User:Toddlute/sandbox

From Wikipedia, the free encyclopedia

Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert.

Past methods of software forensics[edit]

Past methods of code comparison included hashing [1], statistical analysis [2], text matching [3], and tokenization [4]. These methods compared software code and produced a single measure indicating whether copying had occurred. However, these measures were not accurate enough to be admissible in court because the results were not accurate, the algorithms could be easily fooled by simple substitutions in the code, and the methods did not take into account that fact that code could be similar for reasons other than copying.

Robert Zeidman[edit]

In 2003, Robert Zeidman developed algorithms, which he incorporated in the CodeSuite tool, for multidimensional software correlation that divides software code into basic elements and determines which elements are similar, or “correlated.” He also created a procedure for filtering and interpreting the correlations to eliminate reasons for correlation that are not due to copying: common algorithms, third-party code, common identifier names, common author, and automatic code generation. The combination of these algorithms and procedures resulted in a more reliable and quantitative analysis than was available previously. Zeidman’s book, "The Software IP Detective's Handbook," is considered the standard textbook for software forensics[1][2] and the CodeSuite tools and methodology has been used in many software IP litigations including ConnectU v. Facebook, Symantec v. IRS [5], and SCO Group, Inc. v. International Business Machines Corp.

Copyright infringement[edit]

Following the use of software tools to compare code to determine the amount of correlation, an expert can use an iterative filtering process to determine that the correlated code is due to third-party code, code generation tools, commonly used names, common algorithms, common programmers, or copying. If the correlation is due to copying, and the copier did not have the authority from the rights holder, then copyright infringement occurred.

Trade secret protection and infringement[edit]

Software can contain trade secrets, which provide a competitive advantage to a business. To determine trade secret theft, the same tools and processes can be used to detect copyright infringement. If code was copied without authority, and that code has the characteristics of a trade secret—it is not generally known, the business keeps it secret, and its secrecy maintains its value to the business—then the copied code constitutes trade secret theft.

Trade secret theft can also involve the taking of code functionality without literally copying the code. Comparing code functionality is a very difficult problem that has yet to be accomplished by any algorithm in reasonable time. For this reason, finding the theft of code functionality is still mostly a manual process.

Patent infringement[edit]

As with trade secret functionality, it is not currently possible to scientifically detect software patent infringement, as software patents cover general implementation rather than specific source code. For example, a program that implements a patented invention can be written in many available programming languages, using different function names and variable names and performing operations in different sequences. There are so many combinations of ways to implement inventions in software that even the most powerful modern computers cannot consider all combinations of code that might infringe a patent. This work is still left to human experts using their knowledge and experience, but it is a problem that many in software forensics are trying to automate by finding an algorithm or simplifying process.

Objective facts before subjective evidence[edit]

One important rule of any forensic analysis is that the objective facts must be considered first. Reviewing comments in the code or searching the Internet to find information about the companies that distribute the code and the programmers who wrote the code are useful only after the objective facts regarding correlation have been considered. Once an analysis has been performed using forensic tools and procedures, analysts can then begin looking at subjective evidence like comments in the code. If the information in that subjective evidence conflicts with the objective analysis, analysts need to doubt the subjective evidence. Fake copyright notices, open source notifications, or programmer names that were added to source code after copying took place, in order to disguise the copying, are not uncommon in real-world cases of code theft.

Robert Zeidman
Born (1960-01-18) January 18, 1960 (age 64)
NationalityUnited States
Alma materStanford University
Cornell University
Known forApplication-specific integrated circuit (ASIC) design, Field-programmable gate array (FPGA) design, Embedded systems, Software synthesis, Software analysis, Software forensics
AwardsIEEE Outstanding Engineer Awards (2010, 2015)
Scientific career
FieldsElectrical engineering, Computer science, and Software forensics

Robert “Bob” Zeidman (born January 18, 1960) is an American electrical engineer, educator and inventor who has made contributions in Application Specific Integrated Circuit (ASIC) design, Field Programmable Gate Array (FPGA) design, embedded systems development, software synthesis, software analysis and software forensics. Best known as the inventor of software forensics,[3][4] Zeidman’s pioneering research and development of software-forensics tools was instrumental in making detection of software source-code correlation practical and accurate, and in turning previously subjective information into empirical evidence. He has personally consulted on more than 160 court cases involving billions of dollars in disputed intellectual property, the software forensics tools he developed have been used in litigation worldwide, and his book, "The Software IP Detective's Handbook," is considered the standard textbook for software forensics.[5][6]

