
Cracking the Case: How We Captured and Analyzed DIAL Traffic in a Recent Case
Hidden network traffic can make or break a patent case. Our experts uncovered encrypted DIAL communications that became decisive evidence in an infringement dispute.
Hidden network traffic can make or break a patent case. Our experts uncovered encrypted DIAL communications that became decisive evidence in an infringement dispute.
Discover Light House, Quandary Peak’s AI tool for faster, deeper technical due diligence in M&A—benchmark code, teams, and risk in hours, not weeks.
Technical due diligence plays a critical role in assessing and mitigating OSS related risks in M&A transactions, providing companies with a comprehensive understanding to make informed decisions and to manage those risks.
We’re excited to announce a new partnership with CAST, combining deep software analysis and technical evaluation expertise to offer comprehensive software solutions and services.
We use SAST tools during our tech due diligence engagements to provide independent analysis of security risk and to help provide recommendations.
The case of Carpenter v. United States could ultimately set the standard for modern surveillance law: can law enforcement legally obtain information regarding your cell phone location data?
Every computer program comes from source code, but computers never use source code to run their programs. How does that work? Part 2 in our series.
A software patent case can be won or lost on the question of dead code. What is dead code and how can an expert spot it? Part 1 in our series.