4Scott N. Schober - New Jersey Technology Council

New Jersey
Technology Council
www.njtc.org
November 2014
Vol. 18 Issue 8
$3.50
THE BUSINESS BEHIND THE TECHNOLOGY SECTORS OF NEW JERSEY
4
Scott N. Schober
President and CEO, Cyber Security & Wireless
Technology Expert, Berkeley Varitronics Systems, Inc.
The New Jersey Technology Council
and Education Foundation
1001 Briggs Road, Suite 280
Mt. Laurel, N.J. 08054
New Jersey
Technology Council
PAID
Non-profit Org.
U.S. Postage
2014
Data Summit
& Expo
December 9, 2014
JuiceTank, Somerset
SPONSORS
The Data Summit & Expo will bring together data center infrastructure and
operations managers, IT professionals and business continuity professionals
as well as senior business and technology leaders to discuss business
intelligence and analytics systems and solutions.
GOLD SPONSOR
CONFERENCE SPONSOR
AGENDA
1:00 pm Registration, Networking & Exhibits Open
1:30 pm Welcome & Opening Remarks
EVENT SPONSORS
1:35 pm Keynote Speaker
Impact of Big Data
2:15 pm Panel 1:
Data Center, Co-location, Hosted Solutions –
What’s Best for my Business?
EXHIBITORS
3:00 pm Break
3:15 pm Panel 2:
Using Predictive Analytics to Capitalize on Customer Insights
4:00 pm Panel 3:
Big Data’s impact on AdTech, EdTech, FinTech and Supply Chain
IT INDUSTRY NETWORK SPONSOR
TELECOMMUNICATIONS NETWORK SPONSOR
4:45 pm Networking Reception
Sponsorships and exhibiting opportunities available.
Contact Paul Frank for more information.
For more information visit: www.njtc.org
PRESIDENT’S MESSAGE
Three months in and I’m still learning how large
and important our tech community is in the state.
According to the Department of Labor (2013)
more than 354,000 people work in tech; and that
doesn’t include the thousands of entrepreneurs
and tens of thousands of workers who commute
to NY. Tech workers account for more than 11
percent of our state’s workers and an impressive
20 percent of all salaries and compensation.
Last month, I met with the Partnership for
Action, the state’s three-agency team, which
includes the Business Action Committee, the NJEDA, and ChooseNJ. During the
meeting, I explained that one of the Council’s primary goals is to nurture and
support the talent pipeline—from K-12 students to our experienced retirees.
During the meeting I talked about the tech-talent shortage in the country,
and our region, and referred to a recent Fortune article, “The Global Tech
Crunch.” The article notes the troubling talent deficit in our country and
identifies other nations that have talent surpluses. Many of those nations,
including India, Brazil, Colombia, Peru, Philippines, Egypt and Greece, also have
large and robust immigrant communities in New Jersey and the region.
The upshot is that while we work diligently to educate the next generation
of tech talent, we can also collectively nurture and support our talented
immigrant communities, which can help our state and region be more
competitive as we grow and move forward.
As I’ve mentioned, I believe that the Council’s future success will depend
on a collective effort across the state and region to not only educate futuregenerations, but champion innovation in every aspect of business. n
—James C. Barrood, President and CEO, NJTC
TechNews
November 2014 • VOL. 18 NO. 8
New Jersey Technology Council
& The Education Foundation
1001 Briggs Road, Suite 280
Mount Laurel, N.J. 08054
phone (856) 787-9700
fax (856) 787-9800
www.njtc.org
PUBLISHER
James Barrood • [email protected]
VP OF PUBLICATIONS
Leo M. Mennitt • [email protected]
CONTRIBUTING EDITOR
Jennifer Simoni • [email protected]
NJTC CONNECTIONS EDITOR
Judy Storck • [email protected]
GRAPHIC DESIGNER
Bonnie Jacobs • [email protected]
ADVERTISING
Ellen Stein • [email protected]
TechNews is published by the New Jersey Technology Council and The Education Foundation. We are located at 1001 Briggs Road,
Suite 280, Mt Laurel, N.J. 08054. ©2014 NJTC. All rights reserved. Reproduction or use, without permission, of editorial or graphic
contents in any manner is prohibited. To obtain permission, contact Leo Mennitt at [email protected] or 856-787-9700 x227.
contents
On the Cover
4 CORNER OFFICE
Scott N. Schober, President and CEO
of Berkeley Varitronics Systems
Scott Schober shares his expertise on cyber security and
wireless technology, talks about his company’s culture, and
discusses recent high-profile security breaches in the news.
By Jennifer Simoni
Plugged In
6 More Organizations are Outsourcing Data
Center Operations as Healthcare Industry
Leverages Technology Advances
By Sean Brady
7 The Path to a Successful Cloud Migration
By Jennifer Einhorn
9 Unclaimed Property Due Diligence
By Lauren Taguer, CPA
Feature
14 Three Business Imperatives for
Transforming Global Trade Operations
Multi-national companies that are placing more strategic
value on their global trade compliance programs can
achieve significant cost savings and improve the flow of
goods across international borders.
By Ty Bordner
Columns
11 U.S. Supreme Court on Software Patents:
“Show Us the Innovation!”
The latest ruling on software patents that came
down from the U.S. Supreme Court in July
generates more questions than answers.
By Richard A. Catalina, Jr., Esq.
16 From Here to There: Rowan Researchers
Get Travelers on the Road
Rowan University College of Engineering professors and
students are figuratively and literally taking their research
to the road, helping to make travelers’ journeys—and the
environments in which they are taken—safer.
NJTC Connections
18 NEW MEMBERS
20 PHOTO GALLERY
22CALENDAR OF PROGRAMS
TechNews is published eight times a year and is free to all NJTC members. Unqualified subscribers pay $29.99 per year, $39.99 for two
years. Reprints are available for a fee upon request.
For more information on the New Jersey Technology Council, see www.njtc.org.
To contact a staff member, see the staff box for email addresses. Submissions for New Jersey TechNews are welcome. All editorial copy
published is at the discretion of the editor. Send submissions to [email protected]. The views expressed in New Jersey TechNews do not
necessarily reflect those of the New Jersey Technology Council or New Jersey TechNews.
CONNECT@NJTC
NJTC TechWire www.njtc.org
Advertising information: Ellen Stein at 856-787-9700 x 228
NJTC on
Subscription information: www.njtc.org
NJTC Group on
@NJTC
NJTC
Postmaster: Send address changes to: NJTC, 1001 Briggs Road, Suite 280, Mt. Laurel, N.J. 08054.
TechNews | www.njtc.org | October 2014
3
CORNER
OFFICE
Berkeley Varitronics Systems, Inc. is a 40-year old
NJ-based company that designs and manufactures
wireless test and security products. What has the evolution of business been like for BVS?
We’ve had steady success surviving the ups and downs in the roller
coaster economy by being diversified and selling to many different
vertical industries. By re-investing our capital into R&D and into new
designs and products, we are always staying ahead of our competition
and first to market. Naturally since we are all connected, much of our
designs and expertise involve the latest wireless standards (i.e. cellular,
LTE, Bluetooth, Wi-Fi). The areas we focus our attention on are niche
markets so there is little if any direct competition allowing us to enjoy
healthy margins.
How are BVS products positioned to help combat
today’s security threats?
Scott N.
Schober
President and CEO,
Cyber Security &
Wireless Technology Expert
Berkeley Varitronics Systems, Inc.
4
We have made a strategic decision to focus our R&D on mobile threat
solutions. That has paid off in a tremendous amount of business,
spawning an ever-growing fleet of security tools that have gained
worldwide acceptance and usage. Government facilities that house
classified information have all increased security spending as a result of
the recent breaches and tragic shootings.
One of the biggest threats is when someone enters a secure
confidential facility and smuggles in a wireless device to compromise
security. Wireless devices are getting smaller and more challenging to
physically detect so cyber-security personal often rely on BVS’ unique
array of security tools to detect, locate, and eliminate the wireless
threat. Our Wolfhound-PRO, coupled with direction finding antenna,
allows one to hunt down and find the hidden cell phones quickly. When
Bluetooth is a threat, clients’ deploy our Mantis Bluetooth analyzer
allowing security personnel to find discoverable Bluetooth enabled
devices such as laptops or mobile phones that are forbidden in secure
areas. The latest tool we completed development on is the YellowjacketDF, a Wi-Fi Direction Finding solution allowing one to hunt down
rogue access points and mobile Wi-Fi threats. Yellowjacket-DF has the
ability to ‘ping’ a target’s Wi-Fi enabled mobile phone and have it report
back continuously so one can detect and locate the threat without
tipping them off that they are being hunted down.
Can you talk about security innovation?
BVS’s latest innovative security solution is a full body scanner called the
SentryHound cell phone detection portal. This portal uses an advanced
algorithm we developed to isolate where a cell phone is hidden on any
person. The suspect area is illuminated in one of 12 zones allowing
security personnel to quickly isolate a threat area before the individual
enters a secure facility. Since this technology does not rely on the
RF (Radio Frequency) transmission we can detect mobile phones
and electronics powered on, off—even with the battery removed. In
addition, we discriminate so we do not pick up on non-ferrous materials
TechNews | www.njtc.org | November 2014
that falsely trigger common metal detectors. The SentryHound has
gained widespread acceptance for use in court rooms, board rooms,
correctional institutions, and secure government facilities.
Can you talk a little bit about the culture in your
business? On one hand, it seems like it has to be
tight-lipped by design; yet, innovation requires a
level of transparency. How do you balance it with
your teams and staff?
Berkeley Varitronics Systems has a unique interdisciplinary team
thriving on engineering challenges that other companies struggle to
achieve. We handle the entire project from concept to finished design/
product all under one roof. We have the ability to design, schematic
capture, PC layout the circuit board, prototype, assembly, CNC
machining, testing, software engineering, FPGA design, RF Design,
and production run capability. Customers can come to BVS with
confidence that their idea will become a reality all under one roof. The
overall cost will certainly be higher than if our customers outsourced
some or all of the entire project to Asia or India, but they have the
assurance that it is all managed under one roof within the United
States. This minimizes the risk of IP piracy and theft while allowing
us the flexibility needed to respond quickly to customer needs and
maintain solid relationships with local suppliers all within the state of
New Jersey. I am proud to say this also preserves local New Jersey jobs
and strengthens local small businesses within the state.
JP Morgan is the latest in a long-list of high-profile
security hacks. In your opinion, where are the holes?
Why does it keep happening?
In the case of J.P. Morgan Chase, the hackers used a compromised
employee account to break into a web development server. From there
they were able to worm their way into other servers to access sensitive
data. This, as well as many other breaches, are due to lack of good
security safeguards in place coupled with legacy software that was not
properly updated. The web development server had simple access for
employees to log on with their user name and password. These are
extremely simple to hack when the password is 5 or 6 digits in length
(most passwords this simple are hacked in a matter of seconds). If
the password were a strong password of 12 or more upper/lowercase
characters, numbers, and symbols, that password would take years to
hack. If two-factor authentication were required to gain access to this
or any other JP Morgan Chase server, the entire breach could’ve been
avoided. Often, the software running on many of these networks is
legacy software that is not updated regularly with the required security
patches making it the perfect target for malicious software.
This Malware often sits quietly undetected and can steal customers’
credentials and remotely relay them back before covering it’s own
tracks and wiping its existence clean. Cyber hackers are getting bolder
and freely sharing hacking techniques with the underground world.
Hacking is also becoming very lucrative and thus, when looking for a
job, young hackers are attracted to fast money vs. hard-but- rewarding
work. (Much of the hacking is originating out of Eastern Europe where
legitimate jobs are scarce.)
Which industries are most vulnerable for attacks?
Why?
After the Target breach we have seen a steady uptick in hacking
spanning every market segment including large retail corporations,
banking industries, internet, government, and the energy sector. Much
of the cyber attacks are nationstate sponsored by Governments with a
lot of capital behind them looking to send a message and also instill
fear. Numerous hacker groups see hacking as an extremely lucrative
career and are up for a challenge to outdo those in the underground
world. The cyber hackers simply look for the biggest hole where there is
vulnerability and that is where they target their breach. Most industries
are only spending post-breach instead of being proactive and finding
their own weak spots by performing penetration testing. Penetration
testing is hiring a legitimate company to hack your own network to
expose and evaluate vulnerabilities to sure up defenses for possible
cyber attack(s).
What do companies need to do to protect their businesses? What are they missing that they should be
more aware of?
Switch to two-factor authentication. Two-factor authentication requires
a password and an additional step such as a code texted to the user’s
phone. According to sources close to the investigation, the vulnerable
server only required users to supply a login ID and password. It is
possible using two-factor authentication would have prevented the
breach altogether.
Be more open about sharing best security practices. The cyber
hackers share hacking tips. Organizations that have been hacked or are
targets of hackers should all share tips to prevent future hacks.
What is one thing everyone can do tomorrow to
strengthen his or her security systems?
Social media is becoming the norm for most of us but far too many
people put too much information out there for prying eyes to gather
information. If you are going away on vacation, never post on Facebook
or Twitter that you are going to ‘Disney World’ the week of XYZ. Cyber
thieves sweep the internet looking for clues to move in and hack your
wireless network or even sell this information on the underground so
real thieves will rob your house while you are relaxing on vacation.
When cyber thieves start searching they only need a few key pieces of
information to steal your identity. Most of this is easily obtained on the
internet (Name, Address, birthdate, mothers maiden name, pet’s name,
etc.). When we put this information on the internet through social
media, it is like handing them the keys to your front door. n
TechNews | www.njtc.org | November 2014
5
PLUGGED IN
More Organizations are Outsourcing Data
Center Operations as Healthcare Industry
Leverages Technology Advances
Today’s Market Offers Availabilities, Options and Dealmaking Opportunities
BY SEAN BRADY
Technology advances are bringing incredible benefits to the healthcare/
pharmaceutical industry when it comes to facilitating quality care and
providing efficient customer service. At the same time, the usage of
computers in the operating room, global access to cutting-edge medical
research, the accuracy of digitized health records, the ability to quickly
and reliably process claims in today’s rapidly changing insurance
marketplace and countless other daily tasks in this 24/7 field require
instant – and uninterrupted – access to data.
In this changing healthcare environment, the need for additional and
increasingly robust computing power will only continue to expand.
It is no wonder, then, that a growing number of healthcare-related
organizations, including hospitals and pharmaceutical companies, are
outsourcing their data centers to third-party providers. Indeed, we have
seen several hospitals and pharmaceutical companies outsource their
data centers in New Jersey – a clear example of this industry trend.
Outsourcing a Data Center
When does this shift from an in-house to outsourced data center make
sense? Most commonly, large healthcare-related companies think
about de-coupling their data function when planning a relocation or
expansion into a new facility – and the decision typically comes down
to the priority of using working capital, cost efficiencies or the increased
need for redundancy and reliability. Simply put, finding an office or
medical office building that has Tier Three infrastructure in place, or
the space to install equipment to support a data center, is not easy.
Outsourcing a data center can save a company a substantial upfront
expense. Outsourcing a company’s data center requires leasing a
portion of a large third-party data center, in many ways similar to
leasing a major piece of equipment, such as an airplane. This solution
will typically provide a higher quality facility than what a company is
willing to build, and therefore will be more redundant and resilient.
The presence of an advanced cooling system, redundant power and
fiber feeds, generator space, heavy UPS batteries, ceiling heights for
raised floors (if required) and floor loads that support the installation of
a data center are all critical for data center operations. Upgrading any of
these components in an existing building for less than a ten-year lease
term can carry significant expense and may necessitate the navigation
of a lengthy town or landlord approval process – hence, the emergence
of outsourcing as a viable alternative.
While paying for a remotely hosted and operated data center does
add monthly expense, clients of third-party providers enjoy a number
of advantages. In addition to saving present value dollars on the upfront
expense for building the infrastructure, third-party providers have
specialized staffing in place to take care of the equipment, replacing
any of it when required at no expense to the tenant and keeping things
running 24/7/365, which enables the client to redeploy IT talent or
potentially eliminate surplus positions.
Also, in the event of any failure in the middle of the night or on a
holiday, the provider always has an IT, Network or MEP Infrastructure
Engineers on hand to solve the problem. These third-party employees
all specialize in never allowing the data centers to go down, which
See “Outsourcing Data”, page 8
WEBSITE DEVELOPMENT & INTERNET MARKETING
Website Design | Web Applications
E-Commerce | Custom Development
Search Engines | Social Media
Targeted & Tracked Advertising
973.748.1357
[email protected]
Growing businesses through technology and design.
6
www.TrueHitDesigns.com
TechNews | www.njtc.org | November 2014
The Path to a Successful Cloud Migration
It doesn’t matter what size business you are, a move to the cloud requires
careful planning, consideration and understanding of what’s ahead.
BY JENNIFER EINHORN
While the move to the cloud can mean major
IT savings and improved performance, the
shift of enterprise systems and infrastructure
from traditional to cloud environments
needs to be planned carefully to ensure
a real payoff and minimize risk. Whether
you’re an enterprise or SMB, the process of
migration requires an analysis of business,
technical and operational considerations as
well as an understanding of emerging cloud
technologies and architectures.
Business Strategy Should Drive Cloud Strategy
Because cloud migration is fundamentally a business decision, it’s
important to examine business strategies and processes and map them
to the right cloud architecture and cloud strategies. Depending on the
nature of your business and the applications you use to operate, cloud
technologies provide different levels of availability, failover, security and
other services.
