New Jersey Technology Council www.njtc.org November 2014 Vol. 18 Issue 8 $3.50 THE BUSINESS BEHIND THE TECHNOLOGY SECTORS OF NEW JERSEY 4 Scott N. Schober President and CEO, Cyber Security & Wireless Technology Expert, Berkeley Varitronics Systems, Inc. The New Jersey Technology Council and Education Foundation 1001 Briggs Road, Suite 280 Mt. Laurel, N.J. 08054 New Jersey Technology Council PAID Non-profit Org. U.S. Postage 2014 Data Summit & Expo December 9, 2014 JuiceTank, Somerset SPONSORS The Data Summit & Expo will bring together data center infrastructure and operations managers, IT professionals and business continuity professionals as well as senior business and technology leaders to discuss business intelligence and analytics systems and solutions. GOLD SPONSOR CONFERENCE SPONSOR AGENDA 1:00 pm Registration, Networking & Exhibits Open 1:30 pm Welcome & Opening Remarks EVENT SPONSORS 1:35 pm Keynote Speaker Impact of Big Data 2:15 pm Panel 1: Data Center, Co-location, Hosted Solutions – What’s Best for my Business? EXHIBITORS 3:00 pm Break 3:15 pm Panel 2: Using Predictive Analytics to Capitalize on Customer Insights 4:00 pm Panel 3: Big Data’s impact on AdTech, EdTech, FinTech and Supply Chain IT INDUSTRY NETWORK SPONSOR TELECOMMUNICATIONS NETWORK SPONSOR 4:45 pm Networking Reception Sponsorships and exhibiting opportunities available. Contact Paul Frank for more information. For more information visit: www.njtc.org PRESIDENT’S MESSAGE Three months in and I’m still learning how large and important our tech community is in the state. According to the Department of Labor (2013) more than 354,000 people work in tech; and that doesn’t include the thousands of entrepreneurs and tens of thousands of workers who commute to NY. Tech workers account for more than 11 percent of our state’s workers and an impressive 20 percent of all salaries and compensation. Last month, I met with the Partnership for Action, the state’s three-agency team, which includes the Business Action Committee, the NJEDA, and ChooseNJ. During the meeting, I explained that one of the Council’s primary goals is to nurture and support the talent pipeline—from K-12 students to our experienced retirees. During the meeting I talked about the tech-talent shortage in the country, and our region, and referred to a recent Fortune article, “The Global Tech Crunch.” The article notes the troubling talent deficit in our country and identifies other nations that have talent surpluses. Many of those nations, including India, Brazil, Colombia, Peru, Philippines, Egypt and Greece, also have large and robust immigrant communities in New Jersey and the region. The upshot is that while we work diligently to educate the next generation of tech talent, we can also collectively nurture and support our talented immigrant communities, which can help our state and region be more competitive as we grow and move forward. As I’ve mentioned, I believe that the Council’s future success will depend on a collective effort across the state and region to not only educate futuregenerations, but champion innovation in every aspect of business. n —James C. Barrood, President and CEO, NJTC TechNews November 2014 • VOL. 18 NO. 8 New Jersey Technology Council & The Education Foundation 1001 Briggs Road, Suite 280 Mount Laurel, N.J. 08054 phone (856) 787-9700 fax (856) 787-9800 www.njtc.org PUBLISHER James Barrood • [email protected] VP OF PUBLICATIONS Leo M. Mennitt • [email protected] CONTRIBUTING EDITOR Jennifer Simoni • [email protected] NJTC CONNECTIONS EDITOR Judy Storck • [email protected] GRAPHIC DESIGNER Bonnie Jacobs • [email protected] ADVERTISING Ellen Stein • [email protected] TechNews is published by the New Jersey Technology Council and The Education Foundation. We are located at 1001 Briggs Road, Suite 280, Mt Laurel, N.J. 08054. ©2014 NJTC. All rights reserved. Reproduction or use, without permission, of editorial or graphic contents in any manner is prohibited. To obtain permission, contact Leo Mennitt at [email protected] or 856-787-9700 x227. contents On the Cover 4 CORNER OFFICE Scott N. Schober, President and CEO of Berkeley Varitronics Systems Scott Schober shares his expertise on cyber security and wireless technology, talks about his company’s culture, and discusses recent high-profile security breaches in the news. By Jennifer Simoni Plugged In 6 More Organizations are Outsourcing Data Center Operations as Healthcare Industry Leverages Technology Advances By Sean Brady 7 The Path to a Successful Cloud Migration By Jennifer Einhorn 9 Unclaimed Property Due Diligence By Lauren Taguer, CPA Feature 14 Three Business Imperatives for Transforming Global Trade Operations Multi-national companies that are placing more strategic value on their global trade compliance programs can achieve significant cost savings and improve the flow of goods across international borders. By Ty Bordner Columns 11 U.S. Supreme Court on Software Patents: “Show Us the Innovation!” The latest ruling on software patents that came down from the U.S. Supreme Court in July generates more questions than answers. By Richard A. Catalina, Jr., Esq. 16 From Here to There: Rowan Researchers Get Travelers on the Road Rowan University College of Engineering professors and students are figuratively and literally taking their research to the road, helping to make travelers’ journeys—and the environments in which they are taken—safer. NJTC Connections 18 NEW MEMBERS 20 PHOTO GALLERY 22CALENDAR OF PROGRAMS TechNews is published eight times a year and is free to all NJTC members. Unqualified subscribers pay $29.99 per year, $39.99 for two years. Reprints are available for a fee upon request. For more information on the New Jersey Technology Council, see www.njtc.org. To contact a staff member, see the staff box for email addresses. Submissions for New Jersey TechNews are welcome. All editorial copy published is at the discretion of the editor. Send submissions to [email protected]. The views expressed in New Jersey TechNews do not necessarily reflect those of the New Jersey Technology Council or New Jersey TechNews. CONNECT@NJTC NJTC TechWire www.njtc.org Advertising information: Ellen Stein at 856-787-9700 x 228 NJTC on Subscription information: www.njtc.org NJTC Group on @NJTC NJTC Postmaster: Send address changes to: NJTC, 1001 Briggs Road, Suite 280, Mt. Laurel, N.J. 08054. TechNews | www.njtc.org | October 2014 3 CORNER OFFICE Berkeley Varitronics Systems, Inc. is a 40-year old NJ-based company that designs and manufactures wireless test and security products. What has the evolution of business been like for BVS? We’ve had steady success surviving the ups and downs in the roller coaster economy by being diversified and selling to many different vertical industries. By re-investing our capital into R&D and into new designs and products, we are always staying ahead of our competition and first to market. Naturally since we are all connected, much of our designs and expertise involve the latest wireless standards (i.e. cellular, LTE, Bluetooth, Wi-Fi). The areas we focus our attention on are niche markets so there is little if any direct competition allowing us to enjoy healthy margins. How are BVS products positioned to help combat today’s security threats? Scott N. Schober President and CEO, Cyber Security & Wireless Technology Expert Berkeley Varitronics Systems, Inc. 4 We have made a strategic decision to focus our R&D on mobile threat solutions. That has paid off in a tremendous amount of business, spawning an ever-growing fleet of security tools that have gained worldwide acceptance and usage. Government facilities that house classified information have all increased security spending as a result of the recent breaches and tragic shootings. One of the biggest threats is when someone enters a secure confidential facility and smuggles in a wireless device to compromise security. Wireless devices are getting smaller and more challenging to physically detect so cyber-security personal often rely on BVS’ unique array of security tools to detect, locate, and eliminate the wireless threat. Our Wolfhound-PRO, coupled with direction finding antenna, allows one to hunt down and find the hidden cell phones quickly. When Bluetooth is a threat, clients’ deploy our Mantis Bluetooth analyzer allowing security personnel to find discoverable Bluetooth enabled devices such as laptops or mobile phones that are forbidden in secure areas. The latest tool we completed development on is the YellowjacketDF, a Wi-Fi Direction Finding solution allowing one to hunt down rogue access points and mobile Wi-Fi threats. Yellowjacket-DF has the ability to ‘ping’ a target’s Wi-Fi enabled mobile phone and have it report back continuously so one can detect and locate the threat without tipping them off that they are being hunted down. Can you talk about security innovation? BVS’s latest innovative security solution is a full body scanner called the SentryHound cell phone detection portal. This portal uses an advanced algorithm we developed to isolate where a cell phone is hidden on any person. The suspect area is illuminated in one of 12 zones allowing security personnel to quickly isolate a threat area before the individual enters a secure facility. Since this technology does not rely on the RF (Radio Frequency) transmission we can detect mobile phones and electronics powered on, off—even with the battery removed. In addition, we discriminate so we do not pick up on non-ferrous materials TechNews | www.njtc.org | November 2014 that falsely trigger common metal detectors. The SentryHound has gained widespread acceptance for use in court rooms, board rooms, correctional institutions, and