banner ad

Programming /Software / Modeling Consultants

Sort Non-Featured Profiles by
< 1 2 >
Check for SynapsUs
Keith Mallinson
Telecommunications Expert
8 Faneuil Hall Marketplace
Boston MA 02109
USA
phone: 617-418-3977
fax: 617-848-3796
WiseHarbor-Logo.jpg
WiseHarbor is a global Wireless and Mobile Communications consulting firm serving companies, industry associations, and government clients.

While WiseHabor’s focus is industry specific, their scope of technologies, commercial offerings, and issues analyzed is broad and expanding in line with industry developments. Their knowledge encompasses towers, masts and micro sites, radio and core network equipment, devices, chips and software. The industry’s services and applications have diversified from voice and messaging to include rich multimedia with video, mobile commerce, automotive, and the internet of things (IoT). Their expertise has expanded accordingly and also includes analysis on innovation, competition, and technology licensing.

Areas of Expertise:

  • Business Modeling and Valuations
  • Competitive Analysis
  • Due Diligence
  • Market Research
  • Regulation and Licensing
  • Antitrust Investigations
  • Expert Testimony
  • Intellectual Property Analysis
  • Keith Mallinson Telecommunications Expert PhotoPrincipal, Keith Mallinson has more than 25 years of experience in the Telecommunications Industry: as a research analyst, consultant and testifying expert witness. Complementing his industry focus, he has a broad skill set including technologies, market analysis, regulation, economics and finance.

    Background Information - Prior to founding WiseHarbor in 2006, Mallinson led Yankee Group's global Wireless/Mobile research and consulting team as Executive Vice President, based in Boston, from 2000. Until then, he had overall responsibility for the firm's European division, as Managing Director from 1995. Prior to that he was the European Research Director.

    Mr. Mallinson has published numerous articles and speaks publicly at major industry events on a wide variety of topics including next generation mobile network technologies, broadband wireless, fixed mobile convergence and substitution, handset semiconductor technologies, intellectual property patents and licensing, emerging markets in developing nations, mobile search and advertising.

    View Keith Mallinson's Expert Witness Profile.
    10/23/2018 · Telecommunication
    Recent new technology deployments with gigabit LTE at Telstra in Australia, Sprint in the U.S. and EE in the UK highlight how much mobile communications technologies have improved since the introduction of mobile data services with circuit-switched and then packet-switched offerings from around 20 years ago. Peak and average user speeds have increased by a factor of 10,000. By way of comparison, microprocessor performance doubling every couple of years, as predicted by Moore's Law, has increased it only one thousand-fold over that period. Cellular performance improvements are therefore quite spectacular given the vagaries of connecting through the ether up to hundreds of meters, as well as processing those signals in the confines of around one square centimeter of baseband processor silicon!

    10/4/2018 · Telecommunication
    There is plenty of enthusiasm and quite a bit of hype in various quarters about upcoming 5G; but will it be worthwhile for everyone?

    In March 2015, IEEE significantly amended its patent policy in what was couched as an "update" but that seeks to significantly revise commitments from parties holding patent claims essential to IEEE standards to license those rights on reasonable and non-discriminatory (RAND) terms. Changes disallow patent holders from receiving any value attributable to the standards, require licensing at the smallest saleable patent practicing unit level, and deny these rights holders entitlement to seek an injunction against an unlicensed implementer until appellate review is exhausted. IEEE’s stated objective was to protect implementers from patent holdup, which was alleged without any substantiation.[1] IEEE is promoting, by reducing technology licensing costs, the short-term interests of certain implementers while undermining standard-essential patent values and the ability of SEP owners to receive adequate compensation, they are entitled to, from licensing their SEPs.

    8/24/2018 · Telecommunication
    At last, American authorities are also beginning to do the right thing for owners of standard-essential patents. Under the previous administration of President Barack Obama, America's agencies did the wrong thing by seriously undermining standard-essential patents in various ways. For example, this existentially threatened the independence of Qualcomm, which relies substantially on its patent-licensing business to fund long-term R&D including that in upcoming 5G mobile communications. Thankfully, President Donald Trump's administration has recognised the important need to support, not undermine, the nation's technology innovators, and uphold their patent rights, as enshrined in the US Constitution.

    In a major ruling that underscores judicial independence, federal judge Richard J. Leon has just unconditionally approved the merger between AT&T and Time Warner, rebuffing the US government's effort to stop the $85.4 billion deal.

    7/10/2018 · Telecommunication
    Major innovations in cellular technologies arise largely from the substantial Research and Development (R&D) investments and inventions of relatively few companies, followed by widespread collaborations including many more in the process of standard setting.

    6/14/2018 · Telecommunication
    While Ericsson is a leading contributor to mobile communications standards, a US District Court in California has significantly undervalued Ericsson's standard-essential patents (SEPs) by relying heavily on flawed "top-down" valuation analysis that prorates royalties by company for 2G, 3G and 4G based on SEP counting. This analysis applies a series of inaccurate assumptions which whittle down royalty rates from an understated notional maximum in a succession of unreliable steps. The resulting rates derived are a lot lower than those found in a European court's FRAND determination for the same company in the same year (2017) and for the same 2G, 3G, and 4G patent portfolios. The differences between these US and European determinations are irreconcilable.

