Articles about Security

Lacking in Transparency: The Google Transparency Project

In April 2016, the Campaign for Accountability (CfA) launched the Google Transparency Project (GTP), aimed at creating an online resource for the public to explore the relationship between Google and the government—and the impact of this relationship on American lives. In a statement, CfA Executive Director Anne Weisman said, “Google has long…

Read More

Open to Content: A Look at the Case for Net Neutrality

On June 14, 2016 the District of Columbia Circuit Court of Appeals upheld the Federal Communications Commission’s (FCC) Open Internet Rules. The Court’s ruling came after more than a decade of intense debate over the relationship between Internet Service Providers (ISPs), the Federal Government, and internet users. Twice before, attempts by the…

Read More

Nazarian Provides Deposition Testimony in BIOS Cases

Quandary Peak Research expert Dr. Shahin Nazarian was deposed in several IPR cases on March 15, March 16, April 4 and April 6, 2016. He was the lead testifying expert witness on six contested patents. Nazarian was asked to opine on the invalidity of US patents 6,519,659, 6,487,656, 6,633,976, 6,373,498, 6,401,202, and…

Read More

Award Winning Research Conducted by Quandary Peak Experts

Two Quandary Peak experts and their teams presented their latest research at the twenty-sixth International Symposium on Software Reliability and Engineering, one of the most accredited IEEE events. Dr. Mahdi Eslamimehr with his teammate from MIT won the ISSRE 2016 Best Paper award for “AtomChase: Directed Search Towards Atomicity Violations”, the result…

Read More

Introduction to the Gmail API

One of the most difficult questions when creating a new product is how to ensure that the product has a chance to attract a large user base. The good news is that the big players in the technology market such as Facebook, Google, and Twitter let developers create applications that can access…

Read More

Fresh Ideas for Addressing Mobile Software Security Vulnerabilities

Security has become the Achilles’ heel of most modern software systems. Techniques ranging from manual inspection to automated static and dynamic code analyses are commonly employed to identify security vulnerabilities prior to the release of software. However, these techniques are time-consuming and cannot keep pace with the growth of software repositories, such…

Read More

Malek Provides Deposition Testimony in Home Security Case

Professor Sam Malek, one of Quandary Peak’s computer and software experts, was deposed in a patent case on December 13, 2013. Malek was the lead testifying expert witness on several of the asserted patents. In particular, he was asked to opine on the infringement of U.S. Patent No. 8,350,694 and U.S. Patent No.…

Read More

Sam Malek Opines on Potential Security Breach

Dr. Sam Malek is providing his expert opinion in the matter of Lotchinbek Samatov, Jakhongir Samatov, and SSD Software Solutions v. AirShowBuzz, a lawsuit that involves questions of information security and data access control. Malek was retained by Michelman & Robinson LLP, a national firm with offices in Los Angeles, New York,…

Read More