Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The quality of a granted patent is dependent on the quality of the patent application. For the companies where scientists write their own patents, IP legal training for scientists can help improving their patent drafting skills.
-
Mobility and good public transport prove to be essential requirements for an attractive (border) region. Establishes ITEM-PhD candidate Julia Reinold in an interview with EurekaRail.
-
Stimulating cross-border labour mobility? Provide an adequate supply of information, uniformity in laws and regulations, language education and infrastructure, suggests 'ontgrenzer' Martin Unfried in an interview with EurekaRail.
-
The 30%-facility is regularly discussed in both case-law and politics. The facility is currently under pressure and facing turbulent times. With a potential abolition, which may become reality, particular attention must be paid to the effects and possible alternatives. This blog is only available in...