    5/24/2018 · Telecommunication
    Radio spectrum is the lifeblood of wireless networks. Traditional methods of doling out spectrum have somewhat hindered rather than helped maximize the availability of affordable Internet access, even if this was not the case with voice and text. Instead of seeking to aggrandize auction proceeds by creating scarcity, more flexible allocations including shared as well as traditional licensed and unlicensed assignments are required.

    5/4/2018 · Patents
    I participated as a panelist in a session entitled, "Economists: Do They Have a Place?," at the Patents in Telecoms and the Internet of Things conference at George Washington University in Washington, D.C. on November 10, 2017. This article is substantially my remarks in that conference panel session. Before my remarks, Stephen Haber of Stanford University said that I had posed the defining question for the entire conference in an audience question-and-answer exchange the previous day. It had perturbed me to hear a panel speaker mischaracterize the communications standards as platforms of preexisting technologies upon which Internet of Things (IoT) innovation will occur. In response, I said that communications standards are rich in technology innovation and patented intellectual property.

    4/10/2018 · Telecommunication
    As I explained in IP Finance last week, following President Trump's blocking of Broadcom's hostile bid to acquire Qualcomm, by remaining independent the cellular technology leader will be able to maintain its long-term commitment to high levels of R&D investment (at 23 percent of sales recently), most significantly including that in 5G communications standard-essential IP.

    3/20/2018 · Telecommunication
    The broadband performance and economics of cellular with 4G and 5G is making it possible for many of us to do without any wired connection at all - already including those who, on average, stream up to an hour of video per day. Nevertheless, most homes will continue to need fixed connections; but 5G fixed-wireless access will serve many of these.

    2/20/2018 · Telecommunication
    At a conference entitled Patents in Telecoms & the Internet of Things, at George Washington University in the District of Columbia last week, I was perturbed to hear a speaker mischaracterizing the communications standards as platforms of preexisting technologies upon which IoT innovation will occur. Major research and development investments are being made in communications technologies and standards to satisfy the anticipated demands of 5G and IoT. In fact, these investments, with significant innovations resulting already, are largely a leap of faith in advance of hoped-for IoT applications development and proof of demand for these.

    1/24/2018 · Telecommunication
    Consumers are only beginning to use LTE in unlicensed spectrum. So far chatter has mostly been about operator trials, commercial chipsets and sales of devices to seed the market before anyone is to be able to use the new service feature. Nevertheless, the commercial impact will be quite dramatic within a few years.

    The new US Department of Justice antitrust leader says antitrust enforcers are too accommodating to IP implementers when in dispute with standard-essential patent owners. Instead, patent owners should be allowed to decide how they want to exercise their property rights: "under the antitrust laws, a unilateral refusal to license a valid patent should be per se legal" – he also reminds us "the right to exclude is one of the most fundamental bargaining rights the patent owner possesses."

    10/4/2017 · Telecommunication
    Technology innovation by chip, device and equipment vendors plus intense competition among national oligopolies of mobile network operators has improved cellular performance and reduced costs to the enormous benefit of consumers. Meanwhile, recent financial gains in the mobile ecosystem are largely accruing to Silicon Valley's tech titans including Apple, Alphabet, Facebook and Netflix. The massive network investments required for 5G may not be forthcoming if this imbalance persists.

    Check for SynapsUs
    Bruce Weiner
    IT / Patent Expert
    550 W. 54th St, Apt. 2126
    New York NY 10019
    USA
    phone: 646-701-2012
    Bruce-Weiner-Internet-Technology-Patent-Expert-Photo.jpg

    Bruce Weiner is an Information and Internet Technology executive with over 30 years of in-depth experience managing product and software development for contracting companies and Fortune 100 companies. Since 2012, he has been a Technology leader at the Federal Reserve Bank of New York.

    Mr. Weiner is a Princeton trained computer scientist and electrical engineer, and a patent holder. Over his career, he has gained extensive experience in Information Systems management, program/project management, software development, software architecture, internet delivery, business applications, technology vendor selection, IT Outsourcing, and customer contact center operations.

    Litigation Consulting Services: Mr. Weiner has experience as a consulting and/or testifying expert witness in software development, patent infringement, and commercial litigation matters for both plaintiffs and defendants. He is adept at translating complex software, patent, and technology issues for the lay person audience. He consulted on industry transforming anti-trust cases in the travel industry.

    Industry Experience:

    • Travel Industry Technology - Former technology leader for American Express Travel and Chief Technology Officer of United.com;
    • Loyalty Industry Technology - 30 years experience in the technology that powers loyalty programs, working on Membership Miles, Thank You Rewards, Mileage Plus, #1 Gold, eRewards, MyPoints, Blockbuster Rewards, and AAdvantage
    • Financial Services Technology – 30 years experience working with Financial Services Companies (American Express, Citibank, and Chase) on credit card and banking technology.
    Check for SynapsUs
    Bhuvan Urgaonkar, PhD
    Available Nationally and Internationally
    W371 Westgate Building
    University Park PA 16802
    USA
    phone: 814-933-7211
    Bhuvan-Urgaonkar-Computer-Science-Expert-Photo.jpg

    Bhuvan Urgaonkar, PhD, has over 15 years of experience in the field of Software Engineering and Computers. His work includes research in computer systems software, distributed computing (including systems such as Zookeeper, Redis, Memcached, Cassandra, Kafka), datacenters, cloud computing, storage systems, energy efficiency of computers and datacenters, big data (including systems such as Hadoop, Spark). 

