A basic intellectual property presentation relating to patent, trademark, copyright, and trade secret issues at the Alexandria Small Business Development Center.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Confidentiality Agreement for Writers and AuthorsEveryNDA
Learn about why writers and authors may need or want a confidentiality agreement, as well as how to create one and which important clauses to include.
Read the related blog article here for more information:
https://everynda.com/blog/confidentiality-agreement-writers-authors/
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
As APIs continue to drive digital transformation efforts in the enterprise and support innovative customer experiences, securing them has never been more important.
Principal Regional Solution Architect, Philippe Dubuc introduces how to leverage OpenID Connect, OAuth2 and new emerging standards to protect APIs at API Days Paris on 11 December, 2018. In addition, Philippe goes over how the Intelligent Ping Identity Platform can be used to protect APIs in a pro-active way and how AI can help to protect against attacks.
Learn more: http://ow.ly/2Ojm30n1rCT
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
Listen to the on-demand recorded webinar here: http://bit.ly/2synQpD.
In the recording you will learn how customer identity and access management (Customer IAM) solutions can help you meet GDPR requirements out of the box, while also providing a single, unified customer profile, and enabling secure, seamless and personalized customer experiences across all channels and applications.
Note, this is a recorded webinar which took place on 27 June, 2017. For more information on GDPR and how Ping's leading Customer IAM solution can turn a compliance challenge into an opportunity for your organization, visit www.pingidentity.com/GDPR.
Identity Live Sydney 2017 - Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Confidentiality Agreement for Writers and AuthorsEveryNDA
Learn about why writers and authors may need or want a confidentiality agreement, as well as how to create one and which important clauses to include.
Read the related blog article here for more information:
https://everynda.com/blog/confidentiality-agreement-writers-authors/
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
As APIs continue to drive digital transformation efforts in the enterprise and support innovative customer experiences, securing them has never been more important.
Principal Regional Solution Architect, Philippe Dubuc introduces how to leverage OpenID Connect, OAuth2 and new emerging standards to protect APIs at API Days Paris on 11 December, 2018. In addition, Philippe goes over how the Intelligent Ping Identity Platform can be used to protect APIs in a pro-active way and how AI can help to protect against attacks.
Learn more: http://ow.ly/2Ojm30n1rCT
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
Listen to the on-demand recorded webinar here: http://bit.ly/2synQpD.
In the recording you will learn how customer identity and access management (Customer IAM) solutions can help you meet GDPR requirements out of the box, while also providing a single, unified customer profile, and enabling secure, seamless and personalized customer experiences across all channels and applications.
Note, this is a recorded webinar which took place on 27 June, 2017. For more information on GDPR and how Ping's leading Customer IAM solution can turn a compliance challenge into an opportunity for your organization, visit www.pingidentity.com/GDPR.
Identity Live Sydney 2017 - Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Unlocking the Power of Bar & QR Codes for Your Business | Globiboglobibo
Very basic Examples of Bar & QR Codes.
Globbibo provides a wide choice of different Bar code reader devices. Bar code readers allow quick registration of complex data during events, conferences, retail transactions, or warehousing. With different wireless or cabled options, please contact us to get advice on the best choice.
For more info: https://www.globibo.com/et/bar-code-reader-rental.php
#bar #qrcode #globibo #eventtechnology #events
These are our initial product offerings for the banking and financial industry. We offer bitcoins, ether based digital cryptocurrency system along with anti-quantum hacking base image for your systems that allow to leverage on the post- quantum cryptography algorithms that are hacker safe
Identity Live Sydney 2017 - Michael DowlingForgeRock
Businesses operate in a digital ecosystem that’s ever more connected, collaborative and complex. That means becoming a “self-sustaining enterprise”. What does this mean? Think about the business ecosystem as a neighbourhood. A self-sustaining enterprise understands and responds to who’s moving in and out, what they’re doing, and what threats they present. Identity is key to understanding and navigating new relationships in order to perform as effectively as possible while managing risk at an optimal level.
