After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
When one big industry sues another we learn a lot about how business as usual is conducted.
In this case Humana, a giant health insurer, has sued the medical device company Medtronic, maker of the Infuse bone graft. ...more
On October 15, 2013, a divided three-judge panel of the United States Court of Appeals for the Eighth Circuit rendered a federal False Claims Act ("FCA") judgment against Bayer Healthcare Pharmaceuticals ("Bayer"), based on a...more
Three former employees of Bristol Myers Squibb, Inc. (BMS) brought a qui tam action alleging that BMS violated California’s Insurance Frauds Prevention Act, California Insurance Code section 1871.7 et seq. (IFPA), by giving...more
The cloud is all the rage these days. Cloud computing, that is.
When a business uses a cloud computing service, its data storage and application server needs are handled by a third party provider that it can connect to via...more
Part Three in a multi-part series on the topic.
In Part One of this series, we discussed California’s Electronic Discovery Act. Part Two discussed the importance in legal proceedings of electronic information from social...more
Ensuring that key business data survives unexpected events is vital for businesses large and small. That’s why every business should have a plan in place to ensure the availability of its data when manmade or natural...more
Find a Science, Computers & Technology Author »
Back to Top