- All Posts 313 posts
- FinTech 16 posts
- Energy & Infrastructure 10 posts
- Life Sciences 35 posts
- Telecommunications 50 posts
- Mobile Applications 55 posts
- Operating Systems 34 posts
- Computer Networks 53 posts
- Virtual Reality 25 posts
- Gaming 12 posts
- Automotives 14 posts
- Semiconductors 22 posts
- Legal 112 posts
- Multimedia 30 posts
- Intellectual Property 168 posts
- Wearables 23 posts
- Software 65 posts
- Consumer Electronics 79 posts
- Computer Security 38 posts
- Artificial Intelligence 39 posts
- Cloud Computing 39 posts
- Geolocation Services 5 posts
- Reverse Engineering 17 posts
- Patent Infringement 14 posts
- Source Code Review 13 posts
- Document Review 8 posts
- Trade Secret Enforcement 3 posts
- Patent Portfolio Mining 11 posts
- Technology Due Diligence 12 posts
- Prior Art Search 9 posts
- Evidence of Use (EoU) 6 posts
- Damages & Valuation 7 posts
top of page
Insights


Deep Learning with Tensorflow.js
Deep learning is a subset of machine learning in artificial intelligence that has networks capable of learning an unsupervised form of...
6 min read


What is Node.js?
Before interpreting the concept of Node.js, it is important to have some fundamental understanding of JavaScript. JavaScript is commonly...
6 min read


Using Low Code/No Code (LCNC) Platforms for Mobile and Web Applications
Developers can construct mobile or web apps by dragging and dropping application components into low-code or no-code development platforms
6 min read


Augmented Reality (AR) in Car Navigation
The pivotal motive of augmented reality technology in navigation systems is to assist the user in providing the useful information and...
7 min read


Progressive Web Applications (PWA) - Best Fit for Lite Apps Over Native Apps
As technological developments spread from one part of the world to another, the internet inevitably follows suit. In a world where 66% of...
6 min read


Protecting UI/UX Design Using Intellectual Property
UI/UX design is an essential part of any website and the on-screen controls you used to perform various functions on web apps, make up GUI
7 min read


E-Discovery and The Federal Rules of Civil Procedure
What is E-Discovery? Litigation involves discovery, the process of obtaining and exchanging evidence, or information that might...
8 min read


Open Source Vulnerabilities - What are they and how to check them?
Open-source software offers many benefits to enterprises and development teams, they are subjected to open source vulnerabilities that...
5 min read


Reverse Engineering Source Code
Reverse Engineering is a method by which an object is deconstructed for exploring its design, architecture, code and components.
5 min read


What is Doctrine of Equivalents?
While there are multiple ways to skin a cat (see discussion on indirect infringement and direct infringement here), patent infringement...
5 min read
bottom of page