|  | New York | Defense | Competitive SQL code analyses | Trade Secret Misappropriation | Source code analyses and comparisons | Closed #123 | 
        
     
               
            |  | Illinois | Defense | Competitive Fortran and C++ code analyses | Trade Secret Misappropriation | Source code comparisons and analyses | Closed #122 | 
        
     
               
            |  | Nevada | Plaintiffs | Forensics Support for Employment Termination | Computer Forensics | Hard drive reconstruction and forensics analysis of Internet activities. | Closed #120 | 
        
     
                 
            |  | Utah | Defense | Sub-domain processing and web services | Computer forensics, patent infringement | Discovery of invalidation materials on hard drives. | Closed #113 | 
     
                 
            |  | Florida | Defense | Source Code Comparison Analysis | copyright infringement | Defense/Plaintiff Master: Copyright infringement analysis of Auto dealer management systems | Closed #121 | 
          
     
               
            |  | Washington | Defense | AOL Instant Messaging Forensics | child pornography, computer forensics, internet | Investigative efforts for possible litigation. | Closed #119 | 
        
     
               
            |  | United Kingdom | Defense | Counterfeit Microsoft Software Analysis | Microsoft, counterfeit, forensics, software | Analysis of allegedly counterfeit Microsoft software CDs, documentation, certificates of authenticity, EULAs | Closed #118 | 
     
     
             
            |  | Missouri | Defense | Visual Basic Software Code Comparisons | breach of contract, copyright infringement | Review two sets of health care software code for possible copying analyses. | Closed #117 | 
          
     
               
            |  | Utah | Defense | Counterfeit Microsoft Software Analysis | Microsoft counterfeit | Review of allegedly counterfeit software materials and consulting assistance to defense team. | Closed #116 | 
        
     
               
            |  | Oregon | Plaintiffs | Forensics Analyses of Possible Fraud | Computer forensics, fraud, internet | Investigative efforts for possible litigation. | Closed #115 | 
        
     
               
            |  | England | Plaintiffs | Software Execution and Reliability Analysis | Y2K Telecommunications Data Corruption Analyses | Software project and system design analyses. Arbitration in London. | Closed #114 | 
     
     
               
            |  | South Dakota | Defense | Internet Activity Analyses | child pornography, computer forensics | Analyses of computer usage and file/picture storage. | Closed #112 | 
           
               
            |  | Georgia | Defense | Felony Murder and Possession of a Firearm | computer forensics | Analysis of evidence on hard drive of murder victim. | Closed #111 | 
             
               
            |  | California | Defense | Counterfeit I.D. production | child pornography, computer forensics | Allegations of production of counterfeit drivers' licenses and possible possession of child pornography | Closed #110 | 
           
               
            |  | Nevada | Plaintiffs | Gaming Industry Hardware & Software | patent infringement, software code review | Software and hardware analysis of code behind allegedly infringing shuffling device. | Closed #108 | 
            
               
            |  | California | Defense | Counterfeit Microsoft Software Analysis | Microsoft counterfeit | Assessment of counterfeit and genuine Microsoft software and components | Closed #109 | 
              
