938 resultados para Copyright -- Electronic information resources
Resumo:
Traditionally, libraries have provided a modest amount of information about grants and funding opportunities to researchers in need of research funding. Ten years ago, the University of Washington (UW) Health Sciences Libraries and Information Center joined in a cooperative effort with the School of Medicine to develop a complete, library-based grant and funding service for health sciences researchers called the Research Funding Service. The library provided space, access to the library collection, equipment, and electronic resources, and the School of Medicine funded staff and operations. The range of services now includes individual consultation appointments, an extensive Web site, classes on funding database searching and writing grant applications, a discussion series that frequently hosts guest speakers, a monthly newsletter with funding opportunities of interest to the six health sciences schools, extensive files on funding sources, and referral services.
Resumo:
The North Carolina Area Health Education Centers Library and Information Services (NC AHEC LIS) Network provides library outreach services to rural health care providers in all nine AHEC regions of North Carolina. Over the last twenty-five years, the AHEC and university-based librarians have collaborated to create a model program for support of community-based clinical education and information access for rural health care providers. Through several collaborative projects, they have supported Internet access for rural health clinics. The NC AHEC Digital Library—under development by NC AHEC, University of North Carolina at Chapel Hill, Duke University, East Carolina University, and Wake Forest University—will further extend access to electronic biomedical information and resources to health professionals in a statewide digital library.
Resumo:
Globalization and the spread of Information and Communication Technology (ICT), particularly Internet usage, have changed the practice of recruiting employees. The Internet has become an integral part of Human Resource (HR) talent management, and as a result, a majority of business organizations in Germany have adopted an online recruitment initiative. However, technology alone no longer provides a competitive advantage. To meet their talent requirements, business organizations have turned to recruiting alternatives such as electronic recruitment or e-recruitment, which is a form of recruitment using electronic media tools to attract, hire, and retain job seekers. In this investigation, the author examined the efficacy and opportunities of e-recruitment in medium-sized German business organizations.. The author determined that many medium-sized German companies are using the Internet to recruit online but not effectively enough to create and maintain a sustainable strategic advantage. The author concluded that several areas for improvements exist in e-recruitment processes.
Resumo:
The electronic gap structure of the organic molecule N,N′-diphenyl-N,N′-bis(3-methylphenyl)-(1,1′-biphenyl)-4,4′-diamine, also known as TPD, has been studied by means of a Scanning Tunneling Microscope (STM) and by Photoluminescence (PL) analysis. Hundreds of current-voltage characteristics measured at different spots of the sample show the typical behavior of a semiconductor. The analysis of the curves allows to construct a gap distribution histogram which reassembles the PL spectrum of this compound. This analysis demonstrates that STM can give relevant information, not only related to the expected value of a semiconductor gap but also on its distribution which affects its physical properties such as its PL.
Resumo:
The explosive growth of the traffic in computer systems has made it clear that traditional control techniques are not adequate to provide the system users fast access to network resources and prevent unfair uses. In this paper, we present a reconfigurable digital hardware implementation of a specific neural model for intrusion detection. It uses a specific vector of characterization of the network packages (intrusion vector) which is starting from information obtained during the access intent. This vector will be treated by the system. Our approach is adaptative and to detecting these intrusions by using a complex artificial intelligence method known as multilayer perceptron. The implementation have been developed and tested into a reconfigurable hardware (FPGA) for embedded systems. Finally, the Intrusion detection system was tested in a real-world simulation to gauge its effectiveness and real-time response.
Resumo:
This study provides an ex-post evaluation of the EU copyright framework as provided by EU Directive 29/2001 on Copyright in the Information Society (InfoSoc Directive) and related legislation, focusing on four key criteria: effectiveness, efficiency, coherence and relevance. The evaluation finds that the EU copyright framework scores poorly on all four accounts. Of the four main goals pursued by the InfoSoc, only the alignment with international legislation can be said to have been fully achieved. The wider framework on copyright still generates costs by inhibiting content production, distribution and creation and generating productive, allocative and dynamic inefficiencies. Several problems also remain in terms of both internal and external coherence. Finally, espite its overall importance and relevance as a domain of legislation in the fields of content and media, the EU copyright framework is outdated in light of technological developments. Policy options to reform the current framework are provided in the CEPS companion study on the functioning and efficiency of the Digital Single Market in the field of copyright (CEPS Special Report No. 121/November 2015).
Resumo:
"B-234765"--P. 1.
Resumo:
"July 30, 1992."