Articles

  • Nov 20, 2024 | law.com | David Kalat

    Who Got The Work Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct.

  • Oct 7, 2024 | lexology.com | David Kalat

    How a patent infringement lawsuit between Atari and Magnavox (over Pong) led to the era of patent trollsIn August 1972, visitors to Andy Capp’s Tavern in Sunnyvale, California, saw something new. Next to the jukebox and the pinball machines stood a 4-foot-tall wooden cabinet with a black-and-white television set inside, and the word “PONG” printed across the front. For a single quarter, players could play a virtual match of table tennis.

  • Oct 7, 2024 | lexology.com | David Kalat

    You may be surprised to learn that the first recorded use of passwords to gain access to a computing system occurred back in 1961. You may be less surprised to learn that this landmark moment in computer history almost immediately led to another landmark: the first computer passwords to be stolen. And the story of how the first computer password became the first password hack has lessons to teach us today.

  • Oct 2, 2024 | law.com | David Kalat

    Credit: Rokas/Adobe Stock With the aggressive pace of technological change and the onslaught of news regarding data breaches, cyberattacks and technological threats to privacy and security, it is easy to assume these are fundamentally new threats. The pace of technological change is slower than it feels, and many seemingly new categories of threats have been with us longer than we remember.

  • Sep 10, 2024 | law.com | David Kalat |Stephanie Wilkins

    With the aggressive pace of technological change and the onslaught of news regarding data breaches, cyberattacks and technological threats to privacy and security, it is easy to assume these are fundamentally new threats. The pace of technological change is slower than it feels, and many seemingly new categories of threats have been with us longer than we remember.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →