Dan Duncan, Sr. Director, Government Affairs at The McGraw-Hill Companies discusses Copyright and Knowledge Expansion at the Trans-Pacific Partnership Stakeholder Presentation in Leesburg, VA on Sept. 9, 2012.
You're new. And so is everyone else. And everyone is trying to convince you to buy their tokens. It's confusing and full of moonshot promises. Some people are getting wildly rich, while others are losing everything. Welcome to Web3. There's a lot more going on under the surface, and the opportunity space is vast. Let's find the signal in an otherwise noisy space.
This project is under the Alternative Investment course lectured by Professor David Lee at SMU. These slides illustrate the definition, history, types and future of crowdfunding. More specifically, slides demonstrate that, innovative technology, blockchain, will be employed in crowdfunding.
ETHICOMP 2020: Exploring Value Sensitive Design for Blockchain DevelopmentRoberto García
The potential impact that blockchain technologies might have in our society makes it paramount to consider human values during their design and development. Though the blockchain community has been moved from the beginning by a set of values that are favoured by the underlying technologies, it is necessary to explore how these values play among the diverse set of stakeholders and the potential conflicts that might arise. The final aim is to motivate the establishment of a set of guidelines that make blockchains better support human values, despite the initial bias these technologies might impose. The results so far have been used to analyze from a values perspective a blockchain application driven by ethical values.
You're new. And so is everyone else. And everyone is trying to convince you to buy their tokens. It's confusing and full of moonshot promises. Some people are getting wildly rich, while others are losing everything. Welcome to Web3. There's a lot more going on under the surface, and the opportunity space is vast. Let's find the signal in an otherwise noisy space.
This project is under the Alternative Investment course lectured by Professor David Lee at SMU. These slides illustrate the definition, history, types and future of crowdfunding. More specifically, slides demonstrate that, innovative technology, blockchain, will be employed in crowdfunding.
ETHICOMP 2020: Exploring Value Sensitive Design for Blockchain DevelopmentRoberto García
The potential impact that blockchain technologies might have in our society makes it paramount to consider human values during their design and development. Though the blockchain community has been moved from the beginning by a set of values that are favoured by the underlying technologies, it is necessary to explore how these values play among the diverse set of stakeholders and the potential conflicts that might arise. The final aim is to motivate the establishment of a set of guidelines that make blockchains better support human values, despite the initial bias these technologies might impose. The results so far have been used to analyze from a values perspective a blockchain application driven by ethical values.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Indonesia Internet Governance Forum, a presentation in IGF Turkey, IstanbulShita Laksmi
This is a presentation made by the ad hoc team of Indonesia Internet Governance Forum (ID-IGF). This presentation was presented during the 9th Internet Governance Forum in Istanbul to the donors/ supporters of IGF 2013 in Bali. The main content of this presentation is about National Dialogue of ID-IGF in 2014 and the plan ahead.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
It was shared at Korea - China Government Internet Round Table and BizBar community in Kushu, Japan. Inspired by Dr. Jung Ji Hoon, supported by Jae Yeon Kim and summarized by Song Yuri
Napoleon Hill in Think and Grow Rich Discusses the Destructive Power of the Fear Of Poverty. Fear is the result of indecision and doubt that creep up on you slowly when you do not control your thoughts. Fear of Poverty is one of the most powerful of all fears. When you fear poverty it becomes you reality.
Faith is crucial to achieving your desires and goals. This is Part 1 of the chapter on Faith. When you realize the importance of understanding how the universe works, you can achieve your goals faster.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Indonesia Internet Governance Forum, a presentation in IGF Turkey, IstanbulShita Laksmi
This is a presentation made by the ad hoc team of Indonesia Internet Governance Forum (ID-IGF). This presentation was presented during the 9th Internet Governance Forum in Istanbul to the donors/ supporters of IGF 2013 in Bali. The main content of this presentation is about National Dialogue of ID-IGF in 2014 and the plan ahead.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
It was shared at Korea - China Government Internet Round Table and BizBar community in Kushu, Japan. Inspired by Dr. Jung Ji Hoon, supported by Jae Yeon Kim and summarized by Song Yuri
Napoleon Hill in Think and Grow Rich Discusses the Destructive Power of the Fear Of Poverty. Fear is the result of indecision and doubt that creep up on you slowly when you do not control your thoughts. Fear of Poverty is one of the most powerful of all fears. When you fear poverty it becomes you reality.
Faith is crucial to achieving your desires and goals. This is Part 1 of the chapter on Faith. When you realize the importance of understanding how the universe works, you can achieve your goals faster.
Social Media in Law - "Flash in the Pan" or Competitive Advantage?Erik Schmidt
Discussion of underlying business challenges in today's legal world and ways in which Social Media can be leveraged to meet these challenges. Discuss Risks/Rewards and need for clearly defined focus by Law Firms to make Social Media deliver true value.
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
A presentation by Commissioner Cavoukian to the Canadian Institute Advertising and Marketing Law Conference on how Privacy by Design can give a sustainable competitive advantage in advertising and marketing.
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
What is Digital Property Rights by fluidscapesFluidscapes
Digital property rights refer to the legal rights and protections granted to individuals or entities over their digital assets and intellectual property. These rights encompass a wide range of digital content, including but not limited to software, music, videos, images, and written works. Digital property rights establish the ownership, control, and usage parameters of these assets, allowing creators and owners to dictate how their digital property is utilized, distributed, and monetized. These rights are essential in the digital age to safeguard the interests of creators, promote innovation, and ensure fair compensation for intellectual creations in online environments.
The Digital Insurer Europe 2017 Live Stream is a unique two, half-day webinars featuring a mix of global digital advocates and experts in digital insurance.
