banner ad

Computer Systems - Services Expert Witnesses

Sort Non-Featured Profiles by
< 1 2 >
Check for SynapsUs
Jacob Sharony, PhD, MBA
Principal Scientist
info@wirelessexpertconsulting.com
Deer Park NY 11729
USA
phone: 888-829-2457
Jacob-Sharony-Mobile-Wireless-Technology-Expert-Photo.jpg

Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University. Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Litigation Support - Dr. Sharony provides Patent and Class Action litigation support and expert consulting in mobile and wireless technologies. This includes patent infringement and invalidity analysis, FRAND analysis, writing expert reports, and deposition, and testimony in court. His deep knowledge of target markets, including telecom, healthcare, logistics, transportation, government, hospitality, mobile commerce and supply chain management, combined with extensive expertise in wireless and mobile technologies ensure innovative and successful solutions. Areas of Expertise:

  • WiFi
  • 4G LTE and WiMAX
  • 5G Access / Backhaul
  • Millimeter Waves (mmWave) 60 GHz
  • Bluetooth / BLE
  • ZigBee
  • MIMO
  • VoIP
  • RTLS
  • RFID
  • IoT
  • M2M
  • Wireless Sensing Technologies
  • Antenna Issues
  • Small Cell Issues
  • Security Issues

View Dr. Sharony's Consulting Profile.

Check for SynapsUs
Bhuvan Urgaonkar, PhD
Available Nationally and Internationally
W371 Westgate Building
University Park PA 16802
USA
phone: 814-933-7211
Bhuvan-Urgaonkar-Computer-Science-Expert-Photo.jpg

Bhuvan Urgaonkar, PhD, has over 15 years of experience in the field of Software Engineering and Computers. His work includes research in computer systems software, distributed computing (including systems such as Zookeeper, Redis, Memcached, Cassandra, Kafka), datacenters, cloud computing, storage systems, energy efficiency of computers and datacenters, big data (including systems such as Hadoop, Spark). 

Dr. Urgaonkar has published over 80 research papers in competitive peer-reviewed conferences and journals on these topics with several best paper awards. He has procured research funding totaling more than $3 Million USD from federal agencies and industrial labs (Google, HP, IBM, Cisco, Microsoft, Amazon) to lead and train several Phd and MS students who now work in industry and academia. Dr. Urgaonkar has also delivered lectures on topics including Cloud Computing and Data Centers to Faculty at Microsoft and numerous other technology companies and universities around the world. 

Education / Training: Ph.D. in Computer Science from the University of Massachusetts Amherst (2005) B.Tech (honors) in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur, India 

Awards / Honors: Test of Time Award, ACM Sigmetrics 2016 National Science Foundation Career award, 2010 IBM Faculty Fellowships, 2016, 2014 Several best paper awards (see CV) 

Litigation Support - Dr. Urgaonkar serves as an expert / technical consultant with multiple firms helping them (i) understand technical content related to state of the art products in areas such as content distribution, distributed computing, datacenter design, among others and (ii) interpret patents in these areas and connections between them and state of the art products and services. Services are available to law firms, government agencies, schools, firms / corporations, and hospitals. They include case review, deposition, and trial testimony as needed. 

Areas of Expertise:

  • Software Design and Analysis
  • Computer Systems
  • Operating Systems
  • File Systems
  • Databases
  • Computer Security
  • Performance
  • Distributed Computing
  • Data Centers
  • Cloud Computing
  • Big Data Systems
  • Web
  • Internet
  • Content Distribution Networks
  • Software Reliability and Testing
  • Fault Tolerance
  • Hadoop
  • Spark
  • Kubernetes
  • Linux
  • AWS
  • Azure
  • Machine Learning
  • Scheduling
11/5/2018 · Computers
Discovering end-to-end request-processing paths is crucial in many modern IT environments for reasons varying from debugging and bottleneck analysis to billing and auditing. Existing solutions for this problem fall into two broad categories: statistical inference and intrusive instrumentation. The statistical approaches infer request-processing paths in a "most likely" way and their accuracy degrades as the workload increases. The instrumentation approaches can be accurate, but they are system dependent as they require knowledge (and often source code) of the application as well as time and effort from skilled programmers.

