Presentation given by Alex Ball of DCC/UKOLN, University of Bath, at the workshop 'IPR and Licensing: Tips, Traps and Techniques' held on 25 Feburary 2011 in London.
Master URL: http://opus.bath.ac.uk/22975
Abstract: This talk is intended to help workshop participants decide how to apply a licence to their research data, and which licence would be most suitable. It covers why licensing data is important, the impact licences have on future research, and the potential pitfalls to avoid.
Presentation given by Alex Ball of DCC/UKOLN, University of Bath, at the Digital Curation 101 Lite workshop held during the DCC Roadshow, 1-3 March 2011.
Master URL: http://opus.bath.ac.uk/22983
Abstract: This talk is intended to help workshop participants decide how to apply a licence to their research data, and which licence would be most suitable. It covers why licensing data is important, the impact licences have on future research, and the potential pitfalls to avoid.
Every lawyer needs eDiscovery. Do you do it right?
Learn how to navigate dramatically increasing amounts of electronic data in this free Clio webinar.
How does your firm handle eDiscovery? In litigation and government investigations, eDiscovery is the process by which information is exchanged electronically—and it’s becoming more and more common.
Unlike traditional information stored in paper form, electronic information is much more pervasive, long-lasting, and transient. During a discovery disclosure, you will get mountains of data that needs to be sorted and analyzed. In this webinar, we’ll talk about the principles of eDiscovery and how your can ensure that your practice can properly preserve and sort information efficiently.
Join Nextpoint CEO Rakesh Madhava and Clio’s own Joshua Lenon as we walk you through:
- the basics of eDiscovery
- which tools your firm should use to acquire and preserve information
- how to quickly find the nuggets of data your case needs
- how to integrate eDiscovery better into your practice
Even with the growing importance of eDiscovery, most law firms still aren’t prepared to handle large amounts of digital information. Make sure that yours isn’t one of them.
A combined presentation by
- Jef Ausloos (https://twitter.com/Jausl00s): background to data subject rights
- Pierre Dewitte (https://twitter.com/PiDewitte): empirically testing the right of access (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3106632)
- Laurens Naudts (https://twitter.com/RoboNaudts): empirically testing the right to an explanation
All three are member of the CiTiP embedded in the KULeuven.
The event was hosted at the VUB (Vrije Universiteit Brussel) with the collaboration of VRG Brussels.
For the organisations that build long-lived products such as aircraft and buildings, integrating CAD with systems throughout the product lifecycle brings with it many benefits, but from a preservation perspective it creates additional problems and exacerbates others. The KIM Project (amongst other things) looked at preservation-friendly methods of working with CAD within and outside the design team. The ERIM Project is now seeing how the lessons learned from KIM might be applied in managing engineering research data.
The original and a fuller transcript are available at: http://opus.bath.ac.uk/19825
Presentation given by Alex Ball of DCC/UKOLN, University of Bath, at the Digital Curation 101 Lite workshop held during the DCC Roadshow, 1-3 March 2011.
Master URL: http://opus.bath.ac.uk/22983
Abstract: This talk is intended to help workshop participants decide how to apply a licence to their research data, and which licence would be most suitable. It covers why licensing data is important, the impact licences have on future research, and the potential pitfalls to avoid.
Every lawyer needs eDiscovery. Do you do it right?
Learn how to navigate dramatically increasing amounts of electronic data in this free Clio webinar.
How does your firm handle eDiscovery? In litigation and government investigations, eDiscovery is the process by which information is exchanged electronically—and it’s becoming more and more common.
Unlike traditional information stored in paper form, electronic information is much more pervasive, long-lasting, and transient. During a discovery disclosure, you will get mountains of data that needs to be sorted and analyzed. In this webinar, we’ll talk about the principles of eDiscovery and how your can ensure that your practice can properly preserve and sort information efficiently.
Join Nextpoint CEO Rakesh Madhava and Clio’s own Joshua Lenon as we walk you through:
- the basics of eDiscovery
- which tools your firm should use to acquire and preserve information
- how to quickly find the nuggets of data your case needs
- how to integrate eDiscovery better into your practice
Even with the growing importance of eDiscovery, most law firms still aren’t prepared to handle large amounts of digital information. Make sure that yours isn’t one of them.
A combined presentation by
- Jef Ausloos (https://twitter.com/Jausl00s): background to data subject rights
- Pierre Dewitte (https://twitter.com/PiDewitte): empirically testing the right of access (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3106632)
- Laurens Naudts (https://twitter.com/RoboNaudts): empirically testing the right to an explanation
All three are member of the CiTiP embedded in the KULeuven.
The event was hosted at the VUB (Vrije Universiteit Brussel) with the collaboration of VRG Brussels.