secure government facilities. Can you talk a little bit about the culture in your business? On one hand, it seems like it has to be tight-lipped by design; yet, innovation requires a level of transparency. How do you balance it with your teams and staff? Berkeley Varitronics Systems has a unique interdisciplinary team thriving on engineering challenges that other companies struggle to achieve. We handle the entire project from concept to finished design/ product all under one roof. We have the ability to design, schematic capture, PC layout the circuit board, prototype, assembly, CNC machining, testing, software engineering, FPGA design, RF Design, and production run capability. Customers can come to BVS with confidence that their idea will become a reality all under one roof. The overall cost will certainly be higher than if our customers outsourced some or all of the entire project to Asia or India, but they have the assurance that it is all managed under one roof within the United States. This minimizes the risk of IP piracy and theft while allowing us the flexibility needed to respond quickly to customer needs and maintain solid relationships with local suppliers all within the state of New Jersey. I am proud to say this also preserves local New Jersey jobs and strengthens local small businesses within the state. JP Morgan is the latest in a long-list of high-profile security hacks. In your opinion, where are the holes? Why does it keep happening? In the case of J.P. Morgan Chase, the hackers used a compromised employee account to break into a web development server. From there they were able to worm their way into other servers to access sensitive data. This, as well as many other breaches, are due to lack of good security safeguards in place coupled with legacy software that was not properly updated. The web development server had simple access for employees to log on with their user name and password. These are extremely simple to hack when the password is 5 or 6 digits in length (most passwords this simple are hacked in a matter of seconds). If the password were a strong password of 12 or more upper/lowercase characters, numbers, and symbols, that password would take years to hack. If two-factor authentication were required to gain access to this or any other JP Morgan Chase server, the entire breach could’ve been avoided. Often, the software running on many of these networks is legacy software that is not updated regularly with the required security patches making it the perfect target for malicious software. This Malware often sits quietly undetected and can steal customers’ credentials and remotely relay them back before covering it’s own tracks and wiping its existence clean. Cyber hackers are getting bolder and freely sharing hacking techniques with the underground world. Hacking is also becoming very lucrative and thus, when looking for a job, young hackers are attracted to fast money vs. hard-but- rewarding work. (Much of the hacking is originating out of Eastern Europe where legitimate jobs are scarce.) Which industries are most vulnerable for attacks? Why? After the Target breach we have seen a steady uptick in hacking spanning every market segment including large retail corporations, banking industries, internet, government, and the energy sector. Much of the cyber attacks are nationstate sponsored by Governments with a lot of capital behind them looking to send a message and also instill fear. Numerous hacker groups see hacking as an extremely lucrative career and are up for a challenge to outdo those in the underground world. The cyber hackers simply look for the biggest hole where there is vulnerability and that is where they target their breach. Most industries are only spending post-breach instead of being proactive and finding their own weak spots by performing penetration testing. Penetration testing is hiring a legitimate company to hack your own network to expose and evaluate vulnerabilities to sure up defenses for possible cyber attack(s). What do companies need to do to protect their businesses? What are they missing that they should be more aware of? Switch to two-factor authentication. Two-factor authentication requires a password and an additional step such as a code texted to the user’s phone. According to sources close to the investigation, the vulnerable server only required users to supply a login ID and password. It is possible using two-factor authentication would have prevented the breach altogether. Be more open about sharing best security practices. The cyber hackers share hacking tips. Organizations that have been hacked or are targets of hackers should all share tips to prevent future hacks. What is one thing everyone can do tomorrow to strengthen his or her security systems? Social media is becoming the norm for most of us but far too many people put too much information out there for prying eyes to gather information. If you are going away on vacation, never post on Facebook or Twitter that you are going to ‘Disney World’ the week of XYZ. Cyber thieves sweep the internet looking for clues to move in and hack your wireless network or even sell this information on the underground so real thieves will rob your house while you are relaxing on vacation. When cyber thieves start searching they only need a few key pieces of information to steal your identity. Most of this is easily obtained on the internet (Name, Address, birthdate, mothers maiden name, pet’s name, etc.). When we put this information on the internet through social media, it is like handing them the keys to your front door. n TechNews | www.njtc.org | November 2014 5 PLUGGED IN More Organizations are Outsourcing Data Center Operations as Healthcare Industry Leverages Technology Advances Today’s Market Offers Availabilities, Options and Dealmaking Opportunities BY SEAN BRADY Technology advances are bringing incredible benefits to the healthcare/ pharmaceutical industry when it comes to facilitating quality care and providing efficient customer service. At the same time, the usage of computers in the operating room, global access to cutting-edge medical research, the accuracy of digitized health records, the ability to quickly and reliably process claims in today’s rapidly changing insurance marketplace and countless other daily tasks in this 24/7 field require instant – and uninterrupted – access to data. In this changing healthcare environment, the need for additional and increasingly robust computing power will only continue to expand. It is no wonder, then, that a growing number of healthcare-related organizations, including hospitals and pharmaceutical companies, are outsourcing their data centers to third-party providers. Indeed, we have seen several hospitals and pharmaceutical companies outsource their data centers in New Jersey – a clear example of this industry trend. Outsourcing a Data Center When does this shift from an in-house to outsourced data center make sense? Most commonly, large healthcare-related companies think about de-coupling their data function when planning a relocation or expansion into a new facility – and the decision typically comes down to the priority of using working capital, cost efficiencies or the increased need for redundancy and reliability. Simply put, finding an office or medical office building that has Tier Three infrastructure in place, or the space to install equipment to support a data center, is not easy. Outsourcing a data center can save a company a substantial upfront expense. Outsourcing a company’s data center requires leasing a portion of a large third-party data center, in many ways similar to leasing a major piece of equipment, such as an airplane. This solution will typically provide a higher quality facility than what a company is willing to build, and therefore will be more redundant and resilient. The presence of an advanced cooling system, redundant power and fiber feeds, generator space, heavy UPS batteries, ceiling heights for raised floors (if required) and floor loads that support the installation of a data center are all critical for data center operations. Upgrading any of these components in an existing building for less than a ten-year lease term can carry significant expense and may necessitate the navigation of a lengthy town or landlord approval process – hence, the emergence of outsourcing as a viable alternative. While paying for a remotely hosted and operated data center does add monthly expense, clients of third-party providers enjoy a number of advantages. In addition to saving present value dollars on the upfront expense for building the infrastructure, third-party providers have specialized staffing in place to take care of the equipment, replacing any of it when required at no expense to the tenant and keeping things running 24/7/365, which enables the client to redeploy IT talent or potentially eliminate surplus positions. Also, in the event of any failure in the middle of the night or on a holiday, the provider always has an IT, Network or MEP Infrastructure Engineers on hand to solve the problem. These third-party employees all specialize in never allowing the data centers to go down, which See “Outsourcing Data”, page 8 WEBSITE DEVELOPMENT & INTERNET MARKETING Website Design | Web Applications E-Commerce | Custom Development Search Engines | Social Media Targeted & Tracked Advertising 973.748.1357 [email protected] Growing businesses through technology and design. 