Blogs

Oct
13

A new trend in the seemingly lawless land of the internet are controls that regulate how we use the internet.  These shadow regulations, as the Electronic Frontier Foundation has dubbed them, are now increasingly being established through private industry agreements.  They are typically voluntary agreements between companies, unknown to the public, and affect activities conducted

Oct
13

On Saturday, 1 October 2016, House Bill 972 went into effect across North Carolina.  Just the night prior, the Charlotte Mecklenberg Police Department announced it would release the entire dash camera and body camera footage capturing the events of the 20 September police-shooting death of Keith Lamont Scott.  That announcement looks to be the last

Oct
08

The Obama Administration made it a top priority to prevent Medicare and Medicaid fraud, and its efforts have yielded great results. This past summer, the Administration announced that with sophisticated detection methods like “big data” and predictive analytics, the Center for Medicare and Medicaid Services (CMS) was able to prevent $42 billion of improper payments

Oct
07

With the heavy-hitting protections of the First Amendment, the freedom of speech, and the Second Amendment, the right to bear arms, it would seem that 3D printed firearms and the sharing of associated blueprints would be doubly protected. However, the “Liberator” handgun (shown in the video above) may be protected by neither, in the name

Oct
07

Ever since the iCloud hack of August 2014 we have known that our “cloud” based system of data storage is imperfect. What was commonly referred to as “Celebgate” showcased the probable fallacies of the cloud system when 500 celebrities had their personal pictures hacked and displayed for the whole world see. The scare left cloud

Oct
06

If you own an Apple device, you, along with more than 55 million Americans, are probably oblivious to the fact that Apple may be compelled to share your iMessage contact information with law enforcement. Apple, in their privacy policy, promotes that they protect the content of iMessages through encryption on both users’ end of communication

Oct
06

Immigrations and Customs Officials (ICE) increasingly use GPS tracking devices to locate and track illegal immigrants in the U.S. Immigrants who arrive in the U.S. illegally are likely to be eventually identified by ICE officials.  They are then located, arrested, and hauled before a judge.  The judge may, among other things, order hearings to be

Oct
05

The Federal Circuit recently applied the Supreme Court’s decision in KSR Int’l Co. v. Teleflex Inc., in determining the obviousness of a caller ID system patent. In ClassCo, Inc. v. Apple, Inc., Apple was attacking ClassCo’s patents which protected the playing of an identifying sound regarding an incoming phone call. ClassCo’s patent No. 6,970,695, involved

Oct
04

In the world of advertising, the product often does not match the description. This is often the truth especially in the video game categories. Games are announced and displayed usually one to two years before they are actually released. Even then, hyped games are often released, only to have less than ideal player experiences. However,

Categories