Search
Close this search box.
Search
Close this search box.

PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE

Protection, transfer and exploitation of software

In R + D activity, the developed software requires a different transfer procedure. Experts from public and private R + D entities as well as researchers and managers from the business industry consider that the approach after introducing several strategies and their corresponding protection are key activity areas since they have a particular nature. This … Read more