10/10/2018 · Computers
Dynamic capacity provisioning is a useful technique for handling the multi-time-scale variations seen in Internet workloads. In this article, we propose a novel dynamic provisioning technique for multi-tier Internet applications that employs (1) a flexible queuing model to determine how much of the resources to allocate to each tier of the application, and (2) a combination of predictive and reactive methods that determine when to provision these resources, both at large and small time scales. We propose a novel data center architecture based on virtual machine monitors to reduce provisioning overheads. Our experiments on a forty-machine Xen/Linux-based hosting platform demonstrate the responsiveness of our technique in handling dynamic workloads. In one scenario where a flash crowd caused the workload of a three-tier application to double, our technique was able to double the application capacity within five minutes, thus maintaining responsetime targets. Our technique also reduced the overhead of switching servers across applications from several minutes to less than a second, while meeting the performance targets of residual sessions.

9/20/2018 · Computers
Since many Internet applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a model based on a network of queues, where the queues represent different tiers of the application. Our model is sufficiently general to capture (i) the behavior of tiers with significantly different performance characteristics and (ii) application idiosyncrasies such as session-based workloads, concurrency limits, and caching at intermediate tiers. We validate our model using real multi-tier applications running on a Linux server cluster. Our experiments indicate that our model faithfully captures the performance of these applications for a number of workloads and configurations. For a variety of scenarios, including those with caching at one of the application tiers, the average response times predicted by our model were within the 95% confidence intervals of the observed average response times. Our experiments also demonstrate the utility of the model for dynamic capacity provisioning, performance prediction, bottleneck identification, and session policing. In one scenario, where the request arrival rate increased from less than 1500 to nearly 4200 requests/min, a dynamic provisioning technique employing our model was able to maintain response time targets by increasing the capacity of two of the application tiers by factors of 2 and 3.5, respectively.

8/31/2018 · Computers
With public cloud providers poised to become indispensable utility providers, neutrality-related mandates will likely emerge to ensure a level playing field among their customers ("tenants"). We analogize with net neutrality to discuss: (i) what form cloud neutrality might take, (ii) what lessons might the net neutrality debate have to offer, and (iii) in what ways cloud neutrality would be different from (and even more difficult than) net neutrality. We use idealized thought experiments and simple workload case studies to illustrate our points and conclude with a discussion of challenges and future directions. Our paper points to a rich and important area for future work.

8/13/2018 · Computers
Modern Internet-scale distributed networks have hundreds of thousands of servers deployed in hundreds of locations and networks around the world. Canonical examples of such networks are content delivery networks (called CDNs) that we study in this paper. The operating expenses of large distributed networks are increasingly driven by the cost of supplying power to their servers. Typically, CDNs procure power through long-term contracts from co-location providers and pay on the basis of the power (KWs) provisioned for them, rather than on the basis of the energy (KWHs) actually consumed. We propose the use of batteries to reduce both the required power supply and the incurred power cost of a CDN.

7/20/2018 · Computers
Recent technological advances in the development of flashmemory based devices have consolidated their leadership position as the preferred storage media in the embedded systems market and opened new vistas for deployment in enterprise-scale storage systems. Unlike hard disks, flash devices are free from any mechanical moving parts, have no seek or rotational delays and consume lower power. However, the internal idiosyncrasies of flash technology make its performance highly dependent on workload characteristics. The poor performance of random writes has been a cause of major concern which needs to be addressed to better utilize the potential of flash in enterprise-scale environments. We examine one of the important causes of this poor performance: the design of the Flash Translation Layer (FTL) which performs the virtual-to-physical address translations and hides the erase-before-write characteristics of flash. We propose a complete paradigm shift in the design of the core FTL engine from the existing techniques with our Demand-based Flash Translation Layer (DFTL) which selectively caches page-level address mappings. We develop a flash simulation framework called FlashSim. Our experimental evaluation with realistic enterprise-scale workloads endorses the utility of DFTL in enterprise-scale storage systems by demonstrating: (i) improved performance, (ii) reduced garbage collection overhead and (iii) better overload behavior compared to state-of-the-art FTL schemes. For example, a predominantly random-write dominant I/O trace from an OLTP application running at a large financial institution shows a 78% improvement in average response time (due to a 3-fold reduction in operations of the garbage collector), compared to a state-of-the-art FTL scheme. Even for the well-known read-dominant TPC-H benchmark, for which DFTL introduces additional overheads, we improve system response time by 56%.

