950 resultados para responsibility to protect (R2P)
Resumo:
Digital services require personal information for a variety of reasons. Due to advances in communication technology, new types of services are evolving alongwith traditional Internet services. Due to the diversity of services, the traditional approaches to personal information handling designed for Internet services are inadequate. Therefore, new approaches are necessary. In this thesis, a solution where personal information is stored in and accessed from the user's mobile device is presented. This approach is called Mobile Electronic Personality (ME). The ME approach is compared to the existing approaches which rely on a database either at a service, a trusted third party or a client program. Various personal information properties are taken into account in the comparison of storage locations. The thesis presents both the internal and the communication architecture of the ME. The internal architecture defines how the information is stored in the mobile device. The communication architecture defines how the information can be accessed by different types of services from the ME. The use of the architecture is described for services in different environments. A simple ME based solution for the authentication of a user is defined. The authentication of service, which is required to protect the privacy of the users is also presented.
Resumo:
The patent system was created for the purpose of promoting innovation by granting the inventors a legally defined right to exclude others in return for public disclosure. Today, patents are being applied and granted in greater numbers than ever, particularly in new areas such as biotechnology and information andcommunications technology (ICT), in which research and development (R&D) investments are also high. At the same time, the patent system has been heavily criticized. It has been claimed that it discourages rather than encourages the introduction of new products and processes, particularly in areas that develop quickly, lack one-product-one-patent correlation, and in which theemergence of patent thickets is characteristic. A further concern, which is particularly acute in the U.S., is the granting of so-called 'bad patents', i.e. patents that do not factually fulfil the patentability criteria. From the perspective of technology-intensive companies, patents could,irrespective of the above, be described as the most significant intellectual property right (IPR), having the potential of being used to protect products and processes from imitation, to limit competitors' freedom-to-operate, to provide such freedom to the company in question, and to exchange ideas with others. In fact, patents define the boundaries of ownership in relation to certain technologies. They may be sold or licensed on their ownor they may be components of all sorts of technology acquisition and licensing arrangements. Moreover, with the possibility of patenting business-method inventions in the U.S., patents are becoming increasingly important for companies basing their businesses on services. The value of patents is dependent on the value of the invention it claims, and how it is commercialized. Thus, most of them are worth very little, and most inventions are not worth patenting: it may be possible to protect them in other ways, and the costs of protection may exceed the benefits. Moreover, instead of making all inventions proprietary and seeking to appropriate as highreturns on investments as possible through patent enforcement, it is sometimes better to allow some of them to be disseminated freely in order to maximize market penetration. In fact, the ideology of openness is well established in the software sector, which has been the breeding ground for the open-source movement, for instance. Furthermore, industries, such as ICT, that benefit from network effects do not shun the idea of setting open standards or opening up their proprietary interfaces to allow everyone todesign products and services that are interoperable with theirs. The problem is that even though patents do not, strictly speaking, prevent access to protected technologies, they have the potential of doing so, and conflicts of interest are not rare. The primary aim of this dissertation is to increase understanding of the dynamics and controversies of the U.S. and European patent systems, with the focus on the ICT sector. The study consists of three parts. The first part introduces the research topic and the overall results of the dissertation. The second part comprises a publication in which academic, political, legal and business developments that concern software and business-method patents are investigated, and contentiousareas are identified. The third part examines the problems with patents and open standards both of which carry significant economic weight inthe ICT sector. Here, the focus is on so-called submarine patents, i.e. patentsthat remain unnoticed during the standardization process and then emerge after the standard has been set. The factors that contribute to the problems are documented and the practical and juridical options for alleviating them are assessed. In total, the dissertation provides a good overview of the challenges and pressures for change the patent system is facing,and of how these challenges are reflected in standard setting.