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
Presented by Mike Ellis, CEO, ForgeRock at ForgeRock Open Stack Identity Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
Presenter: Loren Russon, Ping Identity VP of Products Management and Design.
Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2. In this session, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
It’s your job to secure customer interactions with your brand. Enabling multi-factor authentication (MFA) for your customers can secure their data, even if their credentials get compromised elsewhere. You may be asking yourself, “doesn’t MFA add friction and detract from their customer experience?”
Join Pamela Dingle, Principal Technical Architect for Ping Identity, as she outlines three easy steps to transform your own mobile application into a second factor that is both secure and convenient. You will learn how to achieve transaction approvals, strong device-based mobile app authentication, and many other use cases from your own mobile app, with minimal impact on your existing authentication infrastructure.
Stay tuned for the webinar replay. To learn more, download the 'Multi-factor Authentication for Customers' white paper: http://www.bit.ly/2tusUA0
Secure your APIs using OAuth 2 and OpenID ConnectNordic APIs
Session held by Travis Spencer at PayEx and Nordic APIs event "Secure, flexible and modern APIs for Payments" event in Oslo, May 10th.
Description:
When opening up secure APIs, OAuth 2 and OpenID Connect are the primary standards being used today. Implementing and using these standards can be challenging. In this session, Travis Spencer, CEO of Twobo Technologies, will provide an in-depth overview of these standards and explain how they can be integrated into financial services apps. The overview will include information on:
The actors involved in OAuth and OpenID Connect
The flows used in the standards
What grant types are, which are defined, and the message exchanges of each
What scopes are and examples of their use
Different classes of tokens and how they are used
Overview of the OpenID Foundation’s work in the Financial API WG
Attendees will leave with:
An overview of OAuth 2 and OpenID Connect
Knowledge of the basics necessary to using these standards
Resources and information sources where more information can be found
Identity Live Sydney 2017 - Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
Presenter: Loren Russon, VP Product Management at Ping Identity.
As your organisation evolves on its cloud transformation journey, your identity and access management (IAM) system must allow you to navigate multiple cloud environments, managing access to mobile, API and traditional applications. Modern identity services like multi-factor authentication (MFA) and identity intelligence help deliver secure and seamless access for any user, environment and use case. Learn how to transform your IAM system to a modern, API and cloud-first hybrid solution, enabling developers, administrators and users with the self-service applications and tools they need to keep pace with the accelerating demand for mobile and cloud-based applications.
You Can't Spell Enterprise Security without MFA Ping Identity
Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.
What secure standards are there when working with a new API? And why should you care?
Presented by Travis Spencer from Twobo Technologies at Nordic APIs in Trondheim, June 11 - 2013
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Identity Live Sydney 2017 - Andrew LathamForgeRock
Identity is the key to providing compelling products and services for customers. Digital services are leveraging internet of things (IoT) devices–health sensors, home lighting, commercial building control, connected vehicles, and so on–but security, privacy and consent is a major concern. To provide a secure connected experience for customers, you need a holistic identity strategy, where “identities” represent not just humans, but devices, things, and services, and you also need to harness the complex relationships between them. Customers need assurance their interactions with IoT devices are secure, and they need control over how all of their data is used and shared. Learn how you can solve these and other challenging customer identity and access management (CIAM) problems today, and be ready for the identity challenges of the future with ForgeRock.
Unlocking the Power of Bar & QR Codes for Your Business | Globiboglobibo
Very basic Examples of Bar & QR Codes.
Globbibo provides a wide choice of different Bar code reader devices. Bar code readers allow quick registration of complex data during events, conferences, retail transactions, or warehousing. With different wireless or cabled options, please contact us to get advice on the best choice.
