964 resultados para TRYPTOPHAN SIDE-CHAINS
Resumo:
Digital innovation is transforming the media and entertainment industries. The professionalization of YouTube’s platform is paradigmatic of that change. The 100 original channel initiative launched in late 2011 was designed to transform YouTube’s brand through production of a high volume of quality premium video content that would more deeply engage its audience base and in the process attract big advertisers. An unanticipated by-product has been the rapid growth of a wave of aspiring next-generation digital media companies from within the YouTube ecosystem. Fuelled by early venture capital some have ambitious goals to become global media corporations in the online video space. A number of larger MCNs (Multi-Channel Networks) - BigFrame, Machinima, Fullscreen, AwesomenessTV, Maker Studios , Revision3 and DanceOn - have attracted interest from media incumbents like Warner Brothers, DreamWorks, Discovery, Bertlesmann, Comcast and AMC, and two larger MCNs Alloy and Break Media have merged. This indicates that a shakeout is underway in these new online supply chains, after rapid initial growth. The higher profile MCNs seek to rapidly develop scale economies in online distribution and facilitate audience growth for their member channels, helping channels optimize monetization, develop sustainable business models and to facilitate producer-collaboration within a growing online community of like-minded content creators. Some MCNs already attract far larger online audiences than any national TV network. The speed with which these developments have occurred is reminiscent of the 1910s, when Hollywood studios first emerged and within only a few years replaced the incumbent film studios as the dominant force within the film industry.
Resumo:
The focus in this article is how the extensive use of fly-in fly-out (FIFO) working arrangements in the Western Australian resources sector has an impact directly and indirectly on smaller firms and their ability to recruit workers in remote locations. We argue that the growth of FIFO working arrangements has disadvantaged smaller resource-sector firms by increasing their employment costs and decreasing their ability to attract skilled workers. As a result, smaller resource-sector firms are recruiting skilled workers on 457 visas to secure their business stability and growth, despite the complexity, costs, and risks involved.
Enhanced interfacial thermal transport across graphene–polymer interfaces by grafting polymer chains
Resumo:
Thermal transport in graphene-polymer nanocomposite is complicated and has not been well understood. The interfacial thermal transport between graphene nanofiller and polymer matrix is expected to play a key role in controlling the overall thermal performance of graphene-polymer nanocomposite. In this work, we investigated the thermal transport across graphene-polymer interfaces functionalized with end-grafted polymer chains using molecular dynamics simulations. The effects of grafting density, chain length and initial morphology on the interfacial thermal transport were systematically investigated. It was found that end-grafted polymer chains could significantly enhance interfacial thermal transport and the underlying mechanism was considered to be the enhanced vibration coupling between graphene and polymer. In addition, a theoretical model based on effective medium theory was established to predict the thermal conductivity in graphene-polymer nanocomposites.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.
Resumo:
This study provides some preliminary insight in relation to the use of social audits by the global clothing and retail companies that source garment products from developing nations. In the era of globalisation, companies based in developed nations have transferred their production locations to many parts of the developing nations. At the same time, there are widespread global stakeholder concerns about the use of child labour, inadequate health and safety standards and poor working conditions at many of these production locations. Social audits appear to be a tool used by companies to monitor working conditions and to ensure that manufacturing takes place in a humane working environment. The study finds that companies use social auditing in order to maintain their legitimacy within the wider community.
Resumo:
This book covers key discussions involving major US and European multinational companies (MNCs) that source products from suppliers in developing countries. Due to the transfer of production from developed to developing nations, there is an urgent need to establish social compliance as a new form of Corporate Social Responsibility (CSR) and a means by which MNCs can meet expected social standards. The cases described are internationally relevant and can be seen to reflect or represent the behavior of many MNCs and their suppliers in developing nations. The discussion offers essential insights into how different levels of social compliance risk and pressure (including broader stakeholder concerns) move managers to adopt or embrace particular social compliance accounting, reporting and auditing strategies. The book will help readers to understand the major concerns, challenges and dilemmas faced by management in the supply chains of MNCs, and proposes measures that can be taken to resolve those dilemmas. Most importantly, it develops a systematic method of assessing the social compliance performance of suppliers to MNCs. This includes highly detailed accounts of the social compliance performance of suppliers within the clothing industry (in a developing nation) that supply goods to the extensive US and European markets. The book offers a valuable guide, not only for corporate managers but also for practitioners, researchers, academics, and undergraduate and postgraduate business students.
Resumo:
The monoanionic ligand 1,1,3,3 tetracyano-2 ethoxypropenide (tcnoet) is reported with its Cu(II)–bpy complex of formula [Cu2(µ-tcnoet)2(tcnoet)2(bpy)2]. The structure has been determined using X-ray diffraction and features an alternating chain with bridging tcnoet ligands. One ligand acts as a bidentate, dinucleating ligand with one short Cu–N and one medium Cu–N bond, whereas the other tcnoet is largely monodentate, albeit with a very weak interdimer Cu–N bond. Despite the arrangement in dinuclear units, further arranged into linear chains through the non-bridging tcnoet ligand, the compound shows no significant magnetic exchange, as deduced from magnetic susceptibility down to 4 K. Ligand-field, IR and EPR spectra in the solid state and in frozen solution are reported and are consistent with the overall structure.
