James T. Geier is an independent consultant, author, and entrepreneur with 40 years experience planning, designing, analyzing and implementing Mobile Devices, Communications Systems, and Wireless Networks. Mr. Geier is the author of over a dozen books on mobile and wireless topics including, Designing and Deploying 802.11n Wireless Networks (Cisco Press), Implementing 802.1X Security Solutions (Wiley), Wireless Networking Handbook (New Riders), and Network Re-engineering (McGraw-Hill). Mr. Geier has been an active participant within IEEE standards organizations, such as the IEEE 802.11 Working Group, and the Wi-Fi Alliance. He has served as Chairman of the IEEE Computer Society, Dayton Section, and various conferences.
Litigation Support - James Geier has been an expert witness, written expert reports, been deposed, and testified in court as an expert during numerous patent litigation cases involving communications systems and protocols, Bluetooth, Wi-Fi, security, encryption, authentication, IoT, transmit power control, network addressing, transmission protection (CTS-to-self), transmission priority, quality of service (QoS), frequency hopping, multi-modal radios, OFDM, application data updates, sensor networks, and location technologies. Mr. Geier has provided the following services dealing with patent litigation:
Patent Invalidity / Validity Analysis
Infringement / Non-infringement Analysis
Patent Claims Interpretation and Analysis / Claim Construction
Gain a practical understanding of the underlying concepts of the 802.11n standard and the methodologies for completing a successful wireless network installation. Practical, start-to-finish guidance for successful deployment of 802.11n wireless LANs. With the ratification of the 802.11n wireless LAN standard, thousands of companies are moving rapidly toward implementation.
You know it's essential, and you've heard that it can be tricky implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
Dr. Tal Lavian holds a Ph.D. from the University of California, Berkeley, in Computer Science, specializing in Networking and Communications. He is an expert in network communications, telecommunications, Internet Protocols (TCP/IP), LAN/WAN, Streaming media, VoIP, mobile wireless, and Internet/Web technologies. He has over 30 years of experience, has invented over 120 patents, and has co-authored over 25 scientific publications. For 20 years, Dr. Lavian has researched, studied, and lectured at UC Berkeley Engineering. He has served as an industry fellow and lecturer with UC Berkeley’s Industrial Engineering IEOR, Berkeley Engineering’s SCET, UC Berkeley’s start-up accelerator, and SkyDeck, as principal investigator for CRadar.Ai and CTO for Aybell.
Areas of Expertise:
Network Communications - Telecommunications - Internet Protocols (TCP/IP) - VoIP - Streaming Media - Mobile Wireless:
Communication Networks: Internet protocols; TCP/IP suite, TCP, UDP, IP, Ethernet, 802.3, network protocols, network software applications, data link, network, and transport layers (L2, L3, L4), packet switching, data center network architecture.
Mobile Wireless: Wi-Fi, 802.11, Bluetooth, MAC, PHY, Wireless LAN (WLAN). Cellular systems, SMS, instant messaging (chat), mobile devices, and smartphones.
Internet/Cloud: Internet Technologies, Web applications, HTTP, e-mail, SMTP, POP, IMAP, Java, C/C++, file transfer FTP, client-server, cloud computing, distributed computing.
Routing/Switching: LAN, WAN, VPN, routing protocols, RIP, BGP, MPLS, OSPF, multicast, DNS, QoS, network infrastructure, and network communication architectures.
Dr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.
Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.
Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, is an expert witness, consultant & trainer in the design, construction, procurement, implementation, commissioning & operations of Information Technology, Telecommunications & Critical Data Center Facilities.
Mr. Isaak provides clear analysis for complex disputes, incorporating industry standards, best-practices and over 20 years of consulting & training expertise working with clients located in 28 countries and territories across 6 continents.
In recognition of Mr. Isaak’s professional standing, the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified him to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold. Mr. Isaak is also an author of several industry standards published by TIA & ANSI/BICSI, whitepapers published by The Green Grid, and the Data Center Handbook published by John Wiley & Sons.
One of the new terms in the data center industry is Edge Data Centers. What is the Edge? Where is the Edge? Before we begin to understand what an Edge Data Center is, it might be helpful to first understand what it is not.
C. Matthew Curtin, CISSP Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.
Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above).
Academic references to their work include the Stanford Law Review and university courses throughout the world. Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.
C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.
As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Dr Castell, award-winning international Professional ICT Consultant and Expert has acted as expert witness in an unusual medical equipment procurement litigation of relevance to the current Covid-19 pandemic and its profound clinical and hospitalisation implications. The court case, specific details of which cannot be given since the matter is subject to Confidentiality Hearing strictures, was over a dispute concerning due and diligent process undertaken by a major Hospital Management Group, the Defendant in the action, in issuing a Tender for complex diagnostic units, and the Group’s selection of the bid put in by a US corporation, a leader in its field. That winning bid was challenged by a Claimant, another US corporation, a market competitor to the winning company. The dispute hinged on whether or not the operational computer software of the winning bidder’s units was compliant with the Hospital Management Group’s strict Tender stipulation that the software had to be identical across all versions of the equipment to be supplied in meeting the Tender requirements.
Dr Castell’s investigation and analysis of the operational software involved, and his opinion as to the extent that the software was compliant with the strict Tender condition, provided insight and assistance to the parties in reaching a satisfactory settlement.
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
This book - "Blockchain Technology and Innovations in Business Processes" - provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness.
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.