|
New York |
Defense |
Competitive SQL code analyses |
Trade Secret Misappropriation |
Source code analyses and comparisons |
Closed #123 |
|
Illinois |
Defense |
Competitive Fortran and C++ code analyses |
Trade Secret Misappropriation |
Source code comparisons and analyses |
Closed #122 |
|
Nevada |
Plaintiffs |
Forensics Support for Employment Termination |
Computer Forensics |
Hard drive reconstruction and forensics analysis of Internet activities. |
Closed #120 |
|
Utah |
Defense |
Sub-domain processing and web services |
Computer forensics, patent infringement |
Discovery of invalidation materials on hard drives. |
Closed #113 |
|
Florida |
Defense |
Source Code Comparison Analysis |
copyright infringement |
Defense/Plaintiff Master: Copyright infringement analysis of Auto dealer management systems |
Closed #121 |
|
Washington |
Defense |
AOL Instant Messaging Forensics |
child pornography, computer forensics, internet |
Investigative efforts for possible litigation. |
Closed #119 |
|
United Kingdom |
Defense |
Counterfeit Microsoft Software Analysis |
Microsoft, counterfeit, forensics, software |
Analysis of allegedly counterfeit Microsoft software CDs, documentation, certificates of authenticity, EULAs |
Closed #118 |
|
Missouri |
Defense |
Visual Basic Software Code Comparisons |
breach of contract, copyright infringement |
Review two sets of health care software code for possible copying analyses. |
Closed #117 |
|
Utah |
Defense |
Counterfeit Microsoft Software Analysis |
Microsoft counterfeit |
Review of allegedly counterfeit software materials and consulting assistance to defense team. |
Closed #116 |
|
Oregon |
Plaintiffs |
Forensics Analyses of Possible Fraud |
Computer forensics, fraud, internet |
Investigative efforts for possible litigation. |
Closed #115 |
|
England |
Plaintiffs |
Software Execution and Reliability Analysis |
Y2K Telecommunications Data Corruption Analyses |
Software project and system design analyses. Arbitration in London. |
Closed #114 |
|
South Dakota |
Defense |
Internet Activity Analyses |
child pornography, computer forensics |
Analyses of computer usage and file/picture storage. |
Closed #112 |
|
Georgia |
Defense |
Felony Murder and Possession of a Firearm |
computer forensics |
Analysis of evidence on hard drive of murder victim. |
Closed #111 |
|
California |
Defense |
Counterfeit I.D. production |
child pornography, computer forensics |
Allegations of production of counterfeit drivers' licenses and possible possession of child pornography |
Closed #110 |
|
Nevada |
Plaintiffs |
Gaming Industry Hardware & Software |
patent infringement, software code review |
Software and hardware analysis of code behind allegedly infringing shuffling device.
|
Closed #108 |
|
California |
Defense |
Counterfeit Microsoft Software Analysis |
Microsoft counterfeit |
Assessment of counterfeit and genuine Microsoft software and components |
Closed #109 |
|
Florida |
Defense |
Violation of Probation |
computer forensics
| Forensics analysis of Internet activities
| Closed #107
|
|
California |
Defense |
Real Estate Software System Infringements |
copyright infringement, trade secret misappropriation
| Copying of data dictionary definitions, database schema
| Closed #103 |
|
California |
Defense |
Robbery |
computer forensics
| Forensics analysis of email traffic, plus existence of installed spyware
| Closed #106 |
|
Nevada |
Plaintiffs |
Electronic Gaming Patent Infringement |
patent infringement, software code review
| Software analysis to assess patent infringement
| Closed #99 |
|
Washington |
Plaintiffs |
Health Care Computer System Breach of Contract |
breach of contract, medical & health
| Breach of contract suit and counterclaim between computer software and information technology services firm and a regional medical center.
| Closed #104
|
|
New York |
Defense |
Pornography Forensics |
child pornography, computer forensics
| Analysis of drive contents and Internet sourcing information.
| Closed #105
|
|
California |
Defense |
Consulting Support in Trust Matter |
computer forensics
| Analysis and support in family will and trust matters
| Closed #98
|
|
California |
Plaintiffs |
Internet Trademark Infringement |
internet, trademark infringement, Lanham Act
| Internet domain name trademark infringment. Cybersquatting.
| Closed #100
|
|
California |
Defense |
Forensics Assessment of Child Pornography on Hard Drive |
child pornography, computer forensics, pornography
| Assessment of existence and extent and origin/dates of child pornography on both defendant's and "victim's" computers.
| Closed #102
|
|
New Jersey |
Plaintiffs |
Electronic Document Management |
copyright infringement, trade secret misappropriation
| Alleged misappropriation of software modules and database schema.
