5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Wolf Greenfield Attorneys Review 2024 and Look Ahead to 2025
(Podcast) The Briefing: A Very Patented Christmas – The Quirkiest Inventions for the Holiday Season
The Briefing: A Very Patented Christmas – The Quirkiest Inventions for the Holiday Season
5 Key Takeaways | Alice at 10: A Section 101 Update
New Developments in Obviousness-Type Double Patenting and Original Patent Requirements — Patents: Post-Grant Podcast
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Artificial Intelligence Patents & Emerging Regulatory Laws
John Harmon on the Evolving Impact of Artificial Intelligence on Intellectual Property
Rob Sahr on the Administration’s Aggressive Approach to Bayh-Dole Compliance
The Briefing: The Patent Puzzle: USPTO's Guidelines for AI Inventions
The Briefing: The Patent Puzzle: USPTO's Guidelines for AI Inventions (Podcast)
Wolf Greenfield Attorneys Preview What’s Ahead in 2024
Noteworthy Points in the Rules for the Implementation of China's Patent Law 2023
5 Key Takeaways | Best Practices in Patent Drafting: Addressing 112 and Enablement after Amgen
Third Party Observation in Patent Prosecution in China
Building a Cost-Effective Global Patent Portfolio Using the Netherlands
Greater Speed and Efficiency: Steps IP Offices Around the World Are Taking to Streamline the Patent Process
Ways to Amend the Claims in the Patent Invalidation Proceedings
Estoppel Doctrine in China's Patent System
3 Key Takeaways | Third party Prior Art Submissions at USPTO
Welcome to the Intellectual Property Litigation Newsletter, our review of decisions and trends in the intellectual property arena. In this edition, we learn that belated statements are not relevant but litigation funding...more
Publication of an algorithm prevents the algorithm from being a trade secret, right? Not necessarily. The Federal Circuit just reminded us that under certain circumstances that may not be the case. ...more
When most companies think about how to protect their proprietary information and inventions, the first (and most obvious) option is to file for patent protection. However, as recent court cases make clear, trade secret law...more
Recently, the Ninth Circuit affirmed a matter of first impression holding that an alleged misappropriation of a trade secret that occurred before the Defend Trade Secrets Act (“DTSA”) was enacted in 2016 may form the basis...more
Shutdown orders due to the COVID-19 virus pandemic have created economic disruption, causing companies to scale back on intellectual property (IP) expense. This creates an opportunity to move ahead of the competition. This is...more
Although many business owners have a general idea of what intellectual property is, most are not as familiar with the different types of intellectual property and what may be protected. This can be an expensive learning curve...more
The United States District Court for the Eastern District of Louisiana recently held that, under the Defend Trade Secrets Act, 18 U.S.C. § 1836, et seq., information included in a patent application remains an actionable...more
In Cajun Services Unlimited, LLC v. Benton Energy Service Company, the U.S. District Court for the Eastern District of Louisiana denied a motion for summary judgment and held that material in a patent application can remain...more
Many companies assume that they need to choose between patent protections or trade secret protections for their intellectual property, thereby foregoing an important tool in their arsenal to protect key company assets....more
At the recent ACC-Socal Double Header Event, Knobbe Martens presented, "CardiAQ - An IP Success Story." ...more
Texas Advanced Optoelectronic Solutions, Inc. v. Renesas Electronics America, Inc., Appeal Nos. 2016-2121, -2208, -2235 (Fed. Cir. 2018)?- In an appeal from a jury trial, the Federal Circuit addressed numerous issues...more
Bitcoin is often portrayed as an untraceable method of payment that facilitates illicit activities by enabling criminals to make and receive payments without being tracked. This depiction implies that users transacting in...more