Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Allegations of ERP and CRM system failures and/or defective business software/systems
Valuation of computer hardware, software and services
An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.
As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Dr Castell, award-winning international Professional ICT Consultant and Expert has acted as expert witness in an unusual medical equipment procurement litigation of relevance to the current Covid-19 pandemic and its profound clinical and hospitalisation implications. The court case, specific details of which cannot be given since the matter is subject to Confidentiality Hearing strictures, was over a dispute concerning due and diligent process undertaken by a major Hospital Management Group, the Defendant in the action, in issuing a Tender for complex diagnostic units, and the Group’s selection of the bid put in by a US corporation, a leader in its field. That winning bid was challenged by a Claimant, another US corporation, a market competitor to the winning company. The dispute hinged on whether or not the operational computer software of the winning bidder’s units was compliant with the Hospital Management Group’s strict Tender stipulation that the software had to be identical across all versions of the equipment to be supplied in meeting the Tender requirements.
Dr Castell’s investigation and analysis of the operational software involved, and his opinion as to the extent that the software was compliant with the strict Tender condition, provided insight and assistance to the parties in reaching a satisfactory settlement.
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
This book - "Blockchain Technology and Innovations in Business Processes" - provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness.
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
Software Engineer Architect Consultant Howard Cohen
Howard J. Cohen, PhD, has over 30 years of experience in Software Engineering, Architecture and Implementation. He possesses particular expertise in Algorithms, Relational Databases, Graphical User Interfaces (GUIs) and Software Applications in general. His experience has been in a broad spectrum of technology, in several languages, in a wide variety of applications, and on multiple platforms. Dr. Cohen's background includes Electronic Design Automation, Bioinformatics, Digital Cartography, Banking Systems for Foreign Exchange Traders, and many more. He is the co-inventor on approximately 120 patents.
Since 1979, Dr. Cohen has served as a Software Development Consultant to several major Silicon Valley businesses including Nortel Networks, Surromed, Incyte Genomics, BomDiver, Canon Information Systems, WeatherNews, PetroSoft, LSI Logic, Aspect Development, Abbott Laboratories, ETAK, Engineering DataXpress, Nikon Precision, Diasonics, Daisy Systems, Rolm, Oceanroutes, Mindcraft, and Integrated CMOS Systems. Concurrently, he has also held full time senior engineering and management positions with such companies as Tibco, Zycad, ETAK, and the NASA Ames Research Center.
Dr. Cohen's Consulting Services are available to companies needing software development involving problem definition, analysis, design modeling, documentation, programming, and implementation. Consulting services are also available issues regarding Trade Secrets, Copyright and Patent Infringement, and Computer Software Security and Forensics.
DataChasers, Inc. is a select, exclusive Computer Forensics and E-Discovery company. With Computer and Cell Phone Forensics and E-Discovery as their core focus, they offer strategies and provide alternatives so that clients are aware of all options to make more informed decisions.
DataChasers, Inc. provides an initial evaluation at one rate regardless of hourly time/rate that includes a review of the initial reports, search warrants, written evidence, and a consultation regarding the strengths and weaknesses of each case.
Cell Phone and Device Forensics
Forensic Computer Examinations
E-Discovery Exams - Electronically Stored Information
Intellectual Property & Copyright
Employment Law & Civil Rights Cases
Computer Forensics Training - DataChasers, Inc. also provides California State Bar approved MCLE presentations for MCLE credits.Topics include Computer Forensics, Intellectual Property, Criminal Defense, Family Law, and Computer Forensics Presentations, Presenting Electronic Evidence at Court, and How to be an Expert Witness.
Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.
Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Data Center Infrastructure Consultant Philip Isaak
Isaak Technologies provides expert witness, consulting & training services in the areas of design, construction, procurement, implementation, commissioning and operations of information technology, telecommunications, network systems and critical data center facilities. Isaak Technologies provides clear solutions to complex challenges using best-practice forecasting, strategy & risk mitigation.
Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, has over 20 years of experience as a design & operations consultant & training provider, with a focus in the information technology, telecommunications & critical data center facility industries.
