This post also appeared in The Tennessean, where Concept Technology has a bi-weekly feature in the Business section.

patent-trolls.jpgAs a country, we’ve seen a dramatic uptick in patent litigation over the past 10 years.

So it should be no surprise that we’ve also seen more and more complaints about “patent trolls” in our headlines. As companies spend massive amounts of corporate resources on patent troll litigation — money that could be spent on research and development — patent law remains very much in flux.

I recently asked Brian Iverson, an attorney with Bass Berry & Sims, a few questions about patent trolls to gain a greater understanding of the issue.

Here’s more of what I learned:

 

Who qualifies as a patent troll?

The term “patent troll” typically refers to companies that buy up large tracts of patent portfolios and make a business out of suing people. This is big business. Some of the biggest trolls in the country have billions of dollars in assets.

One is the best-known patent trolls is MPHJ Technologies, a non-practicing entity that contends its patent portfolio covers “a patent on scanning documents and sending them from the scanner to a computer through a network.” MPHJ Technologies has sent out thousands of “demand letters” to businesses claiming patent infringement and asking for about $1,000 per employee to license its technology. In another example, PersonalAudio is suing podcaster and comedian Adam Carolla, two other podcasters, Fox, CBS and NBC for infringing on is patent on “downloaded playlists.”

Under the broadest definition of a “non-practicing entity” described above, though, most technology household names (IBM, Microsoft, etc.) also would be considered patent trolls, as would most other companies that invest significant portions of their budgets into R&D.

Take, for example, Research in Motion, the company that manufactures BlackBerry. RIM has an extensive patent portfolio and it isn’t necessarily practicing all of its inventions. Does that mean a company like Apple could go out and infringe on any of the patents that RIM isn’t practicing? No.

In another example, take an individual inventor who has a great idea and doesn’t have the resources to market that idea as a product — patent law protects this inventor from anyone else who may have the resources and the desire to steal that idea. These practical examples of entities that do not practice their patented inventions give some context to the policy questions that are challenging our legislators in trying to find a solution to the patent troll problem.

 

Currently, where does the law stand on patent trolls?

In general, patents are a matter of federal law. Congress introduced a dozen or so different bills dealing with patents during its current session, the latest of which the Senate Judiciary Committee recently tabled. Though the vote has been taken off the calendar for now, much of the federal legislation deals with the need to plead patent infringement with greater specificity, reducing the cost of patent litigation, etc.

(more…)

This post also appeared in The Tennessean, where Concept Technology has a bi-weekly feature in the Business section.

Business continuity and disaster recovery planning is hard work, so it’s not surprising that many organizations put off doing both.

To start, many people don’t understand the difference between the two terms. Business continuity defines the assets, threats and scenarios that can adversely impact your organization, and makes decisions about how to mitigate these risks — or to what degree these risks should be mitigated. In other words, business continuity planning prevents the disaster scenario from happening.

Disaster recovery is a subset of business continuity. It defines consistent, pre-planned actions that will occur in various disaster scenarios. Usually focused on recovering or continuing IT and technology systems, disaster recovery planning reacts to the disaster scenario after it has happened.

Most businesses don’t complete business continuity and disaster recovery plans because both are complex, time intensive and hard to complete. However, they are very important to the continued operation of a healthy business. FEMA estimates 40 percent of businesses do not reopen after a disaster, and of those that do reopen, 25 percent fail within one year.

For the purpose of this column, let’s focus on the five steps of disaster recovery planning.

 

1. Define key assets, threats and scenarios.

You need to know what you’re protecting and its value to define how it should be protected. These assets could include your accounting system, files on your Local Area Network, email system and archives, etc. Next, you should evaluate the potential threats to all of your business locations, both natural (fire, flood, earthquake) and human (terrorism, theft, vandalism, HVAC failures).

With your assets and threats identified, define scenarios of potential disasters (for example, a site outage where the facility is still intact). When mapping out scenarios, take a moment to determine the recovery window — how long you can go without access — of each of your assets. Some of your systems may have one hour thresholds, or even lower, while others may be fine if they are operational the next day.

 

2. Define recovery solutions.

Solutions can range from recovering from tape backup or disk backup, to data replication to an offsite location. Determining the appropriate type and level of protection ties directly to the business value of the asset, and how long you can work without it.

(more…)