By David Kalat, BRG | February 1, 2022
The use of GPS systems to track location may seem ubiquitous today. But as this month's history of cybersecurity reveals, it's a relatively recent phenomenon, dating back to one fateful airline disaster at the height of the Cold War.
By David Kalat, BRG | October 4, 2021
Early computers were not only mammoth machines, they weren't very user-friendly. This month's history of cybersecurity examines how the relationship between Man and Machine was reimagined, starting with Xerox's Alto.
By Cynthia Cole, Brooke Chatterton and Natalie Sanders, Baker Botts | September 13, 2021
Any tech companies or marketing firms who rely on harvested data need to consider the implications of these updates on their own products and business plans. And these privacy features are likely the first step in a long path of consumers taking more control of their data.
By David Kalat, BRG | June 7, 2021
Apple's recent transition from Intel-based processors to a new M1 processor using so-called ARM technology has shaken the microprocessor world. But as this month's history of cybersecurity explores, ARM technology is not a recent phenomenon.
By Soniya Shah, Karthik Kumar and Raj Gupta, Finnegan, Henderson, Farabow, Garrett & Dunner | September 2, 2020
While modern day virtual reality and augmented reality use cases promise revolutionary undertakings in mobile applications, gaming, healthcare, retail, automotive, and enterprise industries, the technology has a long history that dates to the 1940s.
By Scott Graham | August 24, 2020
With help from RPX co-founder John Amster's newest venture, the networking competitors have joined forces to create "an industry solution to an industry problem."
By Louis Lehot, L2 Counsel | August 19, 2020
Both the hardware and algorithms have a long way to go until they grace our environments. Quantum computing is not an unattainable innovation, though—it is real enough and, therefore, reachable enough to merit consideration of implications now.
By Victoria Lee, DLA Piper | April 9, 2020
While many technology companies are forging on, it is certainly not business as usual for most. Here are a few key considerations that are unique to the technology sector that bear remembering.
By David Kalat, BRG | April 1, 2020
Today is Census Day, with the ability to submit information online and the use of sophisticated database technology to derive statistics from raw counts. But for more than a century, punch card automation was perhaps the most remarkable longevity of anything in computer science.
By David Kalat, BRG | March 3, 2020
As we head into Super Tuesday, this month's look back at the history of cybersecurity and computing examines when a computer predicted some unbelievable results for the 1952 presidential election.
Presented by BigVoodoo
Law firms & in-house legal departments with a presence in the middle east celebrate outstanding achievement within the profession.
The premier educational and networking event for employee benefits brokers and agents.
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
A large and well-established Tampa company is seeking a contracts administrator to support the company's in-house attorney and manage a wide...
We are seeking an attorney to join our commercial finance practice in either our Stamford, Hartford or New Haven offices. Candidates should ...
We are seeking an attorney to join our corporate and transactional practice. Candidates should have a minimum of 8 years of general corporat...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS