banner ad

Information Science & Architecture Consultants

Sort Non-Featured Profiles by
Check for SynapsUs
Bhuvan Urgaonkar, PhD
Available Nationally and Internationally
W371 Westgate Building
University Park PA 16802
USA
phone: 814-933-7211
Bhuvan-Urgaonkar-Computer-Science-Expert-Photo.jpg
Bhuvan Urgaonkar, PhD, has over 15 years of experience in the field of Software Engineering and Computers. His work includes research in computer systems software, distributed computing (including systems such as Zookeeper, Redis, Memcached, Cassandra, Kafka), datacenters, cloud computing, storage systems, energy efficiency of computers and datacenters, big data (including systems such as Hadoop, Spark).

Dr. Urgaonkar has published over 80 research papers in competitive peer-reviewed conferences and journals on these topics with several best paper awards. He has procured research funding totaling more than $3 Million USD from federal agencies and industrial labs (Google, HP, IBM, Cisco, Microsoft, Amazon) to lead and train several Phd and MS students who now work in industry and academia. Dr. Urgaonkar has also delivered lectures on topics including Cloud Computing and Data Centers to Faculty at Microsoft and numerous other technology companies and universities around the world.

Education / Training: Ph.D. in Computer Science from the University of Massachusetts Amherst (2005) B.Tech (honors) in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur, India

Awards / Honors: Test of Time Award, ACM Sigmetrics 2016 National Science Foundation Career award, 2010 IBM Faculty Fellowships, 2016, 2014 Several best paper awards (see CV)

Litigation Support - Dr. Urgaonkar serves as an expert / technical consultant with multiple firms helping them (i) understand technical content related to state of the art products in areas such as content distribution, distributed computing, datacenter design, among others and (ii) interpret patents in these areas and connections between them and state of the art products and services. Services are available to law firms, government agencies, schools, firms / corporations, and hospitals. They include case review, deposition, and trial testimony as needed.

Areas of Expertise:
  • Software Design and Analysis
  • Computer Systems
  • Operating Systems
  • File Systems
  • Databases
  • Computer Security
  • Performance
  • Distributed Computing
  • Data Centers
  • Cloud Computing
  • Big Data Systems
  • Web
  • Internet
  • Content Distribution Networks
  • Software Reliability and Testing
  • Fault Tolerance
  • Hadoop
  • Spark
  • Kubernetes
  • Linux
  • AWS
  • Azure
  • Machine Learning
  • Scheduling
  • 7/20/2018 · Computers
    Recent technological advances in the development of flashmemory based devices have consolidated their leadership position as the preferred storage media in the embedded systems market and opened new vistas for deployment in enterprise-scale storage systems. Unlike hard disks, flash devices are free from any mechanical moving parts, have no seek or rotational delays and consume lower power. However, the internal idiosyncrasies of flash technology make its performance highly dependent on workload characteristics. The poor performance of random writes has been a cause of major concern which needs to be addressed to better utilize the potential of flash in enterprise-scale environments. We examine one of the important causes of this poor performance: the design of the Flash Translation Layer (FTL) which performs the virtual-to-physical address translations and hides the erase-before-write characteristics of flash. We propose a complete paradigm shift in the design of the core FTL engine from the existing techniques with our Demand-based Flash Translation Layer (DFTL) which selectively caches page-level address mappings. We develop a flash simulation framework called FlashSim. Our experimental evaluation with realistic enterprise-scale workloads endorses the utility of DFTL in enterprise-scale storage systems by demonstrating: (i) improved performance, (ii) reduced garbage collection overhead and (iii) better overload behavior compared to state-of-the-art FTL schemes. For example, a predominantly random-write dominant I/O trace from an OLTP application running at a large financial institution shows a 78% improvement in average response time (due to a 3-fold reduction in operations of the garbage collector), compared to a state-of-the-art FTL scheme. Even for the well-known read-dominant TPC-H benchmark, for which DFTL introduces additional overheads, we improve system response time by 56%.

    6/27/2018 · Computers
    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'my' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating to the cloud can be enumerated, some benefits may not apply to 'my' application. Also, there can be multiple ways in which an application might make use of the facilities offered by cloud providers. Answering these questions requires an in-depth understanding of the cost implications of all the possible choices specific to 'my' circumstances. In this study we identify an initial set of key factors affecting the costs of a deployement choice. Using benchmarks representing two different applications (TPC-W and TPC-E) we investigate the evolution of costs for different deployment choices. We show that application characteristics such as workload intensity, growth rate, storage capacity and software licensing costs produce complex combined effect on overall costs. We also discuss issues regarding workload variance and horizontal partitioning.

