Synopsis: Security:


article_ICT STRATEGY SUPPORT FOR BUSINESS_2010.pdf.txt

Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 1 ICT STRATEGY SUPPORT FOR BUSINESS DEVELOPMENT AND INNOVATION Lecturer, Ph d. Nicoleta GUDÄ

when the business development lives its own life without taking care of real business needs Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 2 and co-operation

and a ploy (beating the Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 3 competitors).

Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 4 Systems interaction has become complex.

strategies and policies 6. Assess the potential impacts of ICT Internal Auditing & Risk management Anul V, Nr. 4 (20),

All these levels need different kinds of ICT and these levels have four Internal Auditing & Risk management Anul V

Ward and Griffiths, 1996) Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 7 Still as we have seen,

Companies do not have a common research framework to achieve Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 8 success both in business and ICT research.

Internal Auditing & Risk management Anul V, Nr. 4 (20), Decembrie 2010 9 Figure 4. Strategic alignment model (Parker et al. 1989;

Success Internal Auditing & Risk management Anul V Nr. 4 (20), Decembrie 2010 10 could be achieved through focused development activities,


Barriers and success factors in health information technology- practitioners perspective 2010.pdf.txt

they perceive it as a threat to patient privacy and confidentiality and as a potential tool for †Big Brother†interference in their practice.


Barriers to Innovation in SMEs_ Can the Internationalization of R&D Mitigate their Effects_ .pdf.txt

The most dominant problems are listed below in Table 1. Barriers to innovation in SMES Studies (amongst others) Financial bottlenecks-hindered access to external finance,-high innovation costs (and therefore)- high economic risks Acs

political and/or security-related concerns and are supported not rarely by strong pressure groups in the society.

Furthermore, some employees in the R&d units at the headquarters tend to see the new location as a potential threat to their job security leading to resentments, antagonism and even non-cooperation,

and ii) SMES. b) What are the advantages and possible risks of internationalization of innovation activities, particularly of R&d?


Basedoc.mwl

ctic king y newal lacing ing ve ield substance ncreas matic cell itory st es bird uth ng ft security yman

ate science imiliano assurance rduti p ing ation dar ciness wallader ish zel sion 7th inklijke ey enschappen kar ondson


Basedoc.scn

G#0v 12458 SECURITY G#1v 12529 3d security 0#2#3d security 3d security G#1v 12530 Access control

0#2#access control Access control G#1v 12670 Backscatter x-ray 0#2#backscatter x ray Backscatter x-ray G#1v 12671 Canary home security

0#2#canary home security Canary home security G#1v 12531 Civil defense 0#2#civil defence Civil defense 0#2#civil defense Civil defense

0#2#civil protection Civil defense G#1v 12460 Classified information 0#2#classified information Classified information G#1v 12532 Counterintelligence

0#2#counterintelligence Counterintelligence G#1v 12461 Crimes G#2v 12462 Burglary 0#3#burglary Burglary

G#2v 12463 Piracy 0#3#maritime hijacking Piracy 0#3#piracy Piracy G#2v 12464 Robbery

G#3v 12465 Armed robbery 0#4#armed robbery Armed robbery G#3v 12466 Robbery 0#4#robbery Robbery

G#1v 12467 Cybercrime G#2v 12468 Computer virus 0#3#computer virus Computer virus G#2v 12469 Cracking

0#3#cracking Cracking G#2v 12470 Crimeware 0#3#crimeware Crimeware G#2v 12471 Cyber attack

0#3#cyber attack Cyber attack G#2v 12472 Cyber crime 0#3#cyber crime Cyber crime 0#3#cyber criminal Cyber crime

G#2v 12473 Cyber threat 0#3#cyber threat Cyber threat G#2v 12474 Cyber war 0#3#cyber war Cyber war

G#2v 12475 Cyber warfare 0#3#cyber warfare Cyber warfare G#2v 12476 Cyber weapons 0#3#cyber weapon Cyber weapons