Resumo:
El presente estudio expone la regulación del nuevo delito de "atti persecutori" introducido en el Código Penal italiano. El Decreto Legge 11/2009, de 23 de febrero, convalidado por el Parlamento italiano mediante la Ley 28/2009, ha incluido un nuevo art. 612 bis al CP italiano. Con la inclusión de dicho delito entre los que protegen la libertad del individuo Italia se incorpora a la corriente político-criminal que propugna la criminalización del stalking. La incriminación de dichas conductas de acoso constituye una orientación iniciada en Estados Unidos a principios de los 90, que ha colonizado otros países del Common Law y que finalmente ha llegado a la Europa continental. En este trabajo se analizan básicamente los elementos del tipo del nuevo delito italiano. Sin embargo, no se deja de atender ni a la previa conceptuación de este fenómeno ni a otras medidas protectoras de la víctima del stalking que se incorporan al ordenamiento italiano mediante la presente Ley.
Resumo:
Cell-cell fusion is essential for fertilization. For fusion of walled cells, the cell wall must be degraded at a precise location but maintained in surrounding regions to protect against lysis. In fission yeast cells, the formin Fus1, which nucleates linear actin filaments, is essential for this process. In this paper, we show that this formin organizes a specific actin structure-the actin fusion focus. Structured illumination microscopy and live-cell imaging of Fus1, actin, and type V myosins revealed an aster of actin filaments whose barbed ends are focalized near the plasma membrane. Focalization requires Fus1 and type V myosins and happens asynchronously always in the M cell first. Type V myosins are essential for fusion and concentrate cell wall hydrolases, but not cell wall synthases, at the fusion focus. Thus, the fusion focus focalizes cell wall dissolution within a broader cell wall synthesis zone to shift from cell growth to cell fusion.
Resumo:
MAF1 is a global repressor of RNA polymerase III transcription that regulates the expression of highly abundant noncoding RNAs in response to nutrient availability and cellular stress. Thus, MAF1 function is thought to be important for metabolic economy. Here we show that a whole-body knockout of Maf1 in mice confers resistance to diet-induced obesity and nonalcoholic fatty liver disease by reducing food intake and increasing metabolic inefficiency. Energy expenditure in Maf1(-/-) mice is increased by several mechanisms. Precursor tRNA synthesis was increased in multiple tissues without significant effects on mature tRNA levels, implying increased turnover in a futile tRNA cycle. Elevated futile cycling of hepatic lipids was also observed. Metabolite profiling of the liver and skeletal muscle revealed elevated levels of many amino acids and spermidine, which links the induction of autophagy in Maf1(-/-) mice with their extended life span. The increase in spermidine was accompanied by reduced levels of nicotinamide N-methyltransferase, which promotes polyamine synthesis, enables nicotinamide salvage to regenerate NAD(+), and is associated with obesity resistance. Consistent with this, NAD(+) levels were increased in muscle. The importance of MAF1 for metabolic economy reveals the potential for MAF1 modulators to protect against obesity and its harmful consequences.
Resumo:
The AMPK/Snf1 kinase has a central role in carbon metabolism homeostasis in Saccharomyces cerevisiae. In this study, we show that Snf1 activity, which requires phosphorylation of the Thr210 residue, is needed for protection against selenite toxicity. Such protection involves the Elm1 kinase, which acts upstream of Snf1 to activate it. Basal Snf1 activity is sufficient for the defense against selenite, although Snf1 Thr210 phosphorylation levels become increased at advanced treatment times, probably by inhibition of the Snf1 dephosphorylation function of the Reg1 phosphatase. Contrary to glucose deprivation, Snf1 remains cytosolic during selenite treatment, and the protective function of the kinase does not require its known nuclear effectors. Upon selenite treatment, a null snf1 mutant displays higher levels of oxidized versus reduced glutathione compared to wild type cells, and its hypersensitivity to the agent is rescued by overexpression of the glutathione reductase gene GLR1. In the presence of agents such as diethyl maleate or diamide, which cause alterations in glutathione redox homeostasis by increasing the levels of oxidized glutathione, yeast cells also require Snf1 in an Elm1-dependent manner for growth. These observations demonstrate a role of Snf1 to protect yeast cells in situations where glutathione-dependent redox homeostasis is altered to a more oxidant intracellular environment and associates AMPK to responses against oxidative stress.
Resumo:
Nykyaikaisessa liiketoimintaympäristössä yritysten kriittisiksi resursseiksi ovat muodostuneet liiketoimintaa tukevat tietojärjestelmät. Mahdollisuus hyödyntää näitä resursseja riippuu ko. liiketoiminnalle kriittisten järjestelmien luotettavuudesta ja hyödynnettävien sovellusten saatavuudesta. Eräs tilanne jossa järjestelmien kyky tukea todellisia liiketoimintaprosesseja vaarantuu on katastrofi. Vaikutukseltaan katastrofi voi olla paikallinen tai kattaa laajojakin alueita. Eri tyyppisiin katastrofeihin on varauduttava niiden edellyttämin tavoin. Eräs kriittisten tietojärjestelmien arkkitehtuuriin vaikuttanut trendi 90-luvulla on ollut client/server lähestymistapa. Client/server paradigman mukaan sovellus jaetaan tasoihin siten että esitys-, sovellus- ja tietokantakerrokset voidaan erottaa fyysisesti toisistaan näiden silti muodostaessa loogisesti yhtenäisen kokonaisuuden. Liiketoiminnan näkökulmasta 90- luvun mullistavia IT-uutuuksia olivat toiminnanohjausjärjestelmät, joiden avulla oli mahdollista hallita koko tuotantoketjua ja muita prosessikokonaisuuksia lähes reaaliajassa. Monikerroksisten toiminnanohjausjärjestelmien luotettavuus on osoittautunut haastavavaksi sillä kaikkien kerrosten suojaaminen kaikilta mahdollisilta katastrofeilta täydellisesti on nykyisellä teknologialla mahdotonta. Kompromissien tekemiseksi on oltava selvillä kunkin menetetyn prosessin aiheuttamista taloudellisista ja liiketoiminnallisista vaikutuksista. Tämän vuoksi juuri toiminnanohjausjärjestelmät ovat mielenkiintoisia, vaikuttavathan ne liiketoimintaprosesseihin läpi koko yrityksen prosessiketjun. Monikerroksisten client/server arkkitehtuuriin pohjautuvien toiminnanohjausjärjestelmien suojaamisessa katastrofeilta onkin sovellettava useita tekniikoita ja teknologioita, ja yhdistettävä kokonaisuus prosessikehykseen. Näin voidaan luoda suunnitelmallinen osa IT strategiaa, joka ottaa kantaa liiketoiminnan jatkuvuuteen katastrofitilanteessa ja mahdollistaa nopean ja täydellisen palautumisen kaikissa olosuhteissa.
Resumo:
OBJECTIVES: In some countries, nicotine-containing electronic cigarettes (e-cigarettes) are considered a consumer product without specific regulations. In others (eg, Switzerland), the sale of e-cigarettes containing nicotine is forbidden, despite the eagerness of many smokers to obtain them. As scientific data about efficacy and long-term safety of these products are scarce, tobacco control experts are divided on how to regulate them. In order to gain consensus among experts to provide recommendations to health authorities, we performed a national consensus study. SETTING: We used a Delphi method with electronic questionnaires to bring together the opinion of Swiss experts on e-cigarettes. PARTICIPANTS: 40 Swiss experts from across the country. OUTCOME MEASURES: We measured the degree of consensus between experts on recommendations regarding regulation, sale, use of and general opinion about e-cigarettes containing nicotine. New recommendations and statements were added following the experts' answers and comments. RESULTS: There was consensus that e-cigarettes containing nicotine should be made available, but only under specific conditions. Sale should be restricted to adults, using quality standards, a maximum level of nicotine and with an accompanying list of authorised ingredients. Advertisement should be restricted and use in public places should be forbidden. CONCLUSIONS: These recommendations encompass three principles: (1) the reality principle, as the product is already on the market; (2) the prevention principle, as e-cigarettes provide an alternative to tobacco for actual smokers, and (3) the precautionary principle, to protect minors and non-smokers, since long-term effects are not yet known. Swiss authorities should design specific regulations to sell nicotine-containing e-cigarettes.
