- All Posts 309 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 54 posts No categories yet.
- Operating Systems 33 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 23 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 112 posts No categories yet.
- Multimedia 30 posts No categories yet.
- Intellectual Property 164 posts No categories yet.
- Wearables 21 posts No categories yet.
- Software 62 posts No categories yet.
- Consumer Electronics 77 posts No categories yet.
- Computer Security 38 posts No categories yet.
- Artificial Intelligence 36 posts No categories yet.
- Cloud Computing 38 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights
Oracle v. Google Shows Why Freely Available Source Code Isn't Actually Free
In computing, source code is any collection of code, written using a human-readable programming language, usually as plain text. The...
7 min read


Patent Drafting - Best Practices
Drafting a patent application is not as easy as many think. Many times those new to the industry fail to adequately describe inventions...
8 min read


Open Source Vulnerabilities - What are they and how to check them?
Open-source software offers many benefits to enterprises and development teams, they are subjected to open source vulnerabilities that...
5 min read
IoT-Based Glucose Monitoring Systems
IoT devices are using Artificial Intelligence (AI) and Machine Learning (ML) to bring intelligence and autonomy to systems and processes,...
8 min read


Decoding Privacy/Security of Social Media Applications
If we run a mobile app that collects personal information from us then that app needs a privacy policy to comply with legislation around...
7 min read


Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
5 min read


Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
4 min read
Investment in IP-Deficient Startups - A Risk Perspective
Entrepreneurs are quite apprehensive of the early stages of a new business, and they understand that it is an unbelievably engrossing...
7 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...
2 min read
bottom of page