Home
 > search for

Featured Documents related to »  damages patent


Informix Denies Patent Infringement Allegations by IBM
On February 7, Informix Corporation (NASDAQ:IFMX) announced it was vigorously denying accusations by International Business Machines (NYSE:IBM) of patent

damages patent  is seeking unspecified compensatory damages in the suit, which it wants tripled because of what it considers Informix's willful violation. The patents involve distributed processing and data compression technology. A spokesman for IBM stated on Wednesday that no comment would be the official position for the time being. On Tuesday, Informix chief executive Jean-Yves Dexmier denied any patent infringement. Informix's stock was down 11 percent on Tuesday, but has since recovered much of the loss. Market Read More...
Electronic Medical Records (EMR) for the Health Care Industry
Electronic Medical Records (EMR) assists physicians and other clinicians document patient care for current visits and provides access to patient clinical history. Sometimes may be referred to as co...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » damages patent


NAI Will Pay Trend $12.5 Million Resulting from Law Suit
Settling a patent dispute out of court, Network Associates agreed to pay Trend Micro $12.5 million for the cost of licensing Trend's patented technologies. Both

damages patent  as well as monetary damages. In response to the lawsuit, Network Associates filed a counter suit alleging unfair competition and wrongful acts. Network Associates claimed that Trend's patent infringed on one of their patents (Patent Registration No. 6,029,256). Market Impact Trend Micro has been lagging leading market indicators, and has dropped substantially in share price since its February high even though its revenue is up 55% from last year. With revenue growth almost 670% higher than the industry Read More...
The Definitive Guide to Successful Deployment of VoIP and IP Telephony-Chapter 1
As the era of traditional telephony draws to a close, the doors to the next generation in communications open. Chapter 1 of this 4-part e-book discusses

damages patent  special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or Read More...
Business Objects Objects Again
In a repeat of the Brio lawsuit of 1999, Business Objects has now sued Cognos over a U.S. patent that Business Objects holds for a query technology. Cognos

damages patent  pay for litigation and damages in this suit, although this event is fairly unlikely. Read More...
E-mail Clustering and Cloud E-mail Services
There has been a lot of buzz about the new cloud computing paradigm. But can cloud computing offer the same benefits as clustering? Find out more in a

damages patent  special, collateral or accidental damages, related in any way to the use of this document. AXIGEN does not guarantee either implicitly or explicitly the suitability of this material for your specific needs. This material is provided on an 'as-is' basis. Searches related to E-mail Clustering and Cloud E-mail Services : Email Clustering | Clustering Email Servers | Email Clustering Comparison | Email Clustering Domain | Email Clustering System | Email Clustering Algorithm | Clustering Email Campaign | Read More...
Smart Protection Network: Stop Web Threats Before They Reach You
The Internet is now an important business tool@but it also puts companies at risk of exposure to Web-based threats that can cause major damages, such as

damages patent  that can cause significant damages including financial losses, identify theft, and loss of intellectual property or trade secrets to name a few. Not just your information, but your personal and business reputation are at stake. Malicious attacks have grown exponentially. In all of 1988, security vendors dealt with 1,738 unique threat samples. During the first two months of 2008 alone, 1.1 million unique samples were reported.1 Trend Micro has seen a 1,731% increase in Web threats since 2005. Security Read More...
SAP Backpedals Its SaaS Forays -- By Design or Under Duress?
Let me start this blog post with a huge disclaimer: I have no intentions of wilfully beating up on SAP whatsoever!Sure, the enterprise applications titan

damages patent  seeking expenses plus additional damages . And it is all coming down in the midst of internal changes and reshuffling in SAP's leadership and some high-profile staff departures . There are also indications about a not so smooth integration and assimilation of recently acquired Business Objects . And yet, we're a long way off from reading SAP's obituary any time soon. SAP is the market leader for a reason, and I have a great deal of respect for its team and its ability to weather such storms. It is not my Read More...
Competitive Challenges for Vanguard
Vanguard's challenge is to continue to be nimble and responsive to the needs of its target market and original equipment manufacturer (OEM) partners.

damages patent  Direct Access,data warehousing,enterprise information integration,EII,real-time information,return on investment,ROI,total cost of ownership,TCO Read More...
When Small Business Packages Have Enterprise Appeal
As an APS-based business management system, NetSuite can effectively serve the needs of small medium businesses. Its integrated application uses three distinct

damages patent  Netsuite,NetSuite Small Business,NetSuite CRM,NetSuite CRM+,accouting,small and medium business,SMB,APS,business management,customer relationship management,CRM,e-commerce,Web store,back-office,MS Great Plains Read More...
HIPAA-Watch for Security Speeds Up Compliance Part One: Vendor and Product Information
HIPAA-Watch for Security is a tool designed to guide organizations through the risk analysis required by the Health Insurance Portability and Accountability Act

damages patent  Watch for Security Speeds Up Compliance Part One: Vendor and Product Information HIPAA-Watch for Security Speeds Up Compliance Part One: Vendor and Product Information Featured Author - Laura Taylor - August 27, 2004 Executive Summary HIPAA-Watch for Security is a tool designed to guide organizations through the risk analysis required by the Health Insurance Portability and Accountability Act (HIPAA) compliance process (US). Relevant Technologies, a leading security research and advisory firm, Read More...
Selectica Joins NetSuite’s Configure-Price-Quote Fray
One impression from the recently held SuiteWorld 2013 conference was that NetSuite’s partner ecosystem is becoming extensive – Autodesk and ClickSoftware

damages patent   Read More...
Progress Software Revs Up to Higher RPM via Savvion - Part 1
Late 2009 and early 2010 were characterized by a number of mergers and acquisitions (M@As) in the vibrant and buoyant business process management (BPM

damages patent   Read More...
How One Vendor Parlays Price Variation into Profit Improvement Opportunities
Rather than sticking to such outdated and speculative pricing practices as

damages patent  data-driven price management,price management software,price optimization,price segmentation,enterprise resource planning,ERP,customer relationship management,CRM,advanced analytics,pricing rules,business-to-consumer,B2C,business-to-business,B2B,negotiated prices Read More...
Has The BI Market Consolidation Been Crystal-Clearly Actuated? Part Two: Market Impact
In addition to products' rationalization, the integration at sales and cultural levels will be challenging. In general, existing customers of involved merging

damages patent  The BI Market Consolidation Been Crystal-Clearly Actuated? Part Two: Market Impact Event Summary The frantic first week of June that marked an outright internecine war in the ERP space, seems to have been somewhat repeated in the second half of July, but this time in the business intelligence (BI) market. The following acquisitions were announced: Business Objects will acquire Crystal Decisions Hyperion will acquire Brio Software Actuate Corporation has completed the acquisition of Nimble Technology Read More...
Identix Leads Biometric Authentication
Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the

damages patent  Leads Biometric Authentication Identix Leads Biometric Authentication Featured Author -  Laura Taylor - January 27, 2002 Vendor Background Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon for Windows 2000 and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security. A pioneer Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others