In recognition of Mr. Isaak’s professional standing, the Officers & Board of Directors of the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified his election to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold.
One of the new terms in the data center industry is Edge Data Centers. What is the Edge? Where is the Edge? Before we begin to understand what an Edge Data Center is, it might be helpful to first understand what it is not.
Mobius Consulting is a Mobile and Wireless Technology management consulting firm. The industry and academic professionals at Mobius offer diverse services leveraging their extensive experience and expertise in enterprise and vertical markets including telecom, healthcare, energy, transportation, government, supply chain and logistics.
Principal, Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University. Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Dr. Sharony has also published extensively in scientific journals and conferences.
Panorama Consulting Group is a technology-agnostic consultancy specializing in Digital Business Transformation and Enterprise Resource Planning (ERP) System Implementations for mid- to large-sized private- and public-sector organizations worldwide.
This highly respected firm is 100% independent of software and technology vendor affiliation. They offer a phased and integrated approach to strategy alignment and execution, enabling each client to achieve its unique business transformation objectives by transforming its people, processes, and technology.
Panorama clients include multi-national conglomerates from Amazon Robotics to Valcor Engineering, as well as governmental entities, including state and local governments, municipalities, school districs, state offices of the attorney general, and tribal governments.
The Tribe hired Panorama to assist in selecting software to support its Health Service functions. This software would replace the Tribe’s current health systems. In the first phase of the project, we documented business and technical requirements, reviewed legacy systems, mapped processes, and identified pain points across
A large global retailer in the process of implementing SAP software wanted customized, on-site training for the company's internal resources. The company needed to implement inventory management modules while executing training and communications, but it had a lack of organizational change management experience.
Providing engineering, architecture, construction, and consulting solutions to the global life sciences and advanced technology industries, this firm had recently undergone an internal reorganization of its business units and operations. Each region was following its own processes, and multiple systems were being used. This led to duplicate and inconsistent data.
This multi-billion dollar professional services company was using various, disparate software applications across its worldwide operations. Many of its core business processes were not utilized globally, and dual/triple entry was demonstrated at various sites and in various functional areas.
Project Oversight Case Study: Oil & Gas: Upstream petroleum oil exploration and production company in the Middle East. Company operates several blocks, including one on the Arabian Sea, where crude oil, produced from this
While the company had little technological communication either internally or with its sister firm, the company was growing by leaps and bounds. It needed to modernize its technology and improve its business processes to continue providing outstanding customer service while meeting increased sales demand.
This consumer services company in Denver was using custom software developed in an AS/400 environment. Many of its core business processes were either manual or paper-based, and the company was struggling with the issue of sole dependency on a single employee who understood the legacy systems.
A tax and accounting firm with revenue between $500,000 and $1,000,000, was growing both organically and through acquisition. This firm had a conglomerate of various software. The main financial system (used for time, billing, and financials) was at “end of life,” meaning it was not going to be supported by the vendor in about two years time.
This plastic and rubber injection molding company processes orders using both a made-to-order process and engineer-to-order process. The company engineers to order through a variety of CAD systems and must undergo first article inspections prior to running production batches.
The district contracted Panorama to help in the replacement of its existing systems with a proven, commercial-off-the-shelf ERP system. The client undertook this initiative to replace aging systems, gain efficiencies and update existing processes. Another goal was to improve the timeliness, accuracy, safeguarding and consistency of information
The client was moving from manual processes and old systems to a modern system, so their employees faced a big learning curve. Unfortunately, their ERP vendor only provided them with a “jump start” program that only covered particular deliverables and activities. For example, they provided an overall communication approach but not a communication plan.
Not long ago, this global organization had implemented an ERP system across several aerospace and defense manufacturing plants. It was now considering an upgrade to the latest version of the system. However, the organization knew its end-users were still struggling to adopt the changes instituted by the prior initiative. Panorama deployed two organizational change management experts
The organization was founded in 1981 as a nonprofit, tax-exempt 501(c)(3) organization. It does not just encompass a non-profit organization but also encompasses a for-profit company that has a different fiscal year. As such, the organization must focus on tracking, reporting and financial record keeping – including tracking grants and gifts from contributor to the end-product or support delivered.
