894 resultados para Strategic alignment of IT
Resumo:
1. 1. Summaries 1.1. Preamble and extended abstract The present thesis dissertation addresses the question of antiviral immunity from the particular standpoint of the adaptive T cell-mediated immune response. The experimental work is presented in the form of three published articles (two experimental articles and one review article, see sections 4.1, 4.2 and 4.3 on pages 73, 81 and 91, respectively), describing advances both in our understanding of viral control by CD8 T lymphocytes, and in vaccine development against the Human Immunodeficiency Virus Type 1 (HIV-1). Because the articles focus on rather specialized areas of antiviral immunity, the article sections are preceded by a general introduction (section 3) on the immune system in general, and on four viruses that were addressed in the experimental work, namely HIV-1, Cytomegalovirus (CMV), Epstein Barr Virus (EBV) and Influenzavirus (Flu). This introduction section is aimed at providing a glimpse on viral molecular biology and immunity, to help the hypothetical non-expert reader proceeding into the experimental part. For this reason, each section is presented as individual entity and can be consulted separately. The four viruses described are of peculiar relevance to immunity because they induce an array of opposite host responses. Flu causes a self limiting disease after which the virus is eradicated. CMV and EBV cause pauci-symptomatic or asymptomatic diseases after which the viruses establish lifelong latency in the host cells, but are kept in check by immunity. Eventually, HIV-1 establishes both latency - by inserting its genome into the host cell chromosome - and proceeds in destroying the immune system in a poorly controlled fashion. Hence, understanding the fundamental differences between these kinds of viral host interactions might help develop new strategies to curb progressive diseases caused by viruses such as HIV-1. Publication #1: The first article (section 4.1, page 73) represents the main frame of my laboratory work. It analyses the ability of CD8 T lymphocytes recovered from viral-infected patients to secrete interferon γ (IFN-γ) alone or in conjunction with interleukin 2 (IL-2) when exposed in vitro to their cognate viral antigens. CD8 T cells are instrumental in controlling viral infection. They can identify infected cells by detecting viral antigens presented at the surface of the infected cells, and eliminate both the cell and its infecting virus by triggering apoptosis and/or lysis of the infected cell. Recognition of these antigens triggers the cognate CD8 cells to produce cytokines, including IFN-γ and IL-2, which in turn attract and activate other pro-inflammatory cells. IFN-γ triggers both intrinsic antiviral activity of the infected cells and distant activation of pro-inflammatory cells, which are important for the eradication of infection. IL-2 is essential for clonal expansion of the antigen (Ag)-specific CD8 T cell. Hence the existence of Ag-specific CD8 cells secreting both IFN-γand IL-2 should be beneficial for controlling infection. In this first work we determined the percentage of IFN-y/IL-2 double positive and single IFN-γsecreting CD8 T cells against antigens HIV-1, CMV, EBV and Flu in three groups of subjects: (i) HIV-1 infected patients progressing to disease (progressors), (ii) HIV-1-infected subjects not progressing to disease (long-term non progressors or LTNP), and (iii) HIV negative blood donors. The results disclosed a specific IFN-y/IL-2 double positive CD8 response in all subjects able to control infection. In other words, IFN-y/IL-2 double positive CD8 cells were present in virus-specific CD8 T cells against Flu, CMV and EBV as well against HIV-1 in LTNP. In contrast, progressors only had single IFN-γsecreting CD8 T cells. Hence, the ability to develop an IFN-y/IL-2 double positive response might be critical to control infection, independently of the nature of the virus. Additional experiments helped identify the developmental stage of the missing cells (using different markers such as CD45RA and CCR7) and showed a correlation between the absence of IL-2 secreting CD8 T cells and a failure in the proliferation capacity of virus-specific CD8 T cells. Addition of exogenous IL-2 could restore clonal expansion of HIV-1 specific CD8 T cells, at least in vitro. It could further been shown, that IL-2 secreting CD8 T cells are sufficient to support proliferation even in absence of CD4 help. However, the reason for the missing IFN-y/IL-2 double positive CD8 T cell response in HIV-1 progessors has yet to be determined. Publication #2: The second article (section 4.2, page 81) explores new strategies to trigger CD8 T cell immunity against specific HIV-1 proteins believed to be processed and exposed as "infection signal" at the surface of infected cells. Such signals consist of peptide fragments (8- 13 amino acids) originating from viral proteins and presented to CD8 T cells in the frame of particular cell surface molecules of the major histocompatibility