Articles about Litigation

Two new recruits, Rick Watts and Vikas Sharma.

Two Accomplished Software Experts Join Quandary Peak Research

Two distinguished software experts have joined our growing team. Rick Watts and Vikas Sharma each bring extensive experience in software litigation to their new roles, further strengthening our capabilities and expertise in critical areas such as enterprise architectures, ERP systems, and software patents, among others.

Unprecedented Tech and IP Legal Battle Surfaces in Arbitration Against Mexico

Mexico City’s taxi fleet is caught in a rare example of an investor-state arbitration that involves intellectual property and technology-related issues. We provided expert software opinions in this groundbreaking case.

A robot enters a garden maze attempting to find success in AI investments

Performing Due Diligence in AI and Generative AI Technology

Artificial Intelligence and Generative AI are at the forefront in a rapidly evolving tech industry, driving innovation and reshaping industries. Due diligence is an intricate process that assesses these technologies’ technical aspects and viability.

Woman Using Lipstick Color Makeup Simulation App On Digital Tablet, Browsing Beauty Application With Augmented Reality Option Online, Creative Collage

Are Photos Like Fingerprints? BIPA and Biometric Privacy Laws

Illinois’ BIPA is a model for upcoming biometric legislation; we expect 20% of states will have biometric privacy laws by 2024.

Software experts meeting in research laboratory: woman leads presentation using digital whiteboard while colleagues listening

Identifying CyberSecurity Risk as Part of Technical Due Diligence

We use SAST tools during our tech due diligence engagements to provide independent analysis of security risk and to help provide recommendations.

Lighthouse perched on sea cliffs

Technical Due Diligence Checklist for Software Transactions

A comprehensive technical due diligence checklist for software transactions, covering code quality, scalability, IP, and security evaluations.