The Ipsos Strategy Partner Group works with the top 50 clients of the firm looking ahead to identify what's next for their businesses around the world.
Attending the Contagious conference is inspiration for new client conversations.
Information is useful, knowledge is power, but if unrestricted and abused access and use of information can lead to unnecessary brand risks.
Marketers and product managers need to leverage information collected about consumers to inform their strategies and drive successful outcomes. Using information responsibly, protecting consumer privacy and complying with laws and regulations can keep a brand safe and even be a brand differentiator.
Privacy issues and regulations important to marketers and product managers.
Current legal and political environment and its impacts on products and marketing.
Recent technology that continues to strain the bounds of what is private and what is public.
How to leverage information the right way to deliver relevant customer experiences (while sharing some examples of the wrong ways to use information).
How using information responsibly can enhance your brand (irresponsible use can have the opposite effect).
This is the presentation material for my class at UI International Program - PR Media Production. Session 2 - Understanding the Audience and The Importance of Storytelling
Last Exit Benchmark Studies: Legal Sector 2012Nuri Djavit
Building on expertise gained contributing to digital industry think tank reports for L2, Last Exit has conducted a study to benchmark the desktop websites, mobile and social presences of 30 of the largest UK-based law firms, measured by worldwide revenues. Covering 34 different touchpoints, the findings of the benchmark are summarised in this document.
For more detailed information and analysis please contact us at info@lastexit.tv
It refers to the dynamic flow of information of public interest that allows stakeholders to make better decisions.The act of the institutions must be transparent: access to citizens, under public scrutiny.
The Triad of Intellectual Property: Patents, Trademarks, and Copyrights: 1. Patents: Safeguarding Innovations 2. Trademarks: Building Brand Identity 3. Copyrights: Preserving Creative Works 4. The Impact on Funding and Valuation 5. Navigating the IP Landscape: Best Practices for Startups
Similar to Copyright and Knowledge Expansion: Dan Duncan of The McGraw-Hill Companies (20)
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Copyright and Knowledge Expansion: Dan Duncan of The McGraw-Hill Companies
1. Copyright and Knowledge Expansion
Dan Duncan
Sr. Director, Government Affairs
Trans-Pacific Partnership Stakeholder Presentation
Leesburg, VA
September 9, 2012
3. McGraw-Hill and the Knowledge Economy
Products & Services
Market Customer
Driven Focused
Solutions
Digital Interactive Based
2
4. Our Business Values
Defense of
Respect for freedom of
established Protection
expression. of customer
laws and
processes. privacy.
To help create a smarter, better world
and meet critical needs for the
knowledge, insights and analysis to
help individuals, markets and
countries grow and prosper.
3
5. Overview of Our Business Objectives
• We provide critical content to the financial services,
education and business markets.
• We align with three enduring global needs:
• Capital to fuel economic growth.
• Knowledge to spur innovation.
• Transparency to ensure user confidence and value.
4
6. Copyright and Its Role in Bringing Products to the
Market
Copyright Law Investment Availability
• High Quality • Increased Access
• Rights under law Products/Services
• Multiplicity of
• Enforcement • Delivery to Formats and Tools
Markets
5
7. Value of Copyright to Society
Direct Employment,
Skilled Workforce
Established
Copyright
Owners &
New Market
Entrants
Increased
Increased Creativity Knowledge and
and Innovation Indirect
Employment
6
8. Changing Nature of Piracy
1990’s 2000’s
2010’s
Individual Increasing digital
distribution by P2P and cyberlocker
infringements with
individuals of full text sites that serve as
little or no
materials, often centers for piracy,
distribution, often
resolved through less resolvable,
unintended, usually
notice and unless a site owner
resolved via direct
takedown. is identifiable willing
communication with
to cooperate.
user.
7
9. The Need for International Norms
• In a globally connected world, incentives to create
and expand knowledge must be consistent for all
to benefit.
• Legal certainty = predictable markets.
• Without certainty about rights and enforcement,
copyright owners will not provide products and
services nor expand investments.
8
10. Copyright and Freedom of Expression
“Concerning the First Amendment, we recognized that some
restriction on expression is the inherent and intended effect
of every grant of copyright.”
“[W]e observed that the Framers [of the Constitution]
regarded copyright protection not simply as a limit on the
manner in which expressive works may be used. They also
saw copyright as an ‘engine of free expression[:] By
establishing a marketable right to the use of one’s
expression, copyright supplies the economic incentive to
create and disseminate ideas.’”
U.S. Supreme Court, Golan v. Holder, 565 U. S. ____ (2012)
(emphasis added; citations omitted)
9
11. Privacy Rights and Illegal Behavior
Privacy Rights Are Not an Absolute Shield Against Illegal
Behaviors
“Member States may adopt legislative measures to restrict
the scope of the rights and obligations provided…when such
restriction constitutes a necessary, appropriate and
proportionate measure within a democratic society to
safeguard national security…, defense, public security, and
the prevention, investigation, detection and prosecution of
criminal offences or of unauthorized use of the electronic
communication system….”
Article 15, Directive 95/46/EC of the European Parliament and of the Council
10
12. Internet Piracy and Privacy Rights
“….[T]here is no legitimate reposing of trust
pursuant to contract or reasonable
expectation…[of anonymity] when a person goes
on the internet with a view to uploading or
downloading what does not belong to them. That
circumstance does not give rise to any
constitutional entitlement or human right to
remain immune from a…[content owner] also
participating in that open forum to discover the
economic damage being done to it….”
EMI & Others v. Eircomm, The High Court of Ireland, Commercial Judicial Review,
2012/167 JR (emphasis added)
11