There is no one-size-fits-all cloud solution. The business needs that
drive your IT applications and infrastructure will determine whether
to migrate all or a portion of your physical systems, applications and
data to a cloud environment and exactly what type of environment that
is—whether a private, public or hybrid cloud solution.
Some key issues and questions to explore include:
• How large and complex is our data? How important are regulatory
considerations such as HIPAA, PCI, Sarbanes Oxley, and other
requirements related to the privacy and protection of data?
• Are our current business applications ‘cloud-ready’? Can they easily
be scaled up and down in order to truly take advantage of the elasticity
of a cloud environment? If not, what do we need to do—re-architect
or replace the applications? Would migration have any impact on our
software licenses?
• What are our requirements for availability of applications and
data? Is any downtime acceptable if there is ever an interruption,
maintenance window or other reason we couldn’t access our cloud
environment? What would the cost of downtime be and what service
level agreement do we require for a cloud environment?
• If we build new applications or modify existing ones in a cloud
environment, would we be able to take them with us if we changed
cloud providers? What would the process and cost be?
Don’t Go it Alone
For many businesses, the most important step of a cloud migration
initiative is finding an experienced and reliable cloud provider who can
help you sort through all of the key questions. Look for a provider that
operates their own SSAE 16 data centers to ensure your infrastructure
has the security and connectivity to protect and run your data. A
solid and reputable cloud provider will be there with you each step
of the way, to help ensure your migration is a success. They will also
have a strong team of certified engineers experienced in such leading
technologies as VMware, Cisco and Fortinet. In fact, a cloud provider
with a strong ecosystem of cloud partners can be a significant advantage
when it comes to delivering a broad portfolio of enterprise-grade
solutions quickly and efficiently.
Not all Clouds Are Created Equal
Just as cloud providers differ, so, of course do cloud solutions.
Cookie-cutter cloud solutions are available, just swipe a credit card and
you’re on your way, but that’s not the best solution for everyone. There
may be concerns about support, security and reliability, plus self-service
clouds tend to be priced ala carte and can lead to billing sticker shock.
Often a customized cloud solution is the best long-term solution. Here
are some features to look for in a custom Infrastructure-as-a-Service
(IaaS) solution:
Customized cloud features to consider:
• High performance firewalls for better security. A cloud solution
with dedicated high performance firewalls capable of passing 1 Gbps
of traffic will keep your apps running smoothly while helping to ensure
secure network performance. In the event of equipment failure, look
See “Cloud Migration”, page 8
LEGAL Q&A
What should employers be
aware of, come January 1, 2015
because of the “increase in
minimum wage” amendment to
the New Jersey Constitution?
In November 2013, voters approved
an amendment to the New Jersey
Constitution increasing the state
minimum wage to $8.25. The
amendment also created annual
cost of living increases, tied to
the Consumer Price Index, to be
added to the minimum wage each
year. The increases are calculated
each September and take effect on
the following January. Therefore,
effective January 1, 2015, New
Jersey minimum wage will rise from
$8.25 to $8.38. Employers must
ensure that all work performed by
employees on and after January
1, 2015 is compensated at the
increased rate. Employers should
be especially mindful of this change
if January 1 falls in the middle of a
pay period.
Saranne E.Weimer, Esq., is
an associate at Giordano,
Halleran & Ciesla and
member of the firm’s
Labor & Employment
Department. She can be
reached at sweimer@ghclaw.
com<mailto:sweimer@
ghclaw.com> or
732-741-3900.
8
PLUGGED IN
Outsourcing Data continued from page 6
isn’t always the case for a user-operated facility. Additionally, their services, power and fiber are
scalable as a client’s needs evolve, which is difficult to manage in terms of timing and cost in a
company-leased or owned facility.
In New Jersey, most of the major pharmaceutical/healthcare companies have outsourced
their primary or back-up data center to a Third Party Provider. As well, many of the mid-sized
companies in the market looking for new office space or looking to right-size their operations today
are seriously considering outsourcing their data center operation. These mid-sized companies are
similarly confronted with the same needs for power because of the ever-growing big data analytics
for marketing and research. Most executives for these companies today are concerned about the
safety of their web sites, potential breaches, and they don’t want their sites to go down at all.
These companies’ web sites need to stay online for doctors, patients and researchers who need
access to the companies’ information for the advancement of medicine and cures.
Oversupply of Data Centers
The good news is that this is an excellent time to outsource data centers, especially in the New
York metropolitan area, which has an oversupply. Northern New Jersey, for example, houses
the single largest concentration of data centers in the United States, with more than 35 Third
Party Providers in over 70 locations around the state and within one hour of New York City.
Manhattan, Rockland and Westchester counties, Long Island and Connecticut also have plenty
of options to consider, just not as many as New Jersey.
This supply includes a number of providers that specialize in healthcare-specific needs, such
as HIPAA compliance and other regulatory issues. In short, today’s market offers tremendous
availability and options, providing ample opportunity to negotiate attractive deals.
As a resource, brokers specializing in data centers know the availabilities throughout the
region, rent per kW or cabinet per month, kWhr, power ramp, power design N-N+1-2N,
fiber, and concessions, and understand the areas in which the landlords will be flexible in the
contracts (SLA, MSA, or Service Order). Ultimately, the process is just like an office transaction:
Experienced data center brokers understand the supply and demand for space just like
commercial office real estate and create an environment where the Providers will competitively
bid for your occupancy and not sacrifice the quality of service they will provide.
The broker is the quarterback for the transaction and the other two valued professionals
required as part of the data center team are the engineer and IT/telco consultant, who provide
the data center broker with the technical facts and due diligence that are needed on a facility in
order to successfully negotiate on behalf of the tenant. Having this team will provide the tenant
the best market transaction at any given time in the data center real estate market cycle. n
Cushman & Wakefield’s Sean Brady is a Senior Director and Co-Founder of the
firm’s Global Data Center Advisory Group, which includes the real estate industry’s
most experienced advisors within this highly specialized asset class.
Cloud Migration continued from page 7
for a solution that includes built-in redundancy to help keep your data running and protected.
• Advanced network protection features such as intrusion detection/prevention; anti-virus
protection, data leak prevention and web content filtering can help protect your critical assets
in the cloud.
• A flexible cloud infrastructure will allow you to better achieve your business objectives. You
may need to implement private fiber, MPLS, or Ethernet connectivity to your existing carrier.
Or perhaps you want to connect your colo rack to your cloud environment. Look for a cloud
and cloud provider that allows that flexibility.
According to IT analyst Gartner, cloud growth will continue to accelerate and by 2016 cloud
will comprise the bulk of new IT spend. This growth is currently being fueled by the need to
drive efficiency within the IT organization, but the next wave of growth will be more focused on
innovation, new and better ways to solve business challenges. If you aren’t already in the cloud,
this is the time to begin taking the first steps toward that innovation. n
Jennifer Einhorn is General Manager for TierPoint, Pennsylvania. http://www.tierpoint.com
TechNews | www.njtc.org | November 2014
Is your company
afraid of
the “D” word?
Debt. It’s not a moral failing. It’s a legitimate business
tool. Businesses use it to grow, seize opportunities,
or just manage their capital flow. EisnerAmper can
show you how to approach debt in ways that are
responsible, conservative, and—best of all—productive.
So you don’t have to think of debt as just another
four-letter word.
Read more about debt at EisnerAmper.com/debt.
Let’s get down to business.® eisneramper.com 732.243.7140
John Pennett [email protected]
PLUGGED IN
Unclaimed Property Due Diligence
BY LAUREN TAGUER, CPA
No one wants an audit.
Make sure your business is thoroughly dealing with unclaimed property.
Unclaimed property and escheatment laws are voluminous and can
appear unrealistic to keep up with. However, knowing that they are
there can spare your business from an unwelcomed unclaimed property
audit. Each state has its own unclaimed property division that not only
manages the unclaimed property, but also ensures that companies are
performing due diligence.
Does your business have policies and procedures in place? If not,
your company may be at risk for an audit, which could result in fines,
interest and penalties.
Simply mailing a check to the unclaimed property owner does not
free your business of the responsibility of finding the respectful owner.
Companies must demonstrate that they have exhausted all options to
locate the property’s rightful owner through a process of due diligence.
Here are a few tips to demonstrate due diligence:
• Have written policies and procedures in place that represent a
timeline of the process (e.g., how often outstanding check listings
are reviewed, how old the checks are when your business makes first
contact with the owner, etc.);
• Prepare a template for company personnel to complete to notify
the rightful owner that there is unclaimed property in his or her name;
• Formulate a plan of action for each different response that may be
obtained after sending the template (undeliverable, wrong address, no
response, etc.);
• Keep the documentation. It is extremely important to keep a trail of
your written policies and procedures (e-mails, correspondence, notes of
phone calls, etc.). When companies discard unclaimed property records,
state auditors may use estimation techniques to determine historical
liability. To prevent this, the organization should adopt record-retention
policies compatible with unclaimed property laws; and
• Know the state that you are dealing with. The state law that
you should follow will correspond to the last known address of the
unclaimed property owner. Reporting requirements and due diligence
laws vary from state to state, and in order to ensure compliance, it is
important to be familiar with the laws in the state.
If the process of due diligence does not result in finding the rightful
owner, you may need to report the unclaimed property and turn it over
to the state where the owner is last known to have resided through a
process called escheatment. State escheatment laws vary as to how old
an uncashed check should be before remitting it to the state. Further,
the laws vary based on the type of payment the check relates to. For
example, New Jersey and New York law states that outstanding payroll
checks become escheatable after one year, while Pennsylvania has a
two-year threshold. In all states, however, property cannot be escheated
unless due diligence requirements have been met. It is important that
your organization become familiar with the due diligence requirements
of each state in which their unclaimed property relates.
Failing to implement policies and procedures for compliance can put
yourself and your business at risk. Following the few tips discussed above
will ensure that your company remains in a position of strength. n
Lauren Taguer, CPA,WithumSmith+Brown [email protected]
10
TechNews | www.njtc.org | November 2014
LEGAL
EAGLE
U.S. Supreme Court on Software Patents:
“Show Us the Innovation!”
BY RICHARD A. CATALINA, JR., ESQ.
The latest ruling
on software patents
generates more
questions than answers.
On June 19, 2014, the U.S. Supreme
Court issued its long-awaited decision
in Alice Corporation, Ltd. v. CLS
Bank International, et al., 573 U.S.
__ (2014) (No. 13-298), in which
the Court considered (again) the
patentability of software. While the
Court did not establish an absolute
bar to the patentability of software,
its failure to establish a bright-line
rule as to patent eligibility, while yet
raising the standard, generates more
questions than it answers.
The patents at issue in Alice Corp. were directed towards a computerimplemented method for mitigating “settlement risk” (i.e., the risk that
only one party to a financial transaction will pay what it owes) by using
a third party intermediary. The question presented was whether the
claims of those patents were patent eligible under 35 U.S.C. §101, or
instead, merely drawn to a patent-ineligible “abstract idea,” thereby
rendering the software ineligible for patent protection. As to the patent
claims at issue in Alice Corp., the Court held that those claims were
directed towards an abstract idea of intermediated settlement and that
merely requiring generic computer implementation fails to transform
that abstract idea into a patent-eligible invention.
As the Court did not enter an absolute rule precluding the patenting
of software, where does this leave software patent applications? In
sum, the claims in a software patent application must comprise an
additional inventive component – specific technological innovation
– that is “significantly more” than the abstract idea. As noted by the
Court, this requires a “search for an ‘inventive concept’… An element
or combination of elements that is sufficient to ensure that the patent in
practice amounts to significantly more than a patent upon” the abstract
idea. In response to Alice Corp., the United States Patent and Trademark
Office (the “USPTO”) issued Interim Guidelines on June 25, 2014,
wherein the agency states that claim limitations that may satisfy the new
rule of Alice Corp. would include improvements to another technology
or technical field, improvements to the functioning of the computer
itself, and meaningful limitations beyond generally linking the use of an
abstract idea to a particular technological environment.
Since the decision in Alice Corp. was handed down by the Supreme
Court, the USPTO has been issuing blanket form rejections on virtually
all software based patent applications and has even been withdrawing
Notices of Allowance – including instances where the applicant has
paid the issue fee and is waiting for the patent to issue. While there
was some early optimistic speculation by practitioners that the Court’s
ruling in Alice Corp. would not significantly change the landscape, it
is now clear that the nebulous Alice Corp. standard has fundamentally
changed the law and future of software based patents.
In terms of patent prosecution, this change in the law necessarily
will require far greater disclosure of innovation in the software patent
application, including the disclosure of algorithms. In addition, various
practitioners are advocating the greater use of “means plus function”
claims, the use of which would require full disclosure of the algorithms.
While “means plus function” claims have traditionally been narrower
in scope than standard functional method, process and systems based
claims, after Alice Corp., “means plus function” claims should be
included in the application, as standard functional claims face a greater
likelihood of invalidation by the USPTO under the Alice Corp. standard.
Alice Corp.’s impact, however, travels far beyond patent prosecution
practice and the ability to patent protect software. As an asset of a
business, the validity of previously issued patents must now be seriously
questioned. Pundits abroad are remarking that the vast majority of
already issued software patents are likely now invalid under the Alice
Corp. standard and may not be worth the paper upon which they are
printed. If true, do companies with a substantial patent portfolio of
software based patents need to re-evaluate these assets? What does this
mean to emerging companies that so highly rely upon their intellectual
property as a basis for satisfying the investment community? Is the
investment community adjusting how it evaluates software based
patents in light of Alice Corp. or is it business as usual? These are a few
of the many thorny issues that Alice Corp. raises.
From a litigation perspective, seemingly it should now be significantly
easier for an infringement defendant to invalidate an asserted software
patent. Perhaps underlying the Alice Corp. ruling was the Court’s
visceral response to address, in part, the dubious litigation and
extortion tactics of “patent trolls” by providing defendants with greater
firepower in their defense arsenal to attack the asserted patent. Time
will tell if Alice Corp. indeed has any effect on slowing the proliferation
of questionable infringement litigation.
Clearly, the software patent landscape has been dramatically altered
by Alice Corp. The present uncertainty, in time, should settle as the
USPTO and the Federal Circuit provide much needed guidance. In
the meantime, would-be software applicants would be best advised
to more fully disclose the invention, highlight the points of novelty
and innovation of the invention as much as possible, and employ
creative claim drafting with limitations specifically directed towards
such technological advances that are narrower in scope than the actual
method or process implemented by the software. n
Attorney Richard Catalina, Jr. is Of Counsel with the law firm of Szaferman, Lakind, Blumstein & Blader P.C. and limits his practice to
intellectual property, technology and life science law. He is registered to practice before the United States Patent and Trademark Office.
TechNews | www.njtc.org | November 2014
11
NJTC 2.0
Ready. Set. Go!
Agenda
5:30 pm
Cocktail Reception
6:30 pm
Awards Ceremony,
Dinner & Dessert
Attire: Business Professional
Suspense Awards
Innovative Technology Company of the Year
iContracts
Kirusa
PayCommerce, Inc.
Sponsored by Comcast Business
Impact Company of the Year
AvePoint, Inc.
MarketSmith, Inc.
Yorktel
Sponsored by Juniper Networks, Inc.
2014 NJTC Awards
(as of pri
BDO, USA LLC | Comcast Business | DLA Piper | Ernst & Young LLP | Edison Partners | GHO Ventures | iCIMS, Inc. |
New Jersey Institute of Technology | NPS Pharmaceuticals, Inc. | PNC Bank | PwC | Robert Half Technology | Rowan University
Super Awards
Private Company of the Year
TRAC Intermodal
Sponsored by Synchronoss Technologies, Inc.
Public Company of the Year
Verisk Analytics
Sponsored by BDO USA, LLP
Master Technology Company of the Year
ETS
Sponsored by Universal Display Corporation
Industry Awards
Trailblazer
Cancer Genetics, Inc.
Sponsored by Systech
Rising Star
Coriell Life Sciences
Sponsored by Robert Half Technology
Outstanding Technology Development
NIKSUN, Inc.
Sponsored by New Jersey Institute of Technology
Consumer Product
Miele Professional USA
Sponsored by Ernst & Young LLP
Beacon of Light
CytoSorbents Corporation
Sponsored by Morgan Lewis
John H. Martinson
Technology Supporter Award
Maxine Ballen, Founder, NJTC
Sponsored by Edison Partners
Legend of Technology Award
Stuart Peltz, Ph.D., CEO
PTC Therapeutics
Sponsored by McCarter & English, LLP
Legislative Champion Award
U.S. Senator Cory Booker
Sponsored by NPS Pharmaceuticals, Inc.
Knowledge is Power Award
Thomas Edison State College
Sponsored by PNC Bank and Rowan University
Celebration Sponsors
int date)
Juniper Networks, Inc. | KPMG LLP | Maloy Risk Services | McCarter & English, LLP | Merrill Corporation | Morgan Lewis
| Stevens Institute of Technology | Synchronoss Technologies, Inc. | Systech | TechXtend | Telx | Universal Display Corporation
Three Business Imperatives
for Transforming
Global Trade Operations
Multi-national
companies
that are placing
more strategic value
on their global trade
compliance programs
can achieve
significant
cost savings
and improve
the flow of
goods across
international borders.