6/27/2018 · Computers
Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'my' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating to the cloud can be enumerated, some benefits may not apply to 'my' application. Also, there can be multiple ways in which an application might make use of the facilities offered by cloud providers. Answering these questions requires an in-depth understanding of the cost implications of all the possible choices specific to 'my' circumstances. In this study we identify an initial set of key factors affecting the costs of a deployement choice. Using benchmarks representing two different applications (TPC-W and TPC-E) we investigate the evolution of costs for different deployment choices. We show that application characteristics such as workload intensity, growth rate, storage capacity and software licensing costs produce complex combined effect on overall costs. We also discuss issues regarding workload variance and horizontal partitioning.

6/7/2018 · Computers
In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary contribution of our work is to demonstrate the feasibility and benefits of overbooking resources in shared platforms, to maximize the platform yield: the revenue generated by the available resources. We do this by first deriving an accurate estimate of application resource needs by profiling applications on dedicated nodes, and then using these profiles to guide the placement of application components onto shared nodes. By overbooking cluster resources in a controlled fashion, our platform can provide performance guarantees to applications even when overbooked, and combine these techniques with commonly used QoS resource allocation mechanisms to provide application isolation and performance guarantees at run-time.

Check for SynapsUs
David Shaw
9 Wimpole Street
London W1G 9SG
GBR
phone: 44-207-193-8355
David Shaw is an independent Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.

Services Offered:
  • Governance
  • Strategy
  • Programme Definition
  • Capability
  • Enterprise Architecture
  • Process Engineering
  • Portfolio Management
  • Programme Management Office Implementation
  • Individual Assignments
  • Check for SynapsUs
    Dr. George Edwards
    Computer Scientist
    7958 Beverly Blvd
    Los Angeles CA 90046
    USA
    phone: 323-545-3933
    quandary-peak-research-logo.jpg
    George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

    Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

    Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

    Dr. Edwards provides expert consulting in the following areas:
    • Intellectual property and patent infringement
    • Software design/source code audit and review
    • Non-performance claims
    • Expert witness and depositions
    Dr. Edwards is an expert in the following technologies :
    • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
    • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
    • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
    • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
    • Operating systems & servers: UNIX, Linux, Windows, Mac OS
    • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
    • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
    • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
    View Consulting Profile.
    7/10/2012 · Patents
    The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

    Check for SynapsUs
    100 Mill Plain Rd.
    Danbury CT 06811
    USA
    phone: 855-PROLIFOGY (776-5436)
    cory_plock_logo.gif
    Premium Software Consulting Services provided by industry leading experts. Today's software users expect and demand software that is more intelligent, interactive, usable, and reliable than ever before, over a backdrop of continuously evolving technology spanning a range of platforms. To remain competitive, modern applications need to solve complex problems that have never been solved before. This requires more than just programmers. You need experts.

    All of our consultants have a Ph.D. in computer science or related discipline and at least ten years of industry experience. All have contributed to the software state-of-the-art, published original work, presented at conferences around the world, and have years of hands-on, practical industry experience. Areas include Software Design, Reliability, OOP, Pedagogy, Algorithms, Vision, Embedded Systems, Knowledge Acquisition, Programming Theory, Formal Methods, Computational Linguistics, Artificial Intelligence, and others. They know and work with today's modern programming languages and technologies. Expertise spans all aspects of the software life-cycle.

    Offering advanced software development, project management, code review & quality assurance, management consulting, expert witness services, failed project turnaround, usability analysis, and more. Available on or off site anywhere in the United States and Europe. Please see our web site for more information and additional service offerings.
    3/28/2013 · Computers
    The discovery phase of IP litigation often calls for a technical review of a software product. A code review is an activity conducted by an expert witness that involves reviewing the source code of a product to discover pertinent facts relevant to the case.