complex class I* (MHC I). To mimic "natural" viral infection, the HIV-1 polyprotein Gagpolnef was inserted and expressed in either of two attenuated viruses i.e. vaccinia virus (MVA) or poxvirus (NYVAC). Mice were infected with these recombinant viruses and specific CD8 T cell response to Gagpolnef peptides was sought. Mice could indeed mount a CD8 T cell response against the HIV-1 antigens, indicating that the system worked, at least in this animal model. To further test whether peptides from Gagpolnef could also be presented in the frame of the human MHC class I proteins, a second round of experiments was performed in "humanized" transgenic mice expressing human MHC molecules. The transgenic mice were also able to load Gagpolnef peptides on their human MHC molecule, and these cells could be detected and destroyed by Ag-specific CD8 T cells isolated from HIV-1-infected patients. Therefore, expressing Gagpolnef on attenuated recombinant viruses might represent a valid strategy for anti-HIV-1 immunization in human. Publication #3: This is a review paper (section 4.3, page 91) describing the immune response to CMV and newly developed methods to detect this cellular immune response. Some of it focuses on the detection of T cells by using in vitro manufactured tetramers. These consist of four MHC class I molecules linked together and loaded with the appropriate antigenic peptide. The tetramer can be labeled with a fluorochrome and analyzed with a fluorescence-activated cell sorter. Taken together, the work presented indicates that (i) an appropriate CD8 T cell response consisting of IFN-y/IL-2 double positive effectors, can potentially control viral infection, including HIV-1 infection, (ii) such a response might be triggered by recombinant viral vaccines, and (iii) CD8 T cell response can be monitored by a variety of techniques, including recently-developed MHC class I tetramers. 1. 2. Préambule et résumé élargi Le présent travail de thèse s'intéresse à l'immunité antivirale du point de vue particulier de la réponse adaptative des cellules T. Le travail expérimental est présenté sous la forme de trois articles publiés (2 articles expérimentaux et 1 article de revue, voir sections 4.1, 4.2 et 4.3, pages 58, 66 et 77, respectivement), décrivant des progrès dans la compréhension du contrôle de l'infection virale par les lymphocytes T CD8, ainsi que dans le développement de nouveaux vaccins contre le Virus d'Immunodéficience de Humaine de type 1 (VIH-1). En raison du caractère spécialisé de l'immunité antivirale de type cellulaire, les articles sont précédés par une introduction générale (section 3), dont le but est de pourvoir le lecteur non avisé avec des bases nécessaire à une meilleure appréhension du travail expérimental. Cette introduction présente les grandes lignes du système immunitaire, et décrit de façon générale les 4 virus utilisés dans le travail expérimental: à savoir le virus VIH-1, le Cytomégalovirus (CMV), le virus Epstein Barr (EBV) et le virus Influenza A (Flu). Toutes les sections sont présentées de façon individuelle et peuvent être consultées séparément. La description des 4 virus a une pertinence particulière quant à leur interaction avec le système immun. En effet, ils induisent une panoplie de réponses immunitaires s'étendant aux extrêmes de la réaction de l'hôte. Influenza A est à l'origine d'une maladie cytopathique aiguë, au décours de laquelle le virus est éradiqué par l'hôte. CMV et EBV sont classiquement à l'origine d'infections pauci-symptomatiques, voire asymptomatiques, après lesquelles les virus persistent de façon latente dans la cellule hôte. Cependant, ils restent sous le contrôle du système immun, qui peut prévenir une éventuelle réactivation. Enfin, VIH-1 s'établit à la fois en infection latente - par l'insertion de son génome dans le chromosome des cellules hôtes - et en infection productive et cytopathique, échappant au contrôle immunitaire et détruisant ses cellules cibles. La compréhension des différences fondamentales entre ces différents types d'interactions virus-hôte devraient faciliter le développement de nouvelles stratégies antivirales. Article 1: Le premier article (section 4.1 Page 58) représente l'objet principal de mon travail de laboratoire. Il analyse la capacité des lymphocytes T CD8 spécifiques de différent virus à sécréter de l'interféron gamma (IFN-y) et/ou de l'interleukine 2 (IL-2) après stimulation par leur antigène spécifique. Les cellules T CD8 jouent un rôle crucial dans le contrôle des infections virales. Elles identifient les cellules infectées en détectant des antigènes viraux présentés à la surface de ces mêmes cellules, et éliminent à la fois les cellules infectées et les virus qu'elles contiennent en induisant l'apoptose et/ou la lyse des cellules cibles. Parallèlement, l'identification de l'antigène par la cellule T CD8 la stimule à sécréter des cytokines. L'IFN-γen est un exemple. L'IFN-γ stimule les cellules infectées à développer une activé antivirale intrinsèque. De plus, il attire sur place d'autres cellules de l'inflammation, et