Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.
As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Dr Castell, award-winning international Professional ICT Consultant and Expert has acted as expert witness in an unusual medical equipment procurement litigation of relevance to the current Covid-19 pandemic and its profound clinical and hospitalisation implications. The court case, specific details of which cannot be given since the matter is subject to Confidentiality Hearing strictures, was over a dispute concerning due and diligent process undertaken by a major Hospital Management Group, the Defendant in the action, in issuing a Tender for complex diagnostic units, and the Group’s selection of the bid put in by a US corporation, a leader in its field. That winning bid was challenged by a Claimant, another US corporation, a market competitor to the winning company. The dispute hinged on whether or not the operational computer software of the winning bidder’s units was compliant with the Hospital Management Group’s strict Tender stipulation that the software had to be identical across all versions of the equipment to be supplied in meeting the Tender requirements.
Dr Castell’s investigation and analysis of the operational software involved, and his opinion as to the extent that the software was compliant with the strict Tender condition, provided insight and assistance to the parties in reaching a satisfactory settlement.
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
This book - "Blockchain Technology and Innovations in Business Processes" - provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness.
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
ExpoTech Engineering Inc. uses Cloud Computing, Mobile Technology, and IT Infrastructure Strategy to increase their clients' efficiency and competitive advantage. They deliver tailored enterprise applications that address business needs and meet client specifications.
For years, ExpoTech has implemented SAP and IT software within businesses. They optimize business processes, and train people within businesses to operate software efficiently. They also work with businesses that have experienced SAP failed implementation, getting their business operations back on track to maximize ROI. It is their experience and reliability that give them a large client list that continues to grow.
Partial Client List - Amazon, American Eagle Outfitters, Blackberry, BMW, Cisco, Emory University, IBM, Intel, Krueger, Microsoft, Nokia, Shell, Sprint, and Uline.
Mobile Development - Mobile application solutions, PWA, PCI compliance, and patented secure electronic signature applications and systems will enable organizations to achieve the best customer experience. Design and build mobile applications that are customer-friendly and facilitate easy and quick data processing.
Telemedicine - Telemedicine Solution is the only complete telehealth platform that fit into any workflow. From fast, secure text + video collaboration app HIPAA messenger, fully customizable Virtual waiting rooms and clinics.
Cloud Computing - Formally conduct cloud computing reliability and scalability assessments to determine the best solution (private, public, hybrid) for the growth of each client's organization.
Learning Management Systems - Deploy and track online learning initiatives with a modern and user-centered learning management system. Top-notch capabilities in content delivery and information management, all in a comprehensive digital learning solution.
Electronic Signature - At the core of eSignature is patented technology and the guarantee of a secure document and legal compliance. The application is all a company needs for electronic signature and document management requirements.
Cyber Security - Measure, benchmark, and set targets to actively manage the digital resilience of networks and security infrastructure. Offering Security Risk Assessments, Penetration, Testing, Application and Code Review, Digital Forensic Investigations.
Data Warehouse - Fast Track Data Warehouse hardware is tested for data warehousing which eliminates guesswork and is designed to save months of configuration, setup, testing and tuning.
Data Analysis - Transform your data into crucial information by creating reports and analysis. Unique elemental approach, intelligent features, and wizards combined with an integrated development environment of Info enables company's to develop reports without the need of writing any code.
Blockchain and UI Development - Deliver state-of-the-art and functional UI and Blockchain development, listening to client needs before designing the perfect turnkey solution needed for growth and success.
This book will explain how cloud computing will be the most radical transformation of business processes every organization will face to date. Is cloud computing a strategic advantage? Cloud computing will reclassify service delivery models in ways that organizations have never seen before. IT organizations will become commoditized and in the center of the new business transformation.
Leverage wireless technology to leapfrog your business into a brand new millennium Deploy and leverage mobile technology in your organization Increase your field efficiency with wireless technology · How unified messaging will play a key roll in your business processes · How the convergence between voice and data will benefit your bottom line. · What does Location Based Services mean to your business? How will you be communicating in 2012?
Tony Mason has 42 years of experience in Software Development, mostly consulting with companies to find novel and useful ways to build new or improve existing products. He has extensive experience in providing "knowledge transfer" activities, such as clearly written documents and focused education.
Consulting Services - Mr. Mason provides software development in Computer Operating Systems environments ("kernel development") including UNIX, Linux, and Windows, with an emphasis on storage technologies, particularly file systems.
Typical customers are usually clients interested in developing products requiring specialized operating systems functionality and/or understanding. Mr. Mason's usual involvement to achieve the client's goals in a reasonable period of time include:
Constructing Software Architecture
Constructing a Corresponding Design
Constructing a Focused Development Plan
Mr. Mason has worked with multiple operating systems including Microsoft Windows, UNIX, and Linux. He is the author of two books, including, Windows NT Device Driver Development, several peer-reviewed papers, and numerous non-peer-reviewed publications.
Mr. Mason is the primary inventor on 12 patents:
US/9830329 Methods and Systems for Data Storage
US/9600486 File System Directory Attribute Correction
US/9535759 Work Queue Thread Balancing
US/8990228 Arbitrary Data Transformation
US/8903874 File System Directory Attribute Correction
US/8539228 Managing Access to a Resource
US/8521752 Arbitrary Data Transformations
US/8024433 Managing Application Resources
US/7809897 Managing Lock Rankings
US/7512748 Managing Lock Rankings
US/7949693 Log-Structured Host Data Storage
US 15/791,486 Methods and Systems for Data Storage
For years, this has been the definitive and comprehensive technical reference for software engineers, systems programmers, and any engineer who needs to understand Windows NT systems internals. While this text has a fresh new look on the outside, the text, pictures, code samples and references on the inside are vintage 1998. Nevertheless, the book retains a tremendous amount of value in its clear (erudite even) descriptions of the Windows NT operating system architecture and internals; information on the implementation of standard Windows NT kernel mode drivers; Key details on the workings of Windows NT I/O Manager; and detailed technical discussions on interrupt management and synchronization issues.