top of page

129 results found

  • Understanding Miracast as a Wireless Display Technology

    media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network Miracast devices do not require any home network to exist for making paired connection. P2P, Wi-Fi Direct Application: Screen Mirroring Frequency allocation: 2.4GHz, 5 GHz Encryption: WPA2 Network products and find evidence of patent infringement through reverse engineering, product testing, and network Our reverse engineering and network captures have been relied upon by leading trial attorneys for negotiating

  • Is Embedded SIM (eSIM) a Solution For IoT Devices?

    The SIM cards were firstly sold to Radiolinja, which was a Finnish Wireless Network operator. At present, there are more than 200 network operators which have or are planning to launch eSIM services The carrier will send her a physical SIM card with their network-specific data stored in it. The carrier data is stored on the physical SIMs and devices need that data to access the network. Instead of using a physical SIM to send the data required to connect to the network, the carrier can

  • Internet Cookies: Impact on Online Privacy

    as a username and password, and are used to identify a computer when it is connected to a computer network When an internet cookie is exchanged with a network server, the server reads the ID and knows what specific On the other hand, a social network may use Internet cookies to track the links they click and then use An attacker eavesdropping on network traffic could easily capture the internet cookie and use it to gain following: Mobile apps that send or receive data over the internet Platforms for online gaming Advertising networks

  • Quantum Computers: Advancement in Weather Forecasts and Climate Change Mitigation

    Pasqal builds quantum computers from ordered neutral atoms in 2D and 3D, offering a broad range of quantum news/climate-measurement/pasqal-and-basf-to-use-quantum-computing-for-weather-prediction.html#:~:text=Neutral

  • Reverse Engineering and the Law: Understand the Restrictions to Minimize Risks

    (ECPA), sections 18 U.S.C. 2510, restricts interference of electronic communications flowing over a network Because packets are communications, network packet inspection may violate the ECPA. The ECPA is a complicated regulation, so if your research involves inspecting network packets, even if Copperpod’s dedicated go-to technical team also performs product testing and network packet capture through

  • Federated Learning: A Paradigm Shift Towards Decentralized AI

    simple and produces accurate models, the presence of a central server creates a bottleneck issue, as network instead of raw data, saving bandwidth and improving model convergence, especially in resource-constrained networks Decentralized Finance (DeFi): Provides secure, privacy-focused services on blockchain networks.

  • IP Becomes Even More Integral To M&A Due Diligence

    The major chunk of the acquisition involves the Technology sector where Wireless Communication and Network larger market share: Companies may decide to merge into order to gain a better distribution or marketing network

  • Blockchain Technology – Patents & Perspectives

    getting stored in a single place, gets stored across a variety of data servers that participate in the network log for the transaction made – which may be authenticated and validated by users participating in the network Miners are special types of nodes in a network that have dedicated themselves to the task of validating batches of these transactions called blocks, signing and broadcasting them to the rest of the network

  • Digital Twin - What is the Future?

    With improvements in networking technology and security, traditional control systems can be leveraged Increased availability of powerful and inexpensive computing power, network, and storage are key enablers help city planners and policymakers in smart city planning by gaining insights from various sensor networks

  • Technology Assisted Review (TAR): Applications Beyond Legal Document Review

    identification of potential data breaches, suspicious activities, and the analysis of log files and network

  • Calculating Damages for Copyright Infringement

    , Jammie Thomas-Rasset was sued by Capitol Records for illegally sharing 24 songs on a peer-to-peer network

  • Printed Circuit Boards (PCB)

    products and find evidence of patent infringement through reverse engineering, product testing, and network Our reverse engineering and network captures have been relied upon by leading trial attorneys for negotiating

Let's connect

Ready to take your IP efforts to the next level? We would love to discuss how our expertise can help you achieve your goals!

Copperpod is one of the world's leading technology research and forensics firms, with an acute focus on management and monetization of intellectual property assets. 

Policy Statements

Contact Info

9901 Brodie Lane, Suite 160 - 828

Austin, TX 78748

​​​​

info@copperpodip.com

  • LinkedIn
  • Facebook
  • X
  • YouTube
  • Medium 2

© 2025 Carthaginian Ventures Private Limited d/b/a Copperpod IP. All Rights Reserved.                                                                                                               

bottom of page