active leur fonction d'éradication des pathogènes. L'IL-2 est un autre exemple. L'IL-2 est essentielle à l'expansion clonale des cellules T CD8 spécifiques à un virus donné. Elle est donc essentielle à augmenter le pool de lymphocytes antiviraux. En conséquence, la double capacité de sécréter de l'IFN-γ et de IL-2 pourrait être un avantage pour le contrôle antiviral par les cellules T CD8. Dans ce travail nous avons comparé les proportions de lymphocytes T CD8 doubles positifs (IFN-γ/IL-2) et simples positifs (IFN-γ) chez trois groupes de sujets: (i) des patients infectés par VIH-1 qui ne contrôlent pas l'infection (progresseurs), (ii) des patients infectés par VIH-1, mais contrôlant l'infection malgré l'absence de traitement ("long term non progressors" [LTNP]) et (iii) des donneurs de sang négatifs pour l'infection à VIH-1. Les résultats ont montré que les individus capables de contrôler une infection possédaient des cellules T CD8 doubles positifs (IFN-γ/IL-2), alors que les patients ne contrôlant pas l'infection procédaient prioritairement des CD8 simples positifs (IFN-γ). Spécifiquement, les lymphocytes T spécifiques pour Flu, CMV, EBV, et VII-1-1 chez les LTNP étaient tous IFN-γ/IL-2 doubles positifs. Au contraire, les lymphocytes T CD8 spécifique à VIH-1 étaient IFN-γ simples positifs chez les progresseurs. La capacité de développer une réponse IFN-γ/IL-2 pourraient être primordiale pour le contrôle de l'infection, indépendamment de la nature du virus. En effet, il a été montré que l'absence de sécrétion d'IL2 par les lymphocytes T CD8 corrélait avec leur incapacité de proliférer. Dans nos mains, cette prolifération a pu être restaurée in vitro par l'adjonction exogène d'IL-2. Toutefois, la faisabilité de ce type de complémentation in vivo n'est pas claire. Des expériences additionnelles ont permis de préciser de stade de développement des lymphocytes doubles positifs et simples positifs par le biais des marqueurs CD45RA et CCR7. Il reste maintenant à comprendre pourquoi certains lymphocytes T CD8 spécifiques sont incapables à sécréter de l'IL-2. Article 2: Le deuxième article explore des nouvelles stratégies pour induire une immunité T CD8 spécifique aux protéines du VIH-1, qui sont édités et exposés à la surface des cellules infectées. Ces signaux consistent en fragments de peptide de 8-13 acide aminés provenant de protéines virales, et exposées à la surface des cellules infectées dans le cadre des molécules spécialisées d'histocompatibilité de classe I (en anglais "major histocompatibility class I" ou MHC I). Pour mimer une infection virale, la polyprotéine Gagpolnef du VIH-1 a été insérée et exprimée dans deux vecteurs viraux atténués, soit MVA (provenant de vaccinia virus) ou NYVAC (provenant d'un poxvirus). Ensuite des souris ont été infectées avec ces virus recombinants et la réponse T CD8 aux peptides issus de Gagpolnef a été étudiée. Les souris ont été capables de développer une réponse de type CD8 T contre ces antigènes du VIH-1. Pour tester si ces antigènes pouvaient aussi être présentés par dans le cadre de molécules MHC humaines, des expériences supplémentaires ont été faites avec des souris exprimant un MHC humain. Les résultats de ces manipulations ont montré que des cellules T CD8 spécifique aux protéines du VIH pouvaient être détectées. Ce travail ouvre de nouvelles options quant à l'utilisation des virus recombinants exprimant Gagpolnef comme stratégie vaccinale contre le virus VIH-I chez l'homme. Article 3: Ces revues décrivent la réponse immunitaire à CMV ainsi que des nouvelles méthodes pouvant servir à sa détection. Une partie du manuscrit décrit la détection de cellule T à l'aide de tétramères. Il s'agit de protéines chimériques composées de 4 quatre molécules MHC liées entre elles. Elles sont ensuite "chargées" avec le peptide antigénique approprié, et utilisée pour détecter les cellules T CD8 spécifiques à ce montage. Elles sont aussi marquées par un fluorochrome, qui permet une analyse avec un cytomètre de flux, et l'isolement ultime des CD8 d'intérêt. En résumé, le travail présenté dans cette thèse indique que (i) une réponse T CD8 appropriée - définie par la présence des cellules effectrices doublement positives pour l'IFN-γ et l'IL-2 - semble indispensable pour le contrôle des infections virales, y compris par le VIH-1, (ii) une telle réponse peut être induite par des vaccin viral recombinant, et (iii) la réponse T CD8 peut être analysée et suivie grâce à plusieurs techniques, incluant celle des tétramères de MHC class I. 1.3. Résumé pour un large public Le système immunitaire humain est composé de différents éléments (cellules, tissus et organes) qui participent aux défenses de l'organisme contre les pathogènes (bactéries, virus). Parmi ces cellules, les lymphocytes T CD8, également appelés cellules tueuses, jouent un rôle important dans la réponse immunitaire et le contrôle des infections virales. Les cellules T CD8 reconnaissent de manière spécifique des fragments de protéines virales qui sont exposés à la surface des cellules infectées par le virus. Suite à cette reconnaissance, les cellules T CD8 sont capables de détruire et d'éliminer ces cellules infectées, ainsi que les virus qu'elles contiennent. Dans le contexte d'une infection par le virus de l'immunodéficience humaine (VIH), le virus responsable du SIDA, il a pu être montré que la présence des cellules T CD8 est primordiale. En effet, en l'absence de ces cellules, les individus infectés par le VIH progressent plus rapidement vers le SIDA. Au cours de la vie, l'Homme est exposé à plusieurs virus. Mais à l'opposé du VIH, certains d'entre eux ne causent pas des maladies graves : par exemple le virus de la grippe (Influenza), le cytomégalovirus ou encore le virus d'Epstein-Barr. Certains de ces virus peuvent être contrôlés et éliminés de l'organisme (p. ex. le virus de la grippe), alors que d'autres ne sont que contrôlés par notre système immunitaire et restent présents en petite quantité dans le corps sans avoir d'effet sur notre santé. Le sujet de mon travail de thèse porte sur la compréhension du mécanisme de contrôle des infections virales par le système immunitaire : pourquoi certains virus peuvent être contrôlés ou même éliminés de l'organisme alors que d'autres, et notamment le VIH, ne le sont pas. Ce travail a permis de démontrer que les cellules T CD8 spécifiques du VIH ne sécrètent pas les mêmes substances, nécessaires au développement d'une réponse antivirale efficace, que les cellules T CD8 spécifiques des virus contrôlés (le virus de la grippe, le cytomégalovirus et le virus d'Epstein-Barr). Parallèlement nous avons également observé que les lymphocytes T CD8 spécifiques du VIH ne possèdent pas la capacité de se diviser. Ils sont ainsi incapables d'être présents en quantité suffisante pour assurer un combat efficace contre le virus du SIDA. La (les) différence(s) entre les cellules T CD8 spécifiques aux virus contrôlés (grippe, cytomégalovirus et Epstein-Barr) et au VIH pourront peut-être nous amener à comprendre comment restaurer une immunité efficace contre ce dernier.
Resumo:
This study examines how firms interpret new, potentially disruptive technologies in their own strategic context. The work presents a cross-case analysis of four potentially disruptive technologies or technical operating models: Bluetooth, WLAN, Grid computing and Mobile Peer-to-peer paradigm. The technologies were investigated from the perspective of three mobile operators, a device manufacturer and a software company in the ICT industry. The theoretical background for the study consists of the resource-based view of the firm with dynamic perspective, the theories on the nature of technology and innovations, and the concept of business model. The literature review builds up a propositional framework for estimating the amount of radical change in the companies' business model with two middle variables, the disruptiveness potential of a new technology, and the strategic importance of a new technology to a firm. The data was gathered in group discussion sessions in each company. The results of each case analysis were brought together to evaluate, how firms interpret the potential disruptiveness in terms of changes in product characteristics and added value, technology and market uncertainty, changes in product-market positions, possible competence disruption and changes in value network positions. The results indicate that the perceived disruptiveness in terms ofproduct characteristics does not necessarily translate into strategic importance. In addition, firms did not see the new technologies as a threat in terms of potential competence disruption.
Resumo:
Information Technology (IT) outsourcing has traditionally been seen as a means to acquire newresources and competencies to perform standard tasks at lowered cost. This dissertationchallenges the thought that outsourcing should be limited to non-strategic systems andcomponents, and presents ways to maximize outsourcing enabled benefits while minimizingassociated risks. In this dissertation IT outsourcing is approached as an efficiency improvement and valuecreationprocess rather than a sourcing decision. The study focuses on when and how tooutsource information technology, and presents a new set of critical success factors foroutsourcing project management. In a case study it re-validates the theory-based propositionthat in certain cases and situations it is beneficial to partly outsource also strategic IT systems. The main contribution of this dissertation is the validation of proposal that in companies wherethe level of IT competency is high, managerial support established and planning processes welldefined,it is possible to safely outsource also business critical IT systems. A model describing the critical success factors in such cases is presented based on existing knowledge on the fieldand the results of empirical study. This model further highlights the essence of aligning IT andbusiness strategies, assuming long-term focus on partnering, and the overall target ofoutsourcing to add to the strengths of the company rather than eliminating weaknesses.
Resumo:
Globalization and new information technologies mean that organizations have to face world-wide competition in rapidly transforming, unpredictable environments, and thus the ability to constantly generate novel and improved products, services and processes has become quintessential for organizational success. Performance in turbulent environments is, above all, influenced by the organization's capability for renewal. Renewal capability consists of the ability of the organization to replicate, adapt, develop and change its assets, capabilities and strategies. An organization with a high renewal capability can sustain its current success factors while at the same time building new strengths for the future. This capability does not only mean that the organization is able to respond to today's challenges and to keep up with the changes in its environment, but also that it can actas a forerunner by creating innovations, both at the tactical and strategic levels of operation and thereby change the rules of the market. However, even though it is widely agreed that the dynamic capability for continuous learning, development and renewal is a major source of competitive advantage, there is no widely shared view on how organizational renewal capability should be defined, and the field is characterized by a plethora of concepts and definitions. Furthermore,there is a lack of methods for systematically assessing organizational renewal capability. The dissertation aims to bridge these gaps in the existing research by constructing an integrative theoretical framework for organizational renewal capability and by presenting a method for modeling and measuring this capability. The viability of the measurement tool is demonstrated in several contexts, andthe framework is also applied to assess renewal in inter-organizational networks. In this dissertation, organizational renewal capability is examined by drawing on three complimentary theoretical perspectives: knowledge management, strategic management and intellectual capital. The knowledge management perspective considers knowledge as inherently social and activity-based, and focuses on the organizational processes associated with its application and development. Within this framework, organizational renewal capability is understood as the capacity for flexible knowledge integration and creation. The strategic management perspective, on the other hand, approaches knowledge in organizations from the standpoint of its implications for the creation of competitive advantage. In this approach, organizational renewal is framed as the dynamic capability of firms. The intellectual capital perspective is focused on exploring how intangible assets can be measured, reported and communicated. From this vantage point, renewal capability is comprehended as the dynamic dimension of intellectual capital, which consists of the capability to maintain, modify and create knowledge assets. Each of the perspectives significantly contributes to the understanding of organizationalrenewal capability, and the integrative approach presented in this dissertationcontributes to the individual perspectives as well as to the understanding of organizational renewal capability as a whole.
Resumo:
Building and sustaining competitive advantage through the creation of market imperfections is challenging in a constantly changing business environment - particularly since the sources of such advantages are increasingly knowledge-based. Facilitated by improved networks and communication, knowledge spills over to competitors more easily than before,thus creating an appropriability problem: the inability of an innovating firm to utilize its innovations commercially. Consequently, as the importance of intellectual assets increases, their protection also calls for new approaches. Companies have various means of protection at their disposal, and by taking advantage of them they can make intangibles more non-transferable and prevent, or at leastdelay, imitation of their most crucial intellectual assets. However, creating barriers against imitation has another side to it, and the transfer of knowledge in situations requiring knowledge sharing may be unintentionally obstructed. Theaim of this thesis is to increase understanding of how firms can balance knowledge protection and sharing so as to benefit most from their knowledge assets. Thus, knowledge protection is approached through an examination of the appropriability regime of a firm, i.e., the combination of available and effective means ofprotecting innovations, their profitability, and the increased rents due to R&D. A further aim is to provide a broader understanding of the formation and structure of the appropriability regime. The study consists of two parts. The first part introduces the research topic and the overall results of the study, and the second part consists of six complementary research publications covering various appropriability issues. The thesis contributes to the existing literature in several ways. Although there is a wide range of prior research on appropriability issues, a lot of it is restricted either to the study of individual appropriability mechanisms, or to comparing certain features of them. These approaches are combined, and the relevant theoretical concepts are clarified and developed. In addition, the thesis provides empirical evidence of the formation of the appropriability regime, which is consequently presented as an adaptive process. Thus, a framework is provided that better corresponds to the complex reality of the current business environment.
Resumo:
Background: Parallel T-Coffee (PTC) was the first parallel implementation of the T-Coffee multiple sequence alignment tool. It is based on MPI and RMA mechanisms. Its purpose is to reduce the execution time of the large-scale sequence alignments. It can be run on distributed memory clusters allowing users to align data sets consisting of hundreds of proteins within a reasonable time. However, most of the potential users of this tool are not familiar with the use of grids or supercomputers. Results: In this paper we show how PTC can be easily deployed and controlled on a super computer architecture using a web portal developed using Rapid. Rapid is a tool for efficiently generating standardized portlets for a wide range of applications and the approach described here is generic enough to be applied to other applications, or to deploy PTC on different HPC environments. Conclusions: The PTC portal allows users to upload a large number of sequences to be aligned by the parallel version of TC that cannot be aligned by a single machine due to memory and execution time constraints. The web portal provides a user-friendly solution.