               |  | Florida | Defense | Violation of Probation | computer forensics | Forensics analysis of Internet activities | Closed #107 | 
       |  | California | Defense | Real Estate Software System Infringements | copyright infringement, trade secret misappropriation | Copying of data dictionary definitions, database schema | Closed #103 | 
       |  | California | Defense | Robbery | computer forensics | Forensics analysis of email traffic, plus existence of installed spyware | Closed #106 | 
       |  | Nevada | Plaintiffs | Electronic Gaming Patent Infringement | patent infringement, software code review | Software analysis to assess patent infringement | Closed #99 | 
       |  | Washington | Plaintiffs | Health Care Computer System Breach of Contract | breach of contract, medical & health | Breach of contract suit and counterclaim between computer software and information technology services firm and a regional medical center. | Closed #104 | 
       |  | New York | Defense | Pornography Forensics | child pornography, computer forensics | Analysis of drive contents and Internet sourcing information. | Closed #105 | 
       |  | California | Defense | Consulting Support in Trust Matter | computer forensics | Analysis and support in family will and trust matters | Closed #98 | 
       |  | California | Plaintiffs | Internet Trademark Infringement | internet, trademark infringement, Lanham Act | Internet domain name trademark infringment. Cybersquatting. | Closed #100 | 
       |  | California | Defense | Forensics Assessment of Child Pornography on Hard Drive | child pornography, computer forensics, pornography | Assessment of existence and extent and origin/dates of child pornography on both defendant's and "victim's" computers. | Closed #102 | 
       |  | New Jersey | Plaintiffs | Electronic Document Management | copyright infringement, trade secret misappropriation | Alleged misappropriation of software modules and database schema. | Closed #96 | 
       |  | Illinois | Defense | Software Analysis and Comparisons | copyright infringement | Detailed modular comparisons of assembler language code | Closed #97 | 
       |  | England | Defense | Conspiracy to Defraud Microsoft and/or Members of the Public | fraud, Microsoft counterfeit | Analysis of Microsoft software as to Genuine or Counterfeit Nature. | Closed #1 | 
       |  | California | Plaintiffs | Summary Execution, Crimes Against Humanity, and Torture | computer forensics, internet | Email and Internet consulting analyses. | Closed #78 | 
       |  | Nebraska | Defense | Counterfeit Software Analysis | Microsoft counterfeit | Consulting assistance in alleged counterfeit software resales. | Closed #79 | 
       |  | California | Plaintiffs | Software Licensing Claims & Counterclaims | breach of contract, copyright infringement, fraud | Software licensed by one company to another. Breach of Contract & Copyright Infringement claims. Counterclaims for fraud. | Closed #101 | 
       |  | California | Defense | Hardware/Software system: trade secret misappropriations | trade secret misappropriation | Consulting advice and litigation support in combined hardware-software system | Closed #81 | 
       |  | North Carolina | Defense | Computer Forensics | computer forensics, internet, pornography | Analysis of misuse of USAF computer for possible child pornography. | Closed #90 | 
       |  | California | Plaintiffs | Trade Secret Misappropriation | database, internet, trade secret misappropriation | Analysis of Internet data base usage and possible misappropriation. | Closed #89 | 
       |  | Nevada | Plaintiffs | Copyright Infringement and Trade Secret Misappropriation | copyright infringement, trade secret misappropriation | Analysis and comparison of sales and marketing materials for training workshops. | Closed #91 | 
       |  | Texas | Defense | Breach of Contract | breach of contract | Source code and licensing issue assessment. | Closed #92 | 
       |  | California | Defense | Defamation and Trademark Infringement | internet, trade secret misappropriation | Internet analyses of trademark misappropriations and search engine visibility issues. Was deposed. Also testified at trial. | Closed #93 | 
       |  | Nevada | Plaintiffs | Trade Secret Misappropriation | trade secret misappropriation | Software analyses regarding possible data base misappropriations. | Closed #10 | 
       |  | California | Defense | Copyright and Trademark Infringement | computer forensics, copyright infringement, internet, trademark infringement | Forensics analyses of Internet web page promotions and trademark infringements. Was deposed. | Closed #11 | 
       |  | Michigan | Defense | Computer Forensics | internet, computer forensics, pornography | Assessment of Internet-based child pornography allegations. | Closed #12 | 
       |  | Ohio | Plaintiffs | Breach of Contract | breach of contract | Analysis of failed software system. Was deposed. | Closed #13 | 
       |  | Virginia | Defense | Fraud and Trademark Infringement | Microsoft counterfeit, trademark infringement, fraud | Analysis of counterfeit software issues, violations of Lanham Act and UCC. Was deposed. | Closed #9 | 
       |  | California | Defense | Copyright Infringement | copyright infringement | Analysis of engineering software programs. | Closed #16 | 
       |  | New York | Plaintiffs | Internet violation of the Federal Lanham Act | internet, trademark infringement | Assessment of website misappropriation of name and likeness. | Closed #18 | 
       |  | Minnesota | Plaintiffs | Patent Infringement | patent infringement | Analysis of Telnaes slot machine technology infringement. | Closed #19 | 
       |  | California | Plaintiffs | Patent Infringement | patent infringement | Analysis of printing industry software patent. | Closed #20 | 
       |  | Delaware | Plaintiffs | Patent Infringement | patent infringement | Analysis of CD ROM game software. Was deposed. | Closed #21 | 
       |  | California | Plaintiffs | Divorce | computer forensics, divorce | Computer forensics' asset discovery. | Closed #17 | 
       |  | Massachusetts | Plaintiffs | Electronic Intrusion | computer forensics, internet |  | Closed #95 | 
       