Zeidman is also well known for his work developing embedded systems. Since 1987, Zeidman has designed ASICs, FPGAs, and PC boards for RISC-based parallel processor systems, vector supercomputers, laser printers, hardware emulators, network switches and routers, and various real-time systems. His clients have included Apple Computer, Cadence Design Systems, Cisco Systems, Intel, Mentor Graphics, Ricoh Systems, and Texas Instruments.[7]

Zeidman received a master's degree in electrical engineering from Stanford University, and bachelor's degrees in electrical engineering and physics from Cornell University. He holds 22 granted patents and four pending patents.[8][9]

Zeidman founded many companies, seven of which are still operating under his leadership: Z Enterprises (novelty items from Silicon Valley; May 1986 – present);[10] Zeidman Consulting (hardware and software design services; October 1987 – present);[11] eVault Remote Backup Service (January 1992 – April 1999); The Chalkboard Network (online business and engineering courses; January 1999 – December 2002); Zeidman Technologies (software tools for embedded software development; December 2002 – present);[12] Software Analysis and Forensic Engineering Corporation (software tools for intellectual property litigation; September 2007 – present);[13] SamAnna Designs (fashion accessories; January 2011 – present);[14] Swiss Creek Publications (independent publisher; June 2012 – present);[15] Firtiva (online videos and films; December 2013 – present).[16]

Zeidman has written many technical papers on hardware and software design methods, and has taught courses on Verilog, ASIC, and FPGA design at engineering conferences throughout the world. He is the author of five engineering books: “Verilog Designer's Library,”[17] “Introduction to Verilog,”[18] “Designing with FPGAs and CPLDs,”[19] “The Software IP Detective's Handbook,”[20] and “Just Enough Electronics to Impress Your Friends and Colleagues.”[21] He is the co-author of two engineering books: “Circuit Design: Know it All (Newnes Know it All)”[22] and “FPGAs: World Class Designs.”[23] He is also the author of three novels: “The Amazing Adventure of Edward and Dr. Sprechtmachen”,[24] “Horror Flick,”[25] and “Good Intentions.”[26]

Zeidman is a senior member of the IEEE and was the recipient of the 1994 Wyle/EE Times American by Design Award, the 2003 Jolt Reader's Choice Award, the 2010 and the 2015 Outstanding Engineer Award from the IEEE Santa Clara Valley Section[27] and from the Region 6 Central Area[28] for his pioneering contributions to the field of software forensics. Zeidman has also won awards for writing and for the production and direction of short films.[29]

Biography[edit]

Zeidman was born and raised in Philadelphia, Pennsylvania. He earned bachelor’s degrees in electrical engineering and physics from Cornell University in 1981 and a master’s degree in electrical engineering from Stanford University in 1982. From 1983 to 1988 Zeidman held engineering positions designing computer chips at four companies: Signetics (April 1983 – December 1984), ROLM Corporation (January – August 1985), American Supercomputers (September – December 1985), and Telestream (January 1986 – March 1988).[30] In May 1986 Zeidman founded the company Z Enterprises, which produces novelty items from Silicon Valley such as posters, mugs, napkins and t-shirts. The company still operates today under Zeidman’s ownership.[31]

In October 1987 Zeidman founded the company Zeidman Consulting, which provides hardware and software design services, engineering support and expert witnesses for high-tech litigation. The company still operates today with Zeidman as president.[32] Zeidman’s work at Zeidman Consulting includes creating patented Molasses® virtualization software that enables a slow speed hardware emulator or prototype to be attached to a high-speed network in order to emulate network hardware in a live system. Zeidman also consulted on more than 160 court cases involving billions of dollars in disputed intellectual property, such as Brocade v. A10 Networks, for which he testified at trial, ConnectU v. Facebook (made famous in the Academy Award-winning movie, “The Social Network”), and Texas Instruments v. Samsung Electronics, which resulted in an award to his client of over $1 billion.[33] At Zeidman Consulting, Zeidman also developed the software tools, SynthOS® [34] and CodeSuite®,[35] which became the flagship products for his two software companies, Zeidman Technologies (SynthOS) and Software Analysis and Forensic Engineering Corporation (CodeSuite).

In 1991 Zeidman wrote his first novel, “The Amazing Adventure of Edward and Dr. Sprechtmachen.”[36]

In January 1992 Zeidman invented remote backup and founded the company eVault Remote Backup Service. The company closed in April 1999 and the intellectual property became part of EVault, which was sold to Seagate Technology in 2007.

In 1992 Zeidman wrote his second novel, “Horror Flick.”[37]

In January 1999 Zeidman founded the company The Chalkboard Network, which ran until December, 2002. The company featured business and engineering courses from world-leading experts, hosted on the Internet and employing Depth Control®, an instructional design methodology for Web-based training that Zeidman developed.

Also in 1999 Zeidman wrote and published his first engineering text book, “Verilog Designer’s Library.”[38]

In 2000 Zeidman wrote and published his second engineering text book, “Introduction to Verilog.”[39]

In December 2002 Zeidman founded the company Zeidman Technologies, which provides software tools for embedded software development. The company’s patented flagship product is SynthOS® software that automatically synthesizes optimized source code for a custom real time operating system. The company still operates with Zeidman as president.[40]

Also in 2002 Zeidman wrote and published his third engineering text book, “Designing with FPGAs and CPLDs.”[41]

In September 2007 Zeidman founded the company Software Analysis and Forensic Engineering Corporation, which provides software tools for intellectual property litigation. The company’s main product is CodeSuite®, which includes the patented BitMatch®, CodeCross®, CodeDiff®, CodeMatch®, and SourceDetective® functions for accelerating the process of detecting copying of software code. The company still operates with Zeidman as president.[42]

In 2008 Zeidman co-authored his fourth engineering text book, “Circuit Design: Know it All (Newnes Know it All).”[43]

In 2009 Zeidman co-authored his fifth engineering text book “FPGAs: World Class Designs.”[44]

In January 2011 Zeidman founded the company SamAnna Designs, which makes practical accessories that are also comfortable. Its first product is the SamAnna Luxury Wallet. The company still operates with Zeidman as owner.[45]

Also in 2011 Zeidman wrote and published his sixth engineering text book, “The Software IP Detective’s Handbook.”[46]

In June 2012 Zeidman founded the company Swiss Creek Publications, an independent publisher, which published four of Zeidman’s books: Introduction to Verilog,” “Just Enough Electronics to Impress Your Friends and Colleagues,” “The Amazing Adventure of Edward and Dr. Sprechtmachen,” “Horror Flick,” and “Good Intentions.” The company still operates with Zeidman as owner.[47]

Also in 2012 Zeidman wrote and published his third novel, “Good Intentions.”[48]

In December 2013 Zeidman founded the company Firtiva, a video-on-demand website built on a patented technology to provide commercial-free content while sending second screen advertisements to a highly targeted audience. The company still operates with Zeidman as president.[49]

Also in 2013 Zeidman wrote and published his seventh engineering text book, “Just Enough Electronics to Impress Your Friends and Colleagues.”[50]

In 2015 Zeidman created and awarded the first annual Zeidman Award, a program established to recognize middle school students in the fields of electrical engineering or computer science who demonstrate an advanced knowledge of electronics or computer programming to solve challenges in a unique and efficient manner.[51]

Awards[edit]

Zeidman has received the following awards:

  • 1994 Wyle/EE Times American by Design Award[52]
  • 2003 Jolt Reader's Choice Award[53]
  • 2010 Outstanding Engineer Award from the IEEE Santa Clara Valley Section[54]
  • 2015 Outstanding Engineer Award from the IEEE Santa Clara Valley Section and from the Region 6 Central Area for his pioneering contributions to the field of software forensics.[55]
  • Zeidman has also won awards for writing and for the production and direction of short films.[56]

Books[edit]

Zeidman is the author of five engineering books:

  • “Introduction to Verilog” (1999)[57]
  • “Verilog Designer's Library” (2000)[58]
  • “Designing with FPGAs and CPLDs” (2002)[59]
  • “The Software IP Detective's Handbook” (2011)[60]
  • “Just Enough Electronics to Impress Your Friends and Colleagues” (2013)[61]

Zeidman is the co-author of two engineering books:

  • “Circuit Design: Know it All (Newnes Know it All)” (2008)[62]
  • “FPGAs: World Class Designs” (2009)[63]

Zeidman is also the author of three novels:

  • “The Amazing Adventure of Edward and Dr. Sprechtmachen” (1991)[64]
  • “Horror Flick” (1992)[65]
  • “Good Intentions” (2012)[66]

Selected articles[edit]

  • "Software Forensics: Objectively Proving Infringement or Misappropriation” IPWatchdog, October 27, 2014.[67]
  • “Software Forensics: Qualifying Tools and Experts Who Use Them” IPWatchdog, October 31, 2014.[68]
  • “Misunderstanding Plagues the Patent System” Electronic Design, July 23, 2014.[69]
  • “Sloppy, Misleading Yale Paper Challenges University Patenting” IPWatchdog, July 15, 2014.[70]
  • “ASOS: A new software development paradigm for the Internet of Things – Part 1: Basic building blocks” Embedded.com, June 30, 2014.[71]
  • "ASOS: A new RTOS paradigm for the Internet of Things – Part 2: Building a project file"Embedded.com, June 29, 2014.[72]
  • “A Code Correlation Comparison of the DOS and CP/M Operating Systems” Journal of Software Engineering and Applications, May 27, 2014.[73]
  • “The bogeymen destroying the patent system” San Jose Mercury News, April 17, 2014.[74]
  • “Fortune Magazine’s Unusual Position on Non-Practicing Entities” IPWatchdog, April 10, 2014.[75]
  • “Did Bill Gates Steal the Heart of DOS?” IEEE Spectrum, July 31, 2012.[76]

Patents[edit]

Zeidman is a named inventor on following patents and patent applications:

  • Zeidman, Robert M., "Visual tool for developing real time task management code," U.S. Patent 6,934,947.[77]
  • Zeidman, Robert M., "Method for connecting a hardware emulator to a network," U.S. Patent 7,050,962.[78]
  • Zeidman, Robert M., Hafeman, Daniel R., Barr, Michael, “Method and apparatus for synthesizing a hardware system from a software description,” U.S. Patent 7,210,116.[79]
  • Zeidman, Robert Marc, "Apparatus and method for connecting hardware to a circuit simulation," U.S. Patent 7,266,490, RE 42,227.[80]
  • Zeidman, Robert M., "Software tool for detecting plagiarism in computer source code," U.S. Patent 7,503,035.[81]
  • Zeidman, Robert M., Hafeman, Daniel R., Barr, Michael, “Method and apparatus for synthesizing a hardware system from a software description,” U.S. Patent 7,620,928.[82]
  • Zeidman, Robert M., Hafeman, Daniel R., “Method and apparatus for emulating a hardware/software system using a computer,” U.S. Patent 7,647,583.[83]
  • Zeidman, Robert Marc, “Detecting plagiarism in computer source code,” U.S. Patent 7,823,127.[84]
  • Zeidman, Robert Marc, "Apparatus and method for connecting hardware to a circuit simulation," U.S. Patent 7,835,897.[85]
  • Zeidman, Robert M., "Software tool for synthesizing a real-time operating system," U.S. Patent 7,882,488.[86]
  • Zeidman, Robert M. and Snider, Gregory, “Using readily available driver and application source code with a synthesized operating system,” U.S. Patent 7,900,187.[87]
  • Zeidman, Robert M., Hafeman, Daniel R., Barr, Michael, “Method and apparatus for synthesizing a hardware system from a software description,” U.S. Patent 7,945,879.[88]
  • Zeidman, Robert M., "System and method for connecting a logic circuit simulation to a network," U.S. Patent 8,160,863.[89]
  • Zeidman, Robert M. “Use of hardware peripheral devices with software simulations,” U.S. Patent 8,195,442.[90]
  • Zeidman, Robert, “Detecting copied computer source code by examining computer object code,” U.S. Patent 8,255,885.[91]
  • Zeidman, Robert M., “Software tool for detecting plagiarism in computer source code,” U.S. Patent 8,261,237.[92]
  • Zeidman, Robert M., "Method for advertisers to sponsor broadcasts without commercials," U.S. Patent 8,316,390.[93]
  • Zeidman, Robert M., “Conveying Data From A Hardware Device To A Circuit Simulation,” U.S. Patent 8,380,481.[94]
  • Zeidman, Robert Marc, “Software for filtering the results of a software source code comparison,” U.S. Patent 8,495,586.[95]
  • Zeidman, Robert Marc, “Detecting plagiarism in computer source code,” U.S. Patent 9,003,366.[96]
  • Zeidman, Robert Marc, and Hoehn, Timothy Douglas, “Searching the Internet for common elements in a document in order to detect plagiarism,” U.S. Patent 9,043,375.[97]
  • Mylroie, Steve and Zeidman, Robert Marc, “Detecting plagiarism in computer markup language files,” US Patent 9,053,296.[98]
  • Zeidman, Robert M., "Method for advertisers to sponsor broadcasts without commercials," USPTO application number 13/632,574 (pending).
  • Zeidman, Robert M., "Conveying Data From A Hardware Device To A Circuit Simulation," USPTO application number 13/766,960 (pending).
  • Zeidman, Robert, "A Portable Compartment For Storing An Umbrella," USPTO application number 14/253,873 (pending).
  • Zeidman, Robert, "Secure Offline Playing Of Media Files," USPTO application number 14/634,728 (pending).