| Closed #96
|
|
Illinois |
Defense |
Software Analysis and Comparisons |
copyright infringement
| Detailed modular comparisons of assembler language code
| Closed #97
|
|
England |
Defense |
Conspiracy to Defraud Microsoft and/or Members of the Public
|
fraud, Microsoft counterfeit |
Analysis of Microsoft software as to Genuine or Counterfeit Nature.
| Closed #1
|
|
California |
Plaintiffs |
Summary Execution, Crimes Against Humanity, and Torture
|
computer forensics, internet |
Email and Internet consulting analyses.
| Closed #78
|
|
Nebraska |
Defense |
Counterfeit Software Analysis |
Microsoft counterfeit
| Consulting assistance in alleged counterfeit software resales.
| Closed #79
|
|
California |
Plaintiffs |
Software Licensing Claims & Counterclaims |
breach of contract, copyright infringement, fraud
| Software licensed by one company to another. Breach of Contract & Copyright Infringement claims. Counterclaims for fraud.
| Closed #101
|
|
California |
Defense |
Hardware/Software system: trade secret misappropriations |
trade secret misappropriation
| Consulting advice and litigation support in combined hardware-software system
| Closed #81
|
|
North Carolina
|
Defense |
Computer Forensics |
computer forensics, internet, pornography
| Analysis of misuse of USAF computer for possible child pornography.
| Closed #90
|
|
California |
Plaintiffs |
Trade Secret Misappropriation |
database, internet, trade secret misappropriation
| Analysis of Internet data base usage and possible misappropriation.
| Closed #89
|
|
Nevada |
Plaintiffs |
Copyright Infringement and Trade Secret Misappropriation |
copyright infringement, trade secret misappropriation
| Analysis and comparison of sales and marketing materials for training workshops.
| Closed #91
|
|
Texas |
Defense |
Breach of Contract |
breach of contract
| Source code and licensing issue assessment.
| Closed #92
|
|
California |
Defense |
Defamation and Trademark Infringement
|
internet, trade secret misappropriation
| Internet analyses of trademark misappropriations and search engine visibility issues. Was deposed. Also testified at trial.
| Closed #93
|
|
Nevada |
Plaintiffs |
Trade Secret Misappropriation
|
trade secret misappropriation |
Software analyses regarding possible data base misappropriations.
| Closed #10
|
|
California |
Defense |
Copyright and Trademark Infringement
|
computer forensics, copyright infringement, internet, trademark infringement
| Forensics analyses of Internet web page promotions and trademark infringements. Was deposed.
| Closed #11
|
|
Michigan |
Defense |
Computer Forensics
|
internet, computer forensics, pornography
| Assessment of Internet-based child pornography allegations.
| Closed #12
|
|
Ohio |
Plaintiffs |
Breach of Contract
|
breach of contract |
Analysis of failed software system. Was deposed.
| Closed #13
|
|
Virginia |
Defense |
Fraud and Trademark Infringement
|
Microsoft counterfeit, trademark infringement, fraud
| Analysis of counterfeit software issues, violations of Lanham Act and UCC. Was deposed.
| Closed #9
|
|
California |
Defense |
Copyright Infringement
|
copyright infringement |
Analysis of engineering software programs.
| Closed #16
|
|
New York |
Plaintiffs |
Internet violation of the Federal Lanham Act
|
internet, trademark infringement
| Assessment of website misappropriation of name and likeness.
| Closed #18
|
|
Minnesota |
Plaintiffs |
Patent Infringement
|
patent infringement |
Analysis of Telnaes slot machine technology infringement.
| Closed #19
|
|
California |
Plaintiffs |
Patent Infringement
|
patent infringement |
Analysis of printing industry software patent.
| Closed #20
|
|
Delaware |
Plaintiffs |
Patent Infringement
|
patent infringement |
Analysis of CD ROM game software. Was deposed.
| Closed #21
|
|
California |
Plaintiffs |
Divorce |
computer forensics, divorce
| Computer forensics' asset discovery.
| Closed #17
|
|
Massachusetts
|
Plaintiffs |
Electronic Intrusion |
computer forensics, internet
| |
Closed #95 |
|
Michigan |
Defense |
Trade Secrets |
trade secret misappropriation
| Software trade secret analysis.
| Closed #94
|
|
California |
Defense |
Counterfeit Software License
|
copyright infringement, Microsoft counterfeit, trademark infringement
| Consulting analysis regarding alleged counterfeit software licensing materials. Was deposed.
| Closed #24
|
|
California |
Defense |
Trade Secret Misappropriation
|
copyright infringement, medical & health, trade secret misappropriation
| Infringement analysis of COBOL and FoxPro health insurance software programs.
| Closed #26
|
|
California |
Plaintiffs |
Contested Will
|
computer forensics, divorce |
Computer forensics analysis of hard drive.
