This highly-qualified expert has extensive experience as a computer engineer in the areas of cybersecurity, network forensics, and encryption. He earned both his BS in information technology and MS in management of secure information systems from George Mason University. He holds several certifications, including information systems security professional, EC-Council ethical hacker, Microsoft enterprise support technician, and SonicWall network security essentials ...
This qualified expert has extensive experience in his field, holding 15 computer technology-related certifications. He earned his BS in computer systems networking & telecommunications from Florida State College and is currently in pursuit of his MS in digital forensics at the University of Central Florida. He is active in his field as a member of the High Technology Crime Investigation Association. He has formerly served as a desktop support engineer for Sea Star Line, ...
This well credentialed expert is a Professor and Distinguished Chair in Computer Science for a public university in Texas. He is also Professor Emeritus in the Department of Electrical and Computer Engineering at Cornell University, where he taught and performed research for 20 years. He has about 30 years of professional experience in communication networks, wireless communication, and wireless and mobile networks. The expert earned his Ph.D. in Electrical and Computer ...
One of the largest program underwriters of logistics insurance nationally and a pioneer of state-of the art coverages. Main logistics specialization is truck brokers....
This expert is a routing/switch professional and is CTO of a worldwide Cloud Computing company competing with Amazon, Rackspace & others. He is a co-founder, Executive Vice President, and Chief Technology Officer of an award winning Cloud Provider known for excellence in hosting servers, storage and virtual desktops which won Network World Magazine's desktop-as-a-service shootout, the UP Cloud Computing Conference for Best VDI Solution, and Microsoft SMB Cloud Partner of ...
This highly qualified nurse has extensive experience in her field. Her areas of expertise include long term care, skilled, medical-surgical, and telemetry nursing. She received her AS in nursing from Meridian Community College, her BS in nursing from the University of Alabama, and her MS in nursing from Loyola University. Formerly, she has served as an occupational health RN at Nursing Corp Inc., an RN supervisor at the Bedford Care Center of Marion, and as a medical ...
This highly qualified telecommunications expert has over 20 years of professional experience. In particular, he has experience in wireless and wired systems, cybersecurity, behavioral analytics, and security systems. He completed his BS from Ohio University and his MA from the University of Manitoba. He is a certified marine radio operator and general radiotelephone operator and instructor by the Federal Communications Commission. This expert is a member of various ...
This highly qualified expert has over 10 years of professional experience in forestry and environmental planning. He earned his BS in forestry from the University of Wisconsin and his MA in urban planning and policy at the University of Illinois at Chicago. This expert is a certified consulting arborist under the American Society of Consulting Arborists and is a board certified master arborist by the International Society of Arboriculture. He is a member of various ...
This highly qualified anesthesiology expert earned his BS in natural sciences from The University of Akron and his MD from Northeast Ohio Medical University. He also obtained his MBA in healthcare management from the American InterContinental University. This expert completed his internship in internal medicine at The Christ Hospital Health Network, his residency in anesthesiology at The Ohio State University and his fellowship in cardiothoracic anesthesiology at ...
This certified cyber security expert has over 25 years' experience in the global digital technology industry having spent the early years of her career as a software developer before working as a management consultant. She earned her post graduate diploma in e-commerce, economics, and technology at the University of London and a graduate diploma in law at University of Westminster. She has been a registered Information security auditor with International Register of ...
Court: United States District Court for the Southern District of New York Jurisdiction: Federal Case Name: National Communs. Ass’n v. AT&T Citation: 1998 U.S. Dist. LEXIS 3198 The plaintiff’s telecommunications expert witness is retained to present damages calculations. The defendant…
Court: United States District Court for the Southern District of Florida Jurisdiction: Federal Case Name: Eldridge v. Pet Supermarket, Inc. Citation: 2020 U.S. Dist. LEXIS 39100 Facts The plaintiff alleged that the defendant used an automatic telephone dialing system (ATDS)…
Court: United States District Court for the Eastern District of New York Jurisdiction: Federal Case Name: Jensen v. Cablevision Sys. Corp. Citation: 372 F. Supp. 3d 95 In this case, the plaintiff purchased a WiFi connection and suffered financial and…
This case involves allegations of patent infringement against a major company that developed and marketed virtual reality headsets. An expert in the design and engineering of virtual reality headsets was sought to review the patents in question and consult on any…
This case involves a telecommunications dispute surrounding the mechanics of private lines and long distance calls. An expert on telecommunications was sought to provide a historical perspective on the development of these technologies over the past 20 years and explain how…
This case involves an ongoing dispute between an employee and her direct supervisor. The employee had been her supervisor’s subordinate for 6 years and the two had developed a contentious working relationship. The supervisor secretly requested that an entry-level IT worker begin…
This case involves a television production company that entered into a contract with a broadcasting company. The broadcasting company sold the production company access to a channel and advertisers engaged the channel. Over time, the channel lost viewers because of…
This case involves a graduate student at a prominent school who had access to his school’s computers through a student computer account. The student created a computer spyware program called an “Internet worm” that could exploit the security defects on computer networks. The…
This case involves a woman who had degrees in communications, business and psychology. The woman founded a banking education company that provided services on-line and in person to the banking industry. The woman had published many articles in banking industry…