Money-Saving Licensing Tips for Startups
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Will I Get Sued if I Create Another Hospital Drama? — No Infringement Intended Podcast
Essential Steps to Sell Your Business
Mickey Mouse: un ratón con abogado
(Podcast) The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
Unexpected Paths to IP Law with Dan Young and Colin White
Why Can't I Clean the Graffiti Off My Walls? — No Infringement Intended Podcast
(Podcast) The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
PODCAST: Williams Mullen's Trending Now: An IP Podcast - NCAA Name, Image, Likeness (NIL) Update – Effects of House Settlement
How IP Can Fuel Your Startup's Growth
Tariffs and Trade Series: What Senior Management Teams Need to Know
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Two Key Considerations in NIL Deals
Welcome to the Intellectual Property Litigation Newsletter, our review of decisions and trends in the intellectual property arena. In this edition, we learn that belated statements are not relevant but litigation funding...more
Publication of an algorithm prevents the algorithm from being a trade secret, right? Not necessarily. The Federal Circuit just reminded us that under certain circumstances that may not be the case. ...more
When most companies think about how to protect their proprietary information and inventions, the first (and most obvious) option is to file for patent protection. However, as recent court cases make clear, trade secret law...more
Recently, the Ninth Circuit affirmed a matter of first impression holding that an alleged misappropriation of a trade secret that occurred before the Defend Trade Secrets Act (“DTSA”) was enacted in 2016 may form the basis...more
Shutdown orders due to the COVID-19 virus pandemic have created economic disruption, causing companies to scale back on intellectual property (IP) expense. This creates an opportunity to move ahead of the competition. This is...more
Although many business owners have a general idea of what intellectual property is, most are not as familiar with the different types of intellectual property and what may be protected. This can be an expensive learning curve...more
The United States District Court for the Eastern District of Louisiana recently held that, under the Defend Trade Secrets Act, 18 U.S.C. § 1836, et seq., information included in a patent application remains an actionable...more
In Cajun Services Unlimited, LLC v. Benton Energy Service Company, the U.S. District Court for the Eastern District of Louisiana denied a motion for summary judgment and held that material in a patent application can remain...more
Many companies assume that they need to choose between patent protections or trade secret protections for their intellectual property, thereby foregoing an important tool in their arsenal to protect key company assets....more
At the recent ACC-Socal Double Header Event, Knobbe Martens presented, "CardiAQ - An IP Success Story." ...more
Texas Advanced Optoelectronic Solutions, Inc. v. Renesas Electronics America, Inc., Appeal Nos. 2016-2121, -2208, -2235 (Fed. Cir. 2018)?- In an appeal from a jury trial, the Federal Circuit addressed numerous issues...more
Bitcoin is often portrayed as an untraceable method of payment that facilitates illicit activities by enabling criminals to make and receive payments without being tracked. This depiction implies that users transacting in...more