14
A
ccording to statistics recently released by the World
Trade Organization (WTO), U.S. companies
imported $2.3 trillion of goods and exported $1.5
trillion in 2013. With the importance of global trade
to corporate top and bottom lines, multi-national
companies are increasingly placing more strategic
value on their global trade compliance programs.
Leading organizations realize that strategic global trade programs result
in improved international supply chain performance, reduced global
duties and taxes, and less corporate risk.
Used within a systematic approach to transforming global trade
compliance, below are three key areas consistently providing cost
savings and process improvements for every multi-national organization,
no matter its size.
Combining global trade compliance
and supply chain operations
To fully transform trade compliance and global supply chain operations,
multi-national organizations must recognize the connected interactions
between these operations. In the past, most trade compliance
departments were created to avoid global regulatory fines and penalties
and were separate from supply chain operations.
Today, global organizations understand the impact compliance
operations have on their global supply chain performance. For instance,
on-time delivery performance can be impacted when shipments are
delayed at Customs due to missing information. Safety stock can be
lowered by improving cycle times for cross border shipments. Customer
satisfaction increases as responsiveness of the global supply chain
improves. And so forth.
A 2014 study by American Shipper, “Import Operations and
Compliance Benchmark Study,” confirms that the majority of multinational companies recognize the symbiotic relationship of these two
functions by assigning import compliance responsibilities to their supply
chain organization. This study also identified that a majority of companies
have either already integrated or plan to integrate the interconnected
functions of trade compliance and global supply chain operations.
International companies, particularly those with high trade volumes,
can see additional benefits by further integrating these two functions
with a comprehensive global trade management (GTM) solution. An
end-to-end GTM captures the appropriate supply chain data required,
allowing for repurposing of information, reducing rekeying time and
errors; provides the necessary global trade content information to
comply with global rules and regulations; and effectively shares the
information with all necessary global trading partners, increasing
visibility, reducing global trade risks and improving global supply chain
performance.
TechNews | www.njtc.org | November 2014
BY TY BORDNER
Accurately capture and use trade content data
Companies engaged in global trade manage a tremendous amount of
information to establish and maintain compliance with regulations.
This information – called trade content – includes harmonized tariff
schedules (HS) to classify goods, duty rates needed to calculate landed
cost, and controls to determine whether you can legally complete
your transaction. For companies managing this process manually, the
business impacts can include high error rates, compliance process
inefficiencies and increased risks for global supply chains.
Further, the nature of trade content requires daily attention to
updates, additions, and corrections. When new regulations come into
force, they must be immediately identified and applied to any affected
trade transactions. Recent studies in the past two years estimate a
steady 16 percent increase in global regulatory activity, placing a strain
on the resources of multi-national organizations.
A recent example of trade regulations are the sanctions against
Russia due to its support of the Ukrainian separatists. The sanctions
affect both Russian companies and those doing business with them.
The new regulations include trade restrictions on specified goods, an
arms trade embargo, a ban on the export of dual-use goods for military,
and certain restrictions in the energy field. In response, Russia imposed
its own trade restrictions, including a ban on imports of a number of
commodities from the United States, the European Union, and a few
other countries. Organizations that fail to company with these new
rules face fines or a loss of export privileges.
Trying to manually maintain a complete and accurate database can
be time-consuming and costly. Without technology, compliance teams
must manually check government sources and track down officials for
data. Once the data is collected, the compliance team must translate,
analyze and verify the information. The regulations must then be
interpreted and codified to be used correctly.
Unfortunately, collecting, cleansing and publishing trade content
is complicated by the number of countries and government agencies,
differences in trade regimes, the presentation of the information in a
wide variety of formats.
Tightly integrating GTM software with comprehensive global trade
content streamlines the process and reduces errors. An integrated
solution provides multi-nationals with up-to-date trade information,
supporting the underlying processes of import management, export
management and preferential trade agreement administration.
Adding collaborative technology
and processes to the system
The nature of today’s global supply chains requires increasing reliance
and dependence upon multiple trading partners around the world.
Global companies must effectively connect with these partners and
respond rapidly to changing business and regulatory requirements.
Many multi-nationals have invested heavily in ERP software systems
that focus on maximizing processes within the organization rather than
across the supply chain. However, due to this focus, these ERP systems
and architectures fall short in collecting and sharing information
rapidly with customers, suppliers, carriers, brokers and government
regulatory agencies.
Many companies, however, are unaware of the additional requirements
needed to support a global supply chain. A 2013 SCM World report
cited “it is surprising how little most organizations have automated or
even supported global trade and collaborative execution with global
trading partners.” Much of this lack of automation and processes can
be attributed to relying on traditional ERP software for all their global
supply chain needs.
As a result of this internal and domestic focus, many companies
cannot respond and adapt quickly to a constantly changing global
regulatory and supply chain environment. A successful global supply
chain must be able to identify changing trade regulations by country
and provide timely updates to appropriate users; quickly connect with
new customers, suppliers and carriers; ensure regulatory compliance;
and enable a streamlined, visible, cost-effective approach.
Deploying a flexible GTM platform can help with these requirements.
A flexible system adapts to evolving global business needs; improves
global trading partner relationship; formalizes and automates global
trade processes and identifies applicable global trade regulations on a
timely basis.
Multi-nationals focused on these three business imperatives for
global trade management are able to achieve significant cost savings
and improve their flow of goods across international borders. Focusing
on these techniques and implementing technology and processes
to address the specific needs of a global supply chain provides an
organization with the foundational elements necessary to reduce
global trade risks, minimize duties and improve global supply chain
performance. n
Ty Bordner, vice president of solutions consulting, Amber Road www.amberroad.com
TechNews | www.njtc.org | November 2014
15
EDUCATION
From here to there:
Rowan researchers
get travelers on the road.
Rowan University College of Engineering
professors and students are figuratively and
literally taking their research to the road,
helping to make travelers’ journeys—and the
environments in which they are taken—safer.
Numerous professor and student teams
are working, often in collaboration with other
universities or industry partners, on regional
and national initiatives that have garnered
millions in outside funding.
Dr. Yusuf Mehta, associate professor of civil
and environmental engineering at Rowan, is
working with researchers from across the country
on a series of transportation-related projects.
Mehta, who oversees an asphalt lab in
the South Jersey Technology Park in Mantua
Township, is studying the environmental
impacts of recycled asphalt pavement, or the
restructuring of asphalt materials removed
from previous roadways, under a $452,490
grant from the New Jersey Department of
Transportation (NJDOT).
His research team, which also includes
investigators from Columbia University and
Stony Brook University in New York, are
working to identify all non-roadway applications,
including aboveground applications, for the
reused asphalt that are safe for people and the
environment and comply with federal and state
environmental guidelines.
The research explores innovative uses of
asphalt, including the construction of guardrails
and walls, but also identifies potential hazards
that may result from the reused asphalt.
Environmental agencies are uncertain
whether there are environmental and/or
health risks associated with reused asphalt,
and this research will provide further insight
on the issue.
Last fall, the NJDOT also awarded Mehta
$450,000 to investigate alternatives to nuclear
density testing of soils, a common but expensive
quality control process during construction.
16
Nuclear density testing is nuclear-reactive,
with engineers using gamma rays to determine
the density of a material. An optimum density
is critical to achieving better-performing
roadways. The project—which also includes
researchers from Columbia University and
Advanced Infrastructure Design, Trenton,
New Jersey—is designed to determine a new
method to substitute this costly practice, thus
saving taxpayer dollars in the long run.
“Nuclear density testing has strict protocols
of usage,” Mehta said. “[The NJDOT] wants
to find an alternative that is repeatable and
accurate. They are willing to explore all options
and have kept a very open mind.”
Dr. Kenneth Blank, vice president
of Health Sciences at Rowan, said
collaborations like Mehta’s are a result of
Rowan’s recent research institution status,
which New Jersey designated in 2013.
Projects such as these, he noted, enable
Rowan to better address issues facing the
region and the country while also expanding
the University’s “national footprint.”
“We are working with nationally recognized
research institutions to solve practical
problems,” Blank said. “That’s a major goal
of Rowan University — to conduct research
that addresses real-world issues and to bring
solutions to those problems to the marketplace.”
Powered by Algae
Rowan has a long history of transportationfocused research that extends well beyond
Mehta’s work. For example, the United States
Department of Energy (DOE), New York State
Department of Transportation (NYSDOT),
NJDOT and United States Department of
Transportation awarded close to $1.2 million
in recent years to Dr. Kauser Jahan, professor
of civil and environmental engineering, to
conduct research on several transportationrelated projects.