For the organisations that build long-lived products such as aircraft and buildings, integrating CAD with systems throughout the product lifecycle brings with it many benefits, but from a preservation perspective it creates additional problems and exacerbates others. The KIM Project (amongst other things) looked at preservation-friendly methods of working with CAD within and outside the design team. The ERIM Project is now seeing how the lessons learned from KIM might be applied in managing engineering research data.
The original and a fuller transcript are available at: http://opus.bath.ac.uk/19825
Learning Registry is an open source project that helps content producers and content consumers share and exchange what they know within a public space. "Social networking for metadata."
Presentation by Dr Jeff Christiansen, Intersect. Presented at the ANDS/Intersect sharing health-y data: challenges and solutions II workshop on 26th October 2016
A brief introduction to Linked Data Licensing, Rights Expression Languages and Linked Data Business Models given on September 6, 2013 at the I-SEMANTICS 2013, the 9th international conference on semantic systems, in Graz, Austria.
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveePlus
Implementing body cameras for your force brings many benefits but getting started can raise many complex questions. ePlus and EMC can help you build a surveillance storage foundation to optimize your body camera deployment. Contact ePlus today to start leveraging the industry's largest and most advanced surveillance validation labs and explore your body camera initiative.
Presentation I gave to U.S. Department of Labor Region 5 TAACCCT grantees (Rounds 2 & 3) on their Technical Assistance convening on 9 July, 2014. Applicable to all TAACCCT grantees.
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
A look at the legal, normative and social issues surrounding data sharing and the ways we've chosen to address this increasingly complex space.
Presented in Beijing on 25 March 2009.A l
Data challenges are halting AI projects for multiple reasons, and open source developers are looking for solutions. Do you know how to share data sets properly? Just like software, you don't want to put your data sets out in the public domain without proper license protections. The Community Data License Agreement (CDLA) is a key part of the answer.
About 80% of the work with an AI project is collecting and preparing data. Are you having challenges with 'data sprawl' across your company? How about GDPR compliance? An open metadata strategy can help. Open source project Egeria provides the open metadata and governance type system, frameworks, APIs, event payloads and interchange protocols to enable tools, engines and platforms to exchange metadata. Leading project community members bring experience from their roles at HortonWorks, IBM, Index Analytics, ING, SAS, and others.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
More Related Content
Similar to Derestricting Datasets: How to License Research Data
Learning Registry is an open source project that helps content producers and content consumers share and exchange what they know within a public space. "Social networking for metadata."
Presentation by Dr Jeff Christiansen, Intersect. Presented at the ANDS/Intersect sharing health-y data: challenges and solutions II workshop on 26th October 2016
A brief introduction to Linked Data Licensing, Rights Expression Languages and Linked Data Business Models given on September 6, 2013 at the I-SEMANTICS 2013, the 9th international conference on semantic systems, in Graz, Austria.
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveePlus
Implementing body cameras for your force brings many benefits but getting started can raise many complex questions. ePlus and EMC can help you build a surveillance storage foundation to optimize your body camera deployment. Contact ePlus today to start leveraging the industry's largest and most advanced surveillance validation labs and explore your body camera initiative.
Presentation I gave to U.S. Department of Labor Region 5 TAACCCT grantees (Rounds 2 & 3) on their Technical Assistance convening on 9 July, 2014. Applicable to all TAACCCT grantees.
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
A look at the legal, normative and social issues surrounding data sharing and the ways we've chosen to address this increasingly complex space.
Presented in Beijing on 25 March 2009.A l
Data challenges are halting AI projects for multiple reasons, and open source developers are looking for solutions. Do you know how to share data sets properly? Just like software, you don't want to put your data sets out in the public domain without proper license protections. The Community Data License Agreement (CDLA) is a key part of the answer.
About 80% of the work with an AI project is collecting and preparing data. Are you having challenges with 'data sprawl' across your company? How about GDPR compliance? An open metadata strategy can help. Open source project Egeria provides the open metadata and governance type system, frameworks, APIs, event payloads and interchange protocols to enable tools, engines and platforms to exchange metadata. Leading project community members bring experience from their roles at HortonWorks, IBM, Index Analytics, ING, SAS, and others.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Derestricting Datasets: How to License Research Data
1. because good research needs good data
Derestricting Datasets
How to License Research Data
Alex Ball
DCC/UKOLN, University of Bath
25 February 2011
Except where otherwise stated, this work is licensed
under Creative Commons BY-NC-SA 2.5 Scotland: http: Funded by
//creativecommons.org/licenses/by- nc- sa/2.5/scotland/
IPR and Licensing: tips, traps and techniques 25 February 2011
2. Outline
Why license research data?
Licensing options
Creative Commons
Open Data Commons
Open Government Licence
GILF/AusGOAL Licences
Design Science Licence
Public Domain
Mechanisms for Licensing Data
Further Information
Group Exercise
IPR and Licensing: tips, traps and techniques 25 February 2011
3. Why license research data?
The open data argument
To allow the data to be used in new ways: comparative studies,
data mining, interdisciplinary studies, ‘citizen science’. . .
