Protective Orders for Computer Source Code
Important advice on how to negotiate protective order terms for each particular review, saving time and money in the long run.
Important advice on how to negotiate protective order terms for each particular review, saving time and money in the long run.
Software consultants at Quandary Peak recently completed an lengthy, in-depth source code review of twenty-nine mobile devices running the Android, Windows Mobile, and Windows Phone 7 operating systems.
George Edwards, one of Quandary Peak’s computer and software experts, was deposed in a patent case on July 17, 2013.
George Edwards and Nenad Medvidovic, two software experts affiliated with Quandary Peak Research, recently completed a comprehensive examination of the camera software architecture of over a dozen Android devices.
The essential steps required for an attorney to engage and best-utilize a source code analyst in a patent infringement case.
Brad Ulrich is performing source code review and analysis in a patent infringement matter brought against a large financial institution.