Exploitation Considering National and European Technological Platforms Sample Clauses

Exploitation Considering National and European Technological Platforms. In the area of Privacy challenges like implementation of privacy at design level, user centricity and user friendliness for transparency and privacy-enhancing technologies, pseudonymisation and anonymisation, mobile-based and web-based privacy-enhanced services, control of private data exchange between services, private data traceability, accountability, privacy risk management and finally awareness building and training of different users are all areas where mutual benefit can be expected (also for exploitation) between PICOS and initiatives and partners of technological platforms where Atos Origin plays a prominent role. The leadership of Atos Research & Innovation of the NESSI European Technological Platform8 in the Software & Services and Trust, Security & Dependability (where Atos Research & Innovation has already co-authored a whitepaper on Privacy geared at defining NESSI’s new SRA, taking into account knowledge derived from PICOS) represents also an excellent opportunity for early exploitation of results as they become available within the project’s planning. In particular, NESSI is an excellent platform for an industrial platform like Atos, to contact the key players in the industry to formalise agreements for exploitation in a context where potential partners are familiar with the idiosyncrasy of research and development projects results. Atos Origin also plays a prominent role in the Spanish technological platform eSec9. Moreover, Atos Origin also participates in the Spanish eMov technological platform10 and its European Counterpart eMobility11 both of which focus in their Strategic Research Agendas on aspects such as security, trust, privacy, threats on mobility and business models all of which are relevant for PICOS and where collaboration with platform partners could lead to identify future exploitation opportunities. Atos Research & Innovation is also working simultaneously in strong authentication solutions in the mobile environment, including biometric authentication, in the context of the Spanish national 7 xxxx://xxx.xxxx-xxxxx.xx/ 8 xxxx://xxx.xxxxx-xxxxxx.xxx 9 xxxx://xxx.xxx.xxxxx.xx/esec/ 10 xxxx://xxx.xxx.xxxxx.xx/emov/ 11 xxxx://xxx.xxxxxxxxx.xx.xxx/about_us.html research and development project Xxxxx@12, using the same mobile handset model chosen for PICOS and the same rich mobile application platform which effectively means that results from both projects can easily achieve complementarities at the implementation level and theref...
AutoNDA by SimpleDocs

Related to Exploitation Considering National and European Technological Platforms

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Research, Science and Technology Cooperation 1. The aims of cooperation in research, science and technology, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to build on existing agreements already in place for cooperation on research, science and technology; (b) to encourage, where appropriate, government agencies, research institutions, universities, private companies and other research organizations in the Parties to conclude direct arrangements in support of cooperative activities, programs or projects within the framework of this Agreement, specially related to trade and commerce; and (c) to focus cooperative activities towards sectors where mutual and complementary interests exist, with special emphasis on information and communication technologies and software development to facilitate trade between the Parties. 2. The Parties will encourage and facilitate, as appropriate, the following activities including, but not limited to:

  • Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Přetrvající platnost This Section 3 “

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • TECHNOLOGY/KNOWLEDGE TRANSFER ACTIVITIES The goal of this task is to develop a plan to make the knowledge gained, experimental results, and lessons learned available to the public and key decision makers. The Recipient shall: • Prepare an Initial Fact Sheet at start of the project that describes the project. Use the format provided by the CAM. • Prepare a Final Project Fact Sheet at the project’s conclusion that discusses results. Use the format provided by the CAM. • Prepare a Technology/Knowledge Transfer Plan that includes: o An explanation of how the knowledge gained from the project will be made available to the public, including the targeted market sector and potential outreach to end users, utilities, regulatory agencies, and others.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

Time is Money Join Law Insider Premium to draft better contracts faster.