For more info: https://www.globibo.com/et/bar-code-reader-rental.php
#bar #qrcode #globibo #eventtechnology #events
These are our initial product offerings for the banking and financial industry. We offer bitcoins, ether based digital cryptocurrency system along with anti-quantum hacking base image for your systems that allow to leverage on the post- quantum cryptography algorithms that are hacker safe
Identity Live Sydney 2017 - Michael DowlingForgeRock
Businesses operate in a digital ecosystem that’s ever more connected, collaborative and complex. That means becoming a “self-sustaining enterprise”. What does this mean? Think about the business ecosystem as a neighbourhood. A self-sustaining enterprise understands and responds to who’s moving in and out, what they’re doing, and what threats they present. Identity is key to understanding and navigating new relationships in order to perform as effectively as possible while managing risk at an optimal level.
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
Presented by Mike Ellis, CEO, ForgeRock at ForgeRock Open Stack Identity Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
Presenter: Loren Russon, Ping Identity VP of Products Management and Design.
Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2. In this session, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
It’s your job to secure customer interactions with your brand. Enabling multi-factor authentication (MFA) for your customers can secure their data, even if their credentials get compromised elsewhere. You may be asking yourself, “doesn’t MFA add friction and detract from their customer experience?”
Join Pamela Dingle, Principal Technical Architect for Ping Identity, as she outlines three easy steps to transform your own mobile application into a second factor that is both secure and convenient. You will learn how to achieve transaction approvals, strong device-based mobile app authentication, and many other use cases from your own mobile app, with minimal impact on your existing authentication infrastructure.
Stay tuned for the webinar replay. To learn more, download the 'Multi-factor Authentication for Customers' white paper: http://www.bit.ly/2tusUA0
Secure your APIs using OAuth 2 and OpenID ConnectNordic APIs
Session held by Travis Spencer at PayEx and Nordic APIs event "Secure, flexible and modern APIs for Payments" event in Oslo, May 10th.
Description:
When opening up secure APIs, OAuth 2 and OpenID Connect are the primary standards being used today. Implementing and using these standards can be challenging. In this session, Travis Spencer, CEO of Twobo Technologies, will provide an in-depth overview of these standards and explain how they can be integrated into financial services apps. The overview will include information on:
The actors involved in OAuth and OpenID Connect
The flows used in the standards
What grant types are, which are defined, and the message exchanges of each
What scopes are and examples of their use
Different classes of tokens and how they are used
Overview of the OpenID Foundation’s work in the Financial API WG
Attendees will leave with:
An overview of OAuth 2 and OpenID Connect
Knowledge of the basics necessary to using these standards
Resources and information sources where more information can be found
Identity Live Sydney 2017 - Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
Presenter: Loren Russon, VP Product Management at Ping Identity.
As your organisation evolves on its cloud transformation journey, your identity and access management (IAM) system must allow you to navigate multiple cloud environments, managing access to mobile, API and traditional applications. Modern identity services like multi-factor authentication (MFA) and identity intelligence help deliver secure and seamless access for any user, environment and use case. Learn how to transform your IAM system to a modern, API and cloud-first hybrid solution, enabling developers, administrators and users with the self-service applications and tools they need to keep pace with the accelerating demand for mobile and cloud-based applications.
You Can't Spell Enterprise Security without MFA Ping Identity
Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.
What secure standards are there when working with a new API? And why should you care?
Presented by Travis Spencer from Twobo Technologies at Nordic APIs in Trondheim, June 11 - 2013
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Identity Live Sydney 2017 - Andrew LathamForgeRock
Identity is the key to providing compelling products and services for customers. Digital services are leveraging internet of things (IoT) devices–health sensors, home lighting, commercial building control, connected vehicles, and so on–but security, privacy and consent is a major concern. To provide a secure connected experience for customers, you need a holistic identity strategy, where “identities” represent not just humans, but devices, things, and services, and you also need to harness the complex relationships between them. Customers need assurance their interactions with IoT devices are secure, and they need control over how all of their data is used and shared. Learn how you can solve these and other challenging customer identity and access management (CIAM) problems today, and be ready for the identity challenges of the future with ForgeRock.
Intellectual Property When Working With 3rd Party DevelopersSoftjourn, Inc.
Intellectual property (IP) can become an issue when you work with
third party providers, whether your employees or someone else’s.
These steps can help protect your IP and keep source code safe.
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
Presented by Stein Myrseth, Senior Technology Solutions Director of ForgeRock and Gerhard Zehethofer, VP or Industries (IOT & Manufacturing) present at Identity Live in Austin in 2018
Building a Mobile App Pen Testing BlueprintNowSecure
Mobile penetration testing helps uncover app exploits and vulnerabilities and is a crucial component of risk assessment. However, many people fear the complexity and don’t know where to get started.
It all begins with a solid plan of attack. NowSecure veterans of hundreds of mobile app pen tests will walk you through the process of assembling a pen testing playbook to hack your app.
This webinar covers:
+Tips and tricks for targeting common issues
+The best tools for the job
+How to document findings to close the loop on vulnerabilities.
Zero trusted networks: Why permiterer security is deadJochen Kressin
Nothing either inside or outside the network perimeter can be trusted without verification! Enterprises are struggling to prevent data breaches. Using conventional approaches they invest a lot of time and energy to protect their networks from outside attacks. VPNs and firewalls are the norms, but perimeter security is not enough anymore. The Zero Trust Security model moves access control mechanisms from the network perimeter to the actual users, devices, and systems.
Android P Security Updates: What You Need to KnowNowSecure
Originally presented August 23, 2018
2018 seems to be the year of privacy updates for both iOS and Android. In this webinar, Mobile Security Analyst Tony Ramirez takes a deeper look at security updates for Android including learnings from Android 8, what to expect for Android 9, and the implications for mobile app security.
Serious games create many opportunities for innovative and creative functionality, content and business models. It is important to insure that you understand how to maximize IP protection for the fruits of your creativity and ensure that it does not run afoul of legal or regulatory issues. This presentation will map the legal landscape for serious games and provide practical advice for how to protect your IP and avoid legal problems.
Inventor Boot Camp Thomas Franklin 10 17 2009dr2tom
Introduction to Intellectual Property (IP)
Presentation includes types of IP - Trade Secrets, Copyrights, Trademarks, Patents; Timing Issues for Protecting IP; and Patent Strategy Models
The Road to Intelligent Authentication JourneysForgeRock
The pressure is on. You need to build a great customer login experience that is secure but doesn’t burden your customers with complicated password requirements. But wait, there’s more – you also need to personalize the login experience and provide metrics back to the business. Legacy authentication has you boxed in. What are you to do? Solutions like multi-factor authentication (MFA) are replacing traditional login methods but its limitations are often static and offer up inconsistent customer experiences, leading to abandonment. Organizations need an intelligent authentication approach that strikes a balance between usability, security, and customer choice. In this webcast you will learn what Intelligent Authentication is and how it enables you to: Easily configure, measure, and adjust login journeys using digital signals including device, contextual, behavioral, user choice, and risk-based factors Leverage user login analytics to increase user adoption rates, and improve the customer experience Automatically redirect suspicious users for further monitoring Quickly consume out-of-the-box authenticators, utilize existing authenticators, and integrate with cyber security solutions — all in one place
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Amazon Web Services
Amazon GuardDuty has the ability to detect threats. However, threat detection is only the first step. In this session, we combine the high fidelity findings of GuardDuty with partner products, and we demonstrate how to quickly respond, remediate, and prevent security incidents in order to supercharge and centralize your cloud security operations center (SOC).
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
The Internet of Things (IoT) relies on the large processing of personal data. And with the adoption of the EU Data Protection Regulation, companies investing on IoT technologies shall considerably change their approach, also because of the potential sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
From Reversing to Exploitation: Android Application Security in EssenceSatria Ady Pradana
Seminar on Explicit's Art of Hacking
Telkom University Bandung
Bandung, 2017-11-04
Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that.
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
Dinosaur thoughts are pervasive, and dangerous to law firms and their clients. It's time to get technically competent--and kill those old risky practices. Welcome to the digital age.