Resumo:
BACKGROUND: Meticulous steps and procedures are proposed in planning guidelines for the development of comprehensive multiyear plans for national immunization programmes. However, we know very little about whether the real-life experience of those who adopt these guidelines involves following these procedures as expected. Are these steps and procedures followed in practice? We examined the adoption and usage of the guidelines in planning national immunization programmes and assessed whether the recommendations in these guidelines are applied as consistently as intended. METHODS: We gathered information from the national comprehensive multiyear plans developed by 77 low-income countries. For each of the 11 components, we examined how each country applied the four recommended steps of situation analysis, problem prioritization, selection of interventions, and selection of indicators. We then conducted an analysis to determine the patterns of alignment of the comprehensive multiyear plans with those four recommended planning steps. RESULTS: Within the first 3 years following publication of the guidelines, 66 (86%) countries used the tool to develop their comprehensive multiyear plans. The funding conditions attached to the use of these guidelines appeared to influence their rapid adoption and usage. Overall, only 33 (43%) countries fully applied all four recommended planning steps of the guidelines. CONCLUSIONS: Adoption and usage of the guidelines for the development of comprehensive multiyear plans for national immunization programmes were rapid. However, our findings show substantial variation between the proposed planning ideals set out in the guidelines and actual use in practice. A better understanding of factors that influence how recommendations in public health guidelines are applied in practice could contribute to improvements in guidelines design. It could also help adjust strategies used to introduce them into public health programmes, with the ultimate goal of a greater health impact.
Resumo:
Pysyvän kilpailuedun saavuttaminen on jokaisen yrityksen strategisen suunnittelun keskeinen tavoite. Monet tunnetut tutkijat ovat suunnanneet strategista johtamista omilla teorioillaan ja tuloksillaan. Tutkimuksissa on havaittu että perinteisillä strategisen johtamisen teorioilla ei voida selittää nykyisin nopeasti muuttuvassa maailmassa toimivien yritysten menestystä. Menestyksen takaa löytyviä tekijöitä kutsutaan yrityksen dynaamisiksi tekijöiksi. Yhtenä merkittävänä dynaamisena tekijänä ovat tulleet esille yrityksen prosessit. Tutkimuksessa on yhdistetty kaksi asiaa samaan tarkastelukehikkoon. Olen tuonut siihen toisaalta yrityksen prosessit, jotka ovat alan parhaiden käytäntöjen mukaiset. Toisaalta on esitetty teoria dynaamisista kyvykkyyksistä, joiden oletetaan ilmentyvän yrityksen prosesseissa. Tässä työssä tarkastellaan yritysten dynaamisista kyvykkyyksistä vain prosesseja.Työn tarkoituksena on löytää vastauksia seuraaviin tutkimuskysymyksiin: Mitkä ovat yrityksen prosessien kautta saavutettavat dynaamiset kyvykkyydet? Voiko yritys saavuttaa ja säilyttää kilpailuetua toteuttaessaan prosessinsa alan parhaiden käytäntöjen mukaan? Voidaanko tunnistetuille dynaamisille kyvykkyyksille rakentaa mallia niiden mittaamiseen?Tutkimuskysymyksiin olen hakenut vastausta esimerkkiyrityksen prosessikehityshankkeen kautta. Tavoitteena on ollut tunnistaa prosessikehityksen takaa mahdolliset yrityksen dynaamiset kyvykkyydet ja siten nimetä niitä yrityksen kilpailuedun tekijöiksi. Tutkimuskohteena olevaan ICT-alan yritykseen kohdistuu yhä suurempia tuottavuuteen ja laatuun liittyviä vaatimuksia. Yhtenä ratkaisuna vastata näihin vaateisiin ovat yritykset lähteneet kehittämään niiden prosesseja. ICT-palveluyritysten toimintaan tukeva viitekehys on ITIL. Viitekehykseen on kerätty useamman yrityksen ja organisaation kokemukset palveluiden tehokkaasta tuottamisesta. ITIL – viitekehys on ollut perustana vuonna 2005 julkaistulle ISO/IEC 20000-1:2005 palveluiden johtamisen standardille. Tutkimuksen perusteella voidaan sanoa, että määrämuotoiset prosessit lisäävät yritysten ketteryyttä mukautua muutoksiin ja siten myös niiden dynaamiset kyvykkyydet ovat lisääntyneet.
