top of page

122 items found

  • Blockchain Technology – Patents & Perspectives

    getting stored in a single place, gets stored across a variety of data servers that participate in the network log for the transaction made – which may be authenticated and validated by users participating in the network Miners are special types of nodes in a network that have dedicated themselves to the task of validating batches of these transactions called blocks, signing and broadcasting them to the rest of the network

  • IP Becomes Even More Integral To M&A Due Diligence

    The major chunk of the acquisition involves the Technology sector where Wireless Communication and Network larger market share: Companies may decide to merge into order to gain a better distribution or marketing network

  • Digital Twin - What is the Future?

    With improvements in networking technology and security, traditional control systems can be leveraged Increased availability of powerful and inexpensive computing power, network, and storage are key enablers help city planners and policymakers in smart city planning by gaining insights from various sensor networks

  • Technology Assisted Review (TAR): Applications Beyond Legal Document Review

    identification of potential data breaches, suspicious activities, and the analysis of log files and network

  • Printed Circuit Boards (PCB)

    products and find evidence of patent infringement through reverse engineering, product testing, and network Our reverse engineering and network captures have been relied upon by leading trial attorneys for negotiating

  • Calculating Damages for Copyright Infringement

    , Jammie Thomas-Rasset was sued by Capitol Records for illegally sharing 24 songs on a peer-to-peer network

  • Intellectual Property for Fashion Industry: Challenges

    consumers across geographical boundaries without the need for physical storefronts or distribution networks

  • Robocalls: The END is near

    which has been pushing for SHAKEN/STIR's adoption has imposed the end of 2019 as a hard deadline for networks &T and Comcast have claimed to have completed the first SHAKEN/STIR call made between two different networks An originating service provider puts the call on the network and authenticates the caller ID information

  • Digital Rights Management (DRM): Comparing PlayReady, FairPlay and WideVine

    The device receives encrypted content via a Content Delivery Network (CDN). products and find evidence of patent infringement through reverse engineering, product testing, and network Our reverse engineering and network captures have been relied upon by leading trial attorneys for negotiating

  • Video Coding Standards and Algorithms - Evolution & Patent Analysis

    experience for existing video services and appropriate performance levels for new media services over 5G networks standards for video encoding, the simplicity of connecting analogue cameras employing video encoders to a network

  • Evolution of Emergency Call Handling Protocols

    Most Public Switched Telephone Networks (PSTN) have a single emergency telephone number (sometimes known NG911 enables faster network communication and call load sharing between PSAPs.

  • Electromagnetic Wave Absorbers – A Solution to Wave Pollution

    These are measured with the help of different analysers such as vector network analyser (VNA). The VNA measures the frequency response of a component or a network of components. The VNA measures the vector response of a high-speed signal to a network by applying a continuous wave

bottom of page