Search Results (2195)
Documents on computer software
Show: results per page
|ALJ Bullock Denies Request For Oral Argument Regarding Spansion’s Motion For Sanctions In Certain Flash Memory Chips (337-TA-893)|
Eric W. Schweibenz; Oblon, McClelland, Maier & Neustadt, L.L.P.;
February 18, 2015, previously published on January 5, 2015On January 5, 2015, Chief ALJ Charles E. Bullock issued Order No. 74 in Certain Flash Memory Chips and Products Containing Same (Inv. No. 337-TA-893).
|North Korea’s Attack Raises Critical Coverage Issues and TRIA Implications|
Joseph F. Bermudez, Carl J. Pernicone; Wilson Elser Moskowitz Edelman & Dicker LLP;
February 18, 2015, previously published on December 23, 2014The FBI advised that the recent attack on Sony Pictures Entertainment (SPE) “destroyed systems” and “rendered thousands of SPE’s computers inoperable, forced SPE to take its entire computer network offline, and significantly disrupted the company’s business...
|Game Developers: What’s Your SWOT?|
Chinh H. Pham; Greenberg Traurig, LLP;
February 17, 2015, previously published on December 8, 2014Multiple criteria have been used over the years by companies and investors to identify the commercial viability of Game Developer Creative Processa technology within a given industry. Included among these criteria are timeliness, market demand, and competitive advantage. These and other criteria...
|Summary of Ericsson, Inc. v. D-Link Systems, Inc., 2013-1625, -1631, -1632, -1633|
Sughrue Mion PLLC;
February 17, 2015, previously published on December 4, 2014On December 4, 2014, in Ericsson, Inc. v. D-Link Systems, Inc., the U.S. Court of Appeals for the Federal Circuit (“Federal Circuit”) vacated the district court’s royalty awards, holding that the district court erred in including all 15 Georgia-Pacific factors in the jury...
|ONC to Tackle Interoperability in 2015 As Congress Requires New Certified EHR Tech to Include Interoperability and Direct De-Certification of Current Systems That "Proactively Block the Sharing of Information."|
Leonardo M. Tamburello; McElroy, Deutsch, Mulvaney
& Carpenter, LLP;
February 17, 2015, previously published on January 16, 2015Before the ubiquity of the internet, it was at best cumbersome and at worst impossible for computers using different operating systems or applications to share information or files with each other. The result was a balkanized world where Macintoshes couldn’t talk to IBM PCs and where...
|D.C. Federal Court Allows IT Worker Lawsuit Over Optional Practical Training Program|
Shaun Staller; Greenberg Traurig LLP;
February 16, 2015, previously published on December 10, 2014A lawsuit brought by a union and several IT workers concerning the legality of the student visa work program known as Optional Practical Training (OPT) was given the go-ahead by federal district court Judge Ellen Segal Huvelle, following her denial of the Department of Homeland Security’s...
|Are You an E-Athlete?|
Chinh H. Pham; Greenberg Traurig, LLP;
February 16, 2015, previously published on January 8, 2015Video games were once associated with couch potatoes, but today there is growing legitimacy, especially around what is known as “eSports.” This type of professional competitive gaming is gaining popularity in the U.S., and eSports is breaking into the mainstream world - emerging...
|Canada’s Anti-Spam Legislation: An Advantage for Cloud Computing?|
Arnold Fridhandler, Martin P.J. Kratz; Bennett Jones LLP;
January 20, 2015, previously published on October 23, 2014The communications provisions of Canada’s Anti-Spam Legislation (CASL) came into force on July 1, 2014. Generally speaking, CASL prohibits a person from sending a “commercial electronic message” without the consent of the recipient.
|CASL - Regulatory Guidance For Computer Program Installation Rules|
Bradley J. Freedman; Borden Ladner Gervais LLP;
January 13, 2015, previously published on November 12, 2014Effective January 15, 2015, Canada¿s anti-spam law (commonly known as ¿CASL¿) will impose restrictions and requirements for the installation and use of computer programs on another person¿s computer system. The rules apply to almost any computer program (not just malware/spyware/harmful programs)...
|The Second Wave of CASL: Transmission Data and Computer Program Rules in Effect Soon|
Chris Bennett, Bill Hearn, Tamara L. Hunter, David Spratley; Davis LLP;
December 3, 2014, previously published on November 7, 2014CASL’s anti-spam rules have been in effect for just over four months, and many organizations have adjusted (or are adjusting) to them. While anti-spam compliance is a work in progress, it is important to remember that CASL addresses more than just spam. Specifically, CASL’s altering...