TechNews | www.njtc.org | November 2014
Under a $750,000 DOE grant, she
is studying the use of algae as a possible
alternative fuel source. Jahan, who says using
algae is one of the most promising alternatives
to traditional biodiesel fuel—plant and animal
oils such as soybeans, corn and canola oil
and animal fat, materials that need to be
replenished through farming—is partnering on
the study with Rowan Engineering colleagues
(chemical engineering professors Dr. Robert
Hesketh and Dr. C. Stewart Slater, chemical
engineering associate professor and program
chair Dr. Mariano Savelski and civil and
environmental engineering associate professor
Dr. Will Riddell).
The Rowan team is conducting a two–part
study: a life-cycle analysis that will determine
the most efficient and environmentally
friendly way to manufacture biodiesel fuel
from algae and, in collaboration with Preston,
Minn.-based Algaedyne Corporation and
Bordentown-based Garden State Ethanol,
Inc., a study of the effect of membrane
technology on the growth of algae. The work
employs an innovative use of membrane
technology to provide carbon dioxide gas to
promote algae growth.
Algae, Jahan said, may provide a viable
energy source and require far less land that
other biofuels require, taking up less property
that can be devoted to food production.
According to Jahan, algae reproduce quickly,
produce oils more efficiently than crop plants
and require relatively few nutrients for growth.
Ultimately, she said, if algae are viable, they
can be grown on land considered substandard
for agricultural purposes and possibly mass
produced indoors as well.
And she noted, “If it is found algae are
a viable cost-effective biofuel source it will
radically charge the future of countries that
do not have fossil fuel resources and reduce
dependency of other countries on petroleum.
Council Connections
PRESIDENT and CEO
James C. Barrood • [email protected]
FOUNDER
Maxine Ballen • [email protected]
EXECUTIVE VICE PRESIDENT
Paul A. Frank III • [email protected]
Algae will be an alternative fuel source not
only for rich countries but for countries that
have no fuel at all.”
Jahan also has worked in the past on
studies for the NYSDOT on field tests to
determine the lead in bridge paint and the
use of natural brine for roadway anti-icing
and de-icing and for the NJDOT on heavy
metal contamination of highway marking
beads, among other projects. The United
States Department of Transportation also
funded Jahan $100,000 to conduct a regional
session of the Garrett A. Morgan Technology
and Transportation Education Program, a
mentoring program for high school students
interested in transportation research.
Protecting Land and Air Travel
Dr. Beena Sukumaran, chair of Civil &
Environmental Engineering, has been
conducting research for the NJDOT and the
Federal Aviation Administration (FAA) for
more than a dozen years, including studies
with international collaborators.
Currently, she is working under a
$222,227 grant from NJDOT/University
Transportation Research Center to use
laser-induced breakdown spectroscopy
(LIBS) to identify problematic minerals in
aggregate stone. Aggregate stone is used
on New Jersey roadways, and if there is the
presence of certain problematic minerals,
roadways can deteriorate faster. The LIBS
analysis technique would replace much more
time-consuming and expensive tests done at
present by the NJDOT. The LIBS chemical
analysis technique involves firing a pulse
laser at a sample to remove material and
evaluate the composition. Once the LIBS
approach has been tested in the laboratory,
a LIBS portable unit will be implemented
in the field so that NJDOT can do a rapid
analysis at construction sites. Working in
conjunction with Rowan physics professor
Dr. Michael Lim, electrical and computer
engineering professor Dr. Ravi Ramachandran
and graduate student Andrew Branin from
Howell, New Jersey, Sukumaran will advise
the NJDOT whether its contractors are using
appropriate construction materials in order to
ensure the quality of Garden State roads.
Sukumaran also is working with postdoctoral scholar Dr. Carlos Cary, a Peru
native who received his Ph.D. from Arizona
State University; Marie Lecorvaisier, a French
student working on her graduate thesis at
Rowan; and undergraduate students Adam
Bagriacik from Burlington, New Jersey;
Robert Cohen from Philadelphia; Jerrett
Clark from Pilesgrove, New Jersey; and Kokeb
Abera from Williamstown, New Jersey, on
a $70,571 funded project for the FAA to
determine the suitability of the Superpave
Gyratory Compactor (SGC) to replicate field
performance of aggregates during construction
and trafficking of airfield pavements.
“When you construct an airport pavement,
you compact it, but under the heavy loads
imposed by aircrafts such as the Boeing 777
and Airbus 380, you can deteriorate the
airport pavements faster. We want to come up
with an approach that would extend the life
of the airport pavements by formulating new
compaction standards,” Sukumaran said.
Blank said that while numerous professors
are conducting research on transportation
issues, that field is just one of dozens of
areas on which Rowan professors, students
and university and industry partners are
focused. n
EXECUTIVE ADMINISTRATOR
Karen Lisnyj • [email protected]
MEMBERSHIP RELATIONS MANAGER
Ellen Stein • [email protected]
OFFICE ADMINISTRATION/MEMBERSHIP
SERVICES - CONNECTIONS EDITOR
Judy Storck • [email protected]
IT COORDINATOR
Erwin Racimo • [email protected]
EVENTS MANAGER
Meredith Meyer • [email protected]
ACCOUNTING
Peggy Reeve • [email protected]
NJTC CHARTER MEMBERS
Deloitte
Edison Venture Fund
KPMG LLP
Maloy Risk Services
Morgan Lewis
PNC
NEW JERSEY TECHNOLOGY COUNCIL
www.njtc.org
1001 Briggs Road, Ste 280
Mount Laurel, NJ 08054
856-787-9700
To learn more about Research at Rowan, visit www.rowan.edu/research
TechNews | www.njtc.org | November 2014
17
NJTC NEW MEMBERS
As of September 2014
ENVIRONMENTAL & ENERGY
TRAC Intermodal
211 College Road East
Princeton, NJ 08540
609-986-0182
http://TRACIntermodal.com
Rick Carney, CIO
TRAC Intermodal is North America’s
leading intermodal equipment provider and
chassis pool manager serving international
and domestic shippers. We provide shortterm chassis rentals and long term chassis
leasing through extensive chassis pool
programs and pool/fleet management
through the use of our proprietary chassis
pool management software, PoolStat®.
TRAC Intermodal’s active fleet consists
of approximately 272,000 chassis. TRAC
Intermodal has a broad operating footprint
with 630 marine, 167 domestic locations
and 61 depot facilities across North America.
TRAC is the leader in providing chassis
solutions to the intermodal industry. TRAC
has been in business since 1968 and is
accredited with an A Plus rating by the
Better Business Bureau. TRAC is also a
member of the Intermodal Association of
North America (IANA), the American
Trucking Association (ATA), and several
other industry organizations. For more
information, visit www.tracintermodal.com
INFORMATION TECHNOLOGIES
CircleBlack, Inc.
353 Nassau Street
Princeton, NJ 08540
609-921-2000
www.circleblack.com
John Michel, CEO
Bringing innovative, next generation,
technology to help advisors and investors
better control their wealth, and life.
Paratus Technologies
PO Box 205
Allamuchy, NJ 07820
908-269-5106
www.paratustechnologies.com
Brian Freedley, CEO
Paratus Technologies offers answers to
your IT questions, resolutions to your
concerns, and implements effective, strategic
plans based on your technology needs.
Life Sciences
Hilin Life Products, Inc.
211 Warren Street
Suite 211
Newark, NJ 07103
973-648-0265
www.hilinlife.com
Gayle Naftaly, Managing Director
[email protected]
Hilin Life Products, Inc. (HLP) has developed
a patented (pending in final stages) and FDA
cleared reusable medical device designed to
help women determine exactly when they are
ovulating to help woman become pregnant
and plan their pregnancy. The results of
this device are clinically proven to be98%
accurate.With over 143 million women of
child bearing age in developed countries, the
market is vast. The main competitive products,
urine strips, are costly, messy and ineffective
–opening up a big opportunity for Hilin Life
Products. Additional differentiators include
our educational kit and our smartphone app
which tracks a woman’s fertility results.
SERVICE PROVIDER
NJ Health Foundation/Foundation Venture
Capital Group, LLC
120 Albany Street
Tower II, Ste 850
New Brunswick, NJ 08901
908-731-6610
www.njhf.org
James Golubieski, President
New Jersey Health Foundation supports
biomedical research, medical education
and healthcare programs in New Jersey.
Its affiliate, Foundation Venture Capital
Group, invests in New Jersey start-ups
heading toward commercialization.
TELECOMMUNICATIONS
Truphone
Enterprise Development Center
211 Warren Street, Ste 418
Newark, NJ 07103
646-358-3496
www.truphone.com
Christopher Celiberti,VP, Business
Engineering - [email protected]
Truphone is the first mobile operator in the
world without country borders. It brings people
closer to their international contacts, makes
them more productive, and gives them the
international quality of service they deserve.