G#2v 12477 Cyberattack 0#3#cyberattack Cyberattack G#2v 12478 Cybercrime 0#3#cybercrime Cybercrime

G#2v 12479 Cybercriminal 0#3#cybercriminal Cybercriminal G#2v 12480 Cyberespionage 0#3#cyberespionage Cyberespionage

G#2v 12481 Cyber-terrorism 0#3#cyber terrorism Cyber-terrorism 0#3#cyber terrorist Cyber-terrorism G#2v 12482 Cyberwarfare

0#3#cyberwar Cyberwarfare 0#3#cyberwarfare Cyberwarfare G#2v 12483 Hacking 0#3#hacker Hacking

0#3#hacking Hacking 0#3#hacktivist Hacking G#2v 12484 Malicious software G#3v 12485 Adware

0#4#adware Adware G#3v 12486 Anti-phishing 0#4#anti-phishing Anti-phishing G#3v 12487 Anti-spyware

0#4#anti spyware Anti-spyware G#3v 12488 Anti-virus software 0#4#anti virus software Anti-virus software G#3v 12489 Botnet

0#4#botnet Botnet G#3v 12490 Exploit 0#4#exploit Exploit G#3v 12491 Malicious software

0#4#malicious software Malicious software G#3v 12492 Payload G#4v 12493 Keylogger 0#5#keylogger Keylogger

G#4v 12494 Payload 0#5#payload Payload G#4v 12495 Rootkit 0#5#rootkit Rootkit

G#3v 12496 Phishing 0#4#phishing Phishing G#3v 12497 Software virus 0#4#software virus Software virus

G#3v 12498 Spyware 0#4#spyware Spyware G#3v 12499 Trojan 0#4#trojan Trojan

0#4#trojan horse Trojan G#2v 12500 Phreaking 0#3#phreaking Phreaking G#1v 12501 Decryption

0#2#decryption Decryption G#1v 12502 Emergency 0#2#emergency Emergency G#1v 12503 Encryption

G#2v 12504 Advanced encryption standard 0#3#advanced encryption standard Advanced encryption standard G#2v 12505 Encryption 0#3#encryption Encryption

G#1v 12672 Eye vein verification 0#2#eye vein verification Eye vein verification G#1v 12506 Fire control system 0#2#fire control system Fire control system

G#1v 12507 Fraud deterrence 0#2#fraud deterrence Fraud deterrence G#1v 12533 Guard G#2v 12534 Bodyguard

0#3#bodyguard Bodyguard G#2v 12535 Border guard 0#3#border guard Border guard G#2v 12536 Coast guard

0#3#coast guard Coast guard 0#3#coastguard Coast guard G#2v 12537 Guard 0#3#guard Guard

G#2v 12538 National guard 0#3#national guard National guard G#2v 12539 Patrol 0#3#patrol Patrol

G#2v 12540 Security guard 0#3#security guard Security guard G#2v 12541 Watchman 0#3#night watchman Watchman

0#3#watchman Watchman G#1v 12508 Insecurity 0#2#insecurity Insecurity G#1v 12509 Insurgency

0#2#insurgency Insurgency G#1v 12673 ismartalarm 0#2#ismartalarm ismartalarm G#1v 12542 IT SECURITY

G#2v 12543 Application security G#3v 12544 Antispyware software 0#4#antispyware Antispyware software 0#4#antispyware software Antispyware software

G#3v 12545 Antivirus software G#4v 12546 Antivirus software 0#5#anti virus Antivirus software 0#5#antimalware Antivirus software

0#5#antimalware software Antivirus software 0#5#antivirus Antivirus software 0#5#antivirus software Antivirus software G#4v 12547 Bitdefender

0#5#bitdefender Bitdefender G#4v 12548 Kaspersky 0#5#kaspersky Kaspersky G#3v 12549 Application security

