Bay2Sierra Silicon Services, Inc. is a Front End Design Services organization offering a wide range of consulting services. Products that we have worked on include – AMD 486,K5, K6 and K7 processors; K7 chipset, MIPS processors, 802.11b wireless, AMBA protocols, ADSL, CMTS, 10G Ethernet switch and PHY, custom network processors, NVRAM subsystems, Smart meters, SOC design and integration, and next generation PLDs.
Bay2Sierra Silicon Services, Inc. also provide IP services (IP portfolio review, infringement cases/expert reports) and business due diligence for investment or acquisition.
Primary Areas of Concentration:
Architecture, RTL implementation, and synthesis
Custom memory controller designs
PCS/MAC architecture and design; XAUI IP block customization
General Purpose IO interfaces (I2C, processor busses, PCI, JTAG).
IP with support – personally customized cores
Generic SDRAM DDR & SRAM memory controllers
XAUI and XFI PCS
Full chip and complex self-checking verification environments
Performance modeling for processor and memory subsystems
Full chip design and verification flow organization, methodology and automation
Complex SoC integration, 3rd party IP vetting
Technical due diligence consulting
IP portfolio review
Infringement and validity issues
John Peck, Partner and Principal Engineer at Bay2Sierra Silicon Services, Inc., has over 25 years of experience as a Software and Hardware Engineer, with over 10 years of experience as a technical analyst for hardware and software Intellectual Property matters. Through his experience as an inventor, he has been granted 10 United States patents.
Background Experience: Mr. Peck's prior hardware engineering experience includes system architecture, digital design, design verification, design methodology automation, FPGAs, ASICs, and complex SoCs using in IoT applications such as smart power meters. He also has a solid background in software engineering, including video game development, firmware, EDA tools, and system validation environments.
Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Allegations of ERP and CRM system failures and/or defective business software/systems
Valuation of computer hardware, software and services
An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.
As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Dr Castell, award-winning international Professional ICT Consultant and Expert has acted as expert witness in an unusual medical equipment procurement litigation of relevance to the current Covid-19 pandemic and its profound clinical and hospitalisation implications. The court case, specific details of which cannot be given since the matter is subject to Confidentiality Hearing strictures, was over a dispute concerning due and diligent process undertaken by a major Hospital Management Group, the Defendant in the action, in issuing a Tender for complex diagnostic units, and the Group’s selection of the bid put in by a US corporation, a leader in its field. That winning bid was challenged by a Claimant, another US corporation, a market competitor to the winning company. The dispute hinged on whether or not the operational computer software of the winning bidder’s units was compliant with the Hospital Management Group’s strict Tender stipulation that the software had to be identical across all versions of the equipment to be supplied in meeting the Tender requirements.
Dr Castell’s investigation and analysis of the operational software involved, and his opinion as to the extent that the software was compliant with the strict Tender condition, provided insight and assistance to the parties in reaching a satisfactory settlement.
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
This book - "Blockchain Technology and Innovations in Business Processes" - provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness.
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
Software Engineer Architect Consultant Howard Cohen
Howard J. Cohen, PhD, has over 30 years of experience in Software Engineering, Architecture and Implementation. He possesses particular expertise in Algorithms, Relational Databases, Graphical User Interfaces (GUIs) and Software Applications in general. His experience has been in a broad spectrum of technology, in several languages, in a wide variety of applications, and on multiple platforms. Dr. Cohen's background includes Electronic Design Automation, Bioinformatics, Digital Cartography, Banking Systems for Foreign Exchange Traders, and many more. He is the co-inventor on approximately 120 patents.
Since 1979, Dr. Cohen has served as a Software Development Consultant to several major Silicon Valley businesses including Nortel Networks, Surromed, Incyte Genomics, BomDiver, Canon Information Systems, WeatherNews, PetroSoft, LSI Logic, Aspect Development, Abbott Laboratories, ETAK, Engineering DataXpress, Nikon Precision, Diasonics, Daisy Systems, Rolm, Oceanroutes, Mindcraft, and Integrated CMOS Systems. Concurrently, he has also held full time senior engineering and management positions with such companies as Tibco, Zycad, ETAK, and the NASA Ames Research Center.
Dr. Cohen's Consulting Services are available to companies needing software development involving problem definition, analysis, design modeling, documentation, programming, and implementation. Consulting services are also available issues regarding Trade Secrets, Copyright and Patent Infringement, and Computer Software Security and Forensics.
DataChasers, Inc. is a select, exclusive Computer Forensics and E-Discovery company. With Computer and Cell Phone Forensics and E-Discovery as their core focus, they offer strategies and provide alternatives so that clients are aware of all options to make more informed decisions.
DataChasers, Inc. provides an initial evaluation at one rate regardless of hourly time/rate that includes a review of the initial reports, search warrants, written evidence, and a consultation regarding the strengths and weaknesses of each case.
