Articles about Analysis

Software experts meeting in research laboratory: woman leads presentation using digital whiteboard while colleagues listening

Identifying CyberSecurity Risk as Part of Technical Due Diligence

We use SAST tools during our tech due diligence engagements to provide independent analysis of security risk and to help provide recommendations.

Supreme Court to Hear Landmark Cellphone Surveillance Case

The case of Carpenter v. United States could ultimately set the standard for modern surveillance law: can law enforcement legally obtain information regarding your cell phone location data?

Front view of a Altair 8800 computer

Code is Tricky, Part 2: Source Code Never Runs

Every computer program comes from source code, but computers never use source code to run their programs. How does that work? Part 2 in our series.

Code is Tricky, Part 1: Dead Code

A software patent case can be won or lost on the question of dead code. What is dead code and how can an expert spot it? Part 1 in our series.

If You Have a Slow Network Connection, You Can Prove It

Consumers pay high prices for private broadband access, but how can you be sure you’re getting what you pay for? Our step-by-step guide will make sure you don’t get fleeced.

Design Challenges in Sub-11nm Process Technologies

Dr. Shahin Nazarian has been conducting research on design and analysis of high speed, energy efficient circuits and has co-authored numerous papers in design, analysis and optimization.