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
Connected objects are taking over the world. There's valuable information hiding in plain sight because of the Internet of Things. Are you ready for smart objects to take over your court case and become an eye witness in your trial?
Angel & Devil: Danger of Emerging TechnologiesAntigone Peyton
New technologies are a concern for all lawyers. This presentation by Antigone Peyton and Ivan Hemmans presented this on March 30, 2012 at the ABA Tech Show.
Social Media for Litigators was presented by Antigone Peyton and Ernie Svenson on Mar 29, 2012 at the ABA TechShow. It makes the point that social media is a powerful marketing tool that lawyers should also embrace because it helps them understand the implications of social media on their litigation practice.
So you want to hear more information about this thing they call “cloud computing,” huh? Well many companies are moving business information and computing into a cloud environment, should law firms be there too? This ABA TechShow presentation covers some basic cloud computing concepts and certain risks and concerns that lawyers should consider before moving their law practice into the cloud.
For additional information on this presentation, please contact Antigone Peyton (antigone.peyton@cloudigylaw.com).
This ABA TechShow presentation is for lawyers and companies who want to have a better understanding of the increasingly important role that social media plays in litigations around the country (and the world). Counsel need to understand that social media is a game changer, and a powerful tool that can be harnessed to win (or lose) a case.
For additional information on this presentation, please contact Antigone Peyton (antigone.peyton@cloudigylaw.com).
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
A basic overview of the U.S. patent law standards for direct infringement of a patent and a case study I’ve used to walk through those standards. This presentation was prepared for the Korean Intellectual Property Office and Korean Invention Promotion Association 2010 training program in Washington, DC.
For additional information on this presentation, please contact Antigone Peyton (antigone.peyton@cloudigylaw.com).
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
So what has been happening in the world of electronic discovery in the litigation context? A lot. From spoliation wars and tragic misfiling of confidential information, to ethics issues involving cloud computing, this presentation is chock full of do’s and don’ts for lawyers dealing with electronic information.
For additional information on this presentation, please contact Antigone Peyton (antigone.peyton@cloudigylaw.com).
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
In the Adani-Hindenburg case, what is SEBI investigating.pptxAdani case
Adani SEBI investigation revealed that the latter had sought information from five foreign jurisdictions concerning the holdings of the firm’s foreign portfolio investors (FPIs) in relation to the alleged violations of the MPS Regulations. Nevertheless, the economic interest of the twelve FPIs based in tax haven jurisdictions still needs to be determined. The Adani Group firms classed these FPIs as public shareholders. According to Hindenburg, FPIs were used to get around regulatory standards.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Exploring Patterns of Connection with Social Dreaming
Two Businessess & An IP Fracas
1. A Tale of Two Small
Businesses & An IP
Fracas
Antigone Peyton
Cloudigy Law
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18. Setting the Stage
Doomsday has a patent covering parts of the Super Public Defender software
program
Doomsday hasn’t registered anything with the Copyright Office
Doomsday considers its customer list a trade secret
It uses a basic employee and contractor agreement that doesn’t say anything
about Intellectual Property rights
Doomsday thinks it’s wrong for Heaven’s Arms to use some of its website
material for a website associated with Heaven’s Arms’ games
21. Patent Analysis
Compare Patent Claims to Final Appeal
software product
If product is covered, then it infringes
the patent
Doesn’t matter whether Heaven’s Gate
knows about patent
Doomsday can get money or an
injunction
26. Trade Secrets
Customer list can be a trade secret in
some circumstances
Depends on what Doomsday does to
protect it and whether it treats it like a
trade secret
27. Factors to Consider
Employee & contractor agreements
restrict access & use
Technical and practical steps taken to
protect it
Competitive advantage to business to
keep it a trade secret
Each situation is different
29. Employee Agreements
They don’t discuss what happens if
employees invent something, or create
something that is protectable by
trademark, copyright, or trade secret law
Problem!!
30. Jack Ryan’s Work
Code for several software games
made up some game images for the
company
created some artwork for several games
added potential customer contacts he
knew personally to the customer list