Panorama was engaged by the city to select and assist in the implementation of a new ERP and related systems. Framed as an initiative to bring a high “return on citizenship” (the amount and quality of services received for taxpayer dollars) to the city’s constituents, the project’s goal was to implement a platform that would provide the same (or better) quality
The city had been using a decades-old ERP solution and had not evaluated their business processes at any point during that time. Not only was the current ERP system not the best fit for their municipality, but the city was spending an inordinate amount of money on maintenance costs for customization and did not take advantage of instituting best practices or current technology.
Vertical integration allows the company to control all aspects of beef production. It partners with ranchers and operates feed lots, ensuring cattle are fed to their standards. In addition to its processing capabilities, the company operates its own trucking line, providing products from farm to table. The company supplies beef to the US retail grocery and foodservice markets, federal school lunch programs and the US military worldwide.
Scott Cooper, Principal atPegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Prior to his responsibilities at Pegasus, Mr. Cooper was a Senior Managing Director at FTI Consulting Inc. and the senior-most person globally in their Electronic Evidence Consulting practice. Prior to joining FTI, in 1984 Mr. Cooper was a co-founder of INSYNC Consulting Group, a nationally recognized Electronic Discovery, Computer Forensics, and Information Technology consulting firm. Prior to that, he worked at KPMG Peat Marwick in their Management Consulting Group’s Information Systems Services practice.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Think Sherlock Holmes sans the goofy hat and magnifying glass. Today ’s digital sleuths enlist the tactics that once were only the purview of FBI and police investigators.The tools of computer forensics play a vital role in resolving matters in the corporate world and litigation process by enhancing the evidence pool, establishing truths otherwise left undiscovered and, consequently, contributing to more efficient and rapid resolution, judgments or settlements
Dr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems.
He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys. Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.
Tony Mason has 42 years of experience in Software Development, mostly consulting with companies to find novel and useful ways to build new or improve existing products. He has extensive experience in providing "knowledge transfer" activities, such as clearly written documents and focused education.
Consulting Services - Mr. Mason provides software development in Computer Operating Systems environments ("kernel development") including UNIX, Linux, and Windows, with an emphasis on storage technologies, particularly file systems.
Typical customers are usually clients interested in developing products requiring specialized operating systems functionality and/or understanding. Mr. Mason's usual involvement to achieve the client's goals in a reasonable period of time include:
Constructing Software Architecture
Constructing a Corresponding Design
Constructing a Focused Development Plan
Mr. Mason has worked with multiple operating systems including Microsoft Windows, UNIX, and Linux. He is the author of two books, including, Windows NT Device Driver Development, several peer-reviewed papers, and numerous non-peer-reviewed publications.
Mr. Mason is the primary inventor on 12 patents:
US/9830329 Methods and Systems for Data Storage
US/9600486 File System Directory Attribute Correction
US/9535759 Work Queue Thread Balancing
US/8990228 Arbitrary Data Transformation
US/8903874 File System Directory Attribute Correction
US/8539228 Managing Access to a Resource
US/8521752 Arbitrary Data Transformations
US/8024433 Managing Application Resources
US/7809897 Managing Lock Rankings
US/7512748 Managing Lock Rankings
US/7949693 Log-Structured Host Data Storage
US 15/791,486 Methods and Systems for Data Storage
For years, this has been the definitive and comprehensive technical reference for software engineers, systems programmers, and any engineer who needs to understand Windows NT systems internals. While this text has a fresh new look on the outside, the text, pictures, code samples and references on the inside are vintage 1998. Nevertheless, the book retains a tremendous amount of value in its clear (erudite even) descriptions of the Windows NT operating system architecture and internals; information on the implementation of standard Windows NT kernel mode drivers; Key details on the workings of Windows NT I/O Manager; and detailed technical discussions on interrupt management and synchronization issues.