Speaking engagements[edit]

Zeidman has delivered seminars and courses on the following topics:

  • Analysis of Software Copyright Infringement Cases
  • ASIC Design
  • CPLD Design
  • Detecting Software IP Theft
  • Electrical Engineering for non-EEs
  • Finding and Utilizing Technical Consultants for IP Litigation
  • FPGA Design
  • FPGAs vs. ASICs for Networking
  • The History of Digital Hardware Design
  • How to Start a Consulting Business
  • Investigating Technology Theft
  • Measuring Software Changes with the CLOC Method
  • Memory Architectures
  • Patents
  • Programmable Systems on a Chip (SOCs)
  • Real-Time Operating Systems for SOCs
  • Software Intellectual Property
  • Software Synthesis
  • Starting a Consulting Business
  • Technical Consultants for IP Litigation
  • Testing Memory
  • Universal Design Methodology
  • Verilog and HDLs

Zeidman has delivered seminars and courses at the following places:

  • Cogswell College
  • Cornell Entrepreneur Network
  • DesignCon
  • Eastcon
  • Embedded Systems Conference Boston
  • Embedded Systems Conference Chicago
  • Embedded Systems Conference Europe
  • Embedded Systems Conference India
  • Embedded Systems Conference Silicon Valley
  • Gigabit Ethernet Conference
  • High-Level Electronic System Design Conference
  • High Technology Crime Investigation Association
  • Institute of Electrical and Electronics Engineers
  • Microsoft Store, Stanford Shopping Center
  • NALSAR University of Law
  • Network Processors Conference West
  • Northcon
  • Palo Alto Area Bar Association
  • PCB Design East
  • PCB Design West
  • San Jose State University
  • San Francisco State University
  • Semizone.com
  • Southcon
  • Stanford University
  • Westcon
  • World Intellectual Property Technical Forum

References[edit]

  1. ^ Maxfield, Max (June 24, 2015). "IEEE Recognizes Outstanding Engineer". EE Times. Retrieved November 25, 2015.
  2. ^ Barbara, John J. (October 18, 2011). "Book Review: The Software IP Detective's Handbook". Forensic Magazine. Retrieved November 16, 2015.
  3. ^ Maxfield, Max (June 24, 2015). "IEEE Recognizes Outstanding Engineer". EE Times. Retrieved November 25, 2015.
  4. ^ "Bob Zeidman Named Outstanding Engineer in the Region 6 Central Area". Reuters. September 29, 2015. Retrieved November 15, 2015.
  5. ^ Maxfield, Max (June 24, 2015). "IEEE Recognizes Outstanding Engineer". EE Times. Retrieved November 25, 2015.
  6. ^ Barbara, John J. (October 18, 2011). "Book Review: The Software IP Detective's Handbook". Forensic Magazine. Retrieved November 16, 2015.
  7. ^ "About the Company". Zeidman Consulting. Retrieved November 16, 2015.
  8. ^ "USPTO Patent Full-Text and Image Database". United States Patent and Trademark Office. Retrieved November 16, 2015.
  9. ^ "Patent Application Full Text and Image Database". United States Patent and Trademark Office. Retrieved November 16, 2015.
  10. ^ "Z Enterprises Homepage". Z Enterprises. Retrieved November 16, 2015.
  11. ^ "Zeidman Consulting Homepage". Zeidman Consulting. Retrieved November 16, 2015.
  12. ^ "Zeidman Technologies Homepage". Zeidman Technologies. Retrieved November 16, 2015.
  13. ^ "Software Analysis and Forensic Engineering Corporation Homepage". Software Analysis and Forensic Engineering Corporation. Retrieved November 16, 2015.
  14. ^ "SamAnna Designs Homepage". SamAnna Designs. Retrieved November 16, 2015.
  15. ^ "Swiss Creek Publications Homepage". Swiss Creek Publications. Retrieved November 16, 2015.
  16. ^ "Firtiva Homepage". Firtiva. Retrieved November 16, 2015.
  17. ^ Zeidman, Bob (1999). Verilog Designer's Library (1st ed.). Retrieved November 16, 2015.
  18. ^ Zeidman, Bob (2000). Introduction to Verilog (1st ed.). Retrieved November 16, 2015.
  19. ^ Zeidman, Bob (2000). Designing with FPGAs and CPLDs (1st ed.). Retrieved November 16, 2015.
  20. ^ Zeidman, Bob (2011). The Software IP Detective's Handbook (1st ed.). Retrieved November 16, 2015.
  21. ^ Zeidman, Bob (2013). Just Enough Electronics to Impress Your Friends and Colleagues (1st ed.). Retrieved November 16, 2015.
  22. ^ Zeidman, Bob (2008). Circuit Design: Know it All (Newnes Know it All) (1st ed.). Retrieved November 25, 2015.
  23. ^ Zeidman, Bob (2009). FPGAs: World Class Designs (1st ed.). Retrieved November 25, 2015.
  24. ^ Zeidman, Bob (1991). The Amazing Adventure of Edward and Dr. Sprechtmachen (1st ed.). Retrieved November 25, 2015.
  25. ^ Zeidman, Bob (1992). Horror Flick (1st ed.). Retrieved November 25, 2015.
  26. ^ Zeidman, Bob (2012). Good Intentions (1st ed.). Retrieved November 25, 2015.
  27. ^ Maxfield, Max (June 24, 2015). "IEEE Recognizes Outstanding Engineer". EE Times. Retrieved November 25, 2015.
  28. ^ "Bob Zeidman Named Outstanding Engineer in the Region 6 Central Area". Reuters. September 29, 2015. Retrieved November 15, 2015.
  29. ^ "Bob Zeidman". LinkedIn. Retrieved November 25, 2015.
  30. ^ "Bob Zeidman". LinkedIn. Retrieved November 25, 2015.
  31. ^ "Z Enterprises Homepage". Z Enterprises. Retrieved November 16, 2015.
  32. ^ "Zeidman Consulting About the Company". Zeidman Consulting. Retrieved November 30, 2015.
  33. ^ "Bob Zeidman Resume" (PDF). Zeidman Consulting. Retrieved November 30, 2015.
  34. ^ "SynthOS". Zeidman Technologies. Retrieved November 30, 2015.
  35. ^ "CodeSuite". Software Analysis & Forensic Engineering Corporation. Retrieved November 30, 2015.
  36. ^ Zeidman, Bob (1991). The Amazing Adventure of Edward and Dr. Sprechtmachen (1st ed.). Retrieved November 25, 2015.
  37. ^ Zeidman, Bob (1992). Horror Flick (1st ed.). Retrieved November 25, 2015.
  38. ^ Zeidman, Bob (1999). Verilog Designer's Library (1st ed.). Retrieved November 16, 2015.
  39. ^ Zeidman, Bob (2000). Introduction to Verilog (1st ed.). Retrieved November 16, 2015.
  40. ^ "Zeidman Technologies Homepage". Zeidman Technologies. Retrieved November 16, 2015.
  41. ^ Zeidman, Bob (2000). Designing with FPGAs and CPLDs (1st ed.). Retrieved November 16, 2015.