0#4#application security Application security 0#4#software security Application security G#2v 12550 Computer security 0#3#computer security Computer security

0#3#cyber security Computer security 0#3#cybersecurity Computer security 0#3#it security Computer security G#2v 12551 Data security

0#3#data security Data security G#2v 12552 Information security 0#3#information security Information security 0#3#infosecurity Information security

G#2v 12553 Internet security G#3v 12554 Browser security 0#4#browser security Browser security G#3v 12555 Electronic mail security

0#4#electronic mail security Electronic mail security G#3v 12556 Internet protocol security 0#4#internet protocol security Internet protocol security G#3v 12557 Internet security

0#4#internet security Internet security G#3v 12558 Mysecurecyberspace 0#4#mysecurecyberspace Mysecurecyberspace G#3v 12559 Password security

0#4#password security Password security G#3v 12560 Security token 0#4#security token Security token G#2v 12561 Network security

0#3#network security Network security G#1v 12510 Missile defence system 0#2#missile defence system Missile defence system G#1v 12562 Physical security

G#2v 12563 Airport security 0#3#airport security Airport security G#2v 12564 Aviation security 0#3#aviation security Aviation security

G#2v 12565 Communications security G#3v 12566 Communications security 0#4#communications security Communications security G#3v 12567 Mobile security

0#4#mobile security Mobile security G#3v 12568 Transmission security 0#4#transmission security Transmission security G#2v 12569 Corporate security

0#3#corporate security Corporate security G#2v 12570 Food security 0#3#food security Food security 0#3#global food security Food security

0#3#international food security Food security G#2v 12571 Home security 0#3#home security Home security G#2v 12572 Infrastructure security

0#3#infrastructure security Infrastructure security G#2v 12573 Physical security 0#3#physical security Physical security G#2v 12574 Port security

0#3#port security Port security G#2v 12575 Private security 0#3#private security Private security G#2v 12576 School security

0#3#school security School security G#2v 12577 Security checkpoint 0#3#security checkpoint Security checkpoint G#2v 12578 Security spike

0#3#security spike Security spike G#2v 12579 Shopping center security 0#3#shopping center security Shopping center security G#2v 12580 Supply chain security

0#3#supply chain security Supply chain security G#2v 12581 Transportation security 0#3#transportation security Transportation security G#1v 12582 Political security

G#2v 12583 Homeland security 0#3#homeland defense Homeland security 0#3#homeland security Homeland security G#2v 12584 Human security

0#3#human security Human security G#2v 12585 Internal security 0#3#internal security Internal security G#2v 12586 International security

0#3#global security International security 0#3#international security International security G#2v 12587 National security G#3v 12588 Economic security

G#4v 12589 Economic security 0#5#economic security Economic security G#4v 12590 Financial security 0#5#financial security Financial security

G#4v 12591 Monetary security 0#5#monetary security Monetary security G#3v 12592 Energy security 0#4#energy security Energy security

G#3v 12593 Environmental security 0#4#environmental security Environmental security G#3v 12594 Espionage 0#4#espionage Espionage

G#3v 12595 Intelligence services G#4v 12596 Electronic intelligence 0#5#electronic intelligence Electronic intelligence G#4v 12597 Intelligence agency

G#5v 12598 Central intelligence agency 0#6#central intelligence agency Central intelligence agency G#5v 12599 Federal bureau of investigation 0#6#federal bureau of investigation Federal bureau of investigation

G#5v 12600 Intelligence agency 0#6#intelligence agency Intelligence agency G#5v 12601 National security agency 0#6#national security agency National security agency

G#5v 12602 Secret intelligence service 0#6#secret intelligence service Secret intelligence service G#4v 12603 Intelligence community 0#5#intelligence community Intelligence community

G#4v 12604 Intelligence service 0#5#intelligence service Intelligence service G#4v 12605 Secret police 0#5#secret police Secret police

