Intellectual property News
August 23, 2017
The Cisco-Springpath acquisition places crucial HyperFlex technology under the networking vendor.
June 16, 2017
A federal task force identified six areas that can improve cybersecurity for healthcare, including more education and information sharing.
May 17, 2017
Best app we've come across recently has to be Shinder. Shinder is a kind of dating website from self-styled comedian/entrepreneur, Sheridan ‘Shed’ Simove. Best practices for online dating suggests ...
April 20, 2017
Nexsan won a court victory over Dell EMC, right in the giant's back yard. A Massachusetts federal district court sided with Nexsan Inc. this week in its trademark dispute with Dell EMC over use of ...
Intellectual property Get Started
Bring yourself up to speed with our introductory content
Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, movies, music and computer programs. Continue Reading
3D printing has made significant inroads in the enterprise. It offers an efficient way to prototype ideas, generate samples and build products, but it presents new challenges for admins. Continue Reading
A non-practicing entity (NPE) is someone who holds a patent for a product or process but has no intentions of developing it. A patent is a government-issued license that gives an inventor exclusive rights to the manufacture, use or sale of his invention for a specified time period. An NPE does none of those things. Continue Reading
Evaluate Intellectual property Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With Office 2016, Microsoft introduced a host of new security features ranging from email and file encryption to multifactor authentication for application access. Continue Reading
Cybersecurity and supply chain risks are drawing more attention from senior management and board members, but many companies fall short with accountability. Continue Reading
Channel partners are building their own IP assets to help differentiate themselves. That strategy involves a learning curve and requires a resource commitment, however. Continue Reading
Manage Intellectual property
Learn to apply best practices and optimize your operations.
Expert Judith Myerson explains how IP theft can happen despite the cryptographic protections in IEEE standard P1735, as well as what can be done to protect intellectual property. Continue Reading
The cyberinsurance market is maturing rapidly, but there are still gray areas to navigate. Sean Martin explains what enterprises should know about policies. Continue Reading
As midyear approaches, there are several channel market trends-- from DRaaS to compliance -- shaping the partner landscape in 2016. Continue Reading
Problem Solve Intellectual property Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprises often struggle to identify and prioritize the most pressing security concerns and threats. Sean Martin explains the common CISO challenges facing organizations today. Continue Reading
Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data has become to nefarious parties. In addition to customer data, companies must make sure sensitive company information such as trade secrets and intellectual property are protected as well. To face these constantly evolving data security threats, businesses have been forced to completely revamp their approach to information protection and embed security into data governance and business processes. In this handbook, learn about the pressing information security vulnerabilities facing modern companies and advice to implement governance strategies that keep your data secure. Continue Reading
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data. Continue Reading