    3/28/2012 · Technology
    The situation: you have invested an enormous amount of money and company resources in developing software solutions to address client needs. Regardless of the size of your company, every dollar counts and you want to know that your investment today will ultimately produce a fast, modern, scalable, and correct software solution that will still be usable tomorrow with tomorrow's technology.

    Licensing and infringement litigation are two primary potential income sources from a patent. With licensing, the inventor permits the licensee to make, use, sell, or offer to sell a patented invention for compensation.

    10/20/2011 · Technology
    C++, one of the most widely used and known programming languages in software history, could possibly turn into one of the most unknown languages in the coming months.

    12/8/2010 · Technology
    Prolifogy's failed project turnaround service has generated increased interest recently. Specifically, it was the most requested of all service offerings last month—a fact that surprised even company officials.

    Check for SynapsUs
    Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE
    Victoria MN USA
    phone: 952-679-4604
    Isaak-Technologies-Logo.jpg
    Philip Isaak Data Center Infrastructure Expert PhotoPhilip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, is an expert witness, consultant & trainer in the design, construction, procurement, implementation, commissioning & operations of information technology, telecommunications & critical data center facilities. Mr. Isaak provides clear analysis for complex disputes, incorporating industry standards, best-practices and over 20 years of consulting & training expertise working with clients located in 28 countries and territories across 6 continents.

    In recognition of Mr. Isaak’s professional standing, the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified him to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold. Mr. Isaak is also an author of several industry standards published by TIA & ANSI/BICSI, whitepapers published by The Green Grid, and the Data Center Handbook published by John Wiley & Sons.


    Expert Witness ServicesAreas of Expertise
    • IP, Trade Secrets, Contracts Analysis
    • Design, Construction, Implementation Claims, Damages, Defects, Delays, Failure & Quality Control Analysis
    • Failed System Analysis
    • Unfulfilled SLA Analysis
    • Technical Investigations
    • Claims Preparation & Analysis
    • Expert Reports
    • Settlement Opinions & Strategies
    • Deposition & Trial Testimony
    • Cloud Computing Services
    • Colocation Services
    • Construction
    • Data Centers
    • Electrical Engineering
    • Fiber Optic Cabling
    • Forensic Engineering
    • IT Systems Capacity Planning & Forecasting
    • Life Safety Systems
    • Network Systems, Services & Infrastructure
    • Operating Procedures
    • Telecommunications


    View Philip Isaak's Consulting Profile.
    1/11/2018 · Computers
    This is the first in a series of six posts on how to overcome contractual challenges for data center projects. The series will address:

    Check for SynapsUs
    C. Matthew Curtin, CISSP
    Founder and CEO
    Columbus Headquarters
    5 E. Long St., 9th Floor
    Columbus OH 43215
    USA
    phone: 614-545-4225
    matt-curtin-photo.jpg

    C. Matthew Curtin, CISSP  Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations. 

    Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above). 

    Academic references to their work include the Stanford Law Review and university courses throughout the world. Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state. 

    C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters. 

    Areas of Forensic Expertise:

    • Electronic Discovery
    • Preservation and Forensic Analysis of Data
    • Complex Analysis of Non-Standard Data Sets
    • Investigations
    • Data Breaches

    View Mr. Curtin's Consulting Profile.

    Matthew Curtin
    This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
    Matthew Curtin, Peter G. Neumann
    Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
    Check for SynapsUs
    Monty G. Myers, PE
    3305 Northland Drive
    Suite 305
    Austin TX 78731
    USA
    phone: 512-459-9292
    Eureka-Software-logo.jpg
    Monty Myers Computer Software Expert PhotoMonty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience, including the founding of Eureka Software Solutions, Inc. (“Eureka”) and acting as CEO of Eureka for 28 years.

    Mr. Myers has provided services to a balanced mix of plaintiffs and defendants in over 40 litigation matters ranging from billion dollar, landscape-changing lawsuits between worldwide industry leaders to smaller-scale litigation between individuals or local businesses. Mr. Myers' clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.

    Litigation Support - Monty Myers is a Computer and Software Expert Witness, experienced and proven at offering expert testimony under-oath at trial, hearings, and depositions. For the last 5+ years, he has provided expert witness services for engagements including Software Patent or Software Trade Secret litigation matters.

    Mr. Myers is available as a consulting and/or testifying expert witness to assist with understanding the technology and technical issues in the case and providing review, analysis, and testimony (report, deposition, or courtroom) regarding the technology, software, or patents involved in the case. He has worked extensively with counsel in the taking and defending of depositions, reviewing and challenging the testimony of others, and assisting with and implementing an overall trial strategy.

    Areas of Expertise:
    • Source Code Review
    • Source Code Comparison
    • Source Code Reconstruction
    • Source Code Misappropriation / Theft
    • Source Code Copyright / Patents
    • Software Patents
    • Trade Marks
    • Trade Secrets
  • Antitrust
  • NDAs
  • Open Source Licensing
  • Computer Forensics
  • Mobile / Wireless Technology
  • Cloud and Web Business
  • Hardware / Infrastructure
  • Contract Performance / Project Management
  • Capabilities:
    • Adept at taking highly technical material and effectively communicating it to counsel, the judge or a jury in terms they can understand via testimony or reports/declarations
    • Skilled at reviewing and comparing software source code and functionality in the litigation context in relation to protected intellectual property including, trade secrets, copyrights, and patents and/or license or other contractual commitments and requirements
    • Able to reverse engineer and reconstruct hardware and software environments from backups, remnants, and fragments of deprecated software along with re-creating historical hardware and software environments
    • Highly familiar with functional and performance testing of software against applicable specifications, warranties, or industry standards using proprietary and commercial testing tools and techniques
    View Monty Myers' Consulting Profile.

    Eureka Software Client Logos
    Check for SynapsUs
    Erik Laykin, CHFI, CEDS
    Managing Director
    10100 Santa Monica Blvd
    11th Floor
    Los Angeles CA 90067
    USA
    phone: 310-245-2902
    erik-laykin-photo.jpg
    Erik Laykin, CHFI, CEDS, Managing Director in the Los Angeles office of Duff & Phelps, LLP, is an internationally recognized Computer Forensic, Electronic Discovery, and Cybercrime Expert. Mr. Laykin is the co-chair of the firm’s Global Electronic Discovery & Investigations practice. He focuses on high stakes eDiscovery, computer forensics and corporate investigations on behalf of law firms and corporations throughout the North America, Asia and Europe.

    An electronic discovery and computer forensic authority, Mr. Laykin has served as an expert witness throughout the United States in both Federal and state court and has also served as a court-appointed Special Master in matters involving complex eDiscovery and technology investigations. As the co-chair of the GEDI practice, Mr. Laykin directs large-scale corporate investigations and electronic discovery litigation. As a result of his investigations and expert testimony, he and his team have successfully solved/resolved cases valued in the hundreds of millions of dollars on behalf of Fortune 100 companies both domestically and abroad.