G#4v 12606 Security intelligence 0#5#security intelligence Security intelligence G#4v 12607 Special agent 0#5#special agent Special agent

G#4v 12608 Tactical intelligence 0#5#tactical intelligence Tactical intelligence G#3v 12609 National security 0#4#national security National security

G#2v 12610 Public security 0#3#public security Public security G#2v 12611 State security 0#3#state security State security

G#1v 12674 Robot dragonfly 0#2#robot dragonfly Robot dragonfly G#1v 12511 Sabotage 0#2#sabotage Sabotage

G#1v 12612 Security G#2v 12613 Cryptosecurity 0#3#cryptosecurity Cryptosecurity G#2v 12614 Secured area

0#3#secured area Secured area G#2v 12615 Security 0#3#security Security G#2v 12616 Security adviser

0#3#security adviser Security adviser G#2v 12617 Security advisory 0#3#security advisory Security advisory G#2v 12618 Security increase

0#3#security increase Security increase G#2v 12619 Security measure 0#3#security measure Security measure G#2v 12620 Security policy

0#3#security policy Security policy G#2v 12621 Security program 0#3#security program Security program G#1v 12622 Security companies

G#2v 12623 G4s 0#3#g4s G4s G#2v 12624 Panda security 0#3#panda security Panda security

G#2v 12625 Pinkerton 0#3#pinkerton Pinkerton G#2v 12626 Security company 0#3#security company Security company

G#2v 12627 Trustwave 0#3#trustwave Trustwave G#1v 12628 Security concepts G#2v 12629 Assurance

0#3#assurance Assurance G#2v 12630 Countermeasure 0#3#countermeasure Countermeasure G#2v 12631 Defence in depth

0#3#defence in depth Defence in depth G#2v 12632 Risk G#3v 12633 Risk 0#4#risk Risk

G#3v 12634 Risk management 0#4#risk management Risk management G#2v 12635 Threat G#3v 12636 Cyberthreat

0#4#cyberthreat Cyberthreat G#3v 12637 External threat 0#4#external threat External threat G#3v 12638 Internal threat

0#4#internal threat Internal threat G#3v 12639 National security threat 0#4#national security threat National security threat G#3v 12640 Real threat

0#4#real threat Real threat G#3v 12641 Security threat 0#4#security threat Security threat G#3v 12642 Serious threat

0#4#serious threat Serious threat G#3v 12643 Terrorist threat 0#4#terrorist threat Terrorist threat G#3v 12644 Threat

0#4#threat Threat G#3v 12645 Threat information 0#4#threat information Threat information G#3v 12646 Threat intelligence

0#4#threat intelligence Threat intelligence G#2v 12647 Vulnerability G#3v 12648 Critical vulnerability 0#4#critical vulnerability Critical vulnerability

G#3v 12649 Free vulnerability 0#4#free vulnerability Free vulnerability G#3v 12650 Vulnerability 0#4#vulnerability Vulnerability

G#1v 12651 Security devices G#2v 12652 Alarm system 0#3#alarm system Alarm system G#2v 12653 Baggage screening

0#3#baggage screening Baggage screening G#2v 12654 Explosive detection 0#3#explosive detection Explosive detection G#2v 12655 Fire alarm

0#3#fire alarm Fire alarm G#2v 12656 Metal detector 0#3#metal detector Metal detector G#2v 12657 Protective barrier

0#3#protective barrier Protective barrier G#2v 12658 Security device 0#3#security device Security device G#2v 12659 X-ray scanner

0#3#x ray scanner X-ray scanner G#1v 12660 Security forces 0#2#security force Security forces 0#2#security forces Security forces

G#1v 12661 Security system 0#2#security system Security system G#1v 12662 Self-defence 0#2#self defence Self-defence

G#1v 12512 Semantic security 0#2#semantic security Semantic security G#1v 12513 Social security number 0#2#social security number Social security number

