889 resultados para mobile environment, peer-to-peer, PeerHood, software security, vulnerabilities
Resumo:
Abstract: The literature on the various links between organizations and their external environment is very extensive and fragmented. This thesis is comprised of three separate essays, each examining specific research questions related to these links. The first essay deals with the notion of industry life cycle and how the geographical concentration of an industry is linked to the particular life cycle stage in which the industry finds itself. The aim of this first essay is firstly to verify if the evolution of the Swiss hotel industry fits some of the stylized facts of the industry life cycle. The second aim is to verify if there is evidence of geographical clustering of the hotel industry, and by extension of tourism. The third aim is to verify a hypothesis that industry decline manifests itself mainly by company closures in decentralized locations. The importance for organizational survival and performance of adapting and reacting to environmental changes has long been ascertained. This adaptation requires managers, under conditions of uncertainty, to identify relevant changes in their external environment and to interpret the possible effects of those changes on their organization. Furthermore, it requires finding and adopting organizational responses in reaction to the environmental changes. The second essay explores how managers perceive their environment by reporting the results of two workshops held with managers from the European hotel industry. In the third essay we examine in more detail the role of uncertainty in the interpretation by executives of environmental changes. We integrate existing theories of interpretation and uncertainty into one framework, which we then test using national survey data from the hotel industry. In all three essays we are able to provide some evidence to support our main hypotheses, but.also make suggestions far further research into the topics examined.
Resumo:
The metropolitan region of Recife, Brazil is endemic for Dirofilaria immitis and has an environment favorable to the development of Culex quinquefasciatus. The goal of this study was to evaluate the vector competence of the Cx. quinquefasciatus RECIFE population for D. immitis transmission. A total of 2,104 females of Cx. quinquefasciatus RECIFE population were exposed to different densities of D. immitis microfilariae blood meals, ranging from 1,820 to 2,900 mf/ml of blood, in a natural membrane apparatus. The results showed a variation between 92.3% and 98.8% of females fed. The exposure of the Cx. quinquefasciatus RECIFE population to different densities of microfilariae did not influence the mortality of the mosquitoes. Infective larvae from D. immitis were observed in the Malpighian tubules beginning on the 12th day, whereas larvae were observed in the head and proboscis beginning on the 13th day following infection. The vector efficiency index (VEI) presented by the mosquitoes ranged from 7.8 to 56.5. The data demonstrates that the Cx. quinquefasciatus RECIFE population has great potential for the transmission of D. immitis, as it allowed the development of the filarid until the infectious stage at the different densities of microfilariae to which it was exposed.
Resumo:
This paper studies how firms make layoff decisions in the presence of adverse shocks. In this uncertain environment, workers' expectations about their job security affect their on-the-job performance. This productivity effect on job insecurity forces firms to strike a balance between laying off redundant workers and maintaining survivors' commitment when deciding on the amount and timing of downsizing. This framework offers an explanation of conservative employment practices (such as zero or reduced layoffs) based on firms having private information about their future profits. High retention rates and wages can signal that the firm has a bright future, boosting workers' confidence. Moreover, the model provides clear predictions about when waves of downsizing will occur as opposed to one-time massive cuts.
Resumo:
Why are the old politically successful? We build a simple interest group model in which political pressure is time-intensive, showing that in the political competitive equilibrium each group lobbies for government policies that lower their own value of time but the old do so to a greater extent and as a result are net gainers from the political process. What distinguishes the elderly from other political groups (and what makes them more succesful) is that they have lower labor productivity and/or that we are all likely to become elderly at some point, while we are relatively unlikely to change gender, race, sexual orientation, or even ocupation, The model has a variety of implications for the design of social security programs, which we test using data from the Social Security Administration. For example, the model predicts that social security programs with retirement incentives are larger and that the old are more "single-minded" in their politics, implications which we verify using cross-country government finance data and cross-country political participation surveys. Finally, we show that the forced savings programs intended to "reform" the social security system may increase the amount of intergenerational redistribution. As a model for evaluating policy reforms, ours has the attractive feature that reforms must be time time consistent from a political point of view rather than a public interest point of view.