One of the ways that Truphone achieves
this is by providing people within a group
of eight countries, called the Truphone Zone,
multiple international mobile numbers
on a patented Truphone SIM card. This
means that people’s international contacts
can always reach them, and make high
quality local calls at a local rate. The
Truphone Zone includes Australia,
Germany, Hong Kong, the Netherlands,
Poland, Spain, USA and the UK.
RENEWALS
BakerHostetler LLP • www.bakerlaw.com
Berkeley Varitronics Systems, Inc.
www.bvsystems.com
Big Red Pin • www.bigredpin.com
BioConsulting International, LLC
www.bioconsultinginternational.com
Casabona Ventures, LLC
www.CasabonaVentures.com
Connexin Software, Inc.
www.officepracticum.com
CoreSite • www.coresite.com
DeVry University • www.devry.edu
Fintelligent, LLC • www.fintelligent.com
Go!Foton Corporation • www.gofoton.com
I.D. Systems, Inc. • www.id-systems.com
iBiquity Digital Corporation
www.ibiquity.com
Interphase Systems, Inc
www.interphasesystems.com
Mission 50 Workspaces • www.mission50.com
Onconova Therapeutics Inc.
www.onconova.com
Petra Systems • www.petrasolar.com
Princeton Center for Educational Services
www.princetoncenter.com
PTS Data Center Solutions, Inc.
www.PTSdcs.com
RennerBrown, Inc. • www.rennerbrown.com
Sevion Therapeutics • www.senesco.com
Shlemmer Algaze Associates Interiors
www.saaia.com
SpeechTrans, Inc • www.speechtrans.com
Technology Management Leaders LLC
The Philadelphia Trust Company
www.philadelphiatrust.com
ThoughtFocus Technologies ]
www.thoughtfocus.com
TranSend IT • www.transendit.com
TRI/Princeton • www.triprinceton.org
vXchnge (fka FiberMedia) • www.vxchnge.com
Wall & Tong, LLP • www.walltong.com
Wayside Technology Group
www.waysidetechnology.com
Joining the NJTC Paul Frank • Ext 222 • [email protected]
Membership Services Judy Storck • Ext 246 • [email protected]
Member Relations Manager Ellen Stein • Ext 228 • [email protected]
18
TechNews | www.njtc.org | November 2014
IS OLD TECHNOLOGY
THE WEAKEST LINK
IN YOUR IT CHAIN?
Don’t let old technology hold you back. With its intelligence and flexibility,
Comcast Business Ethernet is a strategic IT enabler, now and in the future.
Because it’s built for business.
• One of the largest Ethernet footprints in the country.
• Dedicated support for businesses.
• Awarded 2013 North American Service Provider of the Year
by the Metro Ethernet Forum.
BUSINESS.COMCAST.COM/ETHERNET
866- 429-2241
Restrictions apply. Not available in all areas.
Call for details. Comcast ©2014. All rights reserved.
NJTC PHOTO GALLERY
NJTC Leadership Summit
Are
You Ready to Open Up?
The C-level executive’s role as leader, strategist and visionary is
incredibly demanding. The Summit was designed to offer a forum
for executives to meet with their peers in a closed session to share
insights which can help them reflect on their roles as leaders
and realize that they are not alone in what they experience. The
conference featured a keynote lecture by David Kinitsky, Senior
Director at SecondMarket; General Manager of the Bitcoin
Investment Trust, facilitated small group discussions led by,
Comcast Business, DLA Piper, EisnerAmper, Maloy Risk Services,
Morgan Lewis, TD Bank, WeiserMazars, Caliper and The New
Jersey Economic Development Authority. The CEOs of the Year
engaged in an interactive discussion with Summit attendees about
the issues facing CEOs in today’s highly competitive and everchanging business environment. Following the panel discussion,
awards were presented to the CEO of public company, private
company and not-for profit or educational institute.
Photo 1: CEO Award Honorees
L-R: James C. Barrood, President and CEO, NJTC; Al Altomari, President and
CEO, Agile Therapeutics; Rich Napoli, CEO, ObjectFrontier, Inc.; Fred Dirla,
CEO, FieldView Solutions; Michele Brown, CEO, NJEDA; Fran Pierce, President
and CEO, Data Systems Analysts, Inc.; Dr. Chris Grevesen, President, DeVry
University/NJ Campuses; Dr. Mung Chiang, Director, Keller Center, Princeton
University and Dr. Shu-Tung Li, Founder, President and CEO, Collagen Matrix.
Photo 2: Keynote Speaker: David Kinitsky, Senior Director at SecondMarket
and General Manager of the Bitcoin Investment Trust
Photo 3: L-R: Alan Wink, Director, EisnerAmper LLP; David Kinitsky, Senior
Director at SecondMarket and General Manager of Bitcoin
Investment Trust; Simon Nynens, Chairman, President & CEO, Wayside
Technologies and James Barrood, President and CEO, NJTC
Photo 4: L-R: Kathleen Coviello, Director, Technology & Life Science, NJEDA; James C.
Barrood, President and CEO, NJTC; Michele Brown, CEO, NJEDA; Andy Gilbert,
Co-Managing Partner, DLA Piper and Fred Dirla, CEO, FieldView Solutions
1
2
3
4
20
TechNews | www.njtc.org | November 2014
CFO Peer Network Roundtable
Closed-door Session on
Choosing the Right Investor
The discussion was be led
by Scott Feldman, Managing
Director,
Susquehanna
Growth Equity; Doug Cox,
CFO, Primus Green Energy
and Alex Katz, Partner and
CFO, ff Venture Capital who
addressed questions such as:
What should the entrepreneur
consider before pursuing
funding? How do you manage
conflicts of interest? What are
your suggestions for a good
on-going relationship?
Jumpstart NJ Angel Network
Jumpstart NJ Angel Network honored founder sponsor Phil Politzner, Chairman Emeritus,
EisnerAmper at a special dinner in Princeton thanking him for his support of the group and
many years of participation. In attendance were board members, founders and sponsors.
Photo: L-R: Alan Wink, EisnerAmper; Mario Casabona, TechLaunch; Jim Barrood, NJTC; , Steve Dyer, Chairman, Jumpstart
New Jersey; Greg Olsen, GHO Ventures, Katherine O’Neill, Jumpstart New Jersey; Phil Politizner, EisnerAmper; Steven
Lerner, YakStack; Ken Kay, Maxine Ballen, NJTC; , Rick Pinto, Stevens & Lee and Wayne Tamarelli, AWT Private Investments
TechNews | www.njtc.org | November 2014
21
NJTC CALENDER OF EVENTS
SIMULCAST OF
NOVEMBER NYTM AT
WITHUMSMITH+BROWN’S
RED BANK OFFICE
November 3 • 6:30 PM - 9:00 PM
WithumSmith+Brown
331 Newman Springs Road
Red Bank, NJ
SIMULCAST OF
NOVEMBER NYTM AT
WEISERMAZAR’S
METRO PARK OFFICE
November 3 • 6:30 PM - 9:00 PM
WeiserMazars LLP
399 Thornall Street
Edison, NJ
Members $5.00 • Future Members $10.00
Members $5.00 • Future Members $10.00
Note: This listing is for watching a live video
stream of the event with other community
members at WSB, it is not for watching the main
event in person at NYU.
Note: This listing is for watching a live video
stream of the event with other community
members at WeiserMazar, it is not for watching
the main event in person at NYU.
The evening will start with networking with
like-minded people including an angel investor.
We’ll have pizza, snacks and drinks. Then a
founder will do a live demo of their product prior
to watching the NY Tech Meetup live. Finally,
stick around for more networking with fellow
attendees.
The evening will start with networking with
like-minded people including an angel investor.
We’ll have pizza, snacks and drinks. Then a
founder will do a live demo of their product prior
to watching the NY Tech Meetup live. Finally,
stick around for more networking with fellow
attendees.
Attendance will be limited to 20 people.
Attendance will be limited to 25 people.
NETWORKS
Electronics, Advanced Materials & Logistics
Patron Sponsors:
Baker & Hostetler LLP • EisnerAmper
Contact:
Paul Frank • Ext 222
[email protected]
Ellen Stein • Ext 228
[email protected]
Enviro-Energy Industry
Patron Sponsors:
Baker & Hostetler LLP • WeiserMazars LLP
Contact:
Paul Frank • Ext 222
[email protected]
Ellen Stein • Ext 228
[email protected]
22
Members $25.00 • Future Members $50.00
Incubator Tenant Members $10.00
Students $5.00
Anti-virus software, firewalls, employee training,
and plain common sense can go a long way to
protect your customer database and to protect
consumers from loss and identity theft. But
leaving the door open, allowing personally
identifiable information to be stolen or altered,
you have not done your job as a privacy and
security officer. As a result, you have compromised
the trust between you and your customer. There
could be legal ramifications as well.
