Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Preissuance Submission Strategies for Patent Prosecution and Litigation Image

Preissuance Submission Strategies for Patent Prosecution and Litigation

James W. Soong & Sabir Ibrahim

Under the Leahy-Smith America Invents Act, several new mechanisms allow third parties to challenge patent applications and patents. Among these is a new preissuance submission procedure by which members of the general public may submit prior art believed to be relevant to a pending patent application.

Features

iPad Best Practice Tips for Legal Professionals Image

iPad Best Practice Tips for Legal Professionals

Paul Unger

For legal professionals, the only real choice remains Apple's iPad. The wide selection of legal-specific apps for the iPad cannot be matched by competing Android tablets. Whether intended or not, Apple is winning that market. However, with success comes responsibility, and when it comes to lawyers, accountability, security and saving time is extremely important when serving clients. Here are my "best-practice" recommendations and tips to make the most effective and safest use of iPads for lawyers.

Features

The Maturing Nature of e-Intellectual Property Legal Services Image

The Maturing Nature of e-Intellectual Property Legal Services

Jonathan Bick

As the Internet matures, so does the nature of intellectual property legal services required by Internet users. Initially, IP legal services were primarily in demand to facilitate Internet startups. Today, requests for enforcement of Internet IP rights appears to be overtaking calls for legal services related to licensing Internet IP.

Features

Protecting Weak Online Trademarks Image

Protecting Weak Online Trademarks

Scott J. Slavick

Creating a brand name that is trademark-worthy and can be defended in the market requires a thoughtful strategy. The standards of the USPTO for trademark registration are nuanced, and the wrong choice of words can make it challenging to obtain a defensible registered mark.

Features

Using Bring-Your-Own-Device Technology Securely Image

Using Bring-Your-Own-Device Technology Securely

Dale Gonzalez

Bring-Your-Own-Device (BYOD) programs, which allow employees to use their personally owned smartphones, tablets and laptops in and out of the work environment, are significantly changing information technology (IT). Law firms around the country are embracing BYOD as it lets executives and employees use the mobile devices, service providers and operating platforms of their choice.

Features

e-Sales Doing Well Image

e-Sales Doing Well

Michael Lear-Olimpi

Perhaps fueled in part by consumer confidence exhibited in an increase in auto sales, lower gasoline prices, and an apparently recovering construction sector, retail e-commerce rode a rising wave in the Third Quarter, up an estimated 3.7% from the second quarter and 17.3% from the third quarter of 2011, the government revealed last month.

Features

Less Is More in Database Discovery Image

Less Is More in Database Discovery

Michael Spencer & Diana Fasching

If corporate counsel has good lines of communication and support from internal information technology and/or e-discovery personnel, they likely will not need to maintain an in-depth understanding of specific databases and applications. Counsel should, however, understand several key database principles that can affect the discovery process.

Features

Online Holiday Shopping Hits New High Image

Online Holiday Shopping Hits New High

Michael Lear-Olimpi

On Nov. 23, this year's Black Friday, online retail sales tipped over the $1 billion spending brim for the first time, with consumers picking up holiday bargains topping out at $1.042 billion on the Internet, according to comScore, a digital-activity measurement company.

Features

Social and Mobile Media Games Creation Raise Sensitive Legal Issues for Developers Image

Social and Mobile Media Games Creation Raise Sensitive Legal Issues for Developers

Eugene Pak

The social and mobile game industry is experiencing rapid growth as thousands of gaming companies and developers make their games available on iTunes, Facebook and other platforms in the hope of launching the next <i>FarmVille</i> or <i>Angry Birds</i>. The popularity of social and mobile games is expected to expand as sales of tablet computers and smartphones rise. In this competitive landscape, it is not uncommon to find new games that are similar to established popular games, even bearing similar names and features.

Features

BYOD: The Illusion of Cost-Savings Image

BYOD: The Illusion of Cost-Savings

Stanley P. Jaskiewicz

The BYOD movement sprang up from employees' desire to have and use their own choice of a smartphone and to be able to better mix their business and work lives. Yet, this modern-day nod to the 19th Century company town has its dark sides.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›