- All Posts 304 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 52 posts No categories yet.
- Operating Systems 31 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 22 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 111 posts No categories yet.
- Multimedia 29 posts No categories yet.
- Intellectual Property 159 posts No categories yet.
- Wearables 20 posts No categories yet.
- Software 59 posts No categories yet.
- Consumer Electronics 74 posts No categories yet.
- Computer Security 37 posts No categories yet.
- Artificial Intelligence 33 posts No categories yet.
- Cloud Computing 36 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights
5 min read
Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
7 min read
Investment in IP-Deficient Startups - A Risk Perspective
Entrepreneurs are quite apprehensive of the early stages of a new business, and they understand that it is an unbelievably engrossing...
2 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...
10 min read
Trade Secret Theft: Explained
Information today has become an influential mechanism – almost equivalent to money or power. Its extravagance and distribution have led...
4 min read
Essential Tools For Attorneys Working From Home During Covid-19
The exponential growth of coronavirus across the globe has impacted virtually every facet of life. The stock markets have tanked,...
8 min read
Digital Rights Management (DRM): Comparing PlayReady, FairPlay and WideVine
Digital Rights Management (DRM) refers to the set of policies and rights, used to prevent unauthorized user to access the digital content
5 min read
Understanding Source Code Quality and Design Quality During Technology M&A
With thousands of transactions and billions of dollars spent on technology mergers and acquisitions (M&A) every year, buyers must protect...
1 min read
Patent Alert: WINDGO granted IoT wearable products patent having sensing and response components
Would you mind wearing a smart wearable product (such as Smart Bandages, Diapers, and/or Socks) having a sensor and a dispensing unit to...
1 min read
Patent Alert: Amazon wins patent for spoilage-sniffing refrigerator
A refrigerator can slow down the spoilage of food and drinks stored within the refrigerator, although the process is not completely...
bottom of page