Resumo:
Purpose Following the perspective of frustration theory customer frustration incidents lead to frustration behavior such as protest (negative word‐of‐mouth). On the internet customers can express their emotions verbally and non‐verbally in numerous web‐based review platforms. The purpose of this study is to investigate online dysfunctional customer behavior, in particular negative “word‐of‐web” (WOW) in online feedback forums, among customers who participate in frequent‐flier programs in the airline industry. Design/methodology/approach The study employs a variation of the critical incident technique (CIT) referred to as the critical internet feedback technique (CIFT). Qualitative data of customer reviews of 13 different frequent‐flier programs posted on the internet were collected and analyzed with regard to frustration incidents, verbal and non‐verbal emotional effects and types of dysfunctional word‐of‐web customer behavior. The sample includes 141 negative customer reviews based on non‐recommendations and low program ratings. Findings Problems with loyalty programs evoke negative emotions that are expressed in a spectrum of verbal and non‐verbal negative electronic word‐of‐mouth. Online dysfunctional behavior can vary widely from low ratings and non‐recommendations to voicing switching intentions to even stronger forms such as manipulation of others and revenge intentions. Research limitations/implications Results have to be viewed carefully due to methodological challenges with regard to the measurement of emotions, in particular the accuracy of self‐report techniques and the quality of online data. Generalization of the results is limited because the study utilizes data from only one industry. Further research is needed with regard to the exact differentiation of frustration from related constructs. In addition, large‐scale quantitative studies are necessary to specify and test the relationships between frustration incidents and subsequent dysfunctional customer behavior expressed in negative word‐of‐web. Practical implications The study yields important implications for the monitoring of the perceived quality of loyalty programs. Management can obtain valuable information about program‐related and/or relationship‐related frustration incidents that lead to online dysfunctional customer behavior. A proactive response strategy should be developed to deal with severe cases, such as sabotage plans. Originality/value This study contributes to knowledge regarding the limited research of online dysfunctional customer behavior as well as frustration incidents of loyalty programs. Also, the article presents a theoretical “customer frustration‐defection” framework that describes different levels of online dysfunctional behavior in relation to the level of frustration sensation that customers have experienced. The framework extends the existing perspective of the “customer satisfaction‐loyalty” framework developed by Heskett et al.
Resumo:
Deterrence-based initiatives form a cornerstone of many road safety countermeasures. This approach is informed by Classical Deterrence Theory, which proposes that individuals will be deterred from committing offences if they fear the perceived consequences of the act, especially the perceived certainty, severity and swiftness of sanctions. While deterrence-based countermeasures have proven effective in reducing a range of illegal driving behaviours known to cause crashes such as speeding and drink driving, the exact level of exposure, and how the process works, remains unknown. As a result the current study involved a systematic review of the literature to identify theoretical advancements within deterrence theory that has informed evidence-based practice. Studies that reported on perceptual deterrence between 1950 and June 2015 were searched in electronic databases including PsychINFO and ScienceDirect, both within road safety and non-road safety fields. This review indicated that scientific efforts to understand deterrence processes for road safety were most intense during the 1970s and 1980s. This era produced competing theories that postulated both legal and non-legal factors can influence offending behaviours. Since this time, little theoretical progression has been made in the road safety arena, apart from Stafford and Warr's (1993) reconceptualisation of deterrence that illuminated the important issue of punishment avoidance. In contrast, the broader field of criminology has continued to advance theoretical knowledge by investigating a range of individual difference-based factors proposed to influence deterrent processes, including: moral inhibition, social bonding, self-control, tendencies to discount the future, etc. However, this scientific knowledge has not been directed towards identifying how to best utilise deterrence mechanisms to improve road safety. This paper will highlight the implications of this lack of progression and provide direction for future research.
Resumo:
Supply chain outsourcing has posed problems for conventional labour regulation, which focuses on employers contracting directly with workers, particularly employees. These difficulties have been exacerbated by the traditional trifurcated approach to regulation of pay and conditions, work health and safety and workers’ compensation. This paper analyses the parallel interaction of two legal developments within the Australian textile, clothing and footwear industry. The first is mandatory contractual tracking mechanisms within state and federal labour laws and the second is the duties imposed by the harmonised Work Health and Safety Acts. Their combined effect has created an innovative, fully enforceable and integrated regulatory framework for the textile, clothing and footwear industry and, it is argued, other supply chains in different industry contexts. This paper highlights how regulatory solutions can address adverse issues for workers at the bottom of contractual networks, such as fissured workplaces and capital fragmentation, by enabling regulators to harness the commercial power of business controllers at the apex to ensure compliance throughout the entire chain.