    Dr. Urgaonkar has published over 80 research papers in competitive peer-reviewed conferences and journals on these topics with several best paper awards. He has procured research funding totaling more than $3 Million USD from federal agencies and industrial labs (Google, HP, IBM, Cisco, Microsoft, Amazon) to lead and train several Phd and MS students who now work in industry and academia. Dr. Urgaonkar has also delivered lectures on topics including Cloud Computing and Data Centers to Faculty at Microsoft and numerous other technology companies and universities around the world. 

    Education / Training: Ph.D. in Computer Science from the University of Massachusetts Amherst (2005) B.Tech (honors) in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur, India 

    Awards / Honors: Test of Time Award, ACM Sigmetrics 2016 National Science Foundation Career award, 2010 IBM Faculty Fellowships, 2016, 2014 Several best paper awards (see CV) 

    Litigation Support - Dr. Urgaonkar serves as an expert / technical consultant with multiple firms helping them (i) understand technical content related to state of the art products in areas such as content distribution, distributed computing, datacenter design, among others and (ii) interpret patents in these areas and connections between them and state of the art products and services. Services are available to law firms, government agencies, schools, firms / corporations, and hospitals. They include case review, deposition, and trial testimony as needed. 

    Areas of Expertise:

    • Software Design and Analysis
    • Computer Systems
    • Operating Systems
    • File Systems
    • Databases
    • Computer Security
    • Performance
    • Distributed Computing
    • Data Centers
    • Cloud Computing
    • Big Data Systems
    • Web
    • Internet
    • Content Distribution Networks
    • Software Reliability and Testing
    • Fault Tolerance
    • Hadoop
    • Spark
    • Kubernetes
    • Linux
    • AWS
    • Azure
    • Machine Learning
    • Scheduling
    11/5/2018 · Computers
    Discovering end-to-end request-processing paths is crucial in many modern IT environments for reasons varying from debugging and bottleneck analysis to billing and auditing. Existing solutions for this problem fall into two broad categories: statistical inference and intrusive instrumentation. The statistical approaches infer request-processing paths in a "most likely" way and their accuracy degrades as the workload increases. The instrumentation approaches can be accurate, but they are system dependent as they require knowledge (and often source code) of the application as well as time and effort from skilled programmers.

    10/10/2018 · Computers
    Dynamic capacity provisioning is a useful technique for handling the multi-time-scale variations seen in Internet workloads. In this article, we propose a novel dynamic provisioning technique for multi-tier Internet applications that employs (1) a flexible queuing model to determine how much of the resources to allocate to each tier of the application, and (2) a combination of predictive and reactive methods that determine when to provision these resources, both at large and small time scales. We propose a novel data center architecture based on virtual machine monitors to reduce provisioning overheads. Our experiments on a forty-machine Xen/Linux-based hosting platform demonstrate the responsiveness of our technique in handling dynamic workloads. In one scenario where a flash crowd caused the workload of a three-tier application to double, our technique was able to double the application capacity within five minutes, thus maintaining responsetime targets. Our technique also reduced the overhead of switching servers across applications from several minutes to less than a second, while meeting the performance targets of residual sessions.

    9/20/2018 · Computers
    Since many Internet applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a model based on a network of queues, where the queues represent different tiers of the application. Our model is sufficiently general to capture (i) the behavior of tiers with significantly different performance characteristics and (ii) application idiosyncrasies such as session-based workloads, concurrency limits, and caching at intermediate tiers. We validate our model using real multi-tier applications running on a Linux server cluster. Our experiments indicate that our model faithfully captures the performance of these applications for a number of workloads and configurations. For a variety of scenarios, including those with caching at one of the application tiers, the average response times predicted by our model were within the 95% confidence intervals of the observed average response times. Our experiments also demonstrate the utility of the model for dynamic capacity provisioning, performance prediction, bottleneck identification, and session policing. In one scenario, where the request arrival rate increased from less than 1500 to nearly 4200 requests/min, a dynamic provisioning technique employing our model was able to maintain response time targets by increasing the capacity of two of the application tiers by factors of 2 and 3.5, respectively.

    8/31/2018 · Computers
    With public cloud providers poised to become indispensable utility providers, neutrality-related mandates will likely emerge to ensure a level playing field among their customers ("tenants"). We analogize with net neutrality to discuss: (i) what form cloud neutrality might take, (ii) what lessons might the net neutrality debate have to offer, and (iii) in what ways cloud neutrality would be different from (and even more difficult than) net neutrality. We use idealized thought experiments and simple workload case studies to illustrate our points and conclude with a discussion of challenges and future directions. Our paper points to a rich and important area for future work.