    Areas of Investigative Expertise:
    • Cyber-Crime
    • Electronic Fraud
    • Data Breaches
    • Trade Secret Theft
    • Trademark
    • Patent and Systems Design Infringement and Failure
    • Online Piracy
    • Corporate Espionage
    • White Collar Crime
    • Privacy and Data Loss
    • Intellectual Property Disputes
    • Complex Information Technology Disputes
    View Consulting Profile.
    Erik Laykin
    Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.
    Check for SynapsUs
    Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC
    Chief Forensic Analyst
    4790 Caughlin Pkwy., #223
    Reno NV 89519
    USA
    phone: 702-331-8686
    Discovery-Technician-Logo.jpg
    Ira Victor Cybersecurity Expert PhotoIra Victor is the Discovery Technician, practitioner of digital forensics for 25 years. He has extensive background in the following areas:
    • Digital forensics, the examination of data residing on a computer or network to determine events that occurred in the past;
    • E-discovery and preservation of Electronically Stored Information (ESI);
    • Incident Response, the recovery of lost data after a cybercrime, natural disaster, or other business disruption;
    • Information security, the practice of preventing data loss;
    Case consulting and/or expert witness experience:
    • Medical malpractice, personal injury, wrongful death, business espionage, escrow fraud; insurance defense, real property, family/divorce, social media abuse; criminal defense;
    • Strategic use of electronic evidence and ESI;
    • Efficient electronic evidence preservation to contain costs;
    • Experience as consultant or expert witness in California, Mississippi, New Mexico, New York, and Nevada;
    Additional professional activities:
    • Teaches CLE classes for attorneys through the Washoe and Clark County Bar Associations, and the Nevada Justice Association.
    • Public speaking engagements on cybercrime prevention.
    • Named on six U.S. patents in email security and information security, with one additional information security patent pending.
    Education and Relevant Certifications:
    Six (6) active certifications from globally-recognized certification bodies:
    • Global Information Assurance Certification body (GIAC)
    • ISACA, Formerly known as Information Systems Audit and Control Association
    Undergraduate degree: Bachelor of Arts, Temple University

    Areas of Expertise:
    • E-discovery
    • Electronically Stored Information (ESI)
    • Computers and Mobile Devices
    • Vehicle Electronics
    • Electronic Banking
    • Email
    • Title fraud
    • Wire fraud
    • Electronic Medical Records (EMR)
    • Electronic Health Records (EHR)
  • Video Forensics
  • Hacking
  • Ecommerce
  • Cybersecurity
  • Cybercrime (also: cyber crime)
  • Data Recovery
  • Digital Forensics
  • Metadata
  • Information Security
  • Information Governance
  • 5/18/2018 · Digital Forensics
    Habeas Hard Drive gives a thumbs up to Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry. The book chronicles the life of the BlackBerry, a fabulous product that's going extinct. It also offers a clear lesson in how not to present technical evidence in court.

    Habeas Hard Drive was dismayed at the ruckus that unfolded in North Las Vegas earlier this month, when the retiring police chief revealed some details from a six-month-old child porn investigation. Police had responded last fall to Mayor John Lee's report that he found images on his iPad he believed to be child pornography.

    4/4/2018 · Computers
    Maybe you heard about an insurance case in which sides both sides got sanctioned over inadvertent exposure of confidential information – facilitated by a nonlawyer associate. This story skims the surface of a deep reservoir filled with unhappy tales about the many ways electronically stored information (ESI) can get away from you.

    Check for SynapsUs
    Matthew Albee, CFCE, EnCE, SCERS
    Certified Forensic Computer Examiner
    19510 Van Buren Blvd., F3-131
    Riverside CA 95208
    USA
    phone: 951-780-7892
    Matthew-Albee-Computer-Forensics-Expert-Photo.jpg
    Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.

    Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.

    Mr. Albee's experience with computer forensics runs the gamut from individual PCs to major corporations(references available), and includes every level and scope of examination. He has consulted to both public and private organizations and maintain a complete computer forensics laboratory.

    Litigation Support - Matthew Albee has the distinction of having served as Special Master to Federal Court, as well as being the expert of record in numerous Superior and Municipal courts. He has extensive litigation experience as an expert witness and have testified for both civil and criminal cases. Mr. Albee has experience with employment law, family law, and criminal law cases.

    Areas of Expertise:
    • Computer Forensics
    • Cell Phone Forensics
    • E-discovery
    • Intellectual Property Disputes
    • Unauthorized Computer Use
  • Restore Hidden, Deleted, Lost Files
  • Restore Hidden, Deleted, Lost Files Images
  • File Dates: Created, Modified, Deleted
  • Internet History Tracking
  • Email Recovery
  • View Matthew Albee's Consulting Profile.
    Check for SynapsUs
    Howard J. Cohen, PhD
    President
    3272 Cowper Street
    Palo Alto CA 94306-3004
    USA
    phone: 650-856-8123
    fax: 650-856-4273
    Howard J. Cohen, PhD, has over 30 years of experience in Software Engineering, Architecture and Implementation. He possesses particular expertise in Algorithms, Relational Databases, Graphical User Interfaces (GUIs) and Software Applications in general. His experience has been in a broad spectrum of technology, in several languages, in a wide variety of applications, and on multiple platforms. Dr. Cohen's background includes Electronic Design Automation, Bioinformatics, Digital Cartography, Banking Systems for Foreign Exchange Traders, and many more. He is the co-inventor on approximately 120 patents.

