- Troll or No Troll? Policing Patent Usage With an Open Post-Grant ReviewBy: David G. Barker In December 2004, a mystery business, JGR Acquisitions Inc., purchased the patent portfolio of bankrupt Commerce One at auction. Commerce One had not previously enforced the acquired patents and many ...
- Television: Peer-To-Peer’s Next ChallengerBy: D. Branch Furtado The entertainment industry has obsessed over the threat of peer-to-peer file sharing since the introduction of Napster in 1999. The sharing of television content may present a compelling case for ...
- The Dormant Commerce Clause and State Regulation of the Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?By: Chin Pann Several states have enacted statutes to protect minors from harmful or obscene materials disseminated over the Internet, as well as from pedophiles seeking to use the Internet to lure them into ...
- Plugging the “Phishing” Hole: Legislation Versus TechnologyBy: Robert Louis B. Stevenson This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of “phishing.” Phishing is the sending of fraudulent emails which appear to be from legitimate ...
- Willful Infringement and the Evidentiary Value of Opinion Letters After Knorr–Bremse v. DanaBy: Joshua Stowell Recently, the Federal Circuit in Knorr-Bremse v. Dana overruled almost twenty years of precedent by striking down the adverse inference doctrine, which had created a negative presumption against any alleged patent ...