  42. ^ "Software Analysis and Forensic Engineering Corporation Homepage". Software Analysis and Forensic Engineering Corporation. Retrieved November 16, 2015.
  43. ^ Zeidman, Bob (2008). Circuit Design: Know it All (Newnes Know it All) (1st ed.). Retrieved November 25, 2015.
  44. ^ Zeidman, Bob (2009). FPGAs: World Class Designs (1st ed.). Retrieved November 25, 2015.
  45. ^ "SamAnna Designs Homepage". SamAnna Designs. Retrieved November 16, 2015.
  46. ^ Zeidman, Bob (2011). The Software IP Detective's Handbook (1st ed.). Retrieved November 16, 2015.
  47. ^ "Swiss Creek Publications Homepage". Swiss Creek Publications. Retrieved November 16, 2015.
  48. ^ Zeidman, Bob (2012). Good Intentions (1st ed.). Retrieved November 25, 2015.
  49. ^ "Firtiva Homepage". Firtiva. Retrieved November 16, 2015.
  50. ^ Zeidman, Bob (2013). Just Enough Electronics to Impress Your Friends and Colleagues (1st ed.). Retrieved November 16, 2015.
  51. ^ "Winners Announced in Inaugural Zeidman Awards" (Press release). Cupertino, California: Zeidman Consulting. May 27, 2015. Retrieved November 30, 2015.
  52. ^ "Bob Zeidman Resume" (PDF). Zeidman Consulting. Retrieved November 30, 2015.
  53. ^ "Bob Zeidman Resume" (PDF). Zeidman Consulting. Retrieved November 30, 2015.
  54. ^ Maxfield, Max (June 24, 2015). "IEEE Recognizes Outstanding Engineer". EE Times. Retrieved November 25, 2015.
  55. ^ "Bob Zeidman Named Outstanding Engineer in the Region 6 Central Area". Reuters. September 29, 2015. Retrieved November 15, 2015.
  56. ^ "Bob Zeidman Resume" (PDF). Zeidman Consulting. Retrieved November 30, 2015.
  57. ^ Zeidman, Bob (2000). Introduction to Verilog (1st ed.). Retrieved November 16, 2015.
  58. ^ Zeidman, Bob (1999). Verilog Designer's Library (1st ed.). Retrieved November 16, 2015.
  59. ^ Zeidman, Bob (2000). Designing with FPGAs and CPLDs (1st ed.). Retrieved November 16, 2015.
  60. ^ Zeidman, Bob (2011). The Software IP Detective's Handbook (1st ed.). Retrieved November 16, 2015.
  61. ^ Zeidman, Bob (2013). Just Enough Electronics to Impress Your Friends and Colleagues (1st ed.). Retrieved November 16, 2015.
  62. ^ Zeidman, Bob (2008). Circuit Design: Know it All (Newnes Know it All) (1st ed.). Retrieved November 25, 2015.
  63. ^ Zeidman, Bob (2009). FPGAs: World Class Designs (1st ed.). Retrieved November 25, 2015.
  64. ^ Zeidman, Bob (1991). The Amazing Adventure of Edward and Dr. Sprechtmachen (1st ed.). Retrieved November 25, 2015.
  65. ^ Zeidman, Bob (1992). Horror Flick (1st ed.). Retrieved November 25, 2015.
  66. ^ Zeidman, Bob (2012). Good Intentions (1st ed.). Retrieved November 25, 2015.
  67. ^ Zeidman, Bob (October 27, 2014). "Software Forensics: Objectively Proving Infringement or Misappropriation". IP Watchdog. Retrieved November 25, 2015.
  68. ^ Zeidman, Bob (October 31, 2014). "Software Forensics: Qualifying Tools and Experts Who Use Them". IP Watchdog. Retrieved November 25, 2015.
  69. ^ Zeidman, Bob (July 23, 2014). "Misunderstanding Plagues the Patent System". Electronic Design. Retrieved November 25, 2015.
  70. ^ Zeidman, Bob (July 15, 2014). "Sloppy, Misleading Yale Paper Challenges University Patenting". IP Watchdog. Retrieved November 25, 2015.
  71. ^ Zeidman, Bob (June 30, 2014). "ASOS: A new software development paradigm for the Internet of Things – Part 1: Basic building blocks". Embedded.com. Retrieved November 25, 2015.
  72. ^ Zeidman, Bob (June 29, 2014). "ASOS: A new RTOS paradigm for the Internet of Things – Part 2: Building a project file". Embedded.com. Retrieved November 25, 2015.
  73. ^ Zeidman, Bob (May 27, 2014). [www.scirp.org/journal/PaperInformation.aspx?PaperID=46362[%5b%5bPredatory publishing|predatory publisher%5d%5d]#.U4WDefldWCU "A Code Correlation Comparison of the DOS and CP/M Operating Systems"]. Journal of Software Engineering and Applications. Retrieved November 25, 2015. {{cite web}}: Check |url= value (help)
  74. ^ Zeidman, Bob (April 17, 2014). "The bogeymen destroying the patent system". San Jose Mercury News. Retrieved November 25, 2015.
  75. ^ Zeidman, Bob (April 10, 2014). "Fortune Magazine's Unusual Position on Non-Practicing Entities". IP Watchdog. Retrieved November 25, 2015.