Resumo:
Twitter and other social networking sites play an ever more present role in the spread of current events. The dynamics of information dissemination through digital network structures are still relatively unexplored, however. At what time an issue is taken up by whom? Who forwards a message when to whom else? What role do individual communication participants, existing digital communities or the technical foundations of each network platform play in the spread of news? In this chapter we discuss, using the example of a video on a current sociopolitical issue in Australia that was shared on Twitter, a number of new methods for the dynamic visualisation and analysis of communication processes. Our method combines temporal and spatial analytical approaches and provides new insights into the spread of news in digital networks. [Social media dienen immer häufger als Disseminationsmechanismen für Medieninhalte. Auf Twitter ermöglicht besonders die Retweet-Funktion den schnellen und weitläufgen Transfer von Nachrichten. In diesem Beitrag etablieren neue methodische Ansätze zur Erfassung, Visualisierung und Analyse von Retweet-Ketten. Insbesondere heben wir hervor, wie bestehende Netzwerkanalysemethoden ergänzt werden können, um den Ablauf der Weiterleitung sowohl temporal als auch spatial zu erfassen. Unsere Fallstudie demonstriert die verbreitung des videoclips einer am 9. Oktober 2012 spontan gehaltenen Wutrede der australischen Premierministerin Julia Gillard, in der sie Oppositionsführer Tony Abbott als Frauenhasser brandmarkte. Durch die Erfassung von Hintergrunddaten zu den jeweiligen NutzerInnen, die sich an der Weiterleitung des Videoclips beteiligten, erstellen wir ein detailliertes Bild des Disseminationsablaufs im vorliegenden Fall. So lassen sich die wichtigsten AkteurInnen und der Ablauf der Weiterleitung darstellen und analysieren. Daraus entstehen Einblicke in die allgemeinen verbreitungsmuster von Nachrichten auf Twitter].
Resumo:
Climate change is one of the most important issues confronting the sustainable supply of seafood, with projections suggesting major effects on wild and farmed fisheries worldwide. While climate change has been a consideration for Australian fisheries and aquaculture management, emphasis in both research and adaptation effort has been at the production end of supply chains—impacts further along the chain have been overlooked to date. A holistic biophysical and socio-economic system view of seafood industries, as represented by end-to-end supply chains, may lead to an additional set of options in the face of climate change, thus maximizing opportunities for improved fishery profitability, while also reducing the potential for maladaptation. In this paper, we explore Australian seafood industry stakeholder perspectives on potential options for adaptation along seafood supply chains based on future potential scenarios. Stakeholders, representing wild capture and aquaculture industries, provided a range of actions targeting different stages of the supply chain. Overall, proposed strategies were predominantly related to the production end of the supply chain, suggesting that greater attention in developing adaptation options is needed at post-production stages. However, there are chain-wide adaptation strategies that can present win–win scenarios, where commercial objectives beyond adaptation can also be addressed alongside direct or indirect impacts of climate. Likewise, certain adaptation strategies in place at one stage of the chain may have varying implications on other stages of the chain. These findings represent an important step in understanding the role of supply chains in effective adaptation of fisheries and aquaculture industries to climate change.
Resumo:
Flow patterns and aerodynamic characteristics behind three side-by-side square cylinders has been found depending upon the unequal gap spacing (g1 = s1/d and g2 = s2/d) between the three cylinders and the Reynolds number (Re) using the Lattice Boltzmann method. The effect of Reynolds numbers on the flow behind three cylinders are numerically studied for 75 ≤ Re ≤ 175 and chosen unequal gap spacings such as (g1, g2) = (1.5, 1), (3, 4) and (7, 6). We also investigate the effect of g2 while keeping g1 fixed for Re = 150. It is found that a Reynolds number have a strong effect on the flow at small unequal gap spacing (g1, g2) = (1.5, 1.0). It is also found that the secondary cylinder interaction frequency significantly contributes for unequal gap spacing for all chosen Reynolds numbers. It is observed that at intermediate unequal gap spacing (g1, g2) = (3, 4) the primary vortex shedding frequency plays a major role and the effect of secondary cylinder interaction frequencies almost disappear. Some vortices merge near the exit and as a result small modulation found in drag and lift coefficients. This means that with the increase in the Reynolds numbers and unequal gap spacing shows weakens wakes interaction between the cylinders. At large unequal gap spacing (g1, g2) = (7, 6) the flow is fully periodic and no small modulation found in drag and lift coefficients signals. It is found that the jet flows for unequal gap spacing strongly influenced the wake interaction by varying the Reynolds number. These unequal gap spacing separate wake patterns for different Reynolds numbers: flip-flopping, in-phase and anti-phase modulation synchronized, in-phase and anti-phase synchronized. It is also observed that in case of equal gap spacing between the cylinders the effect of gap spacing is stronger than the Reynolds number. On the other hand, in case of unequal gap spacing between the cylinders the wake patterns strongly depends on both unequal gap spacing and Reynolds number. The vorticity contour visualization, time history analysis of drag and lift coefficients, power spectrum analysis of lift coefficient and force statistics are systematically discussed for all chosen unequal gap spacings and Reynolds numbers to fully understand this valuable and practical problem.