Resumo:
High resolution x-ray photoelectron spectroscopy has been used to determine the valence band alignment at ultrathin SiO2/Si interfaces. In the oxide thickness range 1.6-4.4 nm the constant band-offset values of 4.49 and 4.43 eV have been obtained for the dry SiO2/Si(100) and the wet SiO2/Si(100) interfaces, respectively. The valence band alignment of dry SiO2/Si(111) (4.36 eV) is slightly smaller than the case of the dry SiO2/Si(100) interface.
Horizontal transfer of exosomal microRNAs transduce apoptotic signals between pancreatic beta-cells.
Resumo:
BACKGROUND: Diabetes mellitus is a common metabolic disorder characterized by dysfunction of insulin-secreting pancreatic beta-cells. MicroRNAs are important regulators of beta-cell activities. These non-coding RNAs have recently been discovered to exert their effects not only inside the cell producing them but, upon exosome-mediated transfer, also in other recipient cells. This novel communication mode remains unexplored in pancreatic beta-cells. In the present study, the microRNA content of exosomes released by beta-cells in physiological and physiopathological conditions was analyzed and the biological impact of their transfer to recipient cells investigated. RESULTS: Exosomes were isolated from the culture media of MIN6B1 and INS-1 derived 832/13 beta-cell lines and from mice, rat or human islets. Global profiling revealed that the microRNAs released in MIN6B1 exosomes do not simply reflect the content of the cells of origin. Indeed, while a subset of microRNAs was preferentially released in exosomes others were selectively retained in the cells. Moreover, exposure of MIN6B1 cells to inflammatory cytokines changed the release of several microRNAs. The dynamics of microRNA secretion and their potential transfer to recipient cells were next investigated. As a proof-of-concept, we demonstrate that if cel-miR-238, a C. Elegans microRNA not present in mammalian cells, is expressed in MIN6B1 cells a fraction of it is released in exosomes and is transferred to recipient beta-cells. Furthermore, incubation of untreated MIN6B1 or mice islet cells in the presence of microRNA-containing exosomes isolated from the culture media of cytokine-treated MIN6B1 cells triggers apoptosis of recipient cells. In contrast, exosomes originating from cells not exposed to cytokines have no impact on cell survival. Apoptosis induced by exosomes produced by cytokine-treated cells was prevented by down-regulation of the microRNA-mediating silencing protein Ago2 in recipient cells, suggesting that the effect is mediated by the non-coding RNAs. CONCLUSIONS: Taken together, our results suggest that beta-cells secrete microRNAs that can be transferred to neighboring beta-cells. Exposure of donor cells to pathophysiological conditions commonly associated with diabetes modifies the release of microRNAs and affects survival of recipient beta-cells. Our results support the concept that exosomal microRNAs transfer constitutes a novel cell-to-cell communication mechanism regulating the activity of pancreatic beta-cells.
Resumo:
Työssä tarkastellaan sähköisen liiketoiminnan ja asiakaspalvelutoiminnan työvälineenä käytettävän ekstranet–verkon sovellus- ja hyötypotentiaalia teollisuusyrityksissä. Lisäksi selvityksen kohteena ovat ekstranet –palvelu-kanavien strateginen suunnittelu ja kehitys yrityksissä sekä niiden liike-toiminnalliset vaikutukset. Tarkastelun kohteena on esimerkkiyrityksen ekstranet–palvelujärjestelmä ja siinä toimivat sovellukset toiminta-ominaisuuksineen. Lähitarkastelussa on yrityksen yhden ekstranet –moduulin konseptin kehittäminen, joka liittyy uuden sovelluksen pilottikehitys-hankkeeseen, jossa asiakkaalle on tarkoitus tarjota teknistä tukea ns. etädiagnostiikan avulla. Etäseurannan kohteena tässä moduulissa ovat asiakkaan liimausprosessin parametrit, jotka kuvaavat toimittajan liima-aineiden käyttäytymistä asiakkaan prosessissa. Parametritietojen siirtämisen relevanttiutta sekä asiakkaan prosessin problematiikkaa on selvitetty haastattelemalla yrityksen tuotekehityksen ja teknisen asiakaspalvelun avainhenkilöitä. Välittämällä asiakkaan prosessia koskevia tietoja ekstranetiin ja hyväksikäyttämällä niitä päästään merkittäviin molemminpuolisiin tehokkuus- ja kilpailuetuihin sekä kasvavaan asiakasuskollisuuteen. Työn tuloksena on esitetty kehitettävän sovelluksen konsepti, joka voi määritellä ennakkotiedot sitä rakentavalle ASP-toimittajalle sekä toimia vakiomallina sovelluksen käyttökohteita laajennettaessa.