6 www.TrueHitDesigns.com TechNews | www.njtc.org | November 2014 The Path to a Successful Cloud Migration It doesn’t matter what size business you are, a move to the cloud requires careful planning, consideration and understanding of what’s ahead. BY JENNIFER EINHORN While the move to the cloud can mean major IT savings and improved performance, the shift of enterprise systems and infrastructure from traditional to cloud environments needs to be planned carefully to ensure a real payoff and minimize risk. Whether you’re an enterprise or SMB, the process of migration requires an analysis of business, technical and operational considerations as well as an understanding of emerging cloud technologies and architectures. Business Strategy Should Drive Cloud Strategy Because cloud migration is fundamentally a business decision, it’s important to examine business strategies and processes and map them to the right cloud architecture and cloud strategies. Depending on the nature of your business and the applications you use to operate, cloud technologies provide different levels of availability, failover, security and other services. There is no one-size-fits-all cloud solution. The business needs that drive your IT applications and infrastructure will determine whether to migrate all or a portion of your physical systems, applications and data to a cloud environment and exactly what type of environment that is—whether a private, public or hybrid cloud solution. Some key issues and questions to explore include: • How large and complex is our data? How important are regulatory considerations such as HIPAA, PCI, Sarbanes Oxley, and other requirements related to the privacy and protection of data? • Are our current business applications ‘cloud-ready’? Can they easily be scaled up and down in order to truly take advantage of the elasticity of a cloud environment? If not, what do we need to do—re-architect or replace the applications? Would migration have any impact on our software licenses? • What are our requirements for availability of applications and data? Is any downtime acceptable if there is ever an interruption, maintenance window or other reason we couldn’t access our cloud environment? What would the cost of downtime be and what service level agreement do we require for a cloud environment? • If we build new applications or modify existing ones in a cloud environment, would we be able to take them with us if we changed cloud providers? What would the process and cost be? Don’t Go it Alone For many businesses, the most important step of a cloud migration initiative is finding an experienced and reliable cloud provider who can help you sort through all of the key questions. Look for a provider that operates their own SSAE 16 data centers to ensure your infrastructure has the security and connectivity to protect and run your data. A solid and reputable cloud provider will be there with you each step of the way, to help ensure your migration is a success. They will also have a strong team of certified engineers experienced in such leading technologies as VMware, Cisco and Fortinet. In fact, a cloud provider with a strong ecosystem of cloud partners can be a significant advantage when it comes to delivering a broad portfolio of enterprise-grade solutions quickly and efficiently. Not all Clouds Are Created Equal Just as cloud providers differ, so, of course do cloud solutions. Cookie-cutter cloud solutions are available, just swipe a credit card and you’re on your way, but that’s not the best solution for everyone. There may be concerns about support, security and reliability, plus self-service clouds tend to be priced ala carte and can lead to billing sticker shock. Often a customized cloud solution is the best long-term solution. Here are some features to look for in a custom Infrastructure-as-a-Service (IaaS) solution: Customized cloud features to consider: • High performance firewalls for better security. A cloud solution with dedicated high performance firewalls capable of passing 1 Gbps of traffic will keep your apps running smoothly while helping to ensure secure network performance. In the event of equipment failure, look See “Cloud Migration”, page 8 LEGAL Q&A What should employers be aware of, come January 1, 2015 because of the “increase in minimum wage” amendment to the New Jersey Constitution? In November 2013, voters approved an amendment to the New Jersey Constitution increasing the state minimum wage to $8.25. The amendment also created annual cost of living increases, tied to the Consumer Price Index, to be added to the minimum wage each year. The increases are calculated each September and take effect on the following January. Therefore, effective January 1, 2015, New Jersey minimum wage will rise from $8.25 to $8.38. Employers must ensure that all work performed by employees on and after January 1, 2015 is compensated at the increased rate. Employers should be especially mindful of this change if January 1 falls in the middle of a pay period. Saranne E.Weimer, Esq., is an associate at Giordano, Halleran & Ciesla and member of the firm’s Labor & Employment Department. She can be reached at sweimer@ghclaw. com<mailto:sweimer@ ghclaw.com> or 732-741-3900. 8 PLUGGED IN Outsourcing Data continued from page 6 isn’t always the case for a user-operated facility. Additionally, their services, power and fiber are scalable as a client’s needs evolve, which is difficult to manage in terms of timing and cost in a company-leased or owned facility. In New Jersey, most of the major pharmaceutical/healthcare companies have outsourced their primary or back-up data center to a Third Party Provider. As well, many of the mid-sized companies in the market looking for new office space or looking to right-size their operations today are seriously considering outsourcing their data center operation. These mid-sized companies are similarly confronted with the same needs for power because of the ever-growing big data analytics for marketing and research. Most executives for these companies today are concerned about the safety of their web sites, potential breaches, and they don’t want their sites to go down at all. These companies’ web sites need to stay online for doctors, patients and researchers who need access to the companies’ information for the advancement of medicine and cures. Oversupply of Data Centers The good news is that this is an excellent time to outsource data centers, especially in the New York metropolitan area, which has an oversupply. Northern New Jersey, for example, houses the single largest concentration of data centers in the United States, with more than 35 Third Party Providers in over 70 locations around the state and within one hour of New York City. Manhattan, Rockland and Westchester counties, Long Island and Connecticut also have plenty of options to consider, just not as many as New Jersey. This supply includes a number of providers that specialize in healthcare-specific needs, such as HIPAA compliance and other regulatory issues. In short, today’s market offers tremendous availability and options, providing ample opportunity to negotiate attractive deals. As a resource, brokers specializing in data centers know the availabilities throughout the region, rent per kW or cabinet per month, kWhr, power ramp, power design N-N+1-2N, fiber, and concessions, and understand the areas in which the landlords will be flexible in the contracts (SLA, MSA, or Service Order). Ultimately, the process is just like an office transaction: Experienced data center brokers understand the supply and demand for space just like commercial office real estate and create an environment where the Providers will competitively bid for your occupancy and not sacrifice the quality of service they will provide. The broker is the quarterback for the transaction and the other two valued professionals required as part of the data center team are the engineer and IT/telco consultant, who provide the data center broker with the technical facts and due diligence that are needed on a facility in order to successfully negotiate on behalf of the tenant. Having this team will provide the tenant the best market transaction at any given time in the data center real estate market cycle. n Cushman & Wakefield’s Sean Brady is a Senior Director and Co-Founder of the firm’s Global Data Center Advisory Group, which includes the real estate industry’s most experienced advisors within this highly specialized asset class. Cloud Migration continued from page 7 for a solution that includes built-in redundancy to help keep your data running and protected. • Advanced network protection features such as intrusion detection/prevention; anti-virus protection, data leak prevention and web content filtering can help protect your critical assets in the cloud. • A flexible cloud infrastructure will allow you to better achieve your business objectives. You may need to implement private fiber, MPLS, or Ethernet connectivity to your existing carrier. Or perhaps you want to connect your colo rack to your cloud environment. Look for a cloud and cloud provider that allows that flexibility. According to IT analyst Gartner, cloud growth will continue to accelerate and by 2016 cloud will comprise the bulk of new IT spend. This growth is currently being fueled by the need to drive efficiency within the IT organization, but the next wave of growth will be more focused on innovation, new and better ways to solve business challenges. If you aren’t already in the cloud, this is the time to begin taking the first steps toward that innovation. n Jennifer Einhorn is General Manager for TierPoint, Pennsylvania. http://www.tierpoint.com TechNews | www.njtc.org | November 2014 Is your company afraid of the “D” word? Debt. It’s not a moral failing. It’s a legitimate business tool. Businesses use it to grow, seize opportunities, or just manage their capital flow. EisnerAmper can show you how to approach debt in ways that are responsible, conservative, and—best of all—productive. So you don’t have to think of debt as just another four-letter word. Read more about debt at EisnerAmper.com/debt. Let’s get down to business.® eisneramper.com 732.243.7140 John Pennett [email protected] PLUGGED IN Unclaimed Property Due Diligence BY LAUREN TAGUER, CPA No one wants an audit. Make sure your business is thoroughly dealing with unclaimed property. Unclaimed property and escheatment laws are voluminous and can appear unrealistic to keep up with. However, knowing that they are there can spare your business from an unwelcomed unclaimed property audit. Each state has its own unclaimed property division that not only manages the unclaimed property, but also ensures that companies are performing due diligence. Does your business have policies and procedures in place? If not, your company may be at risk for an audit, which could result in fines, interest and penalties. Simply mailing a check to the unclaimed property owner does not free your business of the responsibility of finding the respectful owner. Companies must demonstrate that they have exhausted all options to locate the property’s rightful owner through a process of due diligence. Here are a few tips to demonstrate due diligence: • Have written policies and procedures in place that represent a timeline of the process (e.g., how often outstanding check listings are reviewed, how old the checks are when your business makes first contact with the owner, etc.); • Prepare a template for company personnel to complete to notify the rightful owner that there is unclaimed property in his or her name; • Formulate a plan of action for each different response that may be obtained after sending the template (undeliverable, wrong address, no response, etc.); • Keep the documentation. It is extremely important to keep a trail of your written policies and procedures (e-mails, correspondence, notes of phone calls, etc.). When companies discard unclaimed property records, state auditors may use estimation techniques to determine historical liability. To prevent this, the organization should adopt record-retention policies compatible with unclaimed property laws; and • Know the state that you are dealing with. The state law that you should follow will correspond to the last known address of the unclaimed property owner. Reporting requirements and due diligence laws vary from state to state, and in order to ensure compliance, it is important to be familiar with the laws in the state. If the process of due diligence does not result in finding the rightful owner, you may need to report the unclaimed property and turn it over to the state where the owner is last known to have resided through a process called escheatment. State escheatment laws vary as to how old an uncashed check should be before remitting it to the state. Further, the laws vary based on the type of payment the check relates to. For example, New Jersey and New York law states that outstanding payroll checks become escheatable after one year, while Pennsylvania has a two-year threshold. In all states, however, property cannot be escheated unless due diligence requirements have been met. It is important that your organization become familiar with the due diligence requirements of each state in which their unclaimed property relates. Failing to implement policies and procedures for compliance can put yourself and your business at risk. Following the few tips discussed above will ensure that your company remains in a position of strength. n Lauren Taguer, CPA,WithumSmith+Brown [email protected] 10 TechNews | www.njtc.org | November 2014 LEGAL EAGLE U.S. Supreme Court on Software Patents: “Show Us the Innovation!” BY RICHARD A. CATALINA, JR., ESQ. The latest ruling on software patents generates more questions than answers. On June 19, 2014, the U.S. Supreme Court issued its long-awaited decision in Alice Corporation, Ltd. v. CLS Bank International, et al., 573 U.S. __ (2014) (No. 13-298), in which the Court considered (again) the patentability of software. While the Court did not establish an absolute bar to the patentability of software, its failure to establish a bright-line rule as to patent eligibility, while yet raising the standard, generates more questions than it answers. The patents at issue in Alice Corp. were directed towards a computerimplemented method for mitigating “settlement risk” (i.e., the risk that only one party to a financial transaction will pay what it owes) by using a third party intermediary. The question presented was whether the claims of those patents were patent eligible under 35 U.S.C. §101, or instead, merely drawn to a patent-ineligible “abstract idea,” thereby rendering the software ineligible for patent protection. As to the patent claims at issue in Alice Corp., the Court held that those claims were directed towards an abstract idea of intermediated settlement and that merely requiring generic computer implementation fails to transform that abstract idea into a patent-eligible invention. As the Court did not enter an absolute rule precluding the patenting of software, where does this leave software patent applications? In sum, the claims in a software patent application must comprise an additional inventive component – specific technological innovation – that is “significantly more” than the abstract idea. As noted by the Court, this requires a “search for an ‘inventive concept’… An element or combination of elements that is sufficient to ensure that the patent in practice amounts to significantly more than a patent upon” the abstract idea. In response to Alice Corp., the United States Patent and Trademark Office (the “USPTO”) issued Interim Guidelines on June 25, 2014, wherein the agency states that claim limitations that may satisfy the new rule of Alice Corp. would include improvements to another technology or technical field, improvements to the functioning of the computer itself, and meaningful limitations beyond generally linking the use of an abstract idea to a particular technological environment. Since the decision in Alice Corp. was handed down by the Supreme Court, the USPTO has been issuing blanket form rejections on virtually all software based patent applications and has even been withdrawing Notices of Allowance – including instances where the applicant has paid the issue fee and is waiting for the patent to issue. While there was some early optimistic speculation by practitioners that the Court’s ruling in Alice Corp. would not significantly change the landscape, it is now clear that the nebulous Alice Corp. standard has fundamentally changed the law and future of software based patents. In terms of patent prosecution, this change in the law necessarily will require far greater disclosure of innovation in the software patent application, including the disclosure of algorithms. In addition, various practitioners are advocating the greater use of “means plus function” claims, the use of which would require full disclosure of the algorithms. While “means plus function” claims have traditionally been narrower in scope than standard functional method, process and systems based claims, after Alice Corp., “means plus function” claims should be included in the application, as standard functional claims face a greater likelihood of invalidation by the USPTO under the Alice Corp. standard. Alice Corp.’s impact, however, travels far beyond patent prosecution practice and the ability to patent protect software. As an asset of a business, the validity of previously issued patents must now be seriously questioned. Pundits abroad are remarking that the vast majority of already issued software patents are likely now invalid under the Alice Corp. standard and may not be worth the paper upon which they are printed. If true, do companies with a substantial patent portfolio of software based patents need to re-evaluate these assets? What does this mean to emerging companies that so highly rely upon their intellectual property as a basis for satisfying the investment community? Is the investment community adjusting how it evaluates software based patents in light of Alice Corp. or is it business as usual? These are a few of the many thorny issues that Alice Corp. raises. From a litigation perspective, seemingly it should now be significantly easier for an infringement defendant to invalidate an asserted software patent. Perhaps underlying the Alice Corp. ruling was the Court’s visceral response to address, in part, the dubious litigation and extortion tactics of “patent trolls” by providing defendants with greater firepower in their defense arsenal to attack the asserted patent. Time will tell if Alice Corp. indeed has any effect on slowing the proliferation of questionable infringement litigation. Clearly, the software patent landscape has been dramatically altered by Alice Corp. The present uncertainty, in time, should settle as the USPTO and the Federal Circuit provide much needed guidance. In the meantime, would-be software applicants would be best advised to more fully disclose the invention, highlight the points of novelty and innovation of the invention as much as possible, and employ creative claim drafting with limitations specifically directed towards such technological advances that are narrower in scope than the actual method or process implemented by the software. n Attorney Richard Catalina, Jr. is Of Counsel with the law firm of Szaferman, Lakind, Blumstein & Blader P.C. and limits his practice to intellectual property, technology and life science law. He is registered to practice before