G#1v 12663 Surveillance G#2v 12664 Electronic surveillance 0#3#electronic surveillance Electronic surveillance G#2v 12665 Government surveillance

0#3#government surveillance Government surveillance G#2v 12666 Surveillance 0#3#surveillance Surveillance G#2v 12667 Surveillance program

0#3#surveillance program Surveillance program G#2v 12668 Surveillance system 0#3#surveillance system Surveillance system G#1v 12514 Terrorism

G#2v 12515 Al qaeda 0#3#al qaeda Al qaeda G#2v 12516 Hijack G#3v 12517 Aircraft hijacking

0#4#air piracy Aircraft hijacking 0#4#aircraft hijacking Aircraft hijacking 0#4#aircraft piracy Aircraft hijacking 0#4#skyjacking Aircraft hijacking

G#3v 12518 Carjacking 0#4#carjacking Carjacking G#3v 12519 Hijack 0#4#highjack Hijack

0#4#hijack Hijack 0#4#hijacker Hijack 0#4#hijacking Hijack G#3v 12520 Truck hijacking

0#4#truck hijacking Truck hijacking G#2v 12521 International terrorism 0#3#international terrorism International terrorism G#2v 12522 Takfiri terrorist

0#3#takfiri terrorist Takfiri terrorist G#2v 12523 Terrorism 0#3#terrorism Terrorism G#2v 12524 Terrorism act

0#3#terrorism act Terrorism act G#2v 12525 Terrorist 0#3#terrorist Terrorist G#2v 12526 Terrorist attack

0#3#terrorist attack Terrorist attack G#2v 12527 Terrorist organization 0#3#terrorist organization Terrorist organization


Berlin_Adlershof.pdf.txt

Berlin Adlershof City of Science, Technology, and Media presented to Union of the Baltic Cities, UBC Business Commission

1berlin, May 21 2013 Location •Approx. 8 miles (15 km) to downtown Berlin Two Airports

•Tegel •Schã nefeld (BER; Berlin Brandenburg Airport Excellent access to public transport •4 x urban railway, †S-Bahnâ€oe (30 minutes to downtown Berlin

•2 x tramways, †Tramâ€oe/â€oestraã enbahn†•2 x bus lines Highway •Exit †Adlershofâ€oe (15 minutes to downtown Berlin

2 3 WISTA-MANAGEMENT GMBH •density of the scientific infrastructure is unique in Germany

•this infrastructure provides the best conditions for technology-oriented companies •14 Technology Centers

Berlin-Brandenburg Science and Technology Parks /Technology Centres History 1909 First airfield for motorised aircrafts in Germany

1912 Foundation of the German Testing Institute for Aeronautics (DLV Predecessor of DLR 1949 First institute for the German Academy of Science in Adlershof

1951 Foundation of the guard regiment for the East german Ministry of State security (since 1967 guard regiment †Feliks E. Dzierzynskiâ€oe

1952 East german television established 4 History 1990 Reunification of Germany. The Academy of Science and the East

German state television both closed by the end of 1991 1991 Decision to build a Science and Technology Park in Adlershof

Evaluation and establishment of non-university scientific institutes First start-up companies Decision to move the Humboldt Universityâ's Natural science

Institutes to Adlershof 1993 Adlershof designated as development area 5 Adlershof Today 6 Adlershof in Figures

Area of development 420 hectares (1, 038 acres Total number of Institutes 17 Companies 954

Staff 14,942 Students 8, 438 7 Adlershof in Figures Science and Technology Park 11 non-university scientific institutes (1, 760 employees

6 Humboldt University institutes (1, 056 employees; 8, 034 students 445 technology oriented companies (5, 286 employees

Media City 146 companies (1, 763 employees Industrial Estate 363 companies (4, 969 employees 8

 WISTA-MANAGEMENT GMBH/Adlershof Projekt Gmbh 9 *HU: 246 Mio. â IGAFA: 320 Mio. â (gesch

Mio. EUR%Mio. EUR%Mio. EUR %Investitionen in Infrastruktur Investitionen und Kosten des Entwicklungstrã¤gers) 503 34%167 20%670 29

%Investment in Wissenschaftsinstitute Humboldt-Universitã¤t und auã eruniversitã¤re Institute 506 34%60 7%566 24

%Investments WISTA MANAGEMENT GMBH 290 19%72 9%362 15 %Private Investments 197 13%541 64%738 32

%TOTAL 1496 100%840 100%2336 100 %1991-2005 2006-2012 Gesamt GA/GRW: 156 Mio. â

EFRE: 140 Mio. â Public and private investment in Adlershof 1991 †2012 Sustainable Development

Companies in the Science and Technology Park IT and Media 75 Biotechnology and Environment 71

Photonics and Optics 63 Microsystems and Materials 49 Services 170 10 Total: 429 (2011 445 (2012

Turnover in 2011/2012 â 592 Mâ/637 Mâ Subsidies in 2011/2012 â 33 Mâ/31 Mâ

Non-University Research Institutes Leibniz Association •FBH †Ferdinand Braun Institute for High frequency Technology

•IKZ †Institute for Crystal Growth •ISAS †Institute for Analytical Science •MBI †Max-Born Institute for Nonlinear Optics and Short Pulse Spectroscopy

Fraunhofer Association •FOKUS †Fraunhofer Institute for Open Communication systems Helmholtz Association •DLR †German Aerospace Center:

Institute for Space Sensor Technology and Planetary Exploration, Institute for Transport Research •Helmholtz-Center for Materials and Energy

Electron Storage ring BESSY II, Institute for Silicon Photovoltaics 11 Non-University Research Institutes General •BAM †Federal Institute for Materials Research and Testing

•Dept. I, †Analytical Chemistry; Reference Materialsâ€oe •BTU †Brandenburg Technical University Cottbus, workgroup Air Chemistry

•PTB †National Institute of Natural and Engineering sciences Berlin Adlershof, Photon Radiometry Department 12

Technology Fields 13 Photonics and Optics IT and Media Microsystems and Materials Biotechnology and Environment

Photovoltaics/Energy Photonics and Optics Fields of Competence •Laser technology including laser medicine technology

•Optoelectronics including photovoltaic •Spectrometry and Sensors •Technical optics •Synchrotron radiation •Optical, electron beam, and X-ray analysis

•Telecommunication, fibers 14 Photovoltaics Highlights of the Institutes and Companies •Facility design, financing

•EMC filter for photovoltaic installations •Rectifiers, controllers, systems 15 •Association of research institutes on renewable energies

1, 500 staff •Headquartered in Adlershof •Utilization of UMG Si for solar cell production

Microsystems and Materials Fields of Competence •Semiconductor crystals •Reference Materials •Special Materials

•Catalysts •Chemical analysis •Microsystems •Precision engineering •High vacuum technology 16 Microsystems and Materials

The Network †Center for Microsystems Technologyâ€oe Association of Berlin Research Institutes •Goals •Comprehensive project management

•Development of microsystems technologies and products •Manufacture of prototypes •Production of small scale series

•Functional analysis of products •Consulting and training for companies •Partnership in education

•Management located in Berlin Adlershof 17 IT and Media Fields of Competence •Production technologies

•Software engineering •ICT for healthcare •Ambient intelligence •Security technologies •Transport and logistics

•Multimedia 18 Biotechnology and Environment Fields of Competence •Water, soil, and air analysis

•Analytics •Biotechnology products and procedures development •Pharmaceutics and Medicine •Energy-saving processes

19 Centres, Real estate, Investment 20 Innovation and Business Incubation Centre •Specific †incubation infrastructureâ€oe

•Benefits for start-ups: business plan consulting; office and conference services; financial consulting for grants and loans;

agency for advancement and financing •Platform for contacts and co-operations •Floor space in total:

21,159 mâ •Incubation-Rate since 1991: over 200 companies 21 International Business Incubator OWZ Berlin-Adlershof

•Business Incubation with the focus on East-West business •More than 30 companies from 12 countries:

Belarus, Czech republic France, Great britain, Hungary, India, Kazakhstan, Pakistan, Poland Russia, Ukraine •Established 1997 •Floor space in total:

13,104 mâ 22 Centre for Biotechnology & Environmental Technologies IT & Media Centre Photonics Centre

Photovoltaic (2012 Microsystems & Materials (May 2011 Technology Centres Photonics and Optics Photovoltaics Microsystems and Materials

IT and Media Biotechnology and Environment •Special technology infrastructure •Flexible office and laboratory area

•High quality community and service facilities •Floor space in total: 110,000 mâ 23 24â WISTA-MANAGEMENT GMBH

IT and Media New Centre (ZIM3 •Floor space in total: 6. 761 mâ for about 25 enterprises

•Investment: 8. 6 Million euro •Start of Construction: December 2009 •Completion: April 2010

25â WISTA-MANAGEMENT GMBH Microsystems and Materials New Centre (ZMM •Floor space in total:

6. 500 mâ •Special infrastructure with labs clean room (1. 050 mâ offices, pre-installed network

for gases, centralcooling system high-speed communication network •Investment: 30.5 Million euro •Start of Construction:

May 2009 •Completion: May 2011 26â WISTA-MANAGEMENT GMBH Photovoltaic New Centre (ZPV •Floor space in total:

approx. 8, 000 mâ •Investment: approx. 26 Million euro •Start of Construction: October 2009

•Completion: June 2012 Photovoltaic technology (PV) has emerged as a field of technology in

Adlershof within three years. As a consequence of the rapid growth PV WISTA MANAGEMENT has decided to

have a new technology centre built Rental Space •Space in new buildings (Technology Centers), redeveloped old buildings

and old facilities •Minimum floorspace: 20 mâ •Maximum rental space per building: 500 mâ

•Monthly rental price •hall>6. 50 â/mâ •office>7. 50 â/mâ

•laboratory>9. 50 â/mâ •Operating/additional costs per month approx. 2. 50 â/mâ (office use

•Security deposit: 3 months net rent Sales tax not included 27 Organisation 28 WISTA-MANAGEMENT GMBH

29 WISTA-MANAGEMENT GMBH State of Berlin Shareholder Supervisory Board Adlershof Projekt Gmbh Adlershof Facility

Management Gmbh Innovationszentrum Berlin Management Gmbh Subsidiary Public relations Finances/Controlling Law/Labor Construction Business Development

Technology Centres Subsidiary Advisory board Subsidiary Adlershof key actors and synergies TKA Education Basic Research Park

Management and Development Research and Development Products Services Companies WISTA -MANAGEMENT GMBH Humboldt University, Berlin

Non-university research institutes Growth Cycle 31 Generation/Seed University Research Institutes Companies Incubation IGZ/OWZ

Expansion Productive Environment Growth Technology Centres Some success criteria 32 Success Criterion: Strong policy support

33 Entwicklungsplan 1994 35â WISTA-MANAGEMENT GMBH Success Criterion 3-ple helix structure Products and

Services Small and medium -sized enterprises Education and Basic Research Natural science Institutes Research and Development

Non-university scientific institutes Park Management and Development WISTA -MANAGEMENT GMBH 36 Long term development strategy

Clear strategic orientation on scientific, technology and economic profile Awareness of available and necessary skills

Target oriented marketing and acquisition Consequent growth alongside the selected profile Success Criterion: Profile, Image and Brand

Regional Network Optecbb, 2000 and 2005 Sydow et al. 2007 37 Success Criterion: Proximity (photonics 38

Success Criterion: Proximity (IT Â WISTA-MANAGEMENT GMBH Generation/Seed Incubation Growth Expansion University IGZ/OWZ Technology Centres Productive

Research Institutes Environment Companies Advisory service Coaching Infrastructure Project development Support Networks Marketing Internationalization Financing Trade shows, Events

Success Criterion: growth phases connected 12 †18 p. a. 90 340 approx 20 (premesis

40 Takes place in Adlershof partners Success Criterion: Coverage of supply chain 41 Success Criterion:

Space for growth on site 42 Success Criterion: space for growth on-site 43 First incubator 1991 with 5 companies on 1, 000 mâ

newspapers argued â€oepotemkin in Adlershof†â€oeadlershof †smoke and mirrors†Success Criterion: Strong GA/EFRE support

 WISTA-MANAGEMENT GMBH 44 1991-2005 2010 Mio EUR %Mio. EUR %Infrastructure Investment 495.0 35+70 14

Investment in Res. Institutes 426.9 30+10 2 Investments WISTA 233.1 17+70 14 Private Investments 197.2 14+350 69

Investments Service provider 56.2 4+5 1 TOTAL 1, 408.5 100 505 100 Success Criterion finance model

Increasing private investment Services 45 WISTA-MANAGEMENT GMBH Services for Companies •Comprehensive building infrastructure

•Favorable rent and additional expenses •Incubation and promotion of start-ups, Consultation for grants and loans, etc

•Joint project development •Participation in specialized networks •Communication services •Service Packages

•International contacts and support •Local job exchange •Conference and event services •Participation/organization of exhibitions and fairs

46 Services for Foreign Companies •Quick start via •Network services •International incubation service

•Soft landing packages •Excellent High Tec Facilities •Lab and related office space at low rents for SME

•Flexibility •Berlin Subsidies •Investment subsidies •Research subsidies •Personel recruitment subsidies

47 Adlershof â€oemarket Access Point†48 Service Offers Target Group Service Provider •Access Office:

fully equipped office in the STP premises; free of charge for 3-5 days to test the

market •Initial market information in the related tech-field provided by park management •Preparation and organization of

company meetings on request •Secretary and back up office on request •Access to special networks

•Potential clients from partner STP abroad SME larger companies institutions •Potential investors WISTA

-MANAGEMENT GMBH •Bus. Development Team •Technology Center Management Team Berlin Business Welcome Package

49 Service Offers Target Group Service Provider •Office space (20 mâ, furniture ISDN, PC, Internet

•Apartment (45 mâ •Monthly ticket for all local transportation systems •Founder and financial consultation

•Cost: 2, 400 â for 3 months Start-up support for companies coming to and settling in Berlin

•Berlin Partner •WISTA -MANAGEMENT GMBH Why Adlershof •Education, research, and innovative companies in dynamic clusters

•Leading performance of the Business Incubation Centre •Special technology infrastructure •Flexible office and laboratory rental space

•Plots: buy and long-term lease, project development •High quality community and service facilities •Highly qualified staff

•Efficient networks •Established basis for business with the international market •Low costs in Berlin

•Favorable financial options 50 Urban Hinterland The District of Treptow-Kà penick •Berlin's largest and very scenic district in the southeast

•High-quality housing estates •Shopping Centres, nurseries, schools, restaurants, sports facilities in a dense neighborhood

•Cultural highlights (Old Town of Kà penick with a beautiful baroque castle on the waterfront, Treptower Park

•Large forests and numerous lakes 51 Contact WISTA-MANAGEMENT GMBH Rudower Chaussee 17 12489 Berlin

Germany Hardy R. Schmitz Dr. Helge Neumann Chief executive officer Executive Manager, Business Dvpt Phone:++49-30-6392 2202 Phone:+

+49-30-6392 2230 Fax:++49-30-6392 2203 Fax:++49-30-6392 2204 E-mail:

schmitz@wista. de E-mail: helge@wista. de 52 www. adlershof. de 53


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011