- All Posts 313 posts
- FinTech 16 posts
- Energy & Infrastructure 10 posts
- Life Sciences 35 posts
- Telecommunications 50 posts
- Mobile Applications 55 posts
- Operating Systems 34 posts
- Computer Networks 53 posts
- Virtual Reality 25 posts
- Gaming 12 posts
- Automotives 14 posts
- Semiconductors 22 posts
- Legal 112 posts
- Multimedia 30 posts
- Intellectual Property 168 posts
- Wearables 23 posts
- Software 65 posts
- Consumer Electronics 79 posts
- Computer Security 38 posts
- Artificial Intelligence 39 posts
- Cloud Computing 39 posts
- Geolocation Services 5 posts
- Reverse Engineering 17 posts
- Patent Infringement 14 posts
- Source Code Review 13 posts
- Document Review 8 posts
- Trade Secret Enforcement 3 posts
- Patent Portfolio Mining 11 posts
- Technology Due Diligence 12 posts
- Prior Art Search 9 posts
- Evidence of Use (EoU) 6 posts
- Damages & Valuation 7 posts
top of page
Insights


Understanding Source Code Quality and Design Quality During Technology M&A
With thousands of transactions and billions of dollars spent on technology mergers and acquisitions (M&A) every year, buyers must protect...
5 min read
Managing Code Risks During a Software Acquisition
The most important asset most tech companies possess and hold dear to their heart is their source code. Whether its artificial...
5 min read


Source Code Review: Best Practices
"Few tasks excite a defendant less... Engineers and management howl at the notion of providing strangers, and especially a fierce...
7 min read
Supreme Court Overturns $400 million Verdict For Apple Against Samsung
The biggest IP story this week was the December 6 Supreme Court decision in Samsung Electronics Co. v. Apple, a long fought battle over...
3 min read


Defensive Code Review: Fight Fire With Fire
The pendulum against covered business methods and software continues to swing backward or forward depending on whom you ask. Patent...
3 min read
bottom of page