Articles about Analysis

Quandary Peak Assists in Nokia v. HTC Patent Litigation

Nokia’s recent settlement with HTC over smartphone patents was widely reported in the media on Friday, resulting in the dismissal of all pending patent litigation worldwide between the two companies. Industry observers widely cited the outcome as an important step for Nokia in its effort to generate royalties from its patent portfolio.…

Read More

Fresh Ideas for Addressing Mobile Software Security Vulnerabilities

Security has become the Achilles’ heel of most modern software systems. Techniques ranging from manual inspection to automated static and dynamic code analyses are commonly employed to identify security vulnerabilities prior to the release of software. However, these techniques are time-consuming and cannot keep pace with the growth of software repositories, such…

Read More

Android’s Stagefright Media Player Architecture

A significant portion of today’s mobile devices run on top of Android OS. One of the reasons for the widespread adoption of Android is its open source nature. While this allows any programmer to look beyond the basic API (referred to as the Application Framework), understanding and modifying the lower layers of…

Read More

Protective Orders for Computer Source Code

Proprietary software source code produced as evidence during discovery is typically afforded stronger protection than other types of evidence. The restrictions on how the source code may be stored, transmitted, and viewed are specified by a protective order (PO). Perhaps in an effort to control costs, many attorneys wait until after the…

Read More

Code Review of Android and Windows Devices Completed

Software consultants at Quandary Peak recently completed an lengthy, in-depth source code review of twenty-nine mobile devices running the Android, Windows Mobile, and Windows Phone 7 operating systems. The consultants, George Edwards and Brad Ulrich, drew on their many years of experience in smartphone application development and mobile systems research to document…

Read More

Expert Opinion on Cost and Risk of Enterprise Architectures

Brad Ulrich, a computer scientist at Quandary Peak Research, was recently engaged to provided expert software analysis and opinions for the County of Montgomery County in the matter of Yasmin Reyazuddin v. Montgomery County, Maryland. The case involves enterprise software used at the County’s 311 Call Center and its accessibility under Section…

Read More

Quandary Peak Experts Analyze Android Camera Architecture

George Edwards and Nenad Medvidovic, two software experts affiliated with Quandary Peak Research, recently completed a comprehensive examination of the camera software architecture of over a dozen Android devices. The two also analyzed a handful of mobile phones powered by Qualcomm’s Brew platform. The inspection and analysis of C++ and Java source…

Read More

Quandary Peak Performs Code Review in Patent Infringement Case

Brad Ulrich, a software expert with Quandary Peak Research, is performing source code review and analysis in a patent infringement matter brought against a large financial institution in the Eastern District of Virginia. The software involved utilizes SMS-based communication to a Java EE web platform to provide mobile banking services. Mr. Ulrich,…

Read More

Android vs. iPhone vs. Windows Phone: Getting an App Out There

Turning a great idea into a great app is not necessarily as straightforward as you may expect, and involves a number of important decisions: Which platform(s) should I target and in what order? Is this going to be prohibitively difficult or costly? How can I make sure that my app reaches the…

Read More