    8/13/2018 · Computers
    Modern Internet-scale distributed networks have hundreds of thousands of servers deployed in hundreds of locations and networks around the world. Canonical examples of such networks are content delivery networks (called CDNs) that we study in this paper. The operating expenses of large distributed networks are increasingly driven by the cost of supplying power to their servers. Typically, CDNs procure power through long-term contracts from co-location providers and pay on the basis of the power (KWs) provisioned for them, rather than on the basis of the energy (KWHs) actually consumed. We propose the use of batteries to reduce both the required power supply and the incurred power cost of a CDN.

    7/20/2018 · Computers
    Recent technological advances in the development of flashmemory based devices have consolidated their leadership position as the preferred storage media in the embedded systems market and opened new vistas for deployment in enterprise-scale storage systems. Unlike hard disks, flash devices are free from any mechanical moving parts, have no seek or rotational delays and consume lower power. However, the internal idiosyncrasies of flash technology make its performance highly dependent on workload characteristics. The poor performance of random writes has been a cause of major concern which needs to be addressed to better utilize the potential of flash in enterprise-scale environments. We examine one of the important causes of this poor performance: the design of the Flash Translation Layer (FTL) which performs the virtual-to-physical address translations and hides the erase-before-write characteristics of flash. We propose a complete paradigm shift in the design of the core FTL engine from the existing techniques with our Demand-based Flash Translation Layer (DFTL) which selectively caches page-level address mappings. We develop a flash simulation framework called FlashSim. Our experimental evaluation with realistic enterprise-scale workloads endorses the utility of DFTL in enterprise-scale storage systems by demonstrating: (i) improved performance, (ii) reduced garbage collection overhead and (iii) better overload behavior compared to state-of-the-art FTL schemes. For example, a predominantly random-write dominant I/O trace from an OLTP application running at a large financial institution shows a 78% improvement in average response time (due to a 3-fold reduction in operations of the garbage collector), compared to a state-of-the-art FTL scheme. Even for the well-known read-dominant TPC-H benchmark, for which DFTL introduces additional overheads, we improve system response time by 56%.

    6/27/2018 · Computers
    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'my' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating to the cloud can be enumerated, some benefits may not apply to 'my' application. Also, there can be multiple ways in which an application might make use of the facilities offered by cloud providers. Answering these questions requires an in-depth understanding of the cost implications of all the possible choices specific to 'my' circumstances. In this study we identify an initial set of key factors affecting the costs of a deployement choice. Using benchmarks representing two different applications (TPC-W and TPC-E) we investigate the evolution of costs for different deployment choices. We show that application characteristics such as workload intensity, growth rate, storage capacity and software licensing costs produce complex combined effect on overall costs. We also discuss issues regarding workload variance and horizontal partitioning.

    6/7/2018 · Computers
    In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary contribution of our work is to demonstrate the feasibility and benefits of overbooking resources in shared platforms, to maximize the platform yield: the revenue generated by the available resources. We do this by first deriving an accurate estimate of application resource needs by profiling applications on dedicated nodes, and then using these profiles to guide the placement of application components onto shared nodes. By overbooking cluster resources in a controlled fashion, our platform can provide performance guarantees to applications even when overbooked, and combine these techniques with commonly used QoS resource allocation mechanisms to provide application isolation and performance guarantees at run-time.

    Check for SynapsUs
    David Shaw
    9 Wimpole Street
    London W1G 9SG
    GBR
    phone: 44-207-193-8355
    David Shaw is an independent Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.

    Services Offered:
  • Governance
  • Strategy
  • Programme Definition
  • Capability
  • Enterprise Architecture
  • Process Engineering
  • Portfolio Management
  • Programme Management Office Implementation
  • Individual Assignments
  • Check for SynapsUs
    Dr. Ghassan Hamarneh
    Professor
    School of Computing Science
    Vancouver V5A 1S6
    CAN
    phone: 778-782-2214
    Ghassan-Hamarneh-Medical-mage-Analysis-Consultant.jpg
    Prof. Hamarneh's professional experience extends over 20 years. He obtained his Ph.D. from Chalmers Univ. of Tech. in 2001, was a Post-doc fellow at the Hospital for Sick Children in Toronto, and at the Dept. Med. Biophysics at the Univ. of Toronto. Since 2003, he has been on the Computing Sciences faculty at Simon Fraser Univ. His research area is Medical Image Analysis (MIA) (computer vision and 3D image processing for biomedical imaging applications). He is a leader on a large number of technical projects in collaboration with local and int'l health centers. Dr. Hamarneh is a Senior Member of the Institute of Electrical and Electronics Engineers and a Senior Member of the Association for Computing Machinery.

    Under Dr. Hamarneh's leadership, members of his group won several awards (e.g. 6 best papers), recognitions, and media coverage. His group secured funding from NSERC, CIHR, MSFHR, MITACS, NIH, and the Qatar Foundation.

    Furthermore, he played a leading role in the organization of major workshops: Two highly successful workshop at the Banff International Research Station on "Math. Methods for Medical Image Analysis" and "Geometry for Anatomy", as well as the first MICCAI workshop on functional medical image analysis.

