Does Apple Pay Infringe Any Patents?

The New York Times reported that Universal Secure Registry’s filed a lawsuit against Apple and Visa alleging that “Apple Pay digital payment technology violates its patents.”   The May 21, 2017 article in the New York Times was entitled “Apple Pay Violates Patents Held by Security Technology Inventor, Lawsuit Allege” and reported that Universal Secure Registry entered into a 10 year non-disclosure agreement with Visa in 2010 to share their pay technology, however this never led to a license.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

President Trump Signs Executive Order On Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

On May 11, President Trump signed Executive Order (EO) on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. This is a significant development for U.S. cybersecurity as it represents a concrete call to action for the government to modernize its information technology, beef up its cybersecurity capabilities, protect our country’s critical infrastructure from cyberattacks, and ensure the overall cybersecurity and privacy of the internet for generations to come. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Get Ready for Artificial Intelligence (AI) in the Middle of Blockchain!

The eCommerceTimes column described combining “AI with blockchain allows for the secure, transparent review of data that is changed or moved over time, giving both the buyer and seller confidence in the validity, title and transfer of that bridge in Brooklyn.”  The May 18, 2017 column written by my Gardere colleagues Eric Levy, Eddie Block, and me and is entitled “Intertwining Artificial Intelligence With Blockchain” which describes Blockchain and includes a 1955 definition of AI from James McCarthy of Dartmouth College and a team of researchers as follows: …the conjecture that every aspect of learning or any other feature of intelligence can in principle be so precisely described that a machine can be made to simulate it. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Googlification: Google Has Taken Over US Schools and As a Result – the Next Generation!

The New York Times reported that “more than half the nation’s primary- and secondary-school students — more than 30 million children — use Google education apps like Gmail and Docs.”  The May 13, 2017 report entitled “How Google Took Over the Classroom” included the observation that Google has taken over replaced “Apple and Microsoft with a powerful combination of low-cost laptops, called Chromebooks, and free classroom apps.”  As a result: In doing so, Google is helping to drive a philosophical change in public education — prioritizing training children in skills like teamwork and problem-solving while de-emphasizing the teaching of traditional academic knowledge, like math formulas. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

WannaCry Ransomware Attack: What Happened and How to Address

Recently, a widespread global ransomware attack has struck hospitals, communication, and other types of companies and government offices around the world, seizing control of affected computers until the victims pay a ransom.  This widespread ransomware campaign has affected various organizations with reports of tens of thousands of infections in as many as 99 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Private Blockchains May Not Be Secure!

Coindesk recently published a blog which “attacks the idea that true immutability can be achieved in blockchain systems, arguing a more relative definition of this feature better encapsulates what’s the technology can achieve.” The May 9, 2017 article entitled “The Blockchain Immutability Myth” was a blog from “Dr.   View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

GUEST BLOG: Attorney Client Privilege Lost in the Cloud!

My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Arizona Passes a Law Recognizing That Blockchain is Secure!

CIO from IDG reported that the first state to legalize Blockchain with this description “A record or contract that is secured through blockchain technology is considered to be in an electronic form and to be an electronic record.” The May 4, 2017 article entitled “Is blockchain technology secure for your company’s transactions?” described countries that are embracing Blockchain including “Egypt, India, Oman, Turkey and UAE” and banks including the Bank of England and the People’s Bank of China to name a few. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Court Orders Enterprise to Engage in Forensic Imaging and Analysis

In Realpage Inc. v. Enter. Risk Control, LLC, 2017 BL 102339 (E.D. Tex. 2017), the court ordered Enterprise Risk Control, LLC (“Enterprise”) to produce forensic images of devices used by a former Realpage employee to a forensic neutral in order to determine whether any source code was recoverable pertaining to Realpage’s allegations of misappropriation. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus