- All Posts 311 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 34 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 55 posts No categories yet.
- Operating Systems 33 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 25 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 112 posts No categories yet.
- Multimedia 30 posts No categories yet.
- Intellectual Property 166 posts No categories yet.
- Wearables 22 posts No categories yet.
- Software 64 posts No categories yet.
- Consumer Electronics 78 posts No categories yet.
- Computer Security 38 posts No categories yet.
- Artificial Intelligence 38 posts No categories yet.
- Cloud Computing 39 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights
IoT-Based Glucose Monitoring Systems
IoT devices are using Artificial Intelligence (AI) and Machine Learning (ML) to bring intelligence and autonomy to systems and processes,...
8 min read


Smart Clothing - IoT gets even closer!
Similar to the advancement of smartphones and tablets, wearable technology has been favored by early adopters and is now ready to expand...
5 min read


Flexible Batteries: State of the Art
Flexible batteries are an active area of research because they enable electronic products to be more bendable, adaptable, and...
4 min read


Decoding Privacy/Security of Social Media Applications
If we run a mobile app that collects personal information from us then that app needs a privacy policy to comply with legislation around...
7 min read


Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
5 min read


Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
4 min read
Investment in IP-Deficient Startups - A Risk Perspective
Entrepreneurs are quite apprehensive of the early stages of a new business, and they understand that it is an unbelievably engrossing...
7 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...
2 min read


Trade Secret Theft: Explained
Information today has become an influential mechanism – almost equivalent to money or power. Its extravagance and distribution have led...
10 min read
bottom of page