725 resultados para Japanese music
Resumo:
arr. and ed. for the choir committee of the Council of the United Synagogue by Francis L. Cohen ...
Resumo:
comp. and ed. by Gershon Ephros
Resumo:
On the background of the global rise of luxury consumption, the importance of knowing cross-cultural luxury consumption preferences grows accordingly. We investigate cross-cultural specifics of luxury consumption for two cultures, Switzerland and Japan, which clearly differ along Hofstede’s five cultural dimensions (Hofstede 2013). Using these dimensions as a conceptual background, we conduct qualitative interviews with luxury consumers from both cultures and derive propositions concerning the meaning of these dimensions for luxury consumption.
Resumo:
composed and selected by A. J. Davis
Resumo:
BACKGROUND Japanese encephalitis virus (JEV) is the major cause of viral encephalitis in Southeast Asia. Vaccination of domestic pigs has been suggested as a "one health" strategy to reduce viral disease transmission to humans. The efficiency of two lentiviral TRIP/JEV vectors expressing the JEV envelope prM and E glycoproteins at eliciting protective humoral response was assessed in a mouse model and piglets. METHODOLOGY/PRINCIPAL FINDINGS A gene encoding the envelope proteins prM and E from a genotype 3 JEV strain was inserted into a lentiviral TRIP vector. Two lentiviral vectors TRIP/JEV were generated, each expressing the prM signal peptide followed by the prM protein and the E glycoprotein, the latter being expressed either in its native form or lacking its two C-terminal transmembrane domains. In vitro transduction of cells with the TRIP/JEV vector expressing the native prM and E resulted in the efficient secretion of virus-like particles of Japanese encephalitis virus. Immunization of BALB/c mice with TRIP/JEV vectors resulted in the production of IgGs against Japanese encephalitis virus, and the injection of a second dose one month after the prime injection greatly boosted antibody titers. The TRIP/JEV vectors elicited neutralizing antibodies against JEV strains belonging to genotypes 1, 3, and 5. Immunization of piglets with two doses of the lentiviral vector expressing JEV virus-like particles led to high titers of anti-JEV antibodies, that had efficient neutralizing activity regardless of the JEV genotype tested. CONCLUSIONS/SIGNIFICANCE Immunization of pigs with the lentiviral vector expressing JEV virus-like particles is particularly efficient to prime antigen-specific humoral immunity and trigger neutralizing antibody responses against JEV genotypes 1, 3, and 5. The titers of neutralizing antibodies elicited by the TRIP/JEV vector are sufficient to confer protection in domestic pigs against different genotypes of JEV and this could be of a great utility in endemic regions where more than one genotype is circulating.
Resumo:
Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.
Resumo:
Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.