4,477 research outputs found

    The Prospects for Family Business in Research Universities

    Get PDF
    Family business shows the promise of becoming a respected scholarly field in research universities. However, success is not a given. We inquire about its prospects, with reference to the sociology of science. A key requirement for success that has been met is identification with an important and distinctive domain of inquiry. This domain is at the intersection two phenomena - of kinship and business - but more attention has been paid to enterprise than to kinship. We suggest that this creates important windows for theoretical development, an important requirement for a core presence in research universities. We further suggest additional priorities, such as progress in journal and research quality, more developed links to pressing social issues such as international business, inclusion of family business issues in the credit curriculum, and faculty lines that create research continuity and legitimize research on family business

    Computer program conducts facilities utilization and occupancy survey

    Get PDF
    Computer program identifies the uses of all facilities and provides information on the net area in each room as well as the number and classification of people occupying them. The system also provides a means to indicate unsatisfactory work areas and may be able to be updated each month

    Organizational Learning from Extreme Performance Experience: The Impact of Success and Recovery Experience

    Get PDF
    This paper argues that two different types of a firm’s own extreme performance experiences—success and recovery—and their interactions can generate survival-enhancing learning. Although these types of experience often represent valuable sources of useful learning, several important learning challenges arise when a firm has extremely limited prior experience of the same type. Thus, we theorize that a certain threshold of a given type of experience is required before each type of experience becomes valuable, with low levels of experience harming the organization. Furthermore, we propose that success and recovery experience will interact to enhance each other’s value. These conditions can help overcome learning challenges such as superstitious learning or learning from small samples. We investigate our ideas using a sample of the U.S. commercial banks founded between 1984 and 1998. Our results indicate that both success and recovery experience of a firm generate survival-enhancing learning, but only after a certain level of experience is reached. Furthermore, success and recovery experience enhance each other’s learning value, consistent with the theories that emphasize the importance of richer and contrasting experience in providing useful knowledge. Our framework advances organizational learning theory by presenting a contingent model of the impact of success and recovery experience and their interaction

    Hearing the Danger of an Armed Felon- Allowing for a Detention Hearing Under the Bail Reform Act for Those Who Unlawfully Possess Firearms

    Get PDF
    This Article advocates an interpretation of the Bail Reform Act that affords courts the ability to hold detention hearings in gun crime cases to evaluate defendants\u27 potential