November 5, 2019

With thousands of transactions and billions of dollars spent on technology mergers and acquisitions (M&A) every year, buyers must protect their investments by conducting due diligence. M&A due diligence allows acquirers to do three important things:

  1. Confirm the premises of the deal

  2. Gather information to plan the integration

  3. Identify unknown risks

When considering an acquisition, a buyer will first amass information about the target company and formulate an investment thesis. Then, the buyer would perform due diligence to integrate the target into their operation, within a predetermined window of time as agreed upon between the buyer and the target company...

August 9, 2018

A U.S. jury awarded IBM $82.5 million after finding that Groupon infringed four of its e-commerce patents. It had been a running battle between the two companies since 2016, when IBM accused Groupon  of failure to license technology and intellectual property which provided the foundation of e-commerce. Initially, IBM sought damages worth $167 million, which Groupon managed to bring down to half its value (source).

The verdict underlines IBM’S booming intellectual property licensing business, which brought $1.19 billion for the company the previous year. IBM holds more than 45000 patents and is widely regarded as the most prolific patentee in modern history.

Mid...

May 7, 2018

With the latest update of iOS, Apple has started following a rather ‘intrusive’ policy in getting their customers on board their Apple Pay platform. Apple hopes to bring its current $28B Apple Pay business to $40B by the end of fiscal year 2020. A recent study reveals that digital payments are expected to hit $726B by 2020. Although a majority of Americans still prefer carrying the good old stash of cash, with more and more options available for making the switch to digital payments easier, the adoption of cashless transactions is on a steady rise.

In 2008, Apple took the mobile industry by surprise with a patent application that talked about the use of a fingerprint sensor...

May 3, 2018

NB-IoT, EC-GSM and LTE-M are the cornerstones of "Mobile IoT " and are in the process of deployment in existing mobile network architecture.

April 18, 2018

Tuesday, April 10, 2018: A federal jury in Eastern District of Texas awarded VirnetX Holding Corp. (VHC) with a $502.6 million verdict against Apple Inc. finding that Apple was infringing 4 secure communications patents – providing a new chapter to the now eight-year old battle between Zephyr Cove, Nevada based VirnetX and Cupertino-based Apple, Inc.

VirnetX first sued Apple back in 2010 (6:10-cv-00417), for which the jury awarded VirnetX $368 million in damages in November 2012 plus a 1 percent ongoing royalty on iPhones. The four patents-in-suit relate generally to creating Virtual Private Network (VPN) connections from a client to server by way of sending a domain name se...

April 12, 2018

The Microsoft HoloLens has finally received its first major update in over a year, which Microsoft calls the RedStone 4. The update provides a boost to developers using the UWP (Universal Windows Platform) to develop applications for the HoloLens with ease. Mixed reality has been a top emerging technology for at least 4 years now, but despite increasing investments in mixed reality, the current industry majors have yet to sufficiently commercialize a consumer product.

The headset which weighs around 580 grams, with no wires or oddly shaped antennas popping out of it, is surely on the heavier side of the spectrum of headsets, but the weight is evenly distributed and designed...

April 11, 2018

In the present technological era, information plays a vital role and a critical asset which should be protected. Cryptography has always been the first choice for the security solution to protect the information. It is a technique for changing over plaintext into some code, known as ciphertext, which the third party can’t decrypt easily. The cryptographic information is secure, however, decryption of data at the destination end, the complete integrity of the data and availability of the data when needed are three vital aspects of cryptography. In the view of these three aspects a few methods, protocols and security standards should be followed to protect the information ove...

April 19, 2017

The most important asset most tech companies possess and hold dear to their heart is their source code.

Whether its artificial intelligence, automated cars, Internet of Things or enterprise security, our business and personal lives are driven by software. Thus naturally when a company acquires another, the source code behind the acquired products represents a major contributor to the value of that acquisition.

The way source code is conceptualized, structured, written and managed in companies has dramatically changed in the last 15 years. Until the late 1990s when open source and cloud computing concepts were not as prevalent, most source code was developed in silos where a...

Please reload