the United States Patent and Trademark Office. TechNews | www.njtc.org | November 2014 11 NJTC 2.0 Ready. Set. Go! Agenda 5:30 pm Cocktail Reception 6:30 pm Awards Ceremony, Dinner & Dessert Attire: Business Professional Suspense Awards Innovative Technology Company of the Year iContracts Kirusa PayCommerce, Inc. Sponsored by Comcast Business Impact Company of the Year AvePoint, Inc. MarketSmith, Inc. Yorktel Sponsored by Juniper Networks, Inc. 2014 NJTC Awards (as of pri BDO, USA LLC | Comcast Business | DLA Piper | Ernst & Young LLP | Edison Partners | GHO Ventures | iCIMS, Inc. | New Jersey Institute of Technology | NPS Pharmaceuticals, Inc. | PNC Bank | PwC | Robert Half Technology | Rowan University Super Awards Private Company of the Year TRAC Intermodal Sponsored by Synchronoss Technologies, Inc. Public Company of the Year Verisk Analytics Sponsored by BDO USA, LLP Master Technology Company of the Year ETS Sponsored by Universal Display Corporation Industry Awards Trailblazer Cancer Genetics, Inc. Sponsored by Systech Rising Star Coriell Life Sciences Sponsored by Robert Half Technology Outstanding Technology Development NIKSUN, Inc. Sponsored by New Jersey Institute of Technology Consumer Product Miele Professional USA Sponsored by Ernst & Young LLP Beacon of Light CytoSorbents Corporation Sponsored by Morgan Lewis John H. Martinson Technology Supporter Award Maxine Ballen, Founder, NJTC Sponsored by Edison Partners Legend of Technology Award Stuart Peltz, Ph.D., CEO PTC Therapeutics Sponsored by McCarter & English, LLP Legislative Champion Award U.S. Senator Cory Booker Sponsored by NPS Pharmaceuticals, Inc. Knowledge is Power Award Thomas Edison State College Sponsored by PNC Bank and Rowan University Celebration Sponsors int date) Juniper Networks, Inc. | KPMG LLP | Maloy Risk Services | McCarter & English, LLP | Merrill Corporation | Morgan Lewis | Stevens Institute of Technology | Synchronoss Technologies, Inc. | Systech | TechXtend | Telx | Universal Display Corporation Three Business Imperatives for Transforming Global Trade Operations Multi-national companies that are placing more strategic value on their global trade compliance programs can achieve significant cost savings and improve the flow of goods across international borders. 14 A ccording to statistics recently released by the World Trade Organization (WTO), U.S. companies imported $2.3 trillion of goods and exported $1.5 trillion in 2013. With the importance of global trade to corporate top and bottom lines, multi-national companies are increasingly placing more strategic value on their global trade compliance programs. Leading organizations realize that strategic global trade programs result in improved international supply chain performance, reduced global duties and taxes, and less corporate risk. Used within a systematic approach to transforming global trade compliance, below are three key areas consistently providing cost savings and process improvements for every multi-national organization, no matter its size. Combining global trade compliance and supply chain operations To fully transform trade compliance and global supply chain operations, multi-national organizations must recognize the connected interactions between these operations. In the past, most trade compliance departments were created to avoid global regulatory fines and penalties and were separate from supply chain operations. Today, global organizations understand the impact compliance operations have on their global supply chain performance. For instance, on-time delivery performance can be impacted when shipments are delayed at Customs due to missing information. Safety stock can be lowered by improving cycle times for cross border shipments. Customer satisfaction increases as responsiveness of the global supply chain improves. And so forth. A 2014 study by American Shipper, “Import Operations and Compliance Benchmark Study,” confirms that the majority of multinational companies recognize the symbiotic relationship of these two functions by assigning import compliance responsibilities to their supply chain organization. This study also identified that a majority of companies have either already integrated or plan to integrate the interconnected functions of trade compliance and global supply chain operations. International companies, particularly those with high trade volumes, can see additional benefits by further integrating these two functions with a comprehensive global trade management (GTM) solution. An end-to-end GTM captures the appropriate supply chain data required, allowing for repurposing of information, reducing rekeying time and errors; provides the necessary global trade content information to comply with global rules and regulations; and effectively shares the information with all necessary global trading partners, increasing visibility, reducing global trade risks and improving global supply chain performance. TechNews | www.njtc.org | November 2014 BY TY BORDNER Accurately capture and use trade content data Companies engaged in global trade manage a tremendous amount of information to establish and maintain compliance with regulations. This information – called trade content – includes harmonized tariff schedules (HS) to classify goods, duty rates needed to calculate landed cost, and controls to determine whether you can legally complete your transaction. For companies managing this process manually, the business impacts can include high error rates, compliance process inefficiencies and increased risks for global supply chains. Further, the nature of trade content requires daily attention to updates, additions, and corrections. When new regulations come into force, they must be immediately identified and applied to any affected trade transactions. Recent studies in the past two years estimate a steady 16 percent increase in global regulatory activity, placing a strain on the resources of multi-national organizations. A recent example of trade regulations are the sanctions against Russia due to its support of the Ukrainian separatists. The sanctions affect both Russian companies and those doing business with them. The new regulations include trade restrictions on specified goods, an arms trade embargo, a ban on the export of dual-use goods for military, and certain restrictions in the energy field. In response, Russia imposed its own trade restrictions, including a ban on imports of a number of commodities from the United States, the European Union, and a few other countries. Organizations that fail to company with these new rules face fines or a loss of export privileges. Trying to manually maintain a complete and accurate database can be time-consuming and costly. Without technology, compliance teams must manually check government sources and track down officials for data. Once the data is collected, the compliance team must translate, analyze and verify the information. The regulations must then be interpreted and codified to be used correctly. Unfortunately, collecting, cleansing and publishing trade content is complicated by the number of countries and government agencies, differences in trade regimes, the presentation of the information in a wide variety of formats. Tightly integrating GTM software with comprehensive global trade content streamlines the process and reduces errors. An integrated solution provides multi-nationals with up-to-date trade information, supporting the underlying processes of import management, export management and preferential trade agreement administration. Adding collaborative technology and processes to the system The nature of today’s global supply chains requires increasing reliance and dependence upon multiple trading partners around the world. Global companies must effectively connect with these partners and respond rapidly to changing business and regulatory requirements. Many multi-nationals have invested heavily in ERP software systems that focus on maximizing processes within the organization rather than across the supply chain. However, due to this focus, these ERP systems and architectures fall short in collecting and sharing information rapidly with customers, suppliers, carriers, brokers and government regulatory agencies. Many companies, however, are unaware of the additional requirements needed to support a global supply chain. A 2013 SCM World report cited “it is surprising how little most organizations have automated or even supported global trade and collaborative execution with global trading partners.” Much of this lack of automation and processes can be attributed to relying on traditional ERP software for all their global supply chain needs. As a result of this internal and domestic focus, many companies cannot respond and adapt quickly to a constantly changing global regulatory and supply chain environment. A successful global supply chain must be able to identify changing trade regulations by country and provide timely updates to appropriate users; quickly connect with new customers, suppliers and carriers; ensure regulatory compliance; and enable a streamlined, visible, cost-effective approach. Deploying a flexible GTM platform can help with these requirements. A flexible system adapts to evolving global business needs; improves global trading partner relationship; formalizes and automates global trade processes and identifies applicable global trade regulations on a timely basis. Multi-nationals focused on these three business imperatives for global trade management are able to achieve significant cost savings and improve their flow of goods across international borders. Focusing on these techniques and implementing technology and processes