    Prof. Hamarneh has over 200 scientific publications in high impact journals and peer-reviewed conferences, 7 book chapters, and several software contributions with tens of thousands of downloads, e.g. TurtleSeg, MATITK, N-SIFT, I-DO, and VascuSynth. He has given many invited talks at top universities and companies. He is an Associate Editor of IEEE TM. He has been on the editorial board of JIVC; a reviewer for int'l high impact journals: J MedIA, IEEE TMI, PAMI, TBME, SIAM Imaging Science, NeuroImage, etc. He served on the program and review committees of many int'l conferences/workshops: MICCAI, CVPR, ICCV, IPMI, MMBIA, ISBI, etc.

    Dr. Hamarneh is the co-founder/director of the Medical Image Analysis Lab at SFU, a founding member of the IEEE Engineering in Medicine and Biology Chapter - Vancouver Section, Rehabilitation Aimed at Muscle Performance (RAMP), and the SFU Centre for Disability Independence Research and Education (CDIRE). He is a member of the Int'l Society on Medical Image Computing and Computer Assisted Intervention (MICCAI) and the Vancouver Brain Research Centre, a NeuroDevNet Network Investigator, and a Faculty/Mentor in the Canadian Institute of Health Research (CIHR) Bioinformatics Training Program.
    Check for SynapsUs
    Shamrock Consulting
    Marie G. Kerr
    Davidsonville MD 21035
    USA
    phone: 410-353-4414
    Shamrock-Consulting-logo.gif
    The Shamrock Consulting Group, including our anti-money laundering (AML) division, ShamrockAML, specializes in the "how" of detecting Financial Fraud or Malfeasance of any kind. With a deep understanding of technology and how organizations work, their consultants create imaginative and cost-effective processes, systems and detection scenarios. When new technology is required, they help clients through the entire acquisition cycle—from position papers to RFPs, selection, and implementation.

    Shamrock's practice includes both high-level advisory and hands-on work in the public and private sectors including:
    • Fraud Risk Analysis and Mitigation
    • Software Acquisition and Vendor Management
    • Data and Software Validation
  • Fraud Detection Scenario Development
  • Gap and Data Analysis
  • Expert Witness Reports / Testimony
  • Marie Kerr Financial Fraud  Expert PhotoMarie G. Kerr, President and Founder, specializes in Financial Fraud. She is a Certified Financial Crime Specialist, Certified Anti-Money Laundering Specialist (CAMS), and Project Management Professional (PMP).

    Ms. Kerr is a financial industry veteran with a deep understanding of how financial institutions work. She has served as a Homeland Security Program Advisor and Fraud Detection Subject Matter Expert (SME) and an IT and AML Advisor for a three-bank merger. Her experience includes uncovering the flow of financial transactions through banking application software and banking payment systems, detection of fraud and money laundering, understanding the architecture and data design of software systems and how they can be used to commit financial crimes, and the implementation of COTS products.

    Ms. Kerr has delivered speeches and seminars on financial crimes and money laundering at the Association of Certified Financial Crime Specialists' International Financial Crime Conference, Financial Markets World Conference, and Money Laundering Alert’s International Money Laundering Conference.

    View Marie Kerr's Expert Witness Profile.
    11/21/2017 · Finance
    Well-publicized bank transgressions are frequently labeled "compliance failures." However, to those of us who work in the industry, this sometimes feels like an insult. Anyone, like me, who has worked in banking, anti-money laundering (AML), software creation, audit readiness, compliance and process engineering, knows how easy it is to blame "the system." That excuse is often coupled with process lapses, and the official explanation of failure becomes "we need new software and better training of our (low-level) back-office staff." This may be true. It is quite difficult to grasp the totality of compliance mandates and then implement effective software and process solutions, especially in huge financial institutions. Geographic spread and fuzzy organizational lines can also cause compliance problems.

    11/8/2017 · Banking
    The collision of ineptitude and avarice is a frequent occurrence; sometimes it's on purpose. And always, in the case of financial malfeasance and extreme noncompliance, it involves IT systems. People drive the fraud. Processes can either support or hide the crime depending on the quality of back-office controls, but the proof lies in understanding the data, the software, and how they can be manipulated. Application software, tables within the applications and discrete data elements comprise the fundamentals-the ABCs of understanding how financial crimes are committed and detected. The following two stories are based on true events and are emblematic of how financial crimes and lack of compliance are enabled. One was committed by a single person, the other by a cadre within the bank. And they both matched the MO of the recent HSBC anti-money laundering (AML) debacle: a revolving door in Compliance and Audit of under-qualified people and an active intent to obfuscate by continually changing systems.

    8/23/2016 · Banking
    The recent guidance (warning, really) from the FDIC1 on the need for financial institutions to perform due diligence when selecting anti-money laundering (AML) software puts the proof of compliance burden squarely on the financial institution. It also points to the need for an enterprise solutions architecture, one that builds on existing structures-how things really are-rather than on pushing through a vendor package. While there is no doubt that commercial off-the-shelf (COTS) products play an integral part in AML compliance, there is also no doubt that AML software depends on the quality and uniformity of data supplied by the financial institution. The systems, data, processes and organizational structure of the enterprise form the infrastructure of compliance, and these must be understood and documented to ensure that the COTS "solutions" are just that. If, for example, a bank wanted to institute an automated customer risk scoring system, there would be many questions that needed answers before software could be selected and installed...