    6/7/2018 · Computers
    In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary contribution of our work is to demonstrate the feasibility and benefits of overbooking resources in shared platforms, to maximize the platform yield: the revenue generated by the available resources. We do this by first deriving an accurate estimate of application resource needs by profiling applications on dedicated nodes, and then using these profiles to guide the placement of application components onto shared nodes. By overbooking cluster resources in a controlled fashion, our platform can provide performance guarantees to applications even when overbooked, and combine these techniques with commonly used QoS resource allocation mechanisms to provide application isolation and performance guarantees at run-time.

    Check for SynapsUs
    David Shaw
    9 Wimpole Street
    London W1G 9SG
    GBR
    phone: 44-207-193-8355
    David Shaw is an independent Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.

    Services Offered:
  • Governance
  • Strategy
  • Programme Definition
  • Capability
  • Enterprise Architecture
  • Process Engineering
  • Portfolio Management
  • Programme Management Office Implementation
  • Individual Assignments
  • Check for SynapsUs
    Dr. George Edwards
    Computer Scientist
    7958 Beverly Blvd
    Los Angeles CA 90046
    USA
    phone: 323-545-3933
    quandary-peak-research-logo.jpg
    George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

    Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

    Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

    Dr. Edwards provides expert consulting in the following areas:
    • Intellectual property and patent infringement
    • Software design/source code audit and review
    • Non-performance claims
    • Expert witness and depositions
    Dr. Edwards is an expert in the following technologies :
    • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
    • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
    • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
    • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
    • Operating systems & servers: UNIX, Linux, Windows, Mac OS
    • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
    • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
    • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
    View Expert Witness Profile.
    7/10/2012 · Patents
    The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

    Check for SynapsUs
    100 Mill Plain Rd.
    Danbury CT 06811
    USA
    phone: 855-PROLIFOGY (776-5436)
    cory_plock_logo.gif
    Premium Software Consulting Services provided by industry leading experts. Today's software users expect and demand software that is more intelligent, interactive, usable, and reliable than ever before, over a backdrop of continuously evolving technology spanning a range of platforms. To remain competitive, modern applications need to solve complex problems that have never been solved before. This requires more than just programmers. You need experts.

    All of our consultants have a Ph.D. in computer science or related discipline and at least ten years of industry experience. All have contributed to the software state-of-the-art, published original work, presented at conferences around the world, and have years of hands-on, practical industry experience. Areas include Software Design, Reliability, OOP, Pedagogy, Algorithms, Vision, Embedded Systems, Knowledge Acquisition, Programming Theory, Formal Methods, Computational Linguistics, Artificial Intelligence, and others. They know and work with today's modern programming languages and technologies. Expertise spans all aspects of the software life-cycle.

    Offering advanced software development, project management, code review & quality assurance, management consulting, expert witness services, failed project turnaround, usability analysis, and more. Available on or off site anywhere in the United States and Europe. Please see our web site for more information and additional service offerings.
    3/28/2013 · Computers
    The discovery phase of IP litigation often calls for a technical review of a software product. A code review is an activity conducted by an expert witness that involves reviewing the source code of a product to discover pertinent facts relevant to the case.

    3/28/2012 · Technology
    The situation: you have invested an enormous amount of money and company resources in developing software solutions to address client needs. Regardless of the size of your company, every dollar counts and you want to know that your investment today will ultimately produce a fast, modern, scalable, and correct software solution that will still be usable tomorrow with tomorrow's technology.

    Licensing and infringement litigation are two primary potential income sources from a patent. With licensing, the inventor permits the licensee to make, use, sell, or offer to sell a patented invention for compensation.

    10/20/2011 · Technology
    C++, one of the most widely used and known programming languages in software history, could possibly turn into one of the most unknown languages in the coming months.

    12/8/2010 · Technology
    Prolifogy's failed project turnaround service has generated increased interest recently. Specifically, it was the most requested of all service offerings last month—a fact that surprised even company officials.

