- All Posts 304 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 52 posts No categories yet.
- Operating Systems 31 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 22 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 111 posts No categories yet.
- Multimedia 29 posts No categories yet.
- Intellectual Property 159 posts No categories yet.
- Wearables 20 posts No categories yet.
- Software 59 posts No categories yet.
- Consumer Electronics 74 posts No categories yet.
- Computer Security 37 posts No categories yet.
- Artificial Intelligence 33 posts No categories yet.
- Cloud Computing 36 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights


7 min read
Decoding Privacy/Security of Social Media Applications
If we run a mobile app that collects personal information from us then that app needs a privacy policy to comply with legislation around...


5 min read
Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.


4 min read
Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
2 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...


10 min read
Trade Secret Theft: Explained
Information today has become an influential mechanism – almost equivalent to money or power. Its extravagance and distribution have led...
4 min read
Essential Tools For Attorneys Working From Home During Covid-19
The exponential growth of coronavirus across the globe has impacted virtually every facet of life. The stock markets have tanked,...

8 min read
Digital Rights Management (DRM): Comparing PlayReady, FairPlay and WideVine
Digital Rights Management (DRM) refers to the set of policies and rights, used to prevent unauthorized user to access the digital content

12 min read
Revolutionizing Connectivity: Exploring WiGig Technology and its Patent Landscape
In 2009, the Wireless Gigabit Alliance announced its intentions to create a new high-speed wireless standard called WiGig that marks a...


5 min read
Understanding Source Code Quality and Design Quality During Technology M&A
With thousands of transactions and billions of dollars spent on technology mergers and acquisitions (M&A) every year, buyers must protect...
bottom of page