Resumo:
El software lliure està tenint últimament un pes cada cop més important en les empreses, però encara és el gran desconegut per a molta gent. Des de la seva creació als anys 80 fins ara, hi ha hagut un creixement exponencial de software lliure de gran qualitat, oferint eines per a tot tipus de necessitats, eines ofimàtiques, gestors de correu, sistemes de fitxer, sistemes operatius…. Tot aquest moviment no ha passat desapercebut per a molts usuaris i empreses, que s’han aprofitat d’ell per cobrir les seves necessitats. Pel que fa a les empreses, cada cop n’hi ha més que en petita o gran mesura, utilitzen el software lliure, ja sigui per el seu menor cost d’adquisició, o bé per la seva gran fiabilitat o per que és fàcilment adaptable o per no establir cap lligam tecnològic, en definitiva per tenir més llibertat. En el moment de la creació d’una nova empresa, on es parteix de zero en tota la tecnologia informàtica, és el moment menys costòs d’implementar l’arquitectura informàtica amb software lliure, és quan l’impacte que té sobre l’empresa, usuaris i clients és menor. En les empreses que ja tenen un sistema informàtic, caldrà establir un pla de migració, ja sigui total o parcial. La finalitat d’aquest projecte no és la de dir quin software és millor que l’altre o de dir quin s’ha d’instal•lar, sinó el de donar a conèixer el món del software lliure, mostrar part d’aquest software, fer alguna comparativa de software lliure amb software propietari, donant idees i un conjunt de solucions per a empreses, per què una empresa pugui agafar idees d’implementació d’algunes de les solucions informàtiques exposades o seguir algun dels consells proposats. Actualment ja hi ha moltes empreses que utilitzen software lliure. Algunes només n’utilitzen una petita part en les seves instal•lacions, ja que el fet de que una empresa funcioni al 100% amb software lliure, tot i que n’hi comença ha haver, de moment ho considero una mica arriscat, però que en poc temps, aquest fet serà cada cop més habitual.
Resumo:
The following general aviation security guidelines have been adapted from the National Working Group on General Aviation Security. This group consisted of members from the nation’s major aviation associations. In 2003the group submitted a report on general aviation security to the Transportation Security Administration (TSA). The following guidelines from the report affect airport personnel, pilots and tenants. Additional guidelines on airport security have been shared with airport managers and sponsors. The most up-to-date general aviation security guidelines are posted on the Iowa Department of Transportation’s Office ofAviation Web site: iawings.com
Resumo:
Expression of laminin-5 alpha3, beta3 and gamma2 protein subunits was investigated in colorectal adenocarcinomas using immunostaining and confocal microscopy. The laminin-5 heterotrimer was found in basement membranes and as extracellular deposits in tumor stroma. In contrast to the alpha3 subunit, which was under-expressed, the gamma2 and beta3 subunits were detected in the cytoplasm of carcinoma cells dissociating (budding) from neoplastic tubules, suggestive of focal alterations in laminin-5 assembly and secretion. Laminin-5 gamma2 or beta3 subunit-reactive budding carcinoma cells expressed cytokeratins but not vimentin; they did not proliferate and were not apoptotic. Furthermore, expression of laminin-5 gamma2 and beta3 subunits in budding cells was associated with focal under-expression of the E-cadherin-beta-catenin complex. Results from xenograft experiments showed that budding activity in colorectal adenocarcinomas could be suppressed when these tumors grew at ectopic s.c. sites in nude mice. In vitro, cultured colon carcinoma cells, but not adenoma-derived tumor cells, shared the laminin-5 phenotype expressed by carcinoma cells in vivo. Using colon carcinoma cell lines implanted orthotopically and invading the cecum of nude mice, the laminin-5-associated budding was restored, indicating that this phenotype is not only determined by tumor cell properties but also dependent on the tissue micro-environment. Our results indicate that both laminin-5 alpha3 subunit expression and cell-cell cohesiveness are altered in budding carcinoma cells, which we consider to be actively invading. We propose that the local tissue micro-environment contributes to these events.
