Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to De-Identify Apache Kafka Data Streams Ameesh Divatia, CEO, Baffle and Syl Yelle, VP, Baffle Apache Kafka is a powerful platform for streaming data in real time for multiple use cases, including data analysis downstream. However, putting sensi... 1 month ago | 38 mins Combining online and offline investigations to stop large-scale infringers Managing IP Whether you are a general counsel or a brand protection expert dealing with a lot of infringers you are probably wondering: how can I identify who is ... 3 months ago | 41 mins Brand Protection Strategies to Employ to Avoid the ‘Whack a Mole’ Effect Peter Scott (World IP Review), Daniel Shapiro (RedPoints), James Larson (Purple) Join us on March 10, 2022 at 5pm GMT/ 6pm CET as we discuss proactive brand strategies general counsel should employ to avoid the 'whack a mole' effec... 4 months ago | 67 mins Memory Protection: Technology Primer Danny Kim, Ph.D., Virsec Runtime memory is the foundation of most computing, yet few security technologies have any visibility or control over critical systems as they execute... 1 year ago | 40 mins Five ways to ensure the highest quality patent translation Tom Phillips (WIPR), Candida Jaco (RWS), Chris Brothers (RWS) When the smallest error in translation can result in a patent’s rejection or invalidation, it is important to be mindful of the key steps to successfu... 10 months ago | 50 mins Trends & practical examples of evolving moral standards in trademark protection Tom Phillips (WIPR), Ryan Keech (BGR), Jason Kelly (BGR), Joachim Steinberg (BGR) In this timely webinar, three US-based intellectual property litigators will explore post-COVID-19 trends in the protection of “offensive” trademarks ... 11 months ago | 61 mins Enhancing Brand Value Through Strategic Use of IP Monica Riva Talley and Deirdre M. Wells (Sterne Kessler) This session is focused on trademark and brand protection as it relates to strategic use of trademarks and design patents. The speakers will discuss c... 7 months ago | 57 mins Three NEW Ransomware Exploits - How to Close the Backdoor George Crump, StorONE CMO Ransomware attacks are now using three new exploits to force you into paying the ransom. Bad actors know that you will resort to your backups in respo... 3 months ago | 38 mins Beat Ransomware with Standby Storage George Crump and Scott Armbrust with StorONE In this webinar you will learn how Standby Storage can improve your day-to-day backup infrastructure by shrinking backup windows, improving recovery p... 5 months ago | 37 mins Workshop: CASB - Get Full Visibility into Cloud App Usage Marc Pergolizzi The ability to apply fine grained controls and gain visibility into cloud application usage is critical as your organization moves more applications t... 4 months ago | 28 mins Load more