    Dr. Cohen has over 15 years of experience as an Expert Witness. He possesses excellent written and verbal communications skills, including the ability to express himself well in interpersonal contacts, make presentations to large audiences, explain complex concepts clearly, and write well on levels ranging from the scientific to end user documentation. He is available to analyze complex systems, to write clearly about technical issues, and communicate face-to-face in a manner appropriate for any audience to understand the issues, the technology and the point of view. Dr. Cohen has been deposed and testified at arbitration hearings and in Federal Court.

    Expert Witness Projects Include:
    • Trade Secrets
    • Copyright
    • DMCA - Digital Millennium Copyright Act
    • Patent Infringement
    • Source Code Analysis
    • Business Practices
    • Damages Analysis
    • Computer Software Security / Forensics
    View Consulting Profile.
    Check for SynapsUs
    Dr. Stephen Castell
    PO Box 334
    Witham CM8 3LP
    GBR
    phone: 44-1621-891-776
    stephen_castell_logo.jpg

    Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies. As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).

    6/28/2018 · Computers
    The Reg A Conference is the largest gathering of deal-makers and investors interested in Regulation A, a prime opportunity for companies to network with like-minded business executives, as well as financial professionals who assist in bringing capital to companies (https://theregaconference.com/presenting-companies/). Many such companies are today basing their new business ventures and projects, and their search and submissions for funding, on blockchain technology applications. So-called cryptocurrencies such as bitcoin are just one example of the use of this functionality. The business implications of this secure online record-keeping tech are huge – and not only in cryptocurrency. This presentation provides a probing and extensive expert critique of blockchain, its cryptocurrency, distributed ledger and smart contract applications, and argues for a cautionary, savvy approach to implementing and investing in such business systems, on grounds of professional due diligence, rigorous corporate governance and wide experience of past leading-edge ICT systems failures.

    8/18/2011 · Computers
    The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.

    6/23/2011 · Computers
    You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.

    10/9/2009 · Computers
    Synopsis of a Talk given to the Association of Independent Computer Specialists

    10/8/2009 · Computers
    Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?

    10/7/2009 · Computers
    The Negotiation Competition, now in its fifth year, is a contest open to all law students in England and Wales, designed to promote the skill of negotiation, a crucial component of ADR

    8/4/2004 · Computers
    I spent much of a whole year recently investigating why a major IT outsourcing deal broke down, and had given rise to the largest software contract dispute yet seen in the English High Court

    Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development

    Stephen Castell, PhD
    The Forensic Approach to assessing and dealing effectively with IT Projec Risks. TWO-DAY INTENSIVE SEMINAR, WORKSHOP AND CLINIC. NICE, CÔTE D'AZUR, FRANCE. 17th - 19th MARCH 2005
    12/7/2009
    Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
    10/8/2009
    The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
    Check for SynapsUs
    James B. Wener, BSME, MBA
    Founder
    3132 North Volz Drive West
    Arlington Heights IL 60004
    USA
    phone: 847-927-5377
    Business-Systems-Consulting-Logo.gif
    James Wener Business Systems Expert PhotoJames B. Wener, BSME, MBA is a Business Systems Consultant with over 45 years of experience in successfully managing small through very large projects and implementing a large number of computer systems for healthcare, manufacturing, and distribution organizations.

    Mr. Wener is a certified HIPAA professional, having performed several HIPAA compliance assessments, staff training programs, writing policies and procedures and developing and implementing HIPAA Breach Programs. Health care clients include Rush/Prudential Health Plans in Chicago, HMO Illinois, Mayo Clinic in Minnesota, Harris Health Plans in Dallas, HealthFirst in New York and Mercy Health Plans in Wisconsin and Illinois, Mercy Hospital in Chicago and other health maintenance organizations (HMOs).

