No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
It's never fun to see years and years of hard work go to waste. In particular, when you build an eCommerce site on a site like Etsy, Shopify, Amazon, or eBay, and get an email message or a letter informing you that you have...more
Vulnerabilities in software and hardware are as common as weather changes in Northeast Ohio, and they aren’t going away any time soon. A few years ago, Intel announced vulnerabilities in virtually every computer processor...more
Your personal information is threatened by more pernicious tools and attacks each year. While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more
Podcasting megastar (and, for me, “News Radio” jack-of-all-trades) Joe Rogan has signed a multiyear deal to bring his “Joe Rogan Experience” show to Spotify, an agreement that “could be worth more than $100 million based on...more
Even the mighty can fall – Apple agreed to pay OFAC $467k for violations of the Foreign Narcotics Kingpin Sanctions regulations. In 2008, Apple entered into an applications development agreement with SIS, a Slovenian...more
For corporations, the mobile app is today’s website. Back in the late 1990s, no self-respecting company, no matter how stodgy and old-fashioned, wanted to be without a website....more
Recently, the mobile platforms have played an important role in improving end-user privacy. Along these lines, Apple, in or around iOS version 6.0, created a new, unique identifier that could be used in place of the UDID and...more
As the world recovers from the excitement leading up to Tuesday’s Apple Live Event announcement of the new iPhone 6 and Apple Watch, mobile app developers are chomping at the bit to create software that leverages the new...more