    Check for SynapsUs
    Jacob Sharony, PhD, MBA
    Principal Scientist
    info@mobiusconsulting.com
    N. Babylon NY 11703
    USA
    phone: 888-829-2457
    Jacob-Sharony-Mobile-Wireless-Technology-Expert-Photo.jpg
    Mobius Consulting is a Mobile and Wireless Technology management consulting firm. The industry and academic professionals at Mobius offer diverse services leveraging their extensive experience and expertise in enterprise and vertical markets including telecom, healthcare, energy, transportation, government, supply chain and logistics.

    Consulting Services Include:
    • Technology and Product Strategy
    • Network Architecture Design
    • System Analysis
    • Modeling and Simulations
    • Algorithms Development
    • RF Site Survey
    • Point-to-point / Point-to-multi-point Backhaul Design
    • Vetting New Concepts
  • Product Development / Rapid Prototyping
  • System Integration and Deployment
  • Research / Position / Marketing White Papers
  • Product Evaluation / Competitive Analysis
  • RFI / RFP Development / Processing
  • Education and Training
  • Intellectual Property / Patent Assistance
  • Expert Witness
  • Principal, Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University.

    Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Dr. Sharony has also published extensively in scientific journals and conferences.

    View Dr. Sharony's Expert Witness Profile.
    Check for SynapsUs
    Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE
    Victoria MN USA
    phone: 952-679-4604
    Isaak-Technologies-Logo.jpg
    Isaak Technologies provides expert witness, consulting & training services in the areas of design, construction, procurement, implementation, commissioning and operations of information technology, telecommunications, network systems and critical data center facilities. Isaak Technologies provides clear solutions to complex challenges using best-practice forecasting, strategy & risk mitigation.

    Philip Isaak Data Center Infrastructure Expert PhotoPhilip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, has over 20 years of experience as a design & operations consultant & training provider, with a focus in the information technology, telecommunications & critical data center facility industries.

    In recognition of Mr. Isaak’s professional standing, the Officers & Board of Directors of the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified his election to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold.



    Professional Services:

    LitigationIT & TelecommunicationsCritical Facilities
    • IP, Trade Secrets, Contracts
    • Design, Construction, Implementation Claims, Damages, Defects, Delays, Failure & Quality Control Analysis
    • Failed System Analysis
    • Unfulfilled SLAs
    • Technical Investigations
    • Claims Preparation & Analysis
    • Expert Reports
    • Settlement Opinions & Strategies
    • Deposition & Trail Testimony
    • Needs Assessment, Gap Analysis & Audits
    • Strategic Plans
    • Design, Procurement & Implementation Management
    • Business Continuity & Disaster Recovery Planning
    • Capacity Planning & Forecasting
    • Operations Planning
    • Enterprise Architecture, Network Systems, Services & Cabling Infrastructure Planning
    • Outsourcing Analysis & Planning for Colocation, XaaS or Cloud Services
    • Design Consultant, Contractor & Commissioning Vendor Qualification & RFP Development
    • Reliability Analysis
    • Design Peer Review
    • Site Assessments & Planning
    • Facility Assessments & Audits
    • Space, Power & Cooling Capacity & Redundancy Planning
    • Commissioning Management
    • Standard Operating, Maintenance & Emergency Response Procedures


    View Philip Isaak's Expert Witness Profile.
    1/11/2018 · Computers
    This is the first in a series of six posts on how to overcome contractual challenges for data center projects. The series will address:

    Check for SynapsUs
    C. Matthew Curtin, CISSP
    Columbus Headquarters
    5 E. Long St., 9th Floor
    Columbus OH 43215
    USA
    phone: 614-545-4225
    matt-curtin-photo.jpg
    Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunites involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.

    Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.

    Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.

    Interhack's Cybersecurity Practice helps you to defend your organization.

    Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, cancelled contracts, and stolen trade secrets.

    The Interhack system of Cybersecurity Services has six parts.

    Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.

    Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.

    Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.

    Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.

    Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.

    Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.

    View Mr. Curtin's Expert Witness Profile.
    Matthew Curtin
    This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
    Matthew Curtin, Peter G. Neumann
    Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
    Check for SynapsUs
    Monty G. Myers, PE
    3305 Northland Drive
    Suite 305
    Austin TX 78731
    USA
    phone: 512-459-9292
    Eureka-Software-logo.jpg
    Eureka Software Solutions, Inc. is a Software Development and Consulting business with over 30 years of hands-on experience in the Computer, Software, and Technology industries. Eureka and its team of professionals provide an unparalleled understanding of nearly every facet and factor involved in a complex software or computer related litigation scenario. Eureka's clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.

    Eureka Services and Practical Implementation of Expertise:
    • Review and comparison of software source code and functionality in relation to contractual commitments and requirements and/or protected intellectual property including, trade secrets, copyrights and patents
    • Computer / Software Forensics – able to reverse engineer and reconstruct hardware and software environments from backups, remnants and fragments of deprecated software. Eureka IT and Software development team is skilled at re-creating historical hardware and software environments
    • Investigation and assessment of software project bidding, planning and performance with particular attention to adequacy of discovery, specifications, cost estimates, schedules, and deliverables
    • Functional and performance testing of software against applicable specifications, warranties or industry standards using proprietary and commercial testing tools and techniques
    • Evaluation and use of both traditional and modern software development techniques and strategies, including creative payment structures related to software application/effort valuation and intellectual property licensing and ownership
    • Reviewing and exercising software applications and IT networks to expose and correct security issues and weaknesses
    Monty Myers Computer Software Expert PhotoFounder and CEO, Monty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience. Mr. Myers is involved in all aspects of the daily management and operation of Eureka, including business development, contracts, customer relations, project scope, execution and oversight, strategy and management, hiring, and finance.

    Mr. Myers has negotiated and performed hundreds of real-world software and technology contracts and statements of work involving complex software project and licensing terms and conditions including material intellectual property aspects. He is actively engaged in handling and protecting the confidential, proprietary, and trade secret information and technology of Eureka and its clients.

    View Monty Myers' Expert Witness Profile.

    Eureka Software Client Logos
    Check for SynapsUs
    Anthony Wechselberger
    President
    Escondido CA 92029
    USA
    phone: 760-740-9719
    fax: 760-740-9719
    Broadband & Multimedia Consulting & Expert Witness Services
    Specialized in cable, satellite, broadcast & Internet communications systems, and associated content distribution technologies. Thirty years experience in communications systems, including twenty years in leadership & executive positions (engineering, operations, sales & marketing). Substantial experience in Intellectual Property Litigation and Patent Infringement.

    Technology
  • Systems, Architectural & Design Engineering
  • Digital Rights Management, Conditional Access & Copy Protection Systems
  • Consumer Appliances (set top boxes, DVR/PVR)
  • Pay TV, Video on Demand, Interactive TV, Internet TV
  • Digital Television & Compression Systems
  • Technical & Business Management
  • Business & Product Development Practices
  • Technical, Strategic, & Product Marketing
  • Account & Contracts Management
  • Manufacturing, OEM & 3rd Party Relationships
  • Sales, Support, Installation & Field Engineering
  • Engineering & Product/Project Management
  • Check for SynapsUs
    David H. Williams
    PO Box 220442
    Saint Louis MO 63122
    USA
    phone: 203-423-9015
    E911-LBS-Consulting-Logo.jpg
    E911-LBS Consulting is a premier provider of business, product, and technology strategy and implementation services for enterprises, start-ups, and public sector entities looking to capitalize on Location Information.

    With market leading expertise in all forms of indoor and outdoor location technologies including GPS, Beacons, RFID, RTLS/Wi-Fi, network-based methods, and various combinations and hybrids, E911 provides services to ensure fully functional and integrated indoor and outdoor applications to maximize ROI and customer success.

    Mobile Location Strategy Development and Implementation Services
    • LBS Product Strategy Development
    • Indoor and Next Generation (NG) E911 Technical Strategy Development
    • Business Process and Business Case Development
    • Competitive Assessment and Analysis
    • Marketing Strategy Development
    • Operations Strategy Development
    • Market Launch Planning and Program Management
    • Expanded - LBS Privacy Policy and IT Architecture Development
    • Connected Car Privacy and Security Design
    Mobile Location Product Design and Implementation Services:
    • LBS and E911 Application Design and Development
    • Indoor and Outdoor Location Determination Technology Design, Evaluation and Selection
    • Mobile Application Requirements Definition
    • Mobile / Backoffice IT Integration Planning
    • Sales / Service Mobile Technology Optimization
    • Implementation Roadmap Development
    • Product Realization, Implementation Management
    David Williams Telecommunications Expert PhotoDavid H. Williams is an internationally-known expert in the Wireless / Mobile Location field and President and Founder of E911-LBS Consulting. With over 100 projects in mobile communications and information technology solutions design, selection, implementation and ongoing management, he has extensive experience in the activities and issues needed to get applications to market, including planning and design at the application, system, interface / integration, network, IT, operational and customer facing levels.