to address the specific needs of a global supply chain provides an organization with the foundational elements necessary to reduce global trade risks, minimize duties and improve global supply chain performance. n Ty Bordner, vice president of solutions consulting, Amber Road www.amberroad.com TechNews | www.njtc.org | November 2014 15 EDUCATION From here to there: Rowan researchers get travelers on the road. Rowan University College of Engineering professors and students are figuratively and literally taking their research to the road, helping to make travelers’ journeys—and the environments in which they are taken—safer. Numerous professor and student teams are working, often in collaboration with other universities or industry partners, on regional and national initiatives that have garnered millions in outside funding. Dr. Yusuf Mehta, associate professor of civil and environmental engineering at Rowan, is working with researchers from across the country on a series of transportation-related projects. Mehta, who oversees an asphalt lab in the South Jersey Technology Park in Mantua Township, is studying the environmental impacts of recycled asphalt pavement, or the restructuring of asphalt materials removed from previous roadways, under a $452,490 grant from the New Jersey Department of Transportation (NJDOT). His research team, which also includes investigators from Columbia University and Stony Brook University in New York, are working to identify all non-roadway applications, including aboveground applications, for the reused asphalt that are safe for people and the environment and comply with federal and state environmental guidelines. The research explores innovative uses of asphalt, including the construction of guardrails and walls, but also identifies potential hazards that may result from the reused asphalt. Environmental agencies are uncertain whether there are environmental and/or health risks associated with reused asphalt, and this research will provide further insight on the issue. Last fall, the NJDOT also awarded Mehta $450,000 to investigate alternatives to nuclear density testing of soils, a common but expensive quality control process during construction. 16 Nuclear density testing is nuclear-reactive, with engineers using gamma rays to determine the density of a material. An optimum density is critical to achieving better-performing roadways. The project—which also includes researchers from Columbia University and Advanced Infrastructure Design, Trenton, New Jersey—is designed to determine a new method to substitute this costly practice, thus saving taxpayer dollars in the long run. “Nuclear density testing has strict protocols of usage,” Mehta said. “[The NJDOT] wants to find an alternative that is repeatable and accurate. They are willing to explore all options and have kept a very open mind.” Dr. Kenneth Blank, vice president of Health Sciences at Rowan, said collaborations like Mehta’s are a result of Rowan’s recent research institution status, which New Jersey designated in 2013. Projects such as these, he noted, enable Rowan to better address issues facing the region and the country while also expanding the University’s “national footprint.” “We are working with nationally recognized research institutions to solve practical problems,” Blank said. “That’s a major goal of Rowan University — to conduct research that addresses real-world issues and to bring solutions to those problems to the marketplace.” Powered by Algae Rowan has a long history of transportationfocused research that extends well beyond Mehta’s work. For example, the United States Department of Energy (DOE), New York State Department of Transportation (NYSDOT), NJDOT and United States Department of Transportation awarded close to $1.2 million in recent years to Dr. Kauser Jahan, professor of civil and environmental engineering, to conduct research on several transportationrelated projects. TechNews | www.njtc.org | November 2014 Under a $750,000 DOE grant, she is studying the use of algae as a possible alternative fuel source. Jahan, who says using algae is one of the most promising alternatives to traditional biodiesel fuel—plant and animal oils such as soybeans, corn and canola oil and animal fat, materials that need to be replenished through farming—is partnering on the study with Rowan Engineering colleagues (chemical engineering professors Dr. Robert Hesketh and Dr. C. Stewart Slater, chemical engineering associate professor and program chair Dr. Mariano Savelski and civil and environmental engineering associate professor Dr. Will Riddell). The Rowan team is conducting a two–part study: a life-cycle analysis that will determine the most efficient and environmentally friendly way to manufacture biodiesel fuel from algae and, in collaboration with Preston, Minn.-based Algaedyne Corporation and Bordentown-based Garden State Ethanol, Inc., a study of the effect of membrane technology on the growth of algae. The work employs an innovative use of membrane technology to provide carbon dioxide gas to promote algae growth. Algae, Jahan said, may provide a viable energy source and require far less land that other biofuels require, taking up less property that can be devoted to food production. According to Jahan, algae reproduce quickly, produce oils more efficiently than crop plants and require relatively few nutrients for growth. Ultimately, she said, if algae are viable, they can be grown on land considered substandard for agricultural purposes and possibly mass produced indoors as well. And she noted, “If it is found algae are a viable cost-effective biofuel source it will radically charge the future of countries that do not have fossil fuel resources and reduce dependency of other countries on petroleum. Council Connections PRESIDENT and CEO James C. Barrood • [email protected] FOUNDER Maxine Ballen • [email protected] EXECUTIVE VICE PRESIDENT Paul A. Frank III • [email protected] Algae will be an alternative fuel source not only for rich countries but for countries that have no fuel at all.” Jahan also has worked in the past on studies for the NYSDOT on field tests to determine the lead in bridge paint and the use of natural brine for roadway anti-icing and de-icing and for the NJDOT on heavy metal contamination of highway marking beads, among other projects. The United States Department of Transportation also funded Jahan $100,000 to conduct a regional session of the Garrett A. Morgan Technology and Transportation Education Program, a mentoring program for high school students interested in transportation research. Protecting Land and Air Travel Dr. Beena Sukumaran, chair of Civil & Environmental Engineering, has been conducting research for the NJDOT and the Federal Aviation Administration (FAA) for more than a dozen years, including studies with international collaborators. Currently, she is working under a $222,227 grant from NJDOT/University Transportation Research Center to use laser-induced breakdown spectroscopy (LIBS) to identify problematic minerals in aggregate stone. Aggregate stone is used on New Jersey roadways, and if there is the presence of certain problematic minerals, roadways can deteriorate faster. The LIBS analysis technique would replace much more time-consuming and expensive tests done at present by the NJDOT. The LIBS chemical analysis technique involves firing a pulse laser at a sample to remove material and evaluate the composition. Once the LIBS approach has been tested in the laboratory, a LIBS portable unit will be implemented in the field so that NJDOT can do a rapid analysis at construction sites. Working in conjunction with Rowan physics professor Dr. Michael Lim, electrical and computer engineering professor Dr. Ravi Ramachandran and graduate student Andrew Branin from Howell, New Jersey, Sukumaran will advise the NJDOT whether its contractors are using appropriate construction materials in order to ensure the quality of Garden State roads. Sukumaran also is working with postdoctoral scholar Dr. Carlos Cary, a Peru native who received his Ph.D. from Arizona State University; Marie Lecorvaisier, a French student working on her graduate thesis at Rowan; and undergraduate students Adam Bagriacik from Burlington, New Jersey; Robert Cohen from Philadelphia; Jerrett Clark from Pilesgrove, New Jersey; and Kokeb Abera from Williamstown, New Jersey, on a $70,571 funded project for the FAA to determine the suitability of the Superpave Gyratory Compactor (SGC) to replicate field performance of aggregates during construction and trafficking of airfield pavements. “When you construct an airport pavement, you compact it, but under the heavy loads imposed by aircrafts such as the Boeing 777 and Airbus 380, you can deteriorate the airport pavements faster. We want to come up with an approach that would extend the life of the airport pavements by formulating new compaction standards,” Sukumaran said. Blank said that while numerous professors are conducting research on transportation issues, that field is just one of dozens of areas on which Rowan professors, students and university and industry partners are focused. n EXECUTIVE ADMINISTRATOR Karen Lisnyj • [email protected] MEMBERSHIP RELATIONS MANAGER Ellen Stein • [email protected] OFFICE ADMINISTRATION/MEMBERSHIP SERVICES - CONNECTIONS EDITOR Judy Storck • [email protected] IT COORDINATOR Erwin Racimo • [email protected] EVENTS MANAGER Meredith Meyer • [email protected] ACCOUNTING Peggy Reeve • [email protected] NJTC CHARTER MEMBERS Deloitte Edison Venture Fund KPMG LLP Maloy Risk Services Morgan Lewis PNC NEW JERSEY TECHNOLOGY COUNCIL www.njtc.org 1001 Briggs Road, Ste 280 Mount Laurel, NJ 08054 856-787-9700 