Cell Phone and Device Forensics
Forensic Computer Examinations
E-Discovery Exams - Electronically Stored Information
Intellectual Property & Copyright
Employment Law & Civil Rights Cases
Computer Forensics Training - DataChasers, Inc. also provides California State Bar approved MCLE presentations for MCLE credits.Topics include Computer Forensics, Intellectual Property, Criminal Defense, Family Law, and Computer Forensics Presentations, Presenting Electronic Evidence at Court, and How to be an Expert Witness.
Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.
Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.
Eureka Software Solutions, Inc. is a Software Development and Consulting business with over 35 years of hands-on experience in the Computer, Software, and Technology industries. Eureka and its team of professionals provide an unparalleled understanding of nearly every facet and factor involved in a complex software or computer related litigation scenario. Eureka's clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive. Eureka Services and Practical Implementation of Expertise:
Review and comparison of software source code and functionality in relation to contractual commitments and requirements and/or protected intellectual property including, trade secrets, copyrights and patents
Computer / Software Forensics – able to reverse engineer and reconstruct hardware and software environments from backups, remnants and fragments of deprecated software. Eureka IT and Software development team is skilled at re-creating historical hardware and software environments
Investigation and assessment of software project bidding, planning and performance with particular attention to adequacy of discovery, specifications, cost estimates, schedules, and deliverables
Functional and performance testing of software against applicable specifications, warranties or industry standards using proprietary and commercial testing tools and techniques
Evaluation and use of both traditional and modern software development techniques and strategies, including creative payment structures related to software application/effort valuation and intellectual property licensing and ownership
Reviewing and exercising software applications and IT networks to expose and correct security issues and weaknesses
Founder and CEO, Monty G. Myers, PE, is an active Software Industry Executive with 40+ years of experience. Mr. Myers is involved in all aspects of the daily management and operation of Eureka, including business development, contracts, customer relations, project scope, execution and oversight, strategy and management, hiring, and finance. Mr. Myers has negotiated and performed hundreds of real-world software and technology contracts and statements of work involving complex software project and licensing terms and conditions including material intellectual property aspects. He is actively engaged in handling and protecting the confidential, proprietary, and trade secret information and technology of Eureka and its clients. View Monty Myers' Expert Witness Profile.
ExpoTech Engineering Inc. uses Cloud Computing, Mobile Technology, and IT Infrastructure Strategy to increase their clients' efficiency and competitive advantage. They deliver tailored enterprise applications that address business needs and meet client specifications.
For years, ExpoTech has implemented SAP and IT software within businesses. They optimize business processes, and train people within businesses to operate software efficiently. They also work with businesses that have experienced SAP failed implementation, getting their business operations back on track to maximize ROI. It is their experience and reliability that give them a large client list that continues to grow.
Partial Client List - Amazon, American Eagle Outfitters, Blackberry, BMW, Cisco, Emory University, IBM, Intel, Krueger, Microsoft, Nokia, Shell, Sprint, and Uline.
Mobile Development - Mobile application solutions, PWA, PCI compliance, and patented secure electronic signature applications and systems will enable organizations to achieve the best customer experience. Design and build mobile applications that are customer-friendly and facilitate easy and quick data processing.
Telemedicine - Telemedicine Solution is the only complete telehealth platform that fit into any workflow. From fast, secure text + video collaboration app HIPAA messenger, fully customizable Virtual waiting rooms and clinics.
Cloud Computing - Formally conduct cloud computing reliability and scalability assessments to determine the best solution (private, public, hybrid) for the growth of each client's organization.
Learning Management Systems - Deploy and track online learning initiatives with a modern and user-centered learning management system. Top-notch capabilities in content delivery and information management, all in a comprehensive digital learning solution.
Electronic Signature - At the core of eSignature is patented technology and the guarantee of a secure document and legal compliance. The application is all a company needs for electronic signature and document management requirements.
Cyber Security - Measure, benchmark, and set targets to actively manage the digital resilience of networks and security infrastructure. Offering Security Risk Assessments, Penetration, Testing, Application and Code Review, Digital Forensic Investigations.
Data Warehouse - Fast Track Data Warehouse hardware is tested for data warehousing which eliminates guesswork and is designed to save months of configuration, setup, testing and tuning.
Data Analysis - Transform your data into crucial information by creating reports and analysis. Unique elemental approach, intelligent features, and wizards combined with an integrated development environment of Info enables company's to develop reports without the need of writing any code.
Blockchain and UI Development - Deliver state-of-the-art and functional UI and Blockchain development, listening to client needs before designing the perfect turnkey solution needed for growth and success.
This book will explain how cloud computing will be the most radical transformation of business processes every organization will face to date. Is cloud computing a strategic advantage? Cloud computing will reclassify service delivery models in ways that organizations have never seen before. IT organizations will become commoditized and in the center of the new business transformation.
