August 6, 2018

Based on an analysis of over 200 cases spanning the last decade, this article provides instances when their claim charts actually do more harm than good in forming, advocating and ultimately proving the patent infringement position in the case

August 6, 2018

It never ceases to amaze me how fast the wireless communication sector has evolved. To keep up with the expectations of the consumer, in terms of faster speed and stronger connectivity, the pioneers in the industry have worked their fingers to the bone. And hence fueling the contest, as to who rules the markets.

LG and Ericsson have been one of the largest contributors to the 2G, 3G and 4G standards, and are determined to even dominate the 5G domain. Lately, the 2 companies had been in a patent licensing dispute which they finally decided to settle out of court. They’ve also renewed their global licensing agreement along fair, reasonable and non-discriminatory (FRAND) terms,...

July 12, 2018

What once seemed to be a series of relentless bickering, smartphone giants Apple and Samsung finally reached a settlement on June 29, 2018. Although terms for the agreement have not been disclosed, it is quite apparent that both the parties had had enough mutual drama, in and out of the courtroom.

When Apple filed its first lawsuit against Samsung back in 2011, the news set off alarms because Samsung at the time was a major component in Apple’s supply chain, which manufactured everything from DRAM and SSDs for MacBook Pros to the A4 and A5 processors in the iPhone, iPod touch, Apple TV, and iPad. In its complaint, Apple said “Instead of pursuing independent product developme...

May 7, 2018

With the latest update of iOS, Apple has started following a rather ‘intrusive’ policy in getting their customers on board their Apple Pay platform. Apple hopes to bring its current $28B Apple Pay business to $40B by the end of fiscal year 2020. A recent study reveals that digital payments are expected to hit $726B by 2020. Although a majority of Americans still prefer carrying the good old stash of cash, with more and more options available for making the switch to digital payments easier, the adoption of cashless transactions is on a steady rise.

In 2008, Apple took the mobile industry by surprise with a patent application that talked about the use of a fingerprint sensor...

May 3, 2018

NB-IoT, EC-GSM and LTE-M are the cornerstones of "Mobile IoT " and are in the process of deployment in existing mobile network architecture.

April 18, 2018

Tuesday, April 10, 2018: A federal jury in Eastern District of Texas awarded VirnetX Holding Corp. (VHC) with a $502.6 million verdict against Apple Inc. finding that Apple was infringing 4 secure communications patents – providing a new chapter to the now eight-year old battle between Zephyr Cove, Nevada based VirnetX and Cupertino-based Apple, Inc.

VirnetX first sued Apple back in 2010 (6:10-cv-00417), for which the jury awarded VirnetX $368 million in damages in November 2012 plus a 1 percent ongoing royalty on iPhones. The four patents-in-suit relate generally to creating Virtual Private Network (VPN) connections from a client to server by way of sending a domain name se...

April 12, 2018

The Microsoft HoloLens has finally received its first major update in over a year, which Microsoft calls the RedStone 4. The update provides a boost to developers using the UWP (Universal Windows Platform) to develop applications for the HoloLens with ease. Mixed reality has been a top emerging technology for at least 4 years now, but despite increasing investments in mixed reality, the current industry majors have yet to sufficiently commercialize a consumer product.

The headset which weighs around 580 grams, with no wires or oddly shaped antennas popping out of it, is surely on the heavier side of the spectrum of headsets, but the weight is evenly distributed and designed...

April 11, 2018

In the present technological era, information plays a vital role and a critical asset which should be protected. Cryptography has always been the first choice for the security solution to protect the information. It is a technique for changing over plaintext into some code, known as ciphertext, which the third party can’t decrypt easily. The cryptographic information is secure, however, decryption of data at the destination end, the complete integrity of the data and availability of the data when needed are three vital aspects of cryptography. In the view of these three aspects a few methods, protocols and security standards should be followed to protect the information ove...

Please reload