    Mr. Williams is an expert in the full range of business and consumer location-based services (LBS) that utilize these technologies. His client list includes Apple, AT&T, General Electric, General Motors, Google, HERE, Kaspersky Internet Security, LOCAID, Nextel, Qualcomm, Peschke, Samsung, Sprint, Toyota, and Verizon.

    Mr. Williams has been published and quoted by leading magazines and newspapers about location-related services, including The New York Times, CBS News.com, The Boston Globe, Computerworld, Directions Magazine, Mission Critical Communications, Popular Mechanics, and RFID Journal. He has also published numerous research reports and dozens of location-related articles, and tracks and analyzes leading companies in the LBS industry, particularly with respect to their product and technology strategies, competitive capabilities, and implementation issues.

    View David Williams' Expert Witness Profile.
    Check for SynapsUs
    Ray Yepes
    Director of Forensics and Incident Response
    1205 Sam Bass Rd.
    Round Rock Texas 78681
    USA
    phone: 512-255-3700
    Cyberdefenses-Logo.gif
    Cyber Defenses, Inc. is uniquely positioned to provide the highest possible level of Cyber Security, Management, and Technology solutions to their clients. Founded in 2001 by a team of returning military, cyber security veterans, Cyber Defenses has a dual focus on the Government/Public Sector and Private Sectors. Team members hail from the Big 5 consulting firms, as well as top Fortune 500 companies and the US Military. They hold credentials from NSA, Endeca, SAP – BOBJ, Oracle – OBIEE, MicroStrategy, Microsoft, Cisco, Linux, and many others.

    Cyber Defenses, Inc. integrates cyber security oversight, comprehensive managed services, and cyber security training to provide security service on behalf of national security interests, domestically and abroad, as well as many of the nation’s leading commercial concerns. Such industries include Banking, Educational Institutions, Federal Healthcare Insurance, IT Services, Manufacturing & Packaged Goods, Oil & Gas, and many more.

    Consulting Services:
    • Organization Review
    • Incident Review
    • Data Protection
    • Defense Operations
    • Vulnerability and Patch Management
  • Extended Threat Intelligence
  • Continuous Monitoring
  • Threat Hunting and Response
  • Identity and Access Management (IAM)
  • Education and Training
  • Ray Yepes Security Expert PhotoRay Yepes, Director of Forensics and Incident Response at CyberDefenses, Inc., has over 21 years of experience as a Security Professional and Criminal Investigations Examiner. In addition to many forensic industry certifications, Mr. Yepes is a Diplomate member of the American Board of Forensic Examiners and the American Board for Certification in Homeland Security. He has been a licensed private investigator since 2006.

    As a security professional, Mr. Yepes has consulted, designed, maintained, and/or implemented security perimeters, network security architectures, and security policies for small, midsize, and large companies including Fortune 500, 200, 100, and 50 companies.

    As a criminal investigations examiner, Mr. Yepes has assisted and advised local and federal government agencies in national security matters and high profile criminal investigations. His first digital forensic investigation dates back to 1995 while assisting the FBI in a child pornography case.

    Mr. Yepes has conducted and managed numerous Cyber Security incidents, including but not limited to malware, phishing, password attacks, denial of service attacks (DoS), Man in the Middle attacks (MiTM), drive-by downloads, malvertising, rogue software, social media threats, advanced persistent threats (APT), and other incidents. In response, he has developed and executed information security strategies, advising business areas on security risks.

    View Ray Yepes' Expert Witness Profile.
    Check for SynapsUs
    Hiren Kulkarni
    180 Lonsdale Street
    Melbourne Victoria 3000
    AUS
    phone: +61398387759
    hiren-kulkarni-logo.jpg
    Hiren Kulkarni specializes is IT Services, Account Management, Business Continuity of IT Services & Support Systems. He is experienced in Business Systems Integration (mergers and acquisitions), Business Process Transformation and ERP Implementations.

    Mr. Kulkarni offers Expert Witness and Expert Consultant Services in Project Management, Strategy, Delivery & Execution. He is Certified in Prince2, ITIL and specializes in Oracle Business Intelligence tools & E-Business Suite Modules: Project Accounting (Costing, Billing, Management), SLA, E-Tax, GL, AP, AR, FA, PJM, INV, iExpenses, iProcurement, PO.