Identity theft is an ever growing problem for
consumers and businesses alike. As marketers, we
have a responsibility to protect the personal data
we collect against illegal or unauthorized use.
Awareness is one of the most powerful tools in
the fight against identity theft, and that’s where
you can play an important role: The more your
customers know how to protect their identities
and what to do if a problem occurs, the harder it
is for identity thieves to commit their crimes.
Participate with NJTC as we explore these threats
to corporate and personal security with a panel
of experts.
NJTC Peer Networks bring together like-minded
technology professionals to share common issues,
learn best practices and gain perspective across all
technology industry segments.
NJTC Industry Networks present programs
about opportunities and challenges facing NJ
technology companies by industry segment.
Arts & Technology
Patron Sponsors:
EisnerAmper LLP
Contact:
Paul Frank • Ext 222
[email protected]
INFORMATION SECURITY,
IDENTITY THEFT AND YOU!
November 5 • 5:00 PM - 7:00 PM
Delta Corporate Services
129 Littleton Road
Parsippany, NJ
IT/Software
Patron Sponsor:
BDO
Contact:
Paul Frank • Ext 222
[email protected]
Judy Storck • Ext 246
[email protected]
LifeSci & MedTech
Patron Sponsors:
Drinker Biddle • McGladrey
Contact:
Paul Frank • Ext 222
[email protected]
Ellen Stein • Ext 228
[email protected]
Telecommunications/Media
Patron Sponsor:
Verizon New Jersey
Contact:
Paul Frank • Ext 222
[email protected]
Judy Storck • Ext 246
[email protected]
CEO Forum
Patron Sponsors:
Morgan Lewis
WithumSmith+Brown
Contact:
Karen Lisnyj • Ext 229
[email protected]
CFO Peer Network
Patron Sponsors:
Cresa NJ – North/Central LLC
Ernst & Young, LLP
Contact:
Karen Lisnyj • Ext 229
[email protected]
CIO Peer Network
Patron Sponsors:
Oracle • telx
Contact:
Karen Lisnyj • Ext 229
[email protected]
TechNews | www.njtc.org | November 2014
Government Affairs
Contact:
Karen Lisnyj • Ext 229
[email protected]
Software Engineering Leaders
Peer Network
Patron Sponsors:
Sparta Systems
Szaferman, Lakind, Blumstein & Blader, PC
For updated information or
to register for NJTC events,
visit www.njtc.org
Presenters include:
• Pat Bergamo, Project Manager at Delta
Corporate Services
• Scott Schober, CEO, Berkeley Varitronics
NJTC AWARDS CELEBRATION
See Pages 12-13
November 20, 2014
Renaissance Woodbridge Hotel
Iselin, NJ
SOFTWARE ENGINEERING
LEADERS LUNCH - AGILE COACH
November 12 • 12:00 PM - 2:00 PM
Sparta Systems
2000 Waterview Drive, Ste 300
Hamilton, NJ
2014 NJTC DATA SUMMIT & EXPO
December 9 • 1:00 PM - 5:00 PM
JuiceTank
220 Davidson Ave
Somerset, NJ
Members FREE • Future Members $50.00
Members $75.00 • Future Members $150.00
Speakers:
• Brian Dsouza - Agile Coach
• Bruce Kratz - Vice President R&D,
Sparta Systems
In this talk you will gain a basic understanding
of Agile methodologies and learn how to move
your organization to start realizing the benefits
of Agile. Mr. Dsouza is an Agile Coach with 10
years of experience helping companies transition
to Agile methodologies. He will share the reasons
Agile methodologies may be something your
team can benefit from, and how to execute
the transformation to Agile. Mr. Kratz leads an
enterprise software product team who recently
has led his team through this transition. He will
comment on how they implemented techniques
described by Brian, what benefits they have
realized and pitfalls they experienced along the
way.
ENERGY STORAGE
PRODUCTS/SERVICES SHOWCASE
November 13 • 5:00 PM - 7:00 PM
JCP&L/First Energy
300 Madison Avenue
Morristown, NJ
Members $25.00 • NFuture Members $50.00
Incubator Tenant Members $10.00
Students $10.00
Energy storage technologies are an important
part of the solution to efficiently manage
the area’s electricity demands. The goal of
this program is to bring together technology
providers, commercial energy users and key
stakeholders and to provide them with useful
information about the available technologies in a
showcase and presentation format.
Gold Sponsor:
The Data Summit & Expo will bring together
data center infrastructure and operations IT
professionals, and those responsible for business
continuity and disaster recovery with senior
business and technology leaders who recommend
business intelligence and analytical systems and
solutions that run against large and complex data
sets in educations, finance and healthcare. More
details coming shortly.
Sponsorships and exhibiting opportunities are
available.
Contact Paul Frank at [email protected] for more
information.
INNOVATION FORECAST
January 30 • 8:00 AM - 2:00 PM
Princeton Plasma Physics Lab
100 Stellarator Road
Princeton, NJ
Members $150.00 • Future Members $250.00
Innovation Forecast will highlight innovation
from throughout the region from new ventures
and large companies alike. The Forecast will also
feature a panel on how new ideas will be funded
in 2015 and beyond. After the event, attendees
will have an opportunity to take a tour of one
of the leading technology laboratories in the
country. More information to come.
TechNews | www.njtc.org | November 2014
NJ TECH COUNCIL
BOARD OF DIRECTORS
Chairman of the Board
Simon Nynens, Wayside Technology Group, Inc.
Co-Chair
Virginia Alling, PNC Bank
Board Members
Mel Baiada, BaseCamp Ventures
Maxine Ballen, New Jersey Technology Council
James Barrood, New Jersey Technology Council
Joel Bloom, New Jersey Institute of Technology
James Bourke, WithumSmith+Brown, PC
Skip Braun, Deloitte
Charlene Brown, AT&T
Leslie Browne, Senesco Technologies, Inc.
Michael mChristman, Coriell Institute
for Medical Research
John Clarke, Cardinal Partners
Mark Clifton, SRI International
Steven Cohen, Morgan Lewis
Kathleen Coviello, New Jersey
Economic Development Authority
Patricia Donohue, Mercer County Comm. College
Chris Downie, Telx
Nariman Farvardin, Stevens Institute of Technology
Ronald Gaboury, Yorktel
Mark Giamo, BDO USA, LLP
Andrew Gilbert, DLA Piper
Richard Goldberg, R² Associates
Ian Goldstein, Drinker Biddle
Darren Hammell, Princeton Power Systems
Paul Hoffman, Liberty Science Center
John Houghton, Nephros, Inc.
Brian Hughes, KPMG LLP
Flint Lane, Billtrust
John Lanza, McGladrey
John Martinson, Edison Partners
Dan McGrath, Maloy Risk Services
Stephen Muretta, Ernst & Young LLP
Richard Napoli, ObjectFrontier, Inc.
Gregory Olsen, GHO Ventures, LLC
Kevin Pianko, WeiserMazars LLP
Ari Rabban, Phone.com
Marianna Rabinovitch, ECI Technology
Jeff Rosedale, BakerHostetler LLP
Douglas Schoenberger, Verizon
Stephen Waldis, Synchronoss Technologies
Alan Wink, EisnerAmper LLP
23
is...
Office, Lab, GMP Space, Medical
Located next to Mercer Airport
7 Graphics Drive, Ewing NJ
Office, Lab, Conference Facility
1000 Waterview Drive, Hamilton NJ
4,000 SF Lab for Lease up to 180,000 SF;
3 Floors, Elevator Serviced; Cafeteria,
Fitness Center, Conference Facility Center on Site
Exit 7A & Route 130
6,000 SF Office, 14,000 SF AC/Production/Lab
Space, 6,000 SF Warehouse, 24,000 SF Total; 22’
Clear, 2 Tailgates, 1 Drive-in Door, 800 Amps
Office, Lab, GMP Space, Medical, Data Center
Matrix Corporate Campus, 259 Propect Plains Rd, Cranbury NJ
SALE
8,000-50,000 SF for Sale or Lease, 800 Amps; Located at NJ Turnpike Exit 8A;
Join Bracco Research, ADP, AmeriHealth and Innophos
www.fennelly.com | email: [email protected]
Phone: 609-520-0061
EdgeBrook Technology
Center GMP,
Office, Production
GMP, Electronics,
Production, Warehouse
18 Graphics Drive, Ewing NJ
4 Black Forest Road, Hamilton NJ
SALE
30,817 SF Building on 2.8 Acres; 8,500 SF Office,
6,000 SF Production, 2,900 SF Quarantine Storage, 15,000 SF
with 32’ Ceilings; 1,200 Amps, Fully Air Conditioned;
Located near I-195 & Route 130; Exit 7A Technology Headquarters Building
43,000 SF Located on 4.22 Acres,
Fully Air Conditioned, One 10x14’
Drive In, 4 Loading Docks; For Sale