Resumo:
Sähkömarkkinauudistukset ovat tuoneet kilpailun sähkön tuotantoon ja myyntiin, mutta samalla vahvistaneet tarvetta valvoa sähkönsiirtoa ja -jakelua, jotka ovat ns. luonnollisia monopolitoimintoja. Monopoleja valvotaan, jotta ne eivät väärinkäytä määräävää markkina-asemaansa. Tässä diplomityössä tarkastellaan sähkönjakeluverkkoliiketoiminnan sääntelyyn yleisesti käytettyjä valvontamalleja sekä niiden soveltamisessa huomioon otettavia seikkoja. Tarkasteltuja valvontamalleja on neljä, joista yleisimpiä ovat hintakattosääntely ja liikevaihdon sääntely. Tuoton sääntely on monesti ollut ensimmäinen keino säännellä alaa. Mittatikkusääntelyllä pyritään selvittämään tarkasteltavien yhtiöiden tehokkuutta. Sitä käytetään yleensä muiden mallien lisänä kannustamaan toiminnan tehostamiseen. Yhä useammin valvotaan myös sähköntoimituksen laatua. Jokainen maa valitsee omaan erityistilanteeseensa parhaiten sopivan valvontamallin. Valvontamallit kehittyvät jatkuvasti, jotta asiakkaiden etujen turvaamiseksi on olemassa toimivat regulatiiviset työkalut ja toisaalta sähkönjakeluyhtiöiden toimintaolosuhteet ovat vakaat ja realistiset. Kansallisen regulaattorin on luotava valvontamallin avulla oikeanlaiset kannustimet yhtiöiden toiminnalle, jotta niiden tekemät investointi- ja toimintapäätökset ovat järkeviä ja takaavat sähkönjakelun jatkuvuuden.
Resumo:
The worldwide antibiotic crisis has led to a renewed interest in phage therapy. Since time immemorial phages control bacterial populations on Earth. Potent lytic phages against bacterial pathogens can be isolated from the environment or selected from a collection in a matter of days. In addition, phages have the capacity to rapidly overcome bacterial resistances, which will inevitably emerge. To maximally exploit these advantage phages have over conventional drugs such as antibiotics, it is important that sustainable phage products are not submitted to the conventional long medicinal product development and licensing pathway. There is a need for an adapted framework, including realistic production and quality and safety requirements, that allowsa timely supplying of phage therapy products for 'personalized therapy' or for public health or medical emergencies. This paper enumerates all phage therapy product related quality and safety risks known to the authors, as well as the tests that can be performed to minimize these risks, only to the extent needed to protect the patients and to allow and advance responsible phage therapy and research.