| Closed #27
|
|
Utah |
Plaintiffs |
Divorce |
computer forensics, divorce
| Computer forensics analysis.
| Closed #28
|
|
California |
Plaintiffs |
Breach of Contract
|
breach of contract |
Assessment of software quality in Local Area Network arena.
| Closed #29
|
|
California |
Plaintiffs |
Computer Forensics and Trade Secrets Misappropriation
|
trade secret misappropriation, internet, computer forensics
| Hard drive analysis to determine potential trade secrets misappropriation.
| Closed #33
|
|
South Dakota
|
Plaintiffs |
Rape |
internet, computer forensics
| Internet forensics explorations regarding activities of defendant.
| Closed #34
|
|
Florida |
Defense |
Copyright Infringement, Trademark Infringement, Unfair Trade Practices
|
copyright infringement, internet, Microsoft counterfeit, trademark infringement
| Internet research and counterfeit Microsoft software consulting support.
| Closed #35
|
|
California |
Plaintiffs |
Internet Trade Name Misappropriation |
internet, trademark infringement
| Misappropriation of tradename in Internet domain name usage.
| Closed #36
|
|
California |
Defense |
Trade Secrets Misappropriation
|
trade secret misappropriation, internet
| Internet search engine and database program analyses. Was deposed.
| Closed #31
|
|
California |
Defense |
Copyright Infringement
|
copyright infringement |
Database comparisons.
| Closed #37
|
|
South Dakota
|
Plaintiffs |
Murder |
computer forensics, murder
| Forensic analysis of Internet and other activity on the defendant's computer hard drives. Testified at trial.
| Closed #38
|
|
California |
Defense |
Computer Forensics and Electronic Evidence
|
computer forensics |
Computer forensic analysis of Internet activity on hard drives in stalking case.
| Closed #39
|
|
California |
Defense |
Patent Infringement
|
patent infringement, internet |
Analysis of computer system specifications for Internet website order processing and web appliances.
| Closed #30
|
|
California |
Defense |
Computer Forensics and Electronic Evidence
|
breach of contract, computer forensics
| Analysis of file activity in real estate transactions. Was deposed. Also, testified at trial.
| Closed #22
|
|
New Jersey |
Plaintiffs |
Copyright Infringement and Breach of Contract
|
breach of contract, copyright infringement
| Software analysis of Y2K issues and Visual Basic code applications. Was deposed.
| Closed #23
|
|
Missouri |
Defense |
Trade Secrets Misappropriation
|
trade secret misappropriation, medical & health
| Analysis of WordPerfect macro-based health insurance plan software system.
| Closed #41
|
|
Washington, DC
|
Plaintiffs |
Internet Email and Forensics Deletions
|
internet, computer forensics |
Consulting support for case involving LAN, email, and electronic document processing storage, retrieval and deletions.
| Closed #42
|
|
California |
Defense |
Class Action, Product Liability
|
breach of contract |
Product liability issues in computer based training (CBT) products. Class action suit.
| Closed #43
|
|
California |
Plaintiffs |
Copyright Infringement
|
copyright infringement, internet
| Internet HTML and Javascript code analyses and comparisons.
| Closed #44
|
|
California |
Plaintiffs |
Copyright Infringement
|
copyright infringement |
Comparisons of application systems using Visual Basic and Excel spreadsheets/macros.
| Closed #45
|
|
California |
Defense |
Trade Name and Service Mark Infringement
|
internet, trademark infringement
| Internet promotions and search engine manipulations.
| Closed #46
|
|
California |
Defense |
Unfair Business Practices and Federal Fair Debt Collection
|
internet |
Internet Gambling and financial transactions.
| Closed #47
|
|
Michigan |
Defense |
Business Interruption
|
breach of contract |
Consulting on power outages and computer file corruption.
| Closed #48
|
|
California |
Defense |
Trademark Infringement
|
internet, trademark infringement
| Consulting assistance in multimedia Internet claims evaluations.
| Closed #49
|
|
California |
Defense |
Counterfeit Software
|
Microsoft counterfeit |
Assessment of and consulting advice in alleged counterfeit Microsoft software.
| Closed #50
|
|
New York |
Defense |
Computer Forensics and Electronic Evidence
|
internet, computer forensics |
Analysis of system usage and email transmissions.
| Closed #51
|
|
Nevada |
Plaintiffs |
Computer Forensics and Electronic Evidence
| |
Forensic explorations of correspondence and email on subject's hard drive.
| Closed #52
|
|
Washington |
Defense |
Computer Forensics and Electronic Evidence
|
computer forensics, internet, pornography
| Internet Pornography: analysis of forensic contents of hard drives.
| Closed #53
|
|
Florida |
Defense |
Copyright Infringement and Breach of Warranty
|
copyright infringement, breach of contract, medical & health
| Medical billing systems written in COBOL.
