- All Posts 309 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 54 posts No categories yet.
- Operating Systems 33 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 23 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 112 posts No categories yet.
- Multimedia 30 posts No categories yet.
- Intellectual Property 164 posts No categories yet.
- Wearables 21 posts No categories yet.
- Software 62 posts No categories yet.
- Consumer Electronics 77 posts No categories yet.
- Computer Security 38 posts No categories yet.
- Artificial Intelligence 36 posts No categories yet.
- Cloud Computing 38 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights


Open Source Vulnerabilities - What are they and how to check them?
Open-source software offers many benefits to enterprises and development teams, they are subjected to open source vulnerabilities that...
5 min read


Decoding Privacy/Security of Social Media Applications
If we run a mobile app that collects personal information from us then that app needs a privacy policy to comply with legislation around...
7 min read


Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
5 min read


Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
4 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...
2 min read


Trade Secret Theft: Explained
Information today has become an influential mechanism – almost equivalent to money or power. Its extravagance and distribution have led...
10 min read
Essential Tools For Attorneys Working From Home During Covid-19
The exponential growth of coronavirus across the globe has impacted virtually every facet of life. The stock markets have tanked,...
4 min read

Digital Rights Management (DRM): Comparing PlayReady, FairPlay and WideVine
Digital Rights Management (DRM) refers to the set of policies and rights, used to prevent unauthorized user to access the digital content
8 min read

Revolutionizing Connectivity: Exploring WiGig Technology and its Patent Landscape
In 2009, the Wireless Gigabit Alliance announced its intentions to create a new high-speed wireless standard called WiGig that marks a...
12 min read
bottom of page