Resumo:
Tavoitteena tällä tutkimuksella on soveltaa modernin optimisuunnittelun keinoja komposiittimuovisen nestesäiliön lieriömäisen vaipparakenteen suunnittelemiseksi optimaalisen tyydyttäviksi valmistustekniikan ja kustannusten kannalta. Kuormituksia on kahdenlaisia. Säiliön sisällä on neste, joka tuottaa hydrostaattisen painekuorman ja järjestelmään kytketty puhallin tuottaa ulkoisen ylipaineen. Säiliöt ovat pystysäiliöitä ja ne tukeutuvat alustaan suoran pohjalaatan avulla. FEM- malleissa kuoren alaosat ovat jäykästi kiinnitettyjä ja yläosissa säteensuuntaiset siirtymät ovat estettyjä. Materiaaleiksi kuoreen on valittu kahdella eri menetelmällä lujitetut komposiittimateriaalit. Kantavan kerroksen toimintona on kantaa kuormat. Sulkukerros toimii korroosiosuojana ja sen lujuus on kantavaa kerrosta pienempi. Keinoina käytetään ensin innovatiivista suunnittelua optimaalisten lähtövaihtoehtojen ideoimiseksi ja valitsemiseksi jatkokehittelyä varten. Tavoitteena on asiakkaan tyytyväisyyden maksimointi huomioiden tuotteen kustannukset ja kesto. Yhtenä suunnittelun keinona on käytetty kuoriteoriaa ja komposiittien materiaalimalleja. Kestoehtoina on sovellettu komposiiteille soveltuvia kriteerejä. Toisena keinona käytetään FEM-laskentaa. Elementtityypiksi on valittu kaksiulotteinen kuorielementti, jossa on ortotrooppisen ainemallin mukaiset materiaaliominaisuudet. Jännitystuloksien merkittävyys keston kannalta selvitettiin Tsai-Hillin kriteerillä. Tuloksina saatiin ensin innovoitua rakenteelle kaksi päävaihtoehtoa, joita alettiin optimoida. Valitussa ratkaisussa on huomioitu kokonaisuus ja eri yksityiskohdat, kuten paino, jäykisteet kustannustehokkuus, valmistusnopeus, laatu, hävikit, päästöt, lujuus ja kilpailukykyinen myyntihinta. Yhteenvetona voidaan todeta, että käytetyt keinot ovat hyvin tehokkaita ja niillä voidaan suunnitella ja toteuttaa komposiittirakenteita, jotka tyydyttävät optimaalisesti loppukäyttäjän teknis- taloudelliset vaatimukset. Lisäksi tulokset osoittavat, että standardin ja FEM-laskennan ennustukset ovat lähellä toisiaan sylinterimäisillä kuoriosilla, mutta standardit suosittavat suurempia mittoja itse jäykisteille.
Resumo:
Internet on levinnyt viime vuosina voimakkaasti ja samalla sen tietoturvallisuus on noussut erittäin tärkeäksi tekijäksi. Olen tietoturvallisuuteen liittyvien työtehtävieni ohessa kirjoittanut keräämääni teoriatietoa ja tekemiäni toimenpiteitä diplomityön muotoon. Diplomityön tavoitteena on antaa yleiskuva internet-palveluntarjoajan tietoturvallisuudesta ja sen hallinnasta. Työssä käsitellään tietoturvallisuuskäsitettä, hallinnollista ja teknistä tietoturvallisuutta sekä tietoturvallisuuden taloudellisia vaikutuksia. Tietoturvallisuus on yrityksen henkilökunnan ja teknisten ratkaisujen yhteistoimintaa yrityksen tietojen turvaamiseksi sekä yrityksen sisäisten että yrityksen ulkopuolisten uhkien varalta. Tietoturvallisuus on niin vahva kuin sen heikoin lenkki, joten tietoturvallisuuden huolehtimiseen tarvitaan koko yrityksen henkilöstön panosta. Työn tavoitteena on parantaa kohdeyrityksen tietoturvallisuutta ja tuoda esiin ne heikot kohdat, joiden parantamiseen täytyy saada yrityksen johdolta lisää resursseja. Aukotonta turvallisuutta ei kannata tavoitella, vaan yrityksen tulee pyrkiä minimoimaan tietoturvallisuuden kokonaiskustannukset.