  76. ^ Zeidman, Bob (July 31, 2012). "Did Bill Gates Steal the Heart of DOS?". IEEE Spectrum. Retrieved November 25, 2015.
  77. ^ Visual tool for developing real time task management code {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor-first= ignored (help); Unknown parameter |inventor-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  78. ^ Method for connecting a hardware emulator to a network {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor-first= ignored (help); Unknown parameter |inventor-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  79. ^ Method and apparatus for synthesizing a hardware system from a software description {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |inventor3-first= ignored (help); Unknown parameter |inventor3-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  80. ^ Apparatus and method for connecting hardware to a circuit simulation {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor-first= ignored (help); Unknown parameter |inventor-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  81. ^ Software tool for detecting plagiarism in computer source code {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor-first= ignored (help); Unknown parameter |inventor-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  82. ^ Method and apparatus for synthesizing a hardware system from a software description {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |inventor3-first= ignored (help); Unknown parameter |inventor3-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  83. ^ Method and apparatus for emulating a hardware/software system using a computer {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  84. ^ Detecting plagiarism in computer source code {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  85. ^ Apparatus and method for connecting hardware to a circuit simulation {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  86. ^ Software tool for synthesizing a real-time operating system {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  87. ^ Using readily available driver and application source code with a synthesized operating system {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  88. ^ Method and apparatus for synthesizing a hardware system from a software description {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  89. ^ System and method for connecting a logic circuit simulation to a network {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  90. ^ Use of hardware peripheral devices with software simulations {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  91. ^ Detecting copied computer source code by examining computer object code {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  92. ^ Software tool for detecting plagiarism in computer source code {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  93. ^ Method for advertisers to sponsor broadcasts without commercials {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  94. ^ Conveying Data From A Hardware Device To A Circuit Simulation {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  95. ^ Software for filtering the results of a software source code comparison {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  96. ^ Detecting plagiarism in computer source code {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  97. ^ Searching the Internet for common elements in a document in order to detect plagiarism {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)
  98. ^ Detecting plagiarism in computer markup language files {{citation}}: Unknown parameter |country-code= ignored (help); Unknown parameter |inventor1-first= ignored (help); Unknown parameter |inventor1-last= ignored (help); Unknown parameter |inventor2-first= ignored (help); Unknown parameter |inventor2-last= ignored (help); Unknown parameter |issue-date= ignored (help); Unknown parameter |patent-number= ignored (help)

External links[edit]


Category:1960 births Category:Living people Category:Cornell University alumni Category:Stanford University alumni Category:American engineers