article thumbnail

Pick the Perfect Name for Your Startup

mashable.com

Anyone who has sat stymied with their cursor blinking in a “username” field knows that coming up with a name is harder than you’d think. How do you find that perfect Twitter handle or that ideal epithet for your blog, website or startup — one that’s snappy and memorable, and that you won’t hate by next year? How Do I Start?

Naming 94
article thumbnail

Intellectual Property for Startups in the Real World

Gust

Many thanks to David Rose , Ilana Grossman , Justin Stanwix , and the whole Gust team for making the Gust Blog such a valuable platform and resource for entrepreneurs and angel investors. How much is it worth investing in cultivating and enforcing an IP portfolio ? How much risk do IP issues in the aggregate pose to our business ?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Enhancing Marketing Strategies with AI Assistance

Duct Tape Marketing

It's something that trademarked IP that I call the marketing hourglass. We still use blog or content management system technology, but we don't use it in the, in the sort of fa linear, chronological fashion that people come to think about blogs on. Meaning like, give me a thousand word blog post. It's pretty cool.

article thumbnail

How to Work with Lawyers at a Startup

Both Sides of the Table

I recently read a post over on VentureHacks titled, “ Top Ten Reasons Entrepreneurs Hate Lawyers &# written by Scott Walker (who blogs on legal issues for entrepreneurs ). Shame about not getting it in legal writing that you owned the original IP. Anyone who does IP law in Southern California seems to use Knobbe Martens.

article thumbnail

What Are the Risks of Using Personal Email for Board Business?

Board Effect

The link may take you to another site that asks you to input your name, address, and social security number or the link itself may be malicious. There could also be the consequence of IP theft, loss of company privacy or the loss of customer privacy. Spear phishing works much the same way, but it’s targeted to one individual.

Email 71
article thumbnail

EU Cookie / Privacy Laws: Implications On Data Collection And Analysis

Occam's Razor

Information like IP address, the page requested, time stamps, browser ids and more are stored. Since this is not a blog about legal issues (and I'm not a lawyer!) But information like IP address, browser user agent id, time stamps, page urls and much more are recorded in web logs. All other data should be fine.

Analytics 130
article thumbnail

Search Intent: How to Analyze and Optimize Your Site

ConversionXL

IP address) can provide clues to search engines, as can search history, time of year, or time of day. A Moz article offers an example of informational modifiers for products: [product name] what is [product name] how does [product name] work how do I use [product name]. Geography (i.e. Individual sites?

Search 126