    7/15/2016 · Banking
    A lonely woman falls for a silver-haired gentleman-the face of a criminal enterprise in Africa-in one of the most common romance scams known to law enforcement. She loses her house and her savings. She is devastated both financially and emotionally, taken in by shysters who understand the vulnerabilities of the lonely. And in this true case, the lonely woman is also a victim of the American banking system.

    6/7/2016 · Banking
    In one critical anti-money laundering (AML) review of a mid-tier bank, examiners admitted to having a hard time understanding how the transaction monitoring system worked.

    4/29/2016 · Banking
    A financial institution can have a comprehensive anti-money laundering program, a staff of experts, and a million-dollar (or more) specialized computer system in place and yet still miss potential problem customers because they failed to collect or use important data. In the end, it all comes down to data-discrete pieces of information that need to be collected, analyzed and presented in meaningful ways-to make a successful anti-money laundering program. No matter what automated or procedural anti-money laundering programs you have in place, the success of the program depends on meaningful data.One of the first steps in creating an effective program, then, is to develop a data plan to understand what data must be captured, how to capture it, how to analyze it, how to report it and how to use it.

    4/7/2016 · Banking
    What started out as an apparently straight-forward Transaction Monitoring System Validation project took an interesting and cautionary turn at an international bank recently. The Project Team assembled for the task-as well as executive management at the Bank-expected that the Validation would discover some less-than-perfect data mapping from their core banking system to their Transaction Monitoring System. A completely new Compliance staff had reviewed the Bank's unfamiliar (to them) Transaction Monitoring System, and could see that something wasn't quite right. Wires were not appearing properly on reports, General Ledger account numbers were showing up instead of Customer Account Numbers, and there were unnecessary transaction codes, like Wire fees, clogging the system. It seemed like a simple, methodical task of documenting the current mapping and making appropriate changes.

    Check for SynapsUs
    John Strawn
    President
    15 Willow
    Larkspur CA 94939
    USA
    phone: 415-927-8856
    John-Strawn-Digital-Software-Expert-Photo.jpg

    Dr. John Strawn, Ph.D. (Stanford, 1985) has over 30 years experience in software development (assembly language, Fortran, C, C++, Java, HTML, XML). He is experienced in digital signal processing, especially for audio and music, including audio compression such as MP-3. As an employee and as an independent consultant he has worked on teams in large and small companies on cutting-edge technology. Dr. Strawn has served as testifying expert in patent and trade secret cases, conducted extensive prior art searches, and written expert reports, working for both plaintiffs and defendants. He has conducted software analysis of thousands of pages of source code. Having been a Fulbright scholar in Germany, he can easily work with source material in German. He is an accomplished public speaker and has published extensively. 

    Testifying Experience: includes Lucent v. Microsoft (San Diego, CA, February 2007), at $1.5 billion one of the largest patent jury awards in US history (http://en.wikipedia.org/wiki/Alcatel-Lucent_v._Microsoft).

    Check for SynapsUs
    Christopher M Daft, PhD
    2443 Fillmore St.
    Suite 380-4039
    San Francisco CA 94115-1814
    USA
    phone: 415-800-3734
    Chris-Daft-Medical-Device-Patent-Expert-Photo.jpg
    Award winning, Oxford Educated scientist whose areas of expertise include medical imaging, electronics, semiconductors, medical devices, sensors, MEMS, signal processing and image processing.

    Dr Daft has deposition and trial testimony experience.

    Extensive Intellectual Property experience including patent development, analysis, licensing, and litigation. Serial inventor who holds 22 U.S. Patents with several pending.

    Completed more than 84 hours of SEAK Expert Witness Seminars, including patent-specific training.

    Diverse industry experience including multi-nationals such as GE, Medtronic, Fujifilm, Samsung and Siemens as well as several start-ups. Well published. Winner of grants from National Institute of Health. Extensive international consulting experience. IEEE (Institute of Electrical and Electronic Engineers) Senior Member since 2004.

    Three years’ experience teaching electrical and computer engineering at the University of Illinois.

    Holds BA and MA in Physics from Oxford University as well as Doctorate from Oxford in Materials Science.



    View Dr. Christopher Daft's Expert Witness Profile.
    Check for SynapsUs
    Ian Allport
    Information Technology Consultant
    New York NY 10022
    USA
    phone: 212-813-0403
    Radical- Software-Logo.jpg
    Ian Allport Intellectual Property Expert PhotoIan Allport, principal at Radical Software & Consulting Inc., has over 30 years of experience in the Financial Services and Information Technology industry.

    Background Experience - For over 25 years Mr. Allport worked in various roles in the financial services industry. He has experience in developing applications for many business types and has operated at many different levels of responsibility including project management, application design, and programming. In those roles, he provided technology solutions and was intimately involved in the creation of new business platforms. At all times, Mr. Allport has been strongly aligned with the business operations in companies.