            |  | Michigan | Defense | Trade Secrets | trade secret misappropriation | Software trade secret analysis. | Closed #94 | 
       |  | California | Defense | Counterfeit Software License | copyright infringement, Microsoft counterfeit, trademark infringement | Consulting analysis regarding alleged counterfeit software licensing materials. Was deposed. | Closed #24 | 
       |  | California | Defense | Trade Secret Misappropriation | copyright infringement, medical & health, trade secret misappropriation | Infringement analysis of COBOL and FoxPro health insurance software programs. | Closed #26 | 
       |  | California | Plaintiffs | Contested Will | computer forensics, divorce | Computer forensics analysis of hard drive. | Closed #27 | 
       |  | Utah | Plaintiffs | Divorce | computer forensics, divorce | Computer forensics analysis. | Closed #28 | 
       |  | California | Plaintiffs | Breach of Contract | breach of contract | Assessment of software quality in Local Area Network arena. | Closed #29 | 
       |  | California | Plaintiffs | Computer Forensics and Trade Secrets Misappropriation | trade secret misappropriation, internet, computer forensics | Hard drive analysis to determine potential trade secrets misappropriation. | Closed #33 | 
       |  | South Dakota | Plaintiffs | Rape | internet, computer forensics | Internet forensics explorations regarding activities of defendant. | Closed #34 | 
       |  | Florida | Defense | Copyright Infringement, Trademark Infringement, Unfair Trade Practices | copyright infringement, internet, Microsoft counterfeit, trademark infringement | Internet research and counterfeit Microsoft software consulting support. | Closed #35 | 
       |  | California | Plaintiffs | Internet Trade Name Misappropriation | internet, trademark infringement | Misappropriation of tradename in Internet domain name usage. | Closed #36 | 
       |  | California | Defense | Trade Secrets Misappropriation | trade secret misappropriation, internet | Internet search engine and database program analyses.  Was deposed. | Closed #31 | 
       |  | California | Defense | Copyright Infringement | copyright infringement | Database comparisons. | Closed #37 | 
       |  | South Dakota | Plaintiffs | Murder | computer forensics, murder | Forensic analysis of Internet and other activity on the defendant's computer hard drives.  Testified at trial. | Closed #38 | 
       |  | California | Defense | Computer Forensics and Electronic Evidence | computer forensics | Computer forensic analysis of Internet activity on hard drives in stalking case. | Closed #39 | 
       |  | California | Defense | Patent Infringement | patent infringement, internet | Analysis of computer system specifications for Internet website order processing and web appliances. | Closed #30 | 
       |  | California | Defense | Computer Forensics and Electronic Evidence | breach of contract, computer forensics | Analysis of file activity in real estate transactions.  Was deposed. Also, testified at trial. | Closed #22 | 
       |  | New Jersey | Plaintiffs | Copyright Infringement and Breach of Contract | breach of contract, copyright infringement | Software analysis of Y2K issues and Visual Basic code applications. Was deposed. | Closed #23 | 
       |  | Missouri | Defense | Trade Secrets Misappropriation | trade secret misappropriation, medical & health | Analysis of WordPerfect macro-based health insurance plan software system. | Closed #41 | 
       |  | Washington, DC | Plaintiffs | Internet Email and Forensics Deletions | internet, computer forensics | Consulting support for case involving LAN, email, and electronic document processing storage, retrieval and deletions. | Closed #42 | 
       |  | California | Defense | Class Action, Product Liability | breach of contract | Product liability issues in computer based training (CBT) products. Class action suit. | Closed #43 | 
       |  | California | Plaintiffs | Copyright Infringement | copyright infringement, internet | Internet HTML and Javascript code analyses and comparisons. | Closed #44 | 
       |  | California | Plaintiffs | Copyright Infringement | copyright infringement | Comparisons of application systems using Visual Basic and Excel spreadsheets/macros. | Closed #45 | 
       |  | California | Defense | Trade Name and Service Mark Infringement | internet, trademark infringement | Internet promotions and search engine manipulations. | Closed #46 | 
       |  | California | Defense | Unfair Business Practices and Federal Fair Debt Collection | internet | Internet Gambling and financial transactions. | Closed #47 | 
       |  | Michigan | Defense | Business Interruption | breach of contract | Consulting on power outages and computer file corruption. | Closed #48 | 
       |  | California | Defense | Trademark Infringement | internet, trademark infringement | Consulting assistance in multimedia Internet claims evaluations. | Closed #49 | 
       |  | California | Defense | Counterfeit Software | Microsoft counterfeit | Assessment of and consulting advice in alleged counterfeit Microsoft software. | Closed #50 | 
       |  | New York | Defense | Computer Forensics and Electronic Evidence | internet, computer forensics | Analysis of system usage and email transmissions. | Closed #51 | 
       |  | Nevada | Plaintiffs | Computer Forensics and Electronic Evidence |  | Forensic explorations of correspondence and email on subject's hard drive. | Closed #52 | 
       |  | Washington | Defense | Computer Forensics and Electronic Evidence | computer forensics, internet, pornography | Internet Pornography: analysis of forensic contents of hard drives. | Closed #53 | 
       |  | Florida | Defense | Copyright Infringement and Breach of Warranty | copyright infringement, breach of contract, medical & health | Medical billing systems written in COBOL. | Closed #54 | 
       |  | Arizona | Defense | Computer Forensics and Electronic Evidence | computer forensics, pornography | Consulting on technical aspects underlying the case. | Closed #55 | 
       |  | California | Defense | Internet-based ISP hacking | internet | Consulting on technical aspects underlying the case. | Closed #56 | 
       |  | California | Defense | Product Liability | breach of contract, database | Computer database and system analyses. | Closed #57 | 
       |  | Texas | Defense | Murder | computer forensics, murder | Computer forensics analysis of work and activities on hard drive. | Closed #58 | 
       |  | Nevada | Defense | Murder | internet | Computer forensics analysis of defendant's hard drive and diskettes. | Closed #60 | 
       |  | Florida | Defense | Computer Forensics Analysis | pornography | Child pornography. Discovery and defensive assessment of multiple hard drives and diskettes for relevant evidence. | Closed #61 | 
       |  | California | Plaintiffs | Breach of contract, fraud, software piracy of Novell Netware | breach of contract, fraud | Was deposed and testified at trial on commercial viability, software configurations, and piracy elements of photographic hardware/software application system. Was deposed. | Closed #62 | 
       |  | California | Defense | Copyright Infringement | copyright infringement | Hired to assess technical infringement between two application systems. | Closed #63 | 
       |  | Utah | Defense | Computer Forensics and Electronic Evidence | computer forensics, pornography | Defensive analysis of hard disk contents and organization for child pornography. | Closed #64 | 
       |  | California | Defense | Computer Forensics Explorations | computer forensics | Deleted hard disk files at issue. | Closed #65 | 
       |  | California | Defense | Wrongful Termination, Age Discrimination, Breach of Contract, Breach of Good Faith, Defamation | breach of contract | Consulting role in computer issues surrounding the case. Was deposed. | Closed #59 | 
       |  | Michigan | Plaintiffs | Commercial Fraud and Copyright Infringement | copyright infringement, fraud, internet, medical & health | Evidence research and gathering via the Internet. Potential comparison of multiple medical software systems and languages, including health care billings and patient record keeping. | Closed #25 | 
       |  | Florida | Plaintiffs | Airline Flight System Analysis, Air Accident | database | Analysis of underlying database contents and organization, plus related avionics control computer hardware and software. Was deposed. | Closed #40 | 
       |  | Massachusetts | Plaintiffs | Trade Secrets Misappropriation | trade secret misappropriation | Analysis and comparisons of financial modeling software and systems. | Closed #32 | 
       |  | Alabama | Defense | Military Court Martial | internet, pornography | Testified at trial on a variety of topics related to E-mail, the Internet, child and other pornography on the web, photo retouching software. | Closed #66 | 
       |  | Nevada | Plaintiffs | Breach of Contract, Fraud, Rejection under UCC | breach of contract, fraud | Failure Analysis of Rejected Telecommunications Software and Hardware System; Discovery Guidance. | Closed #67 | 
       |  | Arizona | Plaintiffs | Copyright Infringement Suit | copyright infringement, medical & health | Detailed comparisons of two systems of health care medical billings source code modules, one in Oracle and another in a version of BASIC, to help to determine copyright infringement. | Closed #68 | 
       |  | California | Plaintiffs | Copyright Infringement Suit | copyright infringement, medical & health | Detailed comparisons of hundreds of medical system source code modules, in two dialects of BASIC, to help to determine copyright infringement in programs providing medical record-keeping, 3rd party billing, and nursing home management software services. | Closed #69 | 
       |  | New Jersey | Defense | Copyright Infringement Suit | copyright infringement | As the court-appointed expert, accepted mutually by both Plaintiff and Defense, I analyzed source code from both sides, in two dialects of dBASE, and delivered my detailed opinions directly to the Court. | Closed #70 | 
       |  | California | Plaintiffs | Copyright Infringement Suit (in Federal court) and Breach of Contract Suit (in State court) | breach of contract, copyright infringement | Analyzed/compared BASIC source code for two financial systems to determine possible existence and extent of copying. Was deposed. | Closed #71 | 
       |  | Utah | Plaintiffs | Antitrust Suit | breach of contract | Advice and information about specific company hardware and operating systems. | Closed #72 | 
       |  | California | Defense | Application for Temporary Restraining Order | breach of contract | Analyzed dBASE source code in an Accounting System to assess quality of code in support of the Application. | Closed #73 | 
       |  | Utah | Plaintiffs | Breach of Warranty Suit | copyright infringement, medical & health | Reviewed PASCAL source code for a pharmaceutical system to analyze system quality and reliability. Was deposed. | Closed #74 |