Resumo:
Intra-specific colour polymorphism provides a cryptic camouflage from predators in heterogeneous habitats. The orthoptera species, Acrida ungarica (Herbst, 1786) possess two well-distinguished colour morphs: brown and green and displays several disruptive colouration patterns within each morph to improve the crypsis. This study focused on how the features of the background environment relate to the proportion of the two morphs and to the intensity of disruptive colouration patterns in A. ungarica. As the two sexes are very distinct with respect to mass and length, we also distinctively tested the relationship for each sex. In accordance with the background matching hypothesis, we found that, for both sexes, the brown morph was in higher proportion at sites with a brown-dominant environment, and green morphs were in higher proportion in green-dominant environments. Globally, individuals in drier sites and in the drier year also had more intense disruptive colouration patterns, and brown morphs and females were also more striped. Colour patterns differed largely between populations and were significantly correlated with relevant environmental features. Even if A. ungarica is a polymorphic specialist, disruptive colouration still appears to provide strong benefits, particularly in some habitats. Moreover, because females are larger, they are less able to flee, which might explain the difference between sexes
Resumo:
Antibiotic resistance is an increasing global problem resulting from the pressure of antibiotic usage, greater mobility of the population, and industrialization. Many antibiotic resistance genes are believed to have originated in microorganisms in the environment, and to have been transferred to other bacteria through mobile genetic elements. Among others, ß-lactam antibiotics show clinical efficacy and low toxicity, and they are thus widely used as antimicrobials. Resistance to ß-lactam antibiotics is conferred by ß-lactamase genes and penicillin-binding proteins, which are chromosomal- or plasmid-encoded, although there is little information available on the contribution of other mobile genetic elements, such as phages. This study is focused on three genes that confer resistance to ß-lactam antibiotics, namely two ß-lactamase genes (blaTEM and blaCTX-M9) and one encoding a penicillin-binding protein (mecA) in bacteriophage DNA isolated from environmental water samples. The three genes were quantified in the DNA isolated from bacteriophages collected from 30 urban sewage and river water samples, using quantitative PCR amplification. All three genes were detected in the DNA of phages from all the samples tested, in some cases reaching 104 gene copies (GC) of blaTEM or 102 GC of blaCTX-M and mecA. These values are consistent with the amount of fecal pollution in the sample, except for mecA, which showed a higher number of copies in river water samples than in urban sewage. The bla genes from phage DNA were transferred by electroporation to sensitive host bacteria, which became resistant to ampicillin. blaTEM and blaCTX were detected in the DNA of the resistant clones after transfection. This study indicates that phages are reservoirs of resistance genes in the environment.
Resumo:
There is a lack of dedicated tools for business model design at a strategic level. However, in today's economic world the need to be able to quickly reinvent a company's business model is essential to stay competitive. This research focused on identifying the functionalities that are necessary in a computer-aided design (CAD) tool for the design of business models in a strategic context. Using design science research methodology a series of techniques and prototypes have been designed and evaluated to offer solutions to the problem. The work is a collection of articles which can be grouped into three parts: First establishing the context of how the Business Model Canvas (BMC) is used to design business models and explore the way in which CAD can contribute to the design activity. The second part extends on this by proposing new technics and tools which support elicitation, evaluation (assessment) and evolution of business models design with CAD. This includes features such as multi-color tagging to easily connect elements, rules to validate coherence of business models and features that are adapted to the correct business model proficiency level of its users. A new way to describe and visualize multiple versions of a business model and thereby help in addressing the business model as a dynamic object was also researched. The third part explores extensions to the business model canvas such as an intermediary model which helps IT alignment by connecting business model and enterprise architecture. And a business model pattern for privacy in a mobile environment, using privacy as a key value proposition. The prototyped techniques and proposition for using CAD tools in business model modeling will allow commercial CAD developers to create tools that are better suited to the needs of practitioners.