Resumo:
During evolution, the immune system has diversified to protect the host from the extremely wide array of possible pathogens. Until recently, immune responses were dissected by use of global approaches and bulk tools, averaging responses across samples and potentially missing particular contributions of individual cells. This is a strongly limiting factor, considering that initial immune responses are likely to be triggered by a restricted number of cells at the vanguard of host defenses. The development of novel, single-cell technologies is a major innovation offering great promise for basic and translational immunology with the potential to overcome some of the limitations of traditional research tools, such as polychromatic flow cytometry or microscopy-based methods. At the transcriptional level, much progress has been made in the fields of microfluidics and single-cell RNA sequencing. At the protein level, mass cytometry already allows the analysis of twice as many parameters as flow cytometry. In this review, we explore the basis and outcome of immune-cell diversity, how genetically identical cells become functionally different, and the consequences for the exploration of host-immune defense responses. We will highlight the advantages, trade-offs, and potential pitfalls of emerging, single-cell-based technologies and how they provide unprecedented detail of immune responses.
Resumo:
Molecular evidence suggests that levels of vitamin D are associated with kidney function loss. Still, population-based studies are limited and few have considered the potential confounding effect of baseline kidney function. This study evaluated the association of serum 25-hydroxyvitamin D with change in eGFR, rapid eGFR decline, and incidence of CKD and albuminuria. Baseline (2003-2006) and 5.5-year follow-up data from a Swiss adult general population were used to evaluate the association of serum 25-hydroxyvitamin D with change in eGFR, rapid eGFR decline (annual loss >3 ml/min per 1.73 m(2)), and incidence of CKD and albuminuria. Serum 25-hydroxyvitamin D was measured at baseline using liquid chromatography-tandem mass spectrometry. eGFR and albuminuria were collected at baseline and follow-up. Multivariate linear and logistic regression models were used considering potential confounding factors. Among the 4280 people included in the analysis, the mean±SD annual eGFR change was -0.57±1.78 ml/min per 1.73 m(2), and 287 (6.7%) participants presented rapid eGFR decline. Before adjustment for baseline eGFR, baseline 25-hydroxyvitamin D level was associated with both mean annual eGFR change and risk of rapid eGFR decline, independently of baseline albuminuria. Once adjusted for baseline eGFR, associations were no longer significant. For every 10 ng/ml higher baseline 25-hydroxyvitamin D, the adjusted mean annual eGFR change was -0.005 ml/min per 1.73 m(2) (95% confidence interval, -0.063 to 0.053; P=0.87) and the risk of rapid eGFR decline was null (odds ratio, 0.93; 95% confidence interval, 0.79 to 1.08; P=0.33). Baseline 25-hydroxyvitamin D level was not associated with incidence of CKD or albuminuria. The association of 25-hydroxyvitamin D with eGFR decline is confounded by baseline eGFR. Sufficient 25-hydroxyvitamin D levels do not seem to protect from eGFR decline independently from baseline eGFR.
Resumo:
BACKGROUND: Root-colonizing fluorescent pseudomonads are known for their excellent abilities to protect plants against soil-borne fungal pathogens. Some of these bacteria produce an insecticidal toxin (Fit) suggesting that they may exploit insect hosts as a secondary niche. However, the ecological relevance of insect toxicity and the mechanisms driving the evolution of toxin production remain puzzling. RESULTS: Screening a large collection of plant-associated pseudomonads for insecticidal activity and presence of the Fit toxin revealed that Fit is highly indicative of insecticidal activity and predicts that Pseudomonas protegens and P. chlororaphis are exclusive Fit producers. A comparative evolutionary analysis of Fit toxin-producing Pseudomonas including the insect-pathogenic bacteria Photorhabdus and Xenorhadus, which produce the Fit related Mcf toxin, showed that fit genes are part of a dynamic genomic region with substantial presence/absence polymorphism and local variation in GC base composition. The patchy distribution and phylogenetic incongruence of fit genes indicate that the Fit cluster evolved via horizontal transfer, followed by functional integration of vertically transmitted genes, generating a unique Pseudomonas-specific insect toxin cluster. CONCLUSIONS: Our findings suggest that multiple independent evolutionary events led to formation of at least three versions of the Mcf/Fit toxin highlighting the dynamic nature of insect toxin evolution.