News & Analysis as of

Software Patents: History and Strategies (Pt. II – Strategies)

Last week we posted part one of this article, which focuses on the history of patent protection for software. Today we post part two, focused on current strategies for obtaining software patents....more

Fuel for the Flames

A company called WildFireWeb is suing Tinder, Inc. in the Central District of California for allegedly infringing on its TINDER mark. For those who don’t know what Tinder, Inc.’s TINDER is, it’s a dating application that...more

Software Patents: History and Strategies (Pt. I – History)

1952-2010: Software Patents Historically (before Bilski and Alice) - For centuries in United States patent law, the question of patentability of the subject matter of an invention under 35 U.S.C. §101 was fairly...more

DMCA Loosening the Reins for Education

You may know the Digital Millennium Copyright Act (“DMCA”) from the widely deployed DMCA take-down notices that copyright owners use to remove putatively infringing content from the Internet. Enacted in 1998, the DMCA is...more

EU Control List Update

The European Commission is revising the list of dual use items subject to EU export, transit and brokering controls. This briefing summarises the main new and deleted entries, primarily concerning machine tools, avionics...more

Big Data, Big Problems: The Liability Pitfall Lurking Beneath the Shiny Surface of “People Analytics”

The use of big data in employment decisions—a practice often referred to as “people analytics”—has exploded in recent years. Lately, however, the concept is gaining more and more attention not only for its appeal of faster...more

2015 DMCA Exemptions In Detail: When Is It OK to Technologically Circumvent Copyright Protections?

On October 28, 2015, the LOC reported a new set of regulations regarding exemptions to the DMCA provision that prohibits circumvention of technological measures that control access to copyrighted works. Here's a summary of...more

Court Of Chancery Calculates The Length Of An Injunction Against Unfair Competition

How long should competition in violation of an agreement be enjoined? Normally, that would depend on what the agreement says. But when that is not set out by the parties’ contract, this decision explains how to determine the...more

The Latest Writers and CAT Software Technology – Part 4

Parts 2 and 3 of this blog featured the latest and greatest in technology for your writer. Now, just as important, let’s discuss the newest technology in CAT software. When is the last time you upgraded versions of your...more

IP Newsflash - October 2015 #3

DISTRICT COURT CASES - Mobile Device Data Monitoring Patent Not Directed to Abstract Idea Under § 101 - On October 26, 2015, Judge Sparks of the Western District of Texas denied defendant’s motion for summary...more

[Webinar] Software Patent Eligibility - A Post-Alice Landscape Discussion - Nov. 10th, 10:00am PST

Join our panel of Knobbe Martens partners for this complimentary and informative webinar to discuss the state of software patent eligibility after Alice Corp v. CLS Bank International. Since the Supreme Court's...more

Precedential Cloud Victory in Michigan Court of Appeals

On October 27, 2015, a three-judge panel sitting for the Michigan Court of Appeals unanimously affirmed a lower court decision finding that the use of cloud-based services in Michigan is not subject to use tax in Auto-Owners...more

The Latest Writers and CAT Software Technology – Part 3

In Part 2 of this series, we highlighted the features of the Luminex writer. Perhaps it piqued your curiosity that it may be a good fit for you? Before you make the financial commitment, however, you owe it to yourself to be...more

Higher Wages for Computer Software Employees for 2016

The Department of Industrial Relations recently announced an increase in the minimum hourly wage required for certain computer software workers who are exempt from overtime under California Labor Code section 515.5....more

Major Verdict Shows the Power of Per Se Theories

How much is a per se theory under N.C. Gen. Stat. § 75-1.1 worth? According to a recent verdict in the U.S. District Court for the Eastern District of North Carolina, it’s worth 52.7 million dollars (plus, no doubt, a big...more

The Growing Power of Fair Price and Process in Delaware Appraisal Actions

On October 21, 2015, the Delaware Court of Chancery issued a post-trial opinion in an appraisal action in which it yet again found that the merger price was the most reliable indicator of fair value. Vice Chancellor...more

Access to Continued Litigation Denied: Method for Intrusion Detection Found Invalid Under Section 101

Order Granting Motion for Judgment on the Pleadings, Protegrity USA, Inc., et al. v. Netskope Inc., Case No. 15-cv-02515-YGR (Judge Yvonne Gonzalez Rogers) - The NorCal IP Blog has extensively covered the increasing...more

“Bug Bounty” Programs Grow In Popularity

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

Director Cordray sends warning to vendors on TRID rule compliance

In remarks yesterday at the Mortgage Bankers Association’s annual convention, CFPB Director Richard Cordray stated that the CFPB may need to look more closely at vendors of software and other tools used by lenders to comply...more

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

DOJ Disables Malware Designed for Bank-Theft; Unseals Indictment Against Botnet Administrator

On October 13, the DOJ unsealed an indictment against a Moldovan citizen for his alleged involvement in a criminal conspiracy to steal confidential financial information by distributing malware software through phishing...more

Health Hackers: Problems in Applying Traditional Products Liability Theories to Latent Cyber-Vulnerabilities in Medical Devices

October is National Cyber Security Awareness Month (yes, that’s a thing), so it seems fitting to write about an unprecedented alert recently released by the FDA to health care providers that warned of a medical device’s...more

VW Group – A Storm in a Teacup?

We've all seen a lot of media coverage about the 1.2 million Volkswagen/Audi/Seat/Skoda vehicles sold in the United Kingdom that are fitted with "defeat" software and the storm clouds are brewing. But the reality is that...more

Autonomous Vehicles – Where in the (Insurance) World Will They Go?

Self-driving cars are coming. In fact, Tesla Model S owners woke up on the morning of October 15, 2015 to discover that a software download to the cars has made them capable of steering and changing lanes at high speed,...more

Certain Uncertainty: The Future Of Computer Software Patents

LIFE AFTER ALICE ... THE STORY SO FAR - Since the Alice decision came down last June, the world of computer software patents has been upended, both in litigation and in prosecution. In the realm of prosecution, patent...more

589 Results
View per page
Page: of 24

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.