| Closed #54
|
|
Arizona |
Defense |
Computer Forensics and Electronic Evidence
|
computer forensics, pornography |
Consulting on technical aspects underlying the case.
| Closed #55
|
|
California |
Defense |
Internet-based ISP hacking
|
internet |
Consulting on technical aspects underlying the case.
| Closed #56
|
|
California |
Defense |
Product Liability
|
breach of contract, database |
Computer database and system analyses.
| Closed #57
|
|
Texas |
Defense |
Murder |
computer forensics, murder
| Computer forensics analysis of work and activities on hard drive.
| Closed #58
|
|
Nevada |
Defense |
Murder |
internet |
Computer forensics analysis of defendant's hard drive and diskettes.
| Closed #60
|
|
Florida |
Defense |
Computer Forensics Analysis
|
pornography |
Child pornography. Discovery and defensive assessment of multiple hard drives and diskettes for relevant evidence.
| Closed #61
|
|
California |
Plaintiffs |
Breach of contract, fraud, software piracy of Novell Netware
|
breach of contract, fraud |
Was deposed and testified at trial on commercial viability, software configurations, and piracy elements of photographic hardware/software application system. Was deposed.
| Closed #62
|
|
California |
Defense |
Copyright Infringement
|
copyright infringement |
Hired to assess technical infringement between two application systems.
| Closed #63
|
|
Utah |
Defense |
Computer Forensics and Electronic Evidence
|
computer forensics, pornography |
Defensive analysis of hard disk contents and organization for child pornography.
| Closed #64
|
|
California |
Defense |
Computer Forensics Explorations
|
computer forensics |
Deleted hard disk files at issue.
| Closed #65
|
|
California |
Defense |
Wrongful Termination, Age Discrimination, Breach of Contract, Breach of Good Faith, Defamation
|
breach of contract |
Consulting role in computer issues surrounding the case. Was deposed.
| Closed #59
|
|
Michigan |
Plaintiffs |
Commercial Fraud and Copyright Infringement
|
copyright infringement, fraud, internet, medical & health
| Evidence research and gathering via the Internet. Potential comparison of multiple medical software systems and languages, including health care billings and patient record keeping.
| Closed #25
|
|
Florida |
Plaintiffs |
Airline Flight System Analysis, Air Accident
|
database |
Analysis of underlying database contents and organization, plus related avionics control computer hardware and software. Was deposed.
| Closed #40
|
|
Massachusetts
|
Plaintiffs |
Trade Secrets Misappropriation
|
trade secret misappropriation |
Analysis and comparisons of financial modeling software and systems.
| Closed #32
|
|
Alabama |
Defense |
Military Court Martial
|
internet, pornography |
Testified at trial on a variety of topics related to E-mail, the Internet, child and other pornography on the web, photo retouching software.
| Closed #66
|
|
Nevada |
Plaintiffs |
Breach of Contract, Fraud, Rejection under UCC
|
breach of contract, fraud |
Failure Analysis of Rejected Telecommunications Software and Hardware System; Discovery Guidance.
| Closed #67
|
|
Arizona |
Plaintiffs |
Copyright Infringement Suit
|
copyright infringement, medical & health
| Detailed comparisons of two systems of health care medical billings source code modules, one in Oracle and another in a version of BASIC, to help to determine copyright infringement.
| Closed #68
|
|
California |
Plaintiffs |
Copyright Infringement Suit
|
copyright infringement, medical & health
| Detailed comparisons of hundreds of medical system source code modules, in two dialects of BASIC, to help to determine copyright infringement in programs providing medical record-keeping, 3rd party billing, and nursing home management software services.
| Closed #69
|
|
New Jersey |
Defense |
Copyright Infringement Suit
|
copyright infringement |
As the court-appointed expert, accepted mutually by both Plaintiff and Defense, I analyzed source code from both sides, in two dialects of dBASE, and delivered my detailed opinions directly to the Court.
| Closed #70
|
|
California |
Plaintiffs |
Copyright Infringement Suit (in Federal court) and Breach of Contract Suit (in State court) |
breach of contract, copyright infringement
| Analyzed/compared BASIC source code for two financial systems to determine possible existence and extent of copying. Was deposed.
| Closed #71
|
|
Utah |
Plaintiffs |
Antitrust Suit
|
breach of contract |
Advice and information about specific company hardware and operating systems.
| Closed #72
|
|
California |
Defense |
Application for Temporary Restraining Order
|
breach of contract |
Analyzed dBASE source code in an Accounting System to assess quality of code in support of the Application.
| Closed #73
|
|
Utah |
Plaintiffs |
Breach of Warranty Suit |
copyright infringement, medical & health
| Reviewed PASCAL source code for a pharmaceutical system to analyze system quality and reliability. Was deposed.
| Closed #74
|