Resumo:
Kansainvälisen kaupan kiristyessä yrityksien kyky täyttää asiakasketjunsa lailliset, sosiaaliset ja toiminnalliset asiakastarpeet tulee punnituksi. Globaalisuuden lisääntyessä asiakasketju voi sisältää toimintoja samanaikaisesti yli sadassa maassa. Jotta asiakasketjun tarpeet voidaan sisällyttää tuotteeseen tehokkaasti yhä useammat yritykset ovat siirtyneet käyttämään Quality Function Deployment nimistä projektijohto- ja laatutyökalua. Quality Function Deployment työkalu auttaa yritystä muuntamaan sisäisten ja ulkoisten asiakkaittensa tarpeet, tuotefunktioiksi ja tuotespesifikaatioiksi. Näin tehdessä voidaan uuden tuotteen kehitysaikaa ja hintaa alentaa merkittävästi suunnittelmalla tuote alunalkaen paremmin. QFD:tä on käytetty useissa yrityksissä Aasiassa, Pohjois-Amerikassa ja Euroopassa, sen kehittämisen jälkeen Japanissa 1960 luvulla. Tämä diplomityö antaa teoreettisen ja käytännön kuvauksen siitä miten QFD:tä kannatta käyttää ja mitä sen avulla voidaan saavuttaa vastaten kysymykseen "miten minä, ja yritykseni hyötyy jos käytän QFD:tä".
Resumo:
Brain-computer interfaces (BCIs) are becoming more and more popular as an input device for virtual worlds and computer games. Depending on their function, a major drawback is the mental workload associated with their use and there is significant effort and training required to effectively control them. In this paper, we present two studies assessing how mental workload of a P300-based BCI affects participants" reported sense of presence in a virtual environment (VE). In the first study, we employ a BCI exploiting the P300 event-related potential (ERP) that allows control of over 200 items in a virtual apartment. In the second study, the BCI is replaced by a gaze-based selection method coupled with wand navigation. In both studies, overall performance is measured and individual presence scores are assessed by means of a short questionnaire. The results suggest that there is no immediate benefit for visualizing events in the VE triggered by the BCI and that no learning about the layout of the virtual space takes place. In order to alleviate this, we propose that future P300-based BCIs in VR are set up so as require users to make some inference about the virtual space so that they become aware of it,which is likely to lead to higher reported presence.
Resumo:
The aim of this thesis is to study the mixing of fuel and, also to some extent, the mixing of air in a circulating fluidized bed boiler. In the literature survey part of this thesis, a review is made of the previous experimental studies related to the fuel and air mixing in the circulating fluidized beds. In the simulation part of it the commercial computational fluid dynamics software (FLUENT) is used with the Eulerian multiphase model for studying the fuel mixing in the two and three-dimensional furnace geometries. The results of the three-dimensional simulations are promising and, therefore suggestions are made for the future simulations. The two-dimensional studies give new information of the effects of the fluidization velocity, fuel particle size and fuel density on the fuel mixing. However, the present results show that three-dimensional models produce more realistic representation of the circulating fluidized bed behavior.
Resumo:
Introduction and Objectives: The central odontogenic fibroma (COF) is a benign odontogenic tumour derived from the dental mesenchymal tissues. It is a rare tumour and only 70 cases of it have been published. Bearing in mind the rareness of the tumour, 8 new cases of central odontogenic fibroma have been found by analyzing the clinical, radiological and histopathological characteristics of COF. Patients and Method: A retrospective study was carried out on 3011 biopsies in the Service of Oral and Maxillofacial Surgery of the Dental Clinic of Barcelona University between January 1995 and March 2008. 85 odontogenic tumours were diagnosed of which 8 were central odontogenic fibroma. The radiological study was based on orthopantomographs, periapical and occlusal radiographies and computerised tomographics. The variables collected were: sex, age, clinical characteristics of the lesion, treatment received and possible reappearances of the tumour. Results: The central odontogenic fibroma represents 9.4% of all odontogenic tumours. Of the 8 cases, 5 were diagnosed in men and 3 in women. The average age was 19.9 years with an age range of 11 to 38 years. The most common location of the tumour was in the mandible. All cases were associated with unerupted teeth. Of the 8 tumours, 3 provoked rhizolysis of the adjacent teeth and 4 cases caused cortical bone expansion. 50% of the patients complained of pain associated to the lesion. No case of recurrence was recorded up to 2 years after the treatment. Conclusions: Central odontogenic fibromas usually evolve asymptomatically although they can manifest very aggressively provoking dental displacement and rhizolysis. Radiologically, COF manifest as a uni or multilocular radiotransparent image although they can be indistinguishable from other radiotransparent lesions making diagnosis more difficult. COF treatment involves conservative surgery as well as follow-up patient checks.