- All Posts 333 posts
- FinTech 17 posts
- Energy & Infrastructure 10 posts
- Life Sciences 35 posts
- Telecommunications 52 posts
- Mobile Applications 59 posts
- Operating Systems 39 posts
- Computer Networks 55 posts
- Virtual Reality 27 posts
- Gaming 12 posts
- Automotives 16 posts
- Semiconductors 24 posts
- Legal 115 posts
- Multimedia 36 posts
- Intellectual Property 175 posts
- Wearables 25 posts
- Software 68 posts
- Consumer Electronics 86 posts
- Computer Security 39 posts
- Artificial Intelligence 46 posts
- Cloud Computing 42 posts
- Geolocation Services 5 posts
- Reverse Engineering 17 posts
- Patent Infringement 15 posts
- Source Code Review 13 posts
- Document Review 8 posts
- Trade Secret Enforcement 3 posts
- Patent Portfolio Mining 12 posts
- Technology Due Diligence 13 posts
- Prior Art Search 9 posts
- Evidence of Use (EoU) 6 posts
- Damages & Valuation 8 posts
- Computer Graphics 0 posts
top of page
Insights


Decoding Privacy/Security of Social Media Applications
If we run a mobile app that collects personal information from us then that app needs a privacy policy to comply with legislation around...
7 min read


Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
5 min read


Functional Claiming - What is "Structure" and Why is it Important?
What is a Functional Claim? A functional claim limitation describes an invention in terms of what it does, rather than describing its...
4 min read
bottom of page