Summary
Identification of the key exploitable results, exploitation forms, dissemination and communication messages, competition, risk analysis, potential obstacles.
More information & hyperlinks