    Litigation Support - Since 2000, Mr. Allport has provided litigation services for legal firms throughout the United States and Canada in the area of infringement of intellectual property, namely: Patents, Copyrights, and Theft of Intellectual Property. His cases have included subject matter related to:
    • Financial Service Applications
    • Health Care Services
    • Medication Dispensing Software
    • ATM and Point of Sale Transaction Processing
    • Check Image Processing
    Areas of Expertise:

    Patents - Ian Allport has extensive experience in automated trading, including algorithmic and high frequency technology. These skills have been utilized on cases including Reuters vs. Bloomberg, LLC in a patent infringement litigation and a case of potential patent infringement involving automated execution platforms. Mr. Allport creates and examines claim charts, provides input to attorneys evaluating the validity of a patent, and performs detailed code and processing analysis of an application that potentially violate a patent.

    Copyrights - To determine if a copyright has been violated, Mr. Allport utilizes analytical skills including abstraction, filtration and comparison, standards of substantially similar, look and feel protection, virtually identical analysis, and a detailed examination of the processes used in conjunction with the potential violating application. These tasks culminate in a report detailing whether or not the copyright was violated and, if so, the manner in which it was done including the use of copyright case history to highlight how conclusions were drawn.

    Theft of Intellectual Property - Mr. Allport examines motives, defendant skill sets, opportunity, and the systems in question to determine if IP theft has occurred. Extensive reports are created based on his findings.
    Check for SynapsUs
    Dr. George Edwards
    Computer Scientist
    7958 Beverly Blvd
    Los Angeles CA 90046
    USA
    phone: 323-545-3933
    quandary-peak-research-logo.jpg
    George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

    Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

    Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

    Dr. Edwards provides expert consulting in the following areas:
    • Intellectual property and patent infringement
    • Software design/source code audit and review
    • Non-performance claims
    • Expert witness and depositions
    Dr. Edwards is an expert in the following technologies :
    • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
    • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
    • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
    • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
    • Operating systems & servers: UNIX, Linux, Windows, Mac OS
    • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
    • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
    • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
    View Expert Witness Profile.
    7/10/2012 · Patents
    The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

    Check for SynapsUs
    100 Mill Plain Rd.
    Danbury CT 06811
    USA
    phone: 855-PROLIFOGY (776-5436)
    cory_plock_logo.gif
    Premium Software Consulting Services provided by industry leading experts. Today's software users expect and demand software that is more intelligent, interactive, usable, and reliable than ever before, over a backdrop of continuously evolving technology spanning a range of platforms. To remain competitive, modern applications need to solve complex problems that have never been solved before. This requires more than just programmers. You need experts.

    All of our consultants have a Ph.D. in computer science or related discipline and at least ten years of industry experience. All have contributed to the software state-of-the-art, published original work, presented at conferences around the world, and have years of hands-on, practical industry experience. Areas include Software Design, Reliability, OOP, Pedagogy, Algorithms, Vision, Embedded Systems, Knowledge Acquisition, Programming Theory, Formal Methods, Computational Linguistics, Artificial Intelligence, and others. They know and work with today's modern programming languages and technologies. Expertise spans all aspects of the software life-cycle.

    Offering advanced software development, project management, code review & quality assurance, management consulting, expert witness services, failed project turnaround, usability analysis, and more. Available on or off site anywhere in the United States and Europe. Please see our web site for more information and additional service offerings.
    3/28/2013 · Computers
    The discovery phase of IP litigation often calls for a technical review of a software product. A code review is an activity conducted by an expert witness that involves reviewing the source code of a product to discover pertinent facts relevant to the case.

    3/28/2012 · Technology
    The situation: you have invested an enormous amount of money and company resources in developing software solutions to address client needs. Regardless of the size of your company, every dollar counts and you want to know that your investment today will ultimately produce a fast, modern, scalable, and correct software solution that will still be usable tomorrow with tomorrow's technology.

    Licensing and infringement litigation are two primary potential income sources from a patent. With licensing, the inventor permits the licensee to make, use, sell, or offer to sell a patented invention for compensation.

    10/20/2011 · Technology
    C++, one of the most widely used and known programming languages in software history, could possibly turn into one of the most unknown languages in the coming months.

    12/8/2010 · Technology
    Prolifogy's failed project turnaround service has generated increased interest recently. Specifically, it was the most requested of all service offerings last month—a fact that surprised even company officials.

    Check for SynapsUs
    Jacob Sharony, PhD, MBA
    Principal Scientist
    info@mobiusconsulting.com
    N. Babylon NY 11703
    USA
    phone: 888-829-2457
    Jacob-Sharony-Mobile-Wireless-Technology-Expert-Photo.jpg

    Mobius Consulting is a Mobile and Wireless Technology management consulting firm. The industry and academic professionals at Mobius offer diverse services leveraging their extensive experience and expertise in enterprise and vertical markets including telecom, healthcare, energy, transportation, government, supply chain and logistics. Consulting Services Include:

    • Technology and Product Strategy
    • Network Architecture Design
    • System Analysis
    • Modeling and Simulations
    • Algorithms Development
    • RF Site Survey
    • Point-to-point / Point-to-multi-point Backhaul Design
    • Vetting New Concepts
    • Product Development / Rapid Prototyping
    • System Integration and Deployment
    • Research / Position / Marketing White Papers
    • Product Evaluation / Competitive Analysis
    • RFI / RFP Development / Processing
    • Education and Training
    • Intellectual Property / Patent Assistance
    • Expert Witness

    Principal, Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University. Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Dr. Sharony has also published extensively in scientific journals and conferences. View Dr. Sharony's Expert Witness Profile.

