Protective Orders for Computer Source Code
Important advice on how to negotiate protective order terms for each particular review, saving time and money in the long run.
Important advice on how to negotiate protective order terms for each particular review, saving time and money in the long run.
Software consultants at Quandary Peak recently completed an lengthy, in-depth source code review of twenty-nine mobile devices running the Android, Windows Mobile, and Windows Phone 7 operating systems.
Do the unique characteristics of software, in contrast to other forms of technology, make the traditional rationales used to justify patents less valid for software patents?
Brad Ulrich, a computer scientist, was recently engaged to provide expert software analysis and opinions regarding Montgomery County’s 311 Call Center.
Developing mobile apps involves decisions about the target platform. This article reviews the market opportunities related to different app platforms.
Dr. Sam Malek is providing his expert opinion in a lawsuit that involves questions of information security and data access control.
George Edwards, one of Quandary Peak’s computer and software experts, was deposed in a patent case on July 17, 2013.
George Edwards and Nenad Medvidovic, two software experts affiliated with Quandary Peak Research, recently completed a comprehensive examination of the camera software architecture of over a dozen Android devices.