In the rapidly evolving data center industry, efficiency, scalability, and sustainability are paramount. As the demand for data processing power continues to surge, driven mainly by AI, traditional cooling methods are being...more
The Federal Circuit just dismissed the Government’s “Late is Late” appeal on Dec. 16th as moot, preserving the split between the Court of Federal Claims (COFC) and the Government Accountability Office (GAO) on the issue of...more
Over the past decade, technological innovations have quickly transformed how companies operate their IT infrastructure. Traditional on-site servers and hardware have often been replaced or supplemented by off-site solutions...more
The business world woke up Friday to yet another emergency. A CrowdStrike outage has caused computer shutdowns across the globe affecting businesses in every sector. More likely than not, your business is being affected by...more
It has been referred to as one of the top copyright cases to watch this year. This case, Alexis Hunley, et al v. Instagram, LLC, questioned the scope and validity of the Server Test, a copyright doctrine that was established...more
Traduction en cours. Can the buyer in a M&A transaction who takes possession of the seller’s or target company’s privileged communications on closing use those communications in a post-closing dispute against the seller?...more
Are you using VMware ESXi servers? Why should you worry? Unpatched VMware ESXi servers are actively being attacked against a two-year-old remote code execution vulnerability to deploy a new ESXiArgs ransomware. ...more
The disposal of hardware in the wrong manner can leave an organization offside its regulatory obligations under privacy legislation. Depending on the residence of the individuals or entities whose personal data is stored by...more
On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In), a functional organization under the Ministry of Electronics and Information Technology (MeitY), Government of India issued directions under sub-section...more
What is the cloud? There are many differing (but also similar) answers to that question. Some consider the cloud a gateway to providing online access, while others consider it the relatively narrow provisioning of remote...more
Patent owners searching for an appropriate venue for cases against alleged infringers may be able to point to the activity of an infringer’s agents, based on a new decision from the Eastern District of Texas. In recommending...more
The National Security Agency (NSA) recently issued a warning to private industry about four zero-day vulnerabilities in Microsoft Exchange Server versions 2013, 2016, and 2019 used on-premises....more
The US Court of Appeals for the Federal Circuit has now held that a “place of business” for purposes of the patent venue statute requires an employee or agent of the defendant to be conducting business at that place. In light...more
After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more
The US Court of Appeals for the Federal Circuit elected not to decide en banc whether servers or similar equipment in third-party facilities constitute a regular and established place of business under the patent venue...more
We predicted last year that hackers would become more malicious in the future, not only stealing and selling data for nefarious purposes, but actually destroying data and even systems. That reality hit email provider VFEmail...more
We predicted last year that hackers would become more malicious in the future, not only stealing and selling data for nefarious purposes, but actually destroying data and even systems. ...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
The EU’s General Data Protective Regulation (“GDPR”) has been a popular topic of late. Fisher Phillips’ Employment Privacy Blog has covered the evolution of this regulation, starting with the roll back of the previous “safe...more
We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more
The prosecution of Martin Shkreli, whom the BBC has called “the most hated man in America,” reveals some important lessons about the Fourth Amendment protections against search and seizure in the digital corporate context:...more
Earlier today, the Chinese government in Beijing approved a sweeping new cybersecurity law aimed at centralizing control over computer networks operating within China’s borders. The new law is broadly drafted and...more
On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more
As the number of smart devices in homes connected to the Internet continues to grow, the need to keep home networks secure becomes increasingly important. Device manufacturers that promise to secure these home networks,...more
ASUS TeK Computer, Inc. (ASUS) has agreed to settle with the FTC over allegations that “critical security flaws in its routers put the home networks of hundreds of thousands of consumers at risk.” The FTC further alleges that...more