- All Posts 304 posts No categories yet.
- FinTech 16 posts No categories yet.
- Energy & Infrastructure 10 posts No categories yet.
- Life Sciences 33 posts No categories yet.
- Telecommunications 50 posts No categories yet.
- Mobile Applications 52 posts No categories yet.
- Operating Systems 31 posts No categories yet.
- Computer Networks 53 posts No categories yet.
- Virtual Reality 22 posts No categories yet.
- Gaming 12 posts No categories yet.
- Automotives 14 posts No categories yet.
- Semiconductors 22 posts No categories yet.
- Legal 111 posts No categories yet.
- Multimedia 29 posts No categories yet.
- Intellectual Property 159 posts No categories yet.
- Wearables 20 posts No categories yet.
- Software 59 posts No categories yet.
- Consumer Electronics 74 posts No categories yet.
- Computer Security 37 posts No categories yet.
- Artificial Intelligence 33 posts No categories yet.
- Cloud Computing 36 posts No categories yet.
- Geolocation Services 5 posts No categories yet.
- Reverse Engineering 17 posts No categories yet.
- Patent Infringement 14 posts No categories yet.
- Source Code Review 13 posts No categories yet.
- Document Review 8 posts No categories yet.
- Trade Secret Enforcement 3 posts No categories yet.
- Patent Portfolio Mining 11 posts No categories yet.
- Technology Due Diligence 12 posts No categories yet.
- Prior Art Search 9 posts No categories yet.
- Evidence of Use (EoU) 6 posts No categories yet.
- Damages & Valuation 7 posts No categories yet.
top of page
Insights


7 min read
Quantum Computing - Patent Perspective
On a fundamental level, computing systems rely on the ability to store and manipulate information represented and stored as a stream of...


5 min read
Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.


4 min read
Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
What is Technology Risk Assessment?
Information Technology (IT) has gained wide importance amongst the competitive position of firms and hence managers have grown more...
2 min read
Tokenized securities on blockchain are here. And they’ve been around for a while.
Remember tokenized securities or securitization with tokens on the blockchain? With the entire year in crypto defined by a maelstrom of...


10 min read
Trade Secret Theft: Explained
Information today has become an influential mechanism – almost equivalent to money or power. Its extravagance and distribution have led...
7 min read
LTE (4G) network security model and its drawbacks covered in 5G network
Wireless connectivity is spurring a wave of digital transformation which is not just changing our way of working with IT, office tools,...
6 min read
Understanding Miracast as a Wireless Display Technology
Miracast is a standard for wireless connections which defines a protocol to connect external monitors via Wi-Fi to your device.

12 min read
Revolutionizing Connectivity: Exploring WiGig Technology and its Patent Landscape
In 2009, the Wireless Gigabit Alliance announced its intentions to create a new high-speed wireless standard called WiGig that marks a...
9 min read
Robocalls: The END is near
What is a Robocall? A robocall is a phone call made by an automated computer program, commonly referred to as a "robot" or "bot." These...
bottom of page