Nokia’s recent settlement with HTC over smartphone patents was widely reported in the media on Friday, resulting in the dismissal of all pending patent litigation worldwide between the two companies. Industry observers widely cited the outcome as an important step for Nokia in its effort to generate royalties from its patent portfolio.…
Read More
Security has become the Achilles’ heel of most modern software systems. Techniques ranging from manual inspection to automated static and dynamic code analyses are commonly employed to identify security vulnerabilities prior to the release of software. However, these techniques are time-consuming and cannot keep pace with the growth of software repositories, such…
Read More
A significant portion of today’s mobile devices run on top of Android OS. One of the reasons for the widespread adoption of Android is its open source nature. While this allows any programmer to look beyond the basic API (referred to as the Application Framework), understanding and modifying the lower layers of…
Read More
Proprietary software source code produced as evidence during discovery is typically afforded stronger protection than other types of evidence. The restrictions on how the source code may be stored, transmitted, and viewed are specified by a protective order (PO). Perhaps in an effort to control costs, many attorneys wait until after the…
Read More
Software consultants at Quandary Peak recently completed an lengthy, in-depth source code review of twenty-nine mobile devices running the Android, Windows Mobile, and Windows Phone 7 operating systems. The consultants, George Edwards and Brad Ulrich, drew on their many years of experience in smartphone application development and mobile systems research to document…
Read More
Brad Ulrich, a computer scientist at Quandary Peak Research, was recently engaged to provided expert software analysis and opinions for the County of Montgomery County in the matter of Yasmin Reyazuddin v. Montgomery County, Maryland. The case involves enterprise software used at the County’s 311 Call Center and its accessibility under Section…
Read More
George Edwards and Nenad Medvidovic, two software experts affiliated with Quandary Peak Research, recently completed a comprehensive examination of the camera software architecture of over a dozen Android devices. The two also analyzed a handful of mobile phones powered by Qualcomm’s Brew platform. The inspection and analysis of C++ and Java source…
Read More
Welcome to the first segment in this series articles on Utilizing a Source Code Analyst in Software Patent Infringement Suits. In my role as both a source code analyst and software expert witness, I have worked closely with top IP firms and Fortune 500 companies to uncover critical source code evidence in…
Read More
Brad Ulrich, a software expert with Quandary Peak Research, is performing source code review and analysis in a patent infringement matter brought against a large financial institution in the Eastern District of Virginia. The software involved utilizes SMS-based communication to a Java EE web platform to provide mobile banking services. Mr. Ulrich,…
Read More
Turning a great idea into a great app is not necessarily as straightforward as you may expect, and involves a number of important decisions: Which platform(s) should I target and in what order? Is this going to be prohibitively difficult or costly? How can I make sure that my app reaches the…
Read More