Defects, Delays, Failure & Quality Control Analysis
    • Failed System Analysis
    • Unfulfilled SLAs
    • Technical Investigations
    • Claims Preparation & Analysis
    • Expert Reports
    • Settlement Opinions & Strategies
    • Deposition & Trail Testimony
    • Needs Assessment, Gap Analysis & Audits
    • Strategic Plans
    • Design, Procurement & Implementation Management
    • Business Continuity & Disaster Recovery Planning
    • Capacity Planning & Forecasting
    • Operations Planning
    • Enterprise Architecture, Network Systems, Services & Cabling Infrastructure Planning
    • Outsourcing Analysis & Planning for Colocation, XaaS or Cloud Services
    • Design Consultant, Contractor & Commissioning Vendor Qualification & RFP Development
    • Reliability Analysis
    • Design Peer Review
    • Site Assessments & Planning
    • Facility Assessments & Audits
    • Space, Power & Cooling Capacity & Redundancy Planning
    • Commissioning Management
    • Standard Operating, Maintenance & Emergency Response Procedures


    View Philip Isaak's Expert Witness Profile.
    1/11/2018 · Computers
    This is the first in a series of six posts on how to overcome contractual challenges for data center projects. The series will address:

    Check for SynapsUs
    Jacob Sharony, PhD, MBA
    Principal Scientist
    info@mobiusconsulting.com
    N. Babylon NY 11703
    USA
    phone: 888-829-2457
    Jacob-Sharony-Mobile-Wireless-Technology-Expert-Photo.jpg

    Mobius Consulting is a Mobile and Wireless Technology management consulting firm. The industry and academic professionals at Mobius offer diverse services leveraging their extensive experience and expertise in enterprise and vertical markets including telecom, healthcare, energy, transportation, government, supply chain and logistics. Consulting Services Include:

    • Technology and Product Strategy
    • Network Architecture Design
    • System Analysis
    • Modeling and Simulations
    • Algorithms Development
    • RF Site Survey
    • Point-to-point / Point-to-multi-point Backhaul Design
    • Vetting New Concepts
    • Product Development / Rapid Prototyping
    • System Integration and Deployment
    • Research / Position / Marketing White Papers
    • Product Evaluation / Competitive Analysis
    • RFI / RFP Development / Processing
    • Education and Training
    • Intellectual Property / Patent Assistance
    • Expert Witness

    Principal, Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University. Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Dr. Sharony has also published extensively in scientific journals and conferences. View Dr. Sharony's Expert Witness Profile.

    Check for SynapsUs
    100 Mill Plain Rd.
    Danbury CT 06811
    USA
    phone: 855-PROLIFOGY (776-5436)
    cory_plock_logo.gif
    Premium Software Consulting Services provided by industry leading experts. Today's software users expect and demand software that is more intelligent, interactive, usable, and reliable than ever before, over a backdrop of continuously evolving technology spanning a range of platforms. To remain competitive, modern applications need to solve complex problems that have never been solved before. This requires more than just programmers. You need experts.

    All of our consultants have a Ph.D. in computer science or related discipline and at least ten years of industry experience. All have contributed to the software state-of-the-art, published original work, presented at conferences around the world, and have years of hands-on, practical industry experience. Areas include Software Design, Reliability, OOP, Pedagogy, Algorithms, Vision, Embedded Systems, Knowledge Acquisition, Programming Theory, Formal Methods, Computational Linguistics, Artificial Intelligence, and others. They know and work with today's modern programming languages and technologies. Expertise spans all aspects of the software life-cycle.

    Offering advanced software development, project management, code review & quality assurance, management consulting, expert witness services, failed project turnaround, usability analysis, and more. Available on or off site anywhere in the United States and Europe. Please see our web site for more information and additional service offerings.
    3/28/2013 · Computers
    The discovery phase of IP litigation often calls for a technical review of a software product. A code review is an activity conducted by an expert witness that involves reviewing the source code of a product to discover pertinent facts relevant to the case.

    3/28/2012 · Technology
    The situation: you have invested an enormous amount of money and company resources in developing software solutions to address client needs. Regardless of the size of your company, every dollar counts and you want to know that your investment today will ultimately produce a fast, modern, scalable, and correct software solution that will still be usable tomorrow with tomorrow's technology.

    Licensing and infringement litigation are two primary potential income sources from a patent. With licensing, the inventor permits the licensee to make, use, sell, or offer to sell a patented invention for compensation.

    10/20/2011 · Technology
    C++, one of the most widely used and known programming languages in software history, could possibly turn into one of the most unknown languages in the coming months.

    12/8/2010 · Technology
    Prolifogy's failed project turnaround service has generated increased interest recently. Specifically, it was the most requested of all service offerings last month—a fact that surprised even company officials.

    Check for SynapsUs
    Dr. George Edwards
    Computer Scientist
    7958 Beverly Blvd
    Los Angeles CA 90046
    USA
    phone: 323-545-3933
    quandary-peak-research-logo.jpg
    George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

    Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

    Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

    Dr. Edwards provides expert consulting in the following areas:
    • Intellectual property and patent infringement
    • Software design/source code audit and review
    • Non-performance claims
    • Expert witness and depositions
    Dr. Edwards is an expert in the following technologies :
    • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
    • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
    • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
    • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
    • Operating systems & servers: UNIX, Linux, Windows, Mac OS
    • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
    • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
    • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
    View Expert Witness Profile.
    7/10/2012 · Patents
    The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

    Check for SynapsUs
    David Shaw
    9 Wimpole Street
    London W1G 9SG
    GBR
    phone: 44-207-193-8355
    David Shaw is an independent Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.

    Services Offered:
  • Governance
  • Strategy
  • Programme Definition
  • Capability
  • Enterprise Architecture
  • Process Engineering
  • Portfolio Management
  • Programme Management Office Implementation
  • Individual Assignments
  • < 1 2 >