To learn more about Research at Rowan, visit www.rowan.edu/research TechNews | www.njtc.org | November 2014 17 NJTC NEW MEMBERS As of September 2014 ENVIRONMENTAL & ENERGY TRAC Intermodal 211 College Road East Princeton, NJ 08540 609-986-0182 http://TRACIntermodal.com Rick Carney, CIO TRAC Intermodal is North America’s leading intermodal equipment provider and chassis pool manager serving international and domestic shippers. We provide shortterm chassis rentals and long term chassis leasing through extensive chassis pool programs and pool/fleet management through the use of our proprietary chassis pool management software, PoolStat®. TRAC Intermodal’s active fleet consists of approximately 272,000 chassis. TRAC Intermodal has a broad operating footprint with 630 marine, 167 domestic locations and 61 depot facilities across North America. TRAC is the leader in providing chassis solutions to the intermodal industry. TRAC has been in business since 1968 and is accredited with an A Plus rating by the Better Business Bureau. TRAC is also a member of the Intermodal Association of North America (IANA), the American Trucking Association (ATA), and several other industry organizations. For more information, visit www.tracintermodal.com INFORMATION TECHNOLOGIES CircleBlack, Inc. 353 Nassau Street Princeton, NJ 08540 609-921-2000 www.circleblack.com John Michel, CEO Bringing innovative, next generation, technology to help advisors and investors better control their wealth, and life. Paratus Technologies PO Box 205 Allamuchy, NJ 07820 908-269-5106 www.paratustechnologies.com Brian Freedley, CEO Paratus Technologies offers answers to your IT questions, resolutions to your concerns, and implements effective, strategic plans based on your technology needs. Life Sciences Hilin Life Products, Inc. 211 Warren Street Suite 211 Newark, NJ 07103 973-648-0265 www.hilinlife.com Gayle Naftaly, Managing Director [email protected] Hilin Life Products, Inc. (HLP) has developed a patented (pending in final stages) and FDA cleared reusable medical device designed to help women determine exactly when they are ovulating to help woman become pregnant and plan their pregnancy. The results of this device are clinically proven to be98% accurate.With over 143 million women of child bearing age in developed countries, the market is vast. The main competitive products, urine strips, are costly, messy and ineffective –opening up a big opportunity for Hilin Life Products. Additional differentiators include our educational kit and our smartphone app which tracks a woman’s fertility results. SERVICE PROVIDER NJ Health Foundation/Foundation Venture Capital Group, LLC 120 Albany Street Tower II, Ste 850 New Brunswick, NJ 08901 908-731-6610 www.njhf.org James Golubieski, President New Jersey Health Foundation supports biomedical research, medical education and healthcare programs in New Jersey. Its affiliate, Foundation Venture Capital Group, invests in New Jersey start-ups heading toward commercialization. TELECOMMUNICATIONS Truphone Enterprise Development Center 211 Warren Street, Ste 418 Newark, NJ 07103 646-358-3496 www.truphone.com Christopher Celiberti,VP, Business Engineering - [email protected] Truphone is the first mobile operator in the world without country borders. It brings people closer to their international contacts, makes them more productive, and gives them the international quality of service they deserve. One of the ways that Truphone achieves this is by providing people within a group of eight countries, called the Truphone Zone, multiple international mobile numbers on a patented Truphone SIM card. This means that people’s international contacts can always reach them, and make high quality local calls at a local rate. The Truphone Zone includes Australia, Germany, Hong Kong, the Netherlands, Poland, Spain, USA and the UK. RENEWALS BakerHostetler LLP • www.bakerlaw.com Berkeley Varitronics Systems, Inc. www.bvsystems.com Big Red Pin • www.bigredpin.com BioConsulting International, LLC www.bioconsultinginternational.com Casabona Ventures, LLC www.CasabonaVentures.com Connexin Software, Inc. www.officepracticum.com CoreSite • www.coresite.com DeVry University • www.devry.edu Fintelligent, LLC • www.fintelligent.com Go!Foton Corporation • www.gofoton.com I.D. Systems, Inc. • www.id-systems.com iBiquity Digital Corporation www.ibiquity.com Interphase Systems, Inc www.interphasesystems.com Mission 50 Workspaces • www.mission50.com Onconova Therapeutics Inc. www.onconova.com Petra Systems • www.petrasolar.com Princeton Center for Educational Services www.princetoncenter.com PTS Data Center Solutions, Inc. www.PTSdcs.com RennerBrown, Inc. • www.rennerbrown.com Sevion Therapeutics • www.senesco.com Shlemmer Algaze Associates Interiors www.saaia.com SpeechTrans, Inc • www.speechtrans.com Technology Management Leaders LLC The Philadelphia Trust Company www.philadelphiatrust.com ThoughtFocus Technologies ] www.thoughtfocus.com TranSend IT • www.transendit.com TRI/Princeton • www.triprinceton.org vXchnge (fka FiberMedia) • www.vxchnge.com Wall & Tong, LLP • www.walltong.com Wayside Technology Group www.waysidetechnology.com Joining the NJTC Paul Frank • Ext 222 • [email protected] Membership Services Judy Storck • Ext 246 • [email protected] Member Relations Manager Ellen Stein • Ext 228 • [email protected] 18 TechNews | www.njtc.org | November 2014 IS OLD TECHNOLOGY THE WEAKEST LINK IN YOUR IT CHAIN? Don’t let old technology hold you back. With its intelligence and flexibility, Comcast Business Ethernet is a strategic IT enabler, now and in the future. Because it’s built for business. • One of the largest Ethernet footprints in the country. • Dedicated support for businesses. • Awarded 2013 North American Service Provider of the Year by the Metro Ethernet Forum. BUSINESS.COMCAST.COM/ETHERNET 866- 429-2241 Restrictions apply. Not available in all areas. Call for details. Comcast ©2014. All rights reserved. NJTC PHOTO GALLERY NJTC Leadership Summit Are You Ready to Open Up? The C-level executive’s role as leader, strategist and visionary is incredibly demanding. The Summit was designed to offer a forum for executives to meet with their peers in a closed session to share insights which can help them reflect on their roles as leaders and realize that they are not alone in what they experience. The conference featured a keynote lecture by David Kinitsky, Senior Director at SecondMarket; General Manager of the Bitcoin Investment Trust, facilitated small group discussions led by, Comcast Business, DLA Piper, EisnerAmper, Maloy Risk Services, Morgan Lewis, TD Bank, WeiserMazars, Caliper and The New Jersey Economic Development Authority. The CEOs of the Year engaged in an interactive discussion with Summit attendees about the issues facing CEOs in today’s highly competitive and everchanging business environment. Following the panel discussion, awards were presented to the CEO of public company, private company and not-for profit or educational institute. Photo 1: CEO Award Honorees L-R: James C. Barrood, President and CEO, NJTC; Al Altomari, President and CEO, Agile Therapeutics; Rich Napoli, CEO, ObjectFrontier, Inc.; Fred Dirla, CEO, FieldView Solutions; Michele Brown, CEO, NJEDA; Fran Pierce, President and CEO, Data Systems Analysts, Inc.; Dr. Chris Grevesen, President, DeVry University/NJ Campuses; Dr. Mung Chiang, Director, Keller Center, Princeton University and Dr. Shu-Tung Li, Founder, President and CEO, Collagen Matrix. Photo 2: Keynote Speaker: David Kinitsky, Senior Director at SecondMarket and General Manager of the Bitcoin Investment Trust Photo 3: L-R: Alan Wink, Director, EisnerAmper LLP; David Kinitsky, Senior Director at SecondMarket and General Manager of Bitcoin Investment Trust; Simon Nynens, Chairman, President & CEO, Wayside Technologies and James Barrood, President and CEO, NJTC Photo 4: L-R: Kathleen Coviello, Director, Technology & Life Science, NJEDA; James C. Barrood, President and CEO, NJTC; Michele Brown, CEO, NJEDA; Andy Gilbert, Co-Managing Partner, DLA Piper and Fred Dirla, CEO, FieldView Solutions 1 2 3 4 20 TechNews | www.njtc.org | November 2014 CFO Peer Network Roundtable Closed-door Session on Choosing the Right Investor The discussion was be led by Scott Feldman, Managing Director, Susquehanna Growth Equity; Doug Cox, CFO, Primus Green Energy and Alex Katz, Partner and CFO, ff Venture Capital who addressed questions such as: What should the entrepreneur consider before pursuing funding? How do you manage conflicts of interest? What are your suggestions for a good on-going relationship? Jumpstart NJ Angel Network Jumpstart NJ Angel Network honored founder sponsor Phil Politzner, Chairman Emeritus, EisnerAmper at a special dinner in Princeton thanking him for his support of the group and many years of participation. In attendance were board members, founders and sponsors. Photo: L-R: Alan Wink, EisnerAmper; Mario Casabona, TechLaunch; Jim Barrood, NJTC; , Steve Dyer, Chairman, Jumpstart New Jersey; Greg Olsen, GHO Ventures, Katherine O’Neill, Jumpstart New Jersey; Phil Politizner, EisnerAmper; Steven Lerner, YakStack; Ken Kay, Maxine Ballen, NJTC; , Rick Pinto, Stevens & Lee and Wayne Tamarelli, AWT Private Investments TechNews | www.njtc.org | November 2014 21 NJTC CALENDER OF EVENTS SIMULCAST OF NOVEMBER NYTM AT WITHUMSMITH+BROWN’S RED BANK OFFICE November 3 • 6:30 PM - 9:00 PM WithumSmith+Brown 331 Newman Springs Road Red Bank, NJ SIMULCAST OF NOVEMBER NYTM AT WEISERMAZAR’S METRO PARK OFFICE November 3 • 6:30 PM - 9:00 PM WeiserMazars LLP 399 Thornall Street Edison, NJ Members $5.00 • Future Members $10.00 Members $5.00 • Future Members $10.00 Note: This listing is