- All Posts 304 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 52 posts No categories yet.
- Operating Systems 31 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 22 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 111 posts No categories yet.
- Multimedia 29 posts No categories yet.
- Intellectual Property 159 posts No categories yet.
- Wearables 20 posts No categories yet.
- Software 59 posts No categories yet.
- Consumer Electronics 74 posts No categories yet.
- Computer Security 37 posts No categories yet.
- Artificial Intelligence 33 posts No categories yet.
- Cloud Computing 36 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights
8 min read
IoT-Based Glucose Monitoring Systems
IoT devices are using Artificial Intelligence (AI) and Machine Learning (ML) to bring intelligence and autonomy to systems and processes,...


7 min read
Decoding Privacy/Security of Social Media Applications
If we run a mobile app that collects personal information from us then that app needs a privacy policy to comply with legislation around...


5 min read
Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.


4 min read
Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
7 min read
Investment in IP-Deficient Startups - A Risk Perspective
Entrepreneurs are quite apprehensive of the early stages of a new business, and they understand that it is an unbelievably engrossing...
2 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...


10 min read
Trade Secret Theft: Explained
Information today has become an influential mechanism – almost equivalent to money or power. Its extravagance and distribution have led...


9 min read
Reverse Engineering and the Law: Understand the Restrictions to Minimize Risks
“To ensure you steer clear of any legal risk of reverse engineering, it should be performed only to the extent of allowances, such as for...
4 min read
State of Software Patents Around the World
Technology is the cornerstone of the digital world and abundant of its practicality rests in the software. As a matter of fact, all...
bottom of page