    A Management Systems consultant since 1991, Mr. Wener has a significant record of accomplishment. His Information Technology (IT) projects include the implementation and management of a wide variety of application software systems. He has decades of experience in process automation for payers (health plans, third party administrators or TPAs), providers (hospital and physician groups), Management Service Organizations (MSOs), and clients in other industries. Mr. Wener specializes in:
    • Analyzing Operational Flow
    • Identifying Information Requirements
    • Preparing Vendor Requests for Proposal
    • Selecting, Developing, and Implementing Computerized Solutions
    Litigation Support - James B. Wener has been an expert witness for several plaintiffs and defendants regarding failed projects, failed system implementations, and HIPAA breaches. His extensive litigation support and expert witness engagements have focused on assisting attorneys in understanding the industrial and best practices related to the facts of their case, preparing the "message" that best represents the client's position, assisting in preparing pleadings, assisting in settlement negotiations, writing expert witness reports understandable to the non-professional, preparing for opposing side depositions, being deposed, and preparing for and appearing at trial.

    Areas of Expertise:
    • HIPAA Assessments
    • Failed System Implementation Projects
    • Intellectual Property Damages
    • Wrongful Employee Termination
    • Project Management
    • System Implementation
  • Systems Implementation Management
  • Disaster Recovery Planning
  • Breach of Patient Privacy
  • Software Company Bankruptcy
  • Failed Project Management
  • IT Advisor Independence
  • View James B. Wener's Consulting Profile.
    7/5/2018 · Computers
    Companies invest considerable time, effort and money when selecting and implementing a major mission critical computer system. Successfully completing the process can be complicated and frustrating; as a result, it doesn't take a lot for implementations to fail. The problem is that the business organization that undertook the implementation in the first place is stuck - stuck with the time, money and the inconvenience of not having the system they purchased. The company has not only left without the new system, they are back to using the systems that they originally thought so inadequate that they committed to spending the time and money for a new system.

    6/5/2018 · Computers
    Implementing a mission critical computer system has a significant impact upon a business organization. Successfully completing the process can be complicated and frustrating; as a result, it doesn't take a lot for the implementation to fail. Once an implementation fails, there is always enough blame to go around. The problem is that the business organization that undertook the implementation in the first place is stuck – stuck with the time, money and the inconvenience of not having the system they purchased. The company has not only left without the new system, they are back to using the systems that they originally thought sufficiently inadequate that they committed to spending the time and money for a new system. Successful litigation will help – but will not make them whole. But worse, a failed litigation only compounds the problem. Preparing the strategy for litigating a failed implementation takes time and thought. This article will take the reader through the development and implement of a litigation strategy that worked and discuss why it worked.

    3/29/2018 · Expert Witnessing
    The role of the litigation attorney is to tell a story to the arbiter in such a way to effectively represents the client's position. Often the attorney requires a person with unique expertise to understand and present technical information in a manner that is understandable to the lay person. Attorneys often determine the need for an expert witness after discovery and after depositions have been taken for many of the witnesses. In many cases this is too late for an expert to most effective. My experience as an expert witness has led me to recommend considering the use of an expert at the following times

    Check for SynapsUs
    Brooks Hilliard
    11811 North Tatum Boulevard
    Phoenix AZ 85028
    USA
    phone: 602-264-9263
    Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants.

    Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.

    Areas of Expertise:
  • Allegations of ERP and CRM system failures and/or defective business software/systems
  • Computer Forensics
  • Intellectual property
  • Valuation of computer hardware, software and services
  • Regulatory, Procurement and Tax matters
  • 4/7/2011 · Computers
    An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.

    2/21/2011 · Computers
    A distributor of products used in the health care industry invented a system and filed patents describing the system and associated methods.

    2/2/2011 · Computers
    A regional wholesale distributor of construction products was sold a manufacturing ERP system that the software developer and implementer claimed was capable of meeting its distribution needs.

    < 1 2 >