for watching a live video stream of the event with other community members at WSB, it is not for watching the main event in person at NYU. Note: This listing is for watching a live video stream of the event with other community members at WeiserMazar, it is not for watching the main event in person at NYU. The evening will start with networking with like-minded people including an angel investor. We’ll have pizza, snacks and drinks. Then a founder will do a live demo of their product prior to watching the NY Tech Meetup live. Finally, stick around for more networking with fellow attendees. The evening will start with networking with like-minded people including an angel investor. We’ll have pizza, snacks and drinks. Then a founder will do a live demo of their product prior to watching the NY Tech Meetup live. Finally, stick around for more networking with fellow attendees. Attendance will be limited to 20 people. Attendance will be limited to 25 people. NETWORKS Electronics, Advanced Materials & Logistics Patron Sponsors: Baker & Hostetler LLP • EisnerAmper Contact: Paul Frank • Ext 222 [email protected] Ellen Stein • Ext 228 [email protected] Enviro-Energy Industry Patron Sponsors: Baker & Hostetler LLP • WeiserMazars LLP Contact: Paul Frank • Ext 222 [email protected] Ellen Stein • Ext 228 [email protected] 22 Members $25.00 • Future Members $50.00 Incubator Tenant Members $10.00 Students $5.00 Anti-virus software, firewalls, employee training, and plain common sense can go a long way to protect your customer database and to protect consumers from loss and identity theft. But leaving the door open, allowing personally identifiable information to be stolen or altered, you have not done your job as a privacy and security officer. As a result, you have compromised the trust between you and your customer. There could be legal ramifications as well. Identity theft is an ever growing problem for consumers and businesses alike. As marketers, we have a responsibility to protect the personal data we collect against illegal or unauthorized use. Awareness is one of the most powerful tools in the fight against identity theft, and that’s where you can play an important role: The more your customers know how to protect their identities and what to do if a problem occurs, the harder it is for identity thieves to commit their crimes. Participate with NJTC as we explore these threats to corporate and personal security with a panel of experts. NJTC Peer Networks bring together like-minded technology professionals to share common issues, learn best practices and gain perspective across all technology industry segments. NJTC Industry Networks present programs about opportunities and challenges facing NJ technology companies by industry segment. Arts & Technology Patron Sponsors: EisnerAmper LLP Contact: Paul Frank • Ext 222 [email protected] INFORMATION SECURITY, IDENTITY THEFT AND YOU! November 5 • 5:00 PM - 7:00 PM Delta Corporate Services 129 Littleton Road Parsippany, NJ IT/Software Patron Sponsor: BDO Contact: Paul Frank • Ext 222 [email protected] Judy Storck • Ext 246 [email protected] LifeSci & MedTech Patron Sponsors: Drinker Biddle • McGladrey Contact: Paul Frank • Ext 222 [email protected] Ellen Stein • Ext 228 [email protected] Telecommunications/Media Patron Sponsor: Verizon New Jersey Contact: Paul Frank • Ext 222 [email protected] Judy Storck • Ext 246 [email protected] CEO Forum Patron Sponsors: Morgan Lewis WithumSmith+Brown Contact: Karen Lisnyj • Ext 229 [email protected] CFO Peer Network Patron Sponsors: Cresa NJ – North/Central LLC Ernst & Young, LLP Contact: Karen Lisnyj • Ext 229 [email protected] CIO Peer Network Patron Sponsors: Oracle • telx Contact: Karen Lisnyj • Ext 229 [email protected] TechNews | www.njtc.org | November 2014 Government Affairs Contact: Karen Lisnyj • Ext 229 [email protected] Software Engineering Leaders Peer Network Patron Sponsors: Sparta Systems Szaferman, Lakind, Blumstein & Blader, PC For updated information or to register for NJTC events, visit www.njtc.org Presenters include: • Pat Bergamo, Project Manager at Delta Corporate Services • Scott Schober, CEO, Berkeley Varitronics NJTC AWARDS CELEBRATION See Pages 12-13 November 20, 2014 Renaissance Woodbridge Hotel Iselin, NJ SOFTWARE ENGINEERING LEADERS LUNCH - AGILE COACH November 12 • 12:00 PM - 2:00 PM Sparta Systems 2000 Waterview Drive, Ste 300 Hamilton, NJ 2014 NJTC DATA SUMMIT & EXPO December 9 • 1:00 PM - 5:00 PM JuiceTank 220 Davidson Ave Somerset, NJ Members FREE • Future Members $50.00 Members $75.00 • Future Members $150.00 Speakers: • Brian Dsouza - Agile Coach • Bruce Kratz - Vice President R&D, Sparta Systems In this talk you will gain a basic understanding of Agile methodologies and learn how to move your organization to start realizing the benefits of Agile. Mr. Dsouza is an Agile Coach with 10 years of experience helping companies transition to Agile methodologies. He will share the reasons Agile methodologies may be something your team can benefit from, and how to execute the transformation to Agile. Mr. Kratz leads an enterprise software product team who recently has led his team through this transition. He will comment on how they implemented techniques described by Brian, what benefits they have realized and pitfalls they experienced along the way. ENERGY STORAGE PRODUCTS/SERVICES SHOWCASE November 13 • 5:00 PM - 7:00 PM JCP&L/First Energy 300 Madison Avenue Morristown, NJ Members $25.00 • NFuture Members $50.00 Incubator Tenant Members $10.00 Students $10.00 Energy storage technologies are an important part of the solution to efficiently manage the area’s electricity demands. The goal of this program is to bring together technology providers, commercial energy users and key stakeholders and to provide them with useful information about the available technologies in a showcase and presentation format. Gold Sponsor: The Data Summit & Expo will bring together data center infrastructure and operations IT professionals, and those responsible for business continuity and disaster recovery with senior business and technology leaders who recommend business intelligence and analytical systems and solutions that run against large and complex data sets in educations, finance and healthcare. More details coming shortly. Sponsorships and exhibiting opportunities are available. Contact Paul Frank at [email protected] for more information. INNOVATION FORECAST January 30 • 8:00 AM - 2:00 PM Princeton Plasma Physics Lab 100 Stellarator Road Princeton, NJ Members $150.00 • Future Members $250.00 Innovation Forecast will highlight innovation from throughout the region from new ventures and large companies alike. The Forecast will also feature a panel on how new ideas will be funded in 2015 and beyond. After the event, attendees will have an opportunity to take a tour of one of the leading technology laboratories in the country. More information to come. TechNews | www.njtc.org | November 2014 NJ TECH COUNCIL BOARD OF DIRECTORS Chairman of the Board Simon Nynens, Wayside Technology Group, Inc. Co-Chair Virginia Alling, PNC Bank Board Members Mel Baiada, BaseCamp Ventures Maxine Ballen, New Jersey Technology Council James Barrood, New Jersey Technology Council Joel Bloom, New Jersey Institute of Technology James Bourke, WithumSmith+Brown, PC Skip Braun, Deloitte Charlene Brown, AT&T Leslie Browne, Senesco Technologies, Inc. Michael mChristman, Coriell Institute for Medical Research John Clarke, Cardinal Partners Mark Clifton, SRI International Steven Cohen, Morgan Lewis Kathleen Coviello, New Jersey Economic Development Authority Patricia Donohue, Mercer County Comm. College Chris Downie, Telx Nariman Farvardin, Stevens Institute of Technology Ronald Gaboury, Yorktel Mark Giamo, BDO USA, LLP Andrew Gilbert, DLA Piper Richard Goldberg, R² Associates Ian Goldstein, Drinker Biddle Darren Hammell, Princeton Power Systems Paul Hoffman, Liberty Science Center John Houghton, Nephros, Inc. Brian Hughes, KPMG LLP Flint Lane, Billtrust John Lanza, McGladrey John Martinson, Edison Partners Dan McGrath, Maloy Risk Services Stephen Muretta, Ernst & Young LLP Richard Napoli, ObjectFrontier, Inc. Gregory Olsen, GHO Ventures, LLC Kevin Pianko, WeiserMazars LLP Ari Rabban, Phone.com Marianna Rabinovitch, ECI Technology Jeff Rosedale, BakerHostetler LLP Douglas Schoenberger, Verizon Stephen Waldis, Synchronoss Technologies Alan Wink, EisnerAmper LLP 23 is... Office, Lab, GMP Space, Medical Located next to Mercer Airport 7 Graphics Drive, Ewing NJ Office, Lab, Conference Facility 1000 Waterview Drive, Hamilton NJ 4,000 SF Lab for Lease up to 180,000 SF; 3 Floors, Elevator Serviced; Cafeteria, Fitness Center, Conference Facility Center on Site Exit 7A & Route 130 6,000 SF Office, 14,000 SF AC/Production/Lab Space, 6,000 SF Warehouse, 24,000 SF Total; 22’ Clear, 2 Tailgates, 1 Drive-in Door, 800 Amps Office, Lab, GMP Space, Medical, Data Center Matrix Corporate Campus, 259 Propect Plains Rd, Cranbury NJ SALE 8,000-50,000 SF for Sale or Lease, 800 Amps; Located at NJ Turnpike Exit 8A; Join Bracco Research, ADP, AmeriHealth and Innophos www.fennelly.com | email: [email protected] Phone: 609-520-0061 EdgeBrook Technology Center GMP, Office, Production GMP, Electronics, Production, Warehouse 18 Graphics Drive, Ewing NJ 4 Black Forest Road, Hamilton NJ SALE 30,817 SF Building on 2.8 Acres; 8,500 SF Office, 6,000 SF Production, 2,900 SF Quarantine Storage, 15,000 SF with 32’ Ceilings; 1,200 Amps, Fully Air Conditioned; Located near I-195 & Route 130; Exit 7A Technology Headquarters Building 43,000 SF Located on 4.22 Acres, Fully Air Conditioned, One 10x14’ Drive In, 4 Loading Docks; For Sale
© Copyright 2024