To permit greater scrutiny of research
To raise standards of documentation
To protect researchers from challenges
To accelerate community-wide learning from experience
To increase efficiency
To increase impact
The pragmatic argument
To provide clarity
IPR and Licensing: tips, traps and techniques 25 February 2011
4. Types of licenses
Contracts
£
Pure licences
Waivers
IPR and Licensing: tips, traps and techniques 25 February 2011
5. Licensing questions
1. Do you need to make a choice?
Institutional policy
Data archive policy
2. Would a standard licence suffice?
3. Do you need to write your own licence?
4. Do you need more than one licence?
IPR and Licensing: tips, traps and techniques 25 February 2011
6. Multiple licensing
Development Development
Community Partners
Copyleft c Licence Licence fees
Core Product
Licence fees
Copyleft Reseller
Licence
Copyleft Users Customers
Välimäki, M. (2003). Dual licensing in open source
software industry. Systemes d’Information et Man-
agement, 8 (1), 63–75. Retrieved 3 September
Migration 2010, from http : / / opensource . mit . edu /
papers/valimaki.pdf
IPR and Licensing: tips, traps and techniques 25 February 2011
7. Creative Commons
b BY Attribution
n NC Non-Commercial
c
a SA Share Alike
d ND No Derivatives
IPR and Licensing: tips, traps and techniques 25 February 2011
8. Creative Commons
b BY
Attribution
Attribution stacking
n NC Non-Commercial
c
What counts as commercial?
a SA Share Alike
Reduces interoperability
d ND No Derivatives
Severely restricts use
IPR and Licensing: tips, traps and techniques 25 February 2011
9. Open Data Commons
Attribution Licence (ODC-BY)
b/
Open Database Licence (ODC-ODbL)
ba /
Explicitly distinguishes database structure from
contents, and deriving visualisations from
deriving new databases.
IPR and Licensing: tips, traps and techniques 25 February 2011
10. Open Government Licence
Attribution b
Terminates on illegal/misleading usage of data
Can only be used for public sector data
Cannot be used for logos, insignia, personal data,
otherwise encumbered data
Does not distinguish database structure from
contents
IPR and Licensing: tips, traps and techniques 25 February 2011
11. GILF/AusGOAL Licences
Six Australian CC Licences
Restrictive Licence
Contract template: standard legal code modified using
schedules
Expiry date
Geographical restriction
Different copying/distribution terms for confidential
and ordinary data
Licence fees
Other restrictions and permissions
IPR and Licensing: tips, traps and techniques 25 February 2011
12. Design Science Licence
Attribution and Share Alike ba
Distinguishes source data from visualisations
Does not distinguish database structure from
contents
Redistribution requirements
IPR and Licensing: tips, traps and techniques 25 February 2011
13. Public Domain
Creative Commons Zero (CC0) p
Open Data Commons Public Domain Dedication
and Licence (ODC-PDDL)
Open Data Commons Database Contents
Licence (ODC-DbCL)
Community norms?
IPR and Licensing: tips, traps and techniques 25 February 2011
14. Attaching the licence to the data
[This database is/These data are/〈name of dataset〉 is] made available
under the Public Domain Dedication and License v1.0 whose full text
can be found at:
http://www.opendatacommons.org/licenses/pddl/1.0/
http://www.example.com/data/set/1
http://purl.org/dc/terms/license
http://www.opendatacommons.org/
licences/pddl/1.0/
IPR and Licensing: tips, traps and techniques 25 February 2011
15. Further Information
A Digital Curation Centre and JISC Legal
‘working level’ guide http://www.dcc.ac.uk/
resources/how-guides/
How to License license-research-data
Research Data
Alex Ball (DCC)
http://www.web2rights.com/
OERIPRSupport/
Starter Pack
Diagnostic Tools
Digital Curation Centre, 2011.
Licensed under Creative Commons BY-NC-SA 2.5 Scotland:
http://creativecommons.org/licenses/by-nc-sa/2.5/scotland/
IPR and Licensing: tips, traps and techniques 25 February 2011
16. because good research needs good data
Thank you for your attention
DCC Website: http://www.dcc.ac.uk/
Alex Ball: http://www.ukoln.ac.uk/ukoln/staff/a.ball/
IPR and Licensing: tips, traps and techniques 25 February 2011
17. Group Exercise
How would you license the following datasets?
1. Power consumption at your house
2. Temperature and humidity readings from a well-sited Stevenson
Screen
3. Wealth and assets survey data (2006–2008)
4. Anonymised genomic/proteomic data
5. Amounts of carbon and energy embedded in building materials
6. Recordings, transcriptions and annotations of simulated design
meetings
IPR and Licensing: tips, traps and techniques 25 February 2011