IP Q&A: Trademark Registration Timeline, Patent Base Costs, And Utility Patents

*This blog post is continued from IP Q&A part 1, please see the disclaimer included in the first post.

Read More

Data Security Trends For 2013: Current Threats & How To Prevent Them

The number one threat to data security heading into 2013 continues to be human error, according to a study done by the Independent Oracle Users Group (IOUG) titled, “Closing the Security Gap: 2012 IOUG Enterprise Data Security Survey.”

Read More

IP Q&A: Obtaining URLs, Filing Provisionals, And Methodologies

I really enjoyed providing a webinar and we got some great comments, feedback and questions! Thank you. If you have any other questions, please do not hesitate to contact me for a free consultation. Every situation is very fact specific and I want to be sure to answer any questions you may have had after the seminar.

Read More

Secure PDF File Sharing

Portable Document Format (PDF) files are a great way to share information. Each PDF file contains all the pieces it needs to remain visually consistent when viewed with a variety of applications, regardless of origin or destination.

Read More

5 Business Lessons From Superstorm Sandy

Superstorm Sandy hit the northeastern coast recently with a vengeance. Businesses in her direct path saw inventory destroyed, expensive electronic equipment rendered useless and hard copies of important data washed away. Many additional businesses (not in the immediate path of the storm) suffered from loss of power, and in some cases, loss of access to important data stored out-of-reach on powerless machines.

Read More

Dual-Purpose 409A Valuations: The Basics

Offering employees a share in the company as compensation has long been a standard recruitment practice at venture-backed companies. However, the regulatory and enforcement environment in the last eight years has made this process more complicated than it used to be.

Read More

How SecureDocs Guards Against Unauthorized Entrants

It’s every business owner’s worst nightmare: Their data is hacked and sensitive documents fall into the unauthorized hands of those who would use it for ill. There have been several high profile cases in recent years where sensitive information has been leaked—either client information or information on the company itself. These leaks have led an increasing number of companies to look for a more secure way to store sensitive data. The solution? Maximum-security data room services like AppFolio SecureDocs.

Read More

Webinar: How To Protect Your Company's Intellectual Property

Your intellectual property is the most vulnerable before it is patented - it is vital to keep it safe. And, if you're working with strategic partners (who might one day end up as your competitor) you have to be even more careful when sharing company secrets.

Read More

Safe Cloud Computing: Why You Shouldn’t Fear the Cloud

There are so many advantages to using cloud storage for small businesses that many business owners immediately ask, “Where’s the catch?”

Read More

Effective File Storage for Multiple Users

Most business people have had this experience at one time or another: they’re on the phone and someone asks for a piece of information. They know that information is in a certain document on their computer, but when they go to look for it, it’s nowhere to be found. Sound familiar?

Read More