by Daniel Koblenz | Oct 27, 2014 | Commentary |
Last week, Verizon appeared to cave to FCC pressure when it shelved a new network management policy which would have extended the controversial practice of “data throttling” to 4G customers with unlimited data plans. Verizon’s decision put an end to its two-month...
by Ryan Frei | Oct 21, 2014 | Commentary |
Changing patentable subject matter standards have been on the mind of biotech patent holders for the last few years. A wide range of biotech patents that were widely considered valid have been called into question by the decisions in Mayo v. Prometheus and AMP v....
by Andrew Chipouras | Oct 15, 2014 | Commentary |
As part of the Leahy-Smith America Invents Act (AIA) signed into law on September 16, 2011, Congress expanded the Prior User Rights defense to patent infringement. Initially only available for business method patents, the AIA expanded Prior User Rights to all classes...
by Adam Stefanick | Oct 6, 2014 | Commentary |
On September 17, Apple updated its privacy policy to reflect privacy enhancements added to its most recent iteration of its iPhone mobile operating system, iOS 8. Notably, the update highlighted iOS 8’s new protection for user phone data: out-of-the-box passcode...
by lemertz | Sep 28, 2014 | Commentary |
Earlier this year, Ellen DeGeneres briefly “broke” Twitter after tweeting a selfie full of celebrities, captured while she was hosting the Oscars. In an attempt to beat the record for most re-tweets ever, she enlisted megastars like Meryl Streep, Julia Roberts, Lupita...
by Daniel Quarfoot | Sep 25, 2014 | Commentary |
Another year, another batch of nude celebrity photos flooding headlines and the internet. This month, actress Jennifer Lawrence, model Kate Upton, and a handful of other female celebrities became the latest celebrity hack victims when an anonymous user on the online...