    Check for SynapsUs
    C. Matthew Curtin, CISSP
    Founder and CEO
    Columbus Headquarters
    5 E. Long St., 9th Floor
    Columbus OH 43215
    USA
    phone: 614-545-4225
    matt-curtin-photo.jpg

    Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense. 

    Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully. 

    Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe. 

    Interhack's Cybersecurity Practice helps you to defend your organization

    Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets. 

    The Interhack system of Cybersecurity Services has six parts. 

    Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities. 

    Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize. 

    Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards. 

    Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation. 

    Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have. 

    Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.

    View Mr. Curtin's Expert Witness Profile.

    Matthew Curtin
    This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
    Matthew Curtin, Peter G. Neumann
    Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
    Check for SynapsUs
    Monty G. Myers, PE
    3305 Northland Drive
    Suite 305
    Austin TX 78731
    USA
    phone: 512-459-9292
    Eureka-Software-logo.jpg
    Eureka Software Solutions, Inc. is a Software Development and Consulting business with over 30 years of hands-on experience in the Computer, Software, and Technology industries. Eureka and its team of professionals provide an unparalleled understanding of nearly every facet and factor involved in a complex software or computer related litigation scenario. Eureka's clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.

    Eureka Services and Practical Implementation of Expertise:
    • Review and comparison of software source code and functionality in relation to contractual commitments and requirements and/or protected intellectual property including, trade secrets, copyrights and patents
    • Computer / Software Forensics – able to reverse engineer and reconstruct hardware and software environments from backups, remnants and fragments of deprecated software. Eureka IT and Software development team is skilled at re-creating historical hardware and software environments
    • Investigation and assessment of software project bidding, planning and performance with particular attention to adequacy of discovery, specifications, cost estimates, schedules, and deliverables
    • Functional and performance testing of software against applicable specifications, warranties or industry standards using proprietary and commercial testing tools and techniques
    • Evaluation and use of both traditional and modern software development techniques and strategies, including creative payment structures related to software application/effort valuation and intellectual property licensing and ownership
    • Reviewing and exercising software applications and IT networks to expose and correct security issues and weaknesses
    Monty Myers Computer Software Expert PhotoFounder and CEO, Monty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience. Mr. Myers is involved in all aspects of the daily management and operation of Eureka, including business development, contracts, customer relations, project scope, execution and oversight, strategy and management, hiring, and finance.

    Mr. Myers has negotiated and performed hundreds of real-world software and technology contracts and statements of work involving complex software project and licensing terms and conditions including material intellectual property aspects. He is actively engaged in handling and protecting the confidential, proprietary, and trade secret information and technology of Eureka and its clients.

    View Monty Myers' Expert Witness Profile.

    Eureka Software Client Logos
    Check for SynapsUs
    Harry G. Direen, PhD, PE
    Colorado Springs CO 80921
    USA
    phone: 877-869-5201
    Harry-Direen-Control-Systems-Expert-Photo.jpg
    DireenTech is a Design and Systems Development firm in the Electronics and Software Industry. They are currently under contract with the US Air Force Academy Center for UAS Research, Department of Electrical and Computer Engineering in the area of using General Purpose Graphics Processing Units (GPGPU) in UAVs / Drones to provide fast autonomous target identification and GPS denied navigation.

    DireenTech has also partnered with FalconWorks and Falci Adaptive Motor sports on the NeuroGroove program to develop technologies to help those with neuromotor disabilities, including U.S. veterans, increase their ability to control and interact with their environment.

    Core Services
    • Software Design and Development
    • Electronic Hardware Design and Development
    • Research using GPGPUs for Control, Navigation and Image Processing
    • Intellectual Property
    • Reverse Engineering Hardware, Software, and Firmware
    • Product Forensics
    Chief Operating officer, Harry Direen, PhD, PE has over 30 years of experience as an engineer Designing and Developing Systems in the Electronics and Software Industry. He has taught engineering courses at the US Air Force Academy and at the University of Colorado. Dr. Direen currently works with a research group at the US Air Force Academy developing control systems and image processing using GPGPUs for UAVs. An inventor, he holds 3 United States patents.

    Dr. Direen has a broad base of knowledge in electronic and software systems gained from a long career developing a wide range of products and systems. He has reverse engineered a variety of complex systems over the years, including: media players, modems, modem compression algorithms, coriolis mass flow meters, database systems, and a range of other products to support patent infringement cases generating detailed claim charts and writing expert reports to demonstrate infringement. Dr. Direen has successfully discovered and analyzed complex digital signal processing algorithms and pertinent operations within these products for many years.

    View Dr. Direen's Expert Witness Profile.
    < 1 2 >