After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Health Activists' Petition Seeks Sunset Of CBI Claims: On August 21, 2014, six environmental health organizations filed a petition under Section 21 of the Toxic Substances Control Act (TSCA). The petition urges the U.S....more
The Department of Transportation’s (DOT) Pipeline and Hazardous Materials Safety Administration (PHMSA) on August 11, 2014, proposed a rule that would add a section to the Hazardous Materials Regulations (HMRs) creating...more
Infrastructure and Regulations may Dictate Speed of Adoption -
America’s shale gas revolution is making waves in transportation technology. Currently, only 1 percent of all natural-gas-fueled vehicles worldwide are...more
General Legislative -
The Senate will convene at 10:00 am on Tuesday, July 23. Senate Majority Leader Harry Reid (D-NV) is expected to renew his motion to proceed on the FY 2014 Transportation, Housing and Urban...more
Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more
Find a Science, Computers & Technology Author »
Back to Top