Leverage wireless technology to leapfrog your business into a brand new millennium Deploy and leverage mobile technology in your organization Increase your field efficiency with wireless technology · How unified messaging will play a key roll in your business processes · How the convergence between voice and data will benefit your bottom line. · What does Location Based Services mean to your business? How will you be communicating in 2012?
Electronic Information Consultant C Matthew Curtin
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Data Center Infrastructure Consultant Philip Isaak
Isaak Technologies provides expert witness, consulting & training services in the areas of design, construction, procurement, implementation, commissioning and operations of information technology, telecommunications, network systems and critical data center facilities. Isaak Technologies provides clear solutions to complex challenges using best-practice forecasting, strategy & risk mitigation.
Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, has over 20 years of experience as a design & operations consultant & training provider, with a focus in the information technology, telecommunications & critical data center facility industries.
In recognition of Mr. Isaak’s professional standing, the Officers & Board of Directors of the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified his election to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold.
One of the new terms in the data center industry is Edge Data Centers. What is the Edge? Where is the Edge? Before we begin to understand what an Edge Data Center is, it might be helpful to first understand what it is not.
Mobius Consulting is a Mobile and Wireless Technology management consulting firm. The industry and academic professionals at Mobius offer diverse services leveraging their extensive experience and expertise in enterprise and vertical markets including telecom, healthcare, energy, transportation, government, supply chain and logistics.
Principal, Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University. Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Dr. Sharony has also published extensively in scientific journals and conferences.
Panorama Consulting Group is a technology-agnostic consultancy specializing in Digital Business Transformation and Enterprise Resource Planning (ERP) System Implementations for mid- to large-sized private- and public-sector organizations worldwide.
This highly respected firm is 100% independent of software and technology vendor affiliation. They offer a phased and integrated approach to strategy alignment and execution, enabling each client to achieve its unique business transformation objectives by transforming its people, processes, and technology.
Panorama clients include multi-national conglomerates from Amazon Robotics to Valcor Engineering, as well as governmental entities, including state and local governments, municipalities, school districs, state offices of the attorney general, and tribal governments.
While the company had little technological communication either internally or with its sister firm, the company was growing by leaps and bounds. It needed to modernize its technology and improve its business processes to continue providing outstanding customer service while meeting increased sales demand.
This consumer services company in Denver was using custom software developed in an AS/400 environment. Many of its core business processes were either manual or paper-based, and the company was struggling with the issue of sole dependency on a single employee who understood the legacy systems.
A tax and accounting firm with revenue between $500,000 and $1,000,000, was growing both organically and through acquisition. This firm had a conglomerate of various software. The main financial system (used for time, billing, and financials) was at “end of life,” meaning it was not going to be supported by the vendor in about two years time.
This plastic and rubber injection molding company processes orders using both a made-to-order process and engineer-to-order process. The company engineers to order through a variety of CAD systems and must undergo first article inspections prior to running production batches.
The district contracted Panorama to help in the replacement of its existing systems with a proven, commercial-off-the-shelf ERP system. The client undertook this initiative to replace aging systems, gain efficiencies and update existing processes. Another goal was to improve the timeliness, accuracy, safeguarding and consistency of information
The client was moving from manual processes and old systems to a modern system, so their employees faced a big learning curve. Unfortunately, their ERP vendor only provided them with a “jump start” program that only covered particular deliverables and activities. For example, they provided an overall communication approach but not a communication plan.
Not long ago, this global organization had implemented an ERP system across several aerospace and defense manufacturing plants. It was now considering an upgrade to the latest version of the system. However, the organization knew its end-users were still struggling to adopt the changes instituted by the prior initiative. Panorama deployed two organizational change management experts
The organization was founded in 1981 as a nonprofit, tax-exempt 501(c)(3) organization. It does not just encompass a non-profit organization but also encompasses a for-profit company that has a different fiscal year. As such, the organization must focus on tracking, reporting and financial record keeping – including tracking grants and gifts from contributor to the end-product or support delivered.
Panorama was engaged by the city to select and assist in the implementation of a new ERP and related systems. Framed as an initiative to bring a high “return on citizenship” (the amount and quality of services received for taxpayer dollars) to the city’s constituents, the project’s goal was to implement a platform that would provide the same (or better) quality
The city had been using a decades-old ERP solution and had not evaluated their business processes at any point during that time. Not only was the current ERP system not the best fit for their municipality, but the city was spending an inordinate amount of money on maintenance costs for customization and did not take advantage of instituting best practices or current technology.
Vertical integration allows the company to control all aspects of beef production. It partners with ranchers and operates feed lots, ensuring cattle are fed to their standards. In addition to its processing capabilities, the company operates its own trucking line, providing products from farm to table. The company supplies beef to the US retail grocery and foodservice markets, federal school lunch programs and the US military worldwide.
