Computer System Failure and Defect Analysis

Failures of software-intensive systems can result in significant financial losses and, in the worst cases, even injury or death. In these cases, a careful and impartial professional analysis can help answer the tough questions. A dizzying number of factors can come into play including safety and risk management practices, hardware malfunction or misuse, software design controls, user errors, industry best practices, professional standards, regulations, and governing law.

What We Do

Quandary Peak computer expert witnesses:

  • Investigate computer system failures to determine the root cause.
  • Analyze the responsibilities and the impact of software components in the system.
  • Perform a comprehensive analysis of the quality of the software component in question to understand the context in which the failure occurred.
  • Determine industry accepted/best practices, applicable professional standards and government regulations.

What We Know
  • Defect Density Analysis
  • Software validation and QA testing
  • Risk management
  • Applicable professional standards
  • Government regulations for software
  • ISO/IEEE/IEC/W3C standards for software

Computer Forensics and Data Recovery

The proliferation of computers has made many legal cases depend on computer-stored data and metadata, such as logs that record who accessed the data, where, and when. Malicious or inadvertent file deletions or physical disk failures may result in loss of data that may be used as evidence.

What We Do

At Quandary Peak, our computer forensics experts:

  • Supervise and collaborate with data recovery firms to recover the relevant data.
  • Ensure the integrity of recovered data.
  • Attest to the validity of the recovery process.
  • Determine whether appropriate data integrity and information security mechanisms were employed.

What We Know
  • State-of-the-art forensic data recovery techniques for finding and recovering previously lost or destroyed data.
  • State-of-the-art data integrity and information security mechanisms.

Speak with an Expert Today