- All Posts 304 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 52 posts No categories yet.
- Operating Systems 31 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 22 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 111 posts No categories yet.
- Multimedia 29 posts No categories yet.
- Intellectual Property 159 posts No categories yet.
- Wearables 20 posts No categories yet.
- Software 59 posts No categories yet.
- Consumer Electronics 74 posts No categories yet.
- Computer Security 37 posts No categories yet.
- Artificial Intelligence 33 posts No categories yet.
- Cloud Computing 36 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights
7 min read
High-Performance AI Processors to Transform The Digital World
Artificial Intelligence has brought a revolutionary change in every aspect of our lives in this era of technology. When we see autonomous...
4 min read
Blockchain Technology – Patents & Perspectives
Security becomes a priority, especially when the transaction of money or transaction of “Data” is concerned. Data is becoming one of the...
7 min read
Oracle v. Google Shows Why Freely Available Source Code Isn't Actually Free
In computing, source code is any collection of code, written using a human-readable programming language, usually as plain text. The...
3 min read
What is DDR4 SDRAM and How Does It Work?
DDR4 SDRAM or Double Data Rate 4 Synchronous Dynamic Random-Access Memory is a type of synchronous dynamic random-access memory with a...
5 min read
Open Source Vulnerabilities - What are they and how to check them?
Open-source software offers many benefits to enterprises and development teams, they are subjected to open source vulnerabilities that...
5 min read
Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
14 min read
Understanding Open-Source Software and License Regimes
Open-source software today has not only allowed programmers to write increasingly complex software – but also democratized the software...
8 min read
Digital Rights Management (DRM): Comparing PlayReady, FairPlay and WideVine
Digital Rights Management (DRM) refers to the set of policies and rights, used to prevent unauthorized user to access the digital content
12 min read
Revolutionizing Connectivity: Exploring WiGig Technology and its Patent Landscape
In 2009, the Wireless Gigabit Alliance announced its intentions to create a new high-speed wireless standard called WiGig that marks a...
5 min read
Understanding Source Code Quality and Design Quality During Technology M&A
With thousands of transactions and billions of dollars spent on technology mergers and acquisitions (M&A) every year, buyers must protect...
bottom of page