Scott Cooper, Principal atPegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Prior to his responsibilities at Pegasus, Mr. Cooper was a Senior Managing Director at FTI Consulting Inc. and the senior-most person globally in their Electronic Evidence Consulting practice. Prior to joining FTI, in 1984 Mr. Cooper was a co-founder of INSYNC Consulting Group, a nationally recognized Electronic Discovery, Computer Forensics, and Information Technology consulting firm. Prior to that, he worked at KPMG Peat Marwick in their Management Consulting Group’s Information Systems Services practice.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Think Sherlock Holmes sans the goofy hat and magnifying glass. Today ’s digital sleuths enlist the tactics that once were only the purview of FBI and police investigators.The tools of computer forensics play a vital role in resolving matters in the corporate world and litigation process by enhancing the evidence pool, establishing truths otherwise left undiscovered and, consequently, contributing to more efficient and rapid resolution, judgments or settlements
Premium Software Consulting Services provided by industry leading experts. Today's software users expect and demand software that is more intelligent, interactive, usable, and reliable than ever before, over a backdrop of continuously evolving technology spanning a range of platforms. To remain competitive, modern applications need to solve complex problems that have never been solved before. This requires more than just programmers. You need experts. All of our consultants have a Ph.D. in computer science or related discipline and at least ten years of industry experience. All have contributed to the software state-of-the-art, published original work, presented at conferences around the world, and have years of hands-on, practical industry experience. Areas include Software Design, Reliability, OOP, Pedagogy, Algorithms, Vision, Embedded Systems, Knowledge Acquisition, Programming Theory, Formal Methods, Computational Linguistics, Artificial Intelligence, and others. They know and work with today's modern programming languages and technologies. Expertise spans all aspects of the software life-cycle. Offering advanced software development, project management, code review & quality assurance, management consulting, expert witness services, failed project turnaround, usability analysis, and more. Available on or off site anywhere in the United States and Europe. Please see our web site for more information and additional service offerings.
The discovery phase of IP litigation often calls for a technical review of a software product. A code review is an activity conducted by an expert witness that involves reviewing the source code of a product to discover pertinent facts relevant to the case.
The situation: you have invested an enormous amount of money and company resources in developing software solutions to address client needs. Regardless of the size of your company, every dollar counts and you want to know that your investment today will ultimately produce a fast, modern, scalable, and correct software solution that will still be usable tomorrow with tomorrow's technology.
Licensing and infringement litigation are two primary potential income sources from a patent. With licensing, the inventor permits the licensee to make, use, sell, or offer to sell a patented invention for compensation.
Prolifogy's failed project turnaround service has generated increased interest recently. Specifically, it was the most requested of all service offerings last month—a fact that surprised even company officials.
Dr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems.
He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys. Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.
Tony Mason has 42 years of experience in Software Development, mostly consulting with companies to find novel and useful ways to build new or improve existing products. He has extensive experience in providing "knowledge transfer" activities, such as clearly written documents and focused education.
Consulting Services - Mr. Mason provides software development in Computer Operating Systems environments ("kernel development") including UNIX, Linux, and Windows, with an emphasis on storage technologies, particularly file systems.
Typical customers are usually clients interested in developing products requiring specialized operating systems functionality and/or understanding. Mr. Mason's usual involvement to achieve the client's goals in a reasonable period of time include:
Constructing Software Architecture
Constructing a Corresponding Design
Constructing a Focused Development Plan
Mr. Mason has worked with multiple operating systems including Microsoft Windows, UNIX, and Linux. He is the author of two books, including, Windows NT Device Driver Development, several peer-reviewed papers, and numerous non-peer-reviewed publications.
Mr. Mason is the primary inventor on 12 patents:
US/9830329 Methods and Systems for Data Storage
US/9600486 File System Directory Attribute Correction
US/9535759 Work Queue Thread Balancing
US/8990228 Arbitrary Data Transformation
US/8903874 File System Directory Attribute Correction
US/8539228 Managing Access to a Resource
US/8521752 Arbitrary Data Transformations
US/8024433 Managing Application Resources
US/7809897 Managing Lock Rankings
US/7512748 Managing Lock Rankings
US/7949693 Log-Structured Host Data Storage
US 15/791,486 Methods and Systems for Data Storage
For years, this has been the definitive and comprehensive technical reference for software engineers, systems programmers, and any engineer who needs to understand Windows NT systems internals. While this text has a fresh new look on the outside, the text, pictures, code samples and references on the inside are vintage 1998. Nevertheless, the book retains a tremendous amount of value in its clear (erudite even) descriptions of the Windows NT operating system architecture and internals; information on the implementation of standard Windows NT kernel mode drivers; Key details on the workings of Windows NT I/O Manager; and detailed technical discussions on interrupt management and synchronization issues.