Resumo:
The Institute has professionals with extensive experience in training, specifically with experience in the field of police and emergencies training. Moreover, it also has very talented people. But above all, our institution has public professionals with a desire to serve, who love security and emergency responders and want to provide them with the best knowledge to make them every day better professionals. In the quest for continuous training improvement, its during 2009 when e-learning begins to have a presence at the Institute. Virtual training methodology becomes a facilitator for the training of various professionals, avoiding geographical displacement and easing the class schedule.
Resumo:
The report describes the state of the art video equipment used and experiences gained from the 6,800 mile field test. The first objective of this project was to determine if laser disc equipment could capture and store usable roadway images while operating in a mobile environment. The second objective was to evaluate methods of using optical disc storage and retrieval features to enhance highway planning and design function. Several highway departments have attempted to use video technology to replace the traditional 16 and 35 mm film format used in photologging. These attempts have met with limited success because of the distortion caused by video technology not being capable of dealing with highway speeds. The distortion has caused many highway signs to be unreadable and, therefore, clients have labeled the technology unusable. Two methods of using optical laser disc storage and retrieval have been successfully demonstrated by Wisconsin and Connecticut Departments of Transportation. Each method provides instantaneous retrieval and linking of images with other information. However, both methods gather the images using 35 mm film techniques. The 35 mm film image is then transferred to laser disc. Eliminating the film conversion to laser disc has potential for saving $4 to $5 per logging mile. In addition to a cost savings, the image would be available immediately as opposed to delays caused by film developing and transferring to laser disc. In June and November of 1986 Iowa DOT staff and cooperating equipment suppliers demonstrated the concept of direct image capture. The results from these tests were promising and an FHWA Demonstration program established. Since 1986 technology advancements have been incorporated into the design that further improve the image quality originally demonstrated.
Resumo:
This manual describes how to use the Iowa Bridge Backwater software. It also documents the methods and equations used for the calculations. The main body describes how to use the software and the appendices cover technical aspects. The Bridge Backwater software performs 5 main tasks: Design Discharge Estimation; Stream Rating Curves; Floodway Encroachment; Bridge Backwater; and Bridge Scour. The intent of this program is to provide a simplified method for analysis of bridge backwater for rural structures located in areas with low flood damage potential. The software is written in Microsoft Visual Basic 6.0. It will run under Windows 95 or newer versions (i.e. Windows 98, NT, 2000, XP and later).
Resumo:
El documento recoge los hitos del desarrollo de Pintoresco, una aplicación orientada a la evaluación de los procesos de aprendizaje conceptual que se examinan a partir de su uso por usuario ordinario. La aplicación permite obtener datos del proceso de aprendizaje conceptual en un contexto en que la estructura interna de las clases en que se produce una partición no depende de las propiedades específicas de los patrones de estímulo que son distintos para cada usuario sino de la forma lógica de la propia partición.
Resumo:
Nowadays, when a user is planning a touristic route is very difficult to find out which are the best places to visit. The user has to choose considering his/her preferences due to the great quantity of information it is possible to find in the web and taking into account it is necessary to do a selection, within small time because there is a limited time to do a trip. In Itiner@ project, we aim to implement Semantic Web technology combined with Geographic Information Systems in order to offer personalized touristic routes around a region based on user preferences and time situation. Using ontologies it is possible to link, structure, share data and obtain the result more suitable for user's preferences and actual situation with less time and more precisely than without ontologies. To achieve these objectives we propose a web page combining a GIS server and a touristic ontology. As a step further, we also study how to extend this technology on mobile devices due to the raising interest and technological progress of these devices and location-based services, which allows the user to have all the route information on the hand when he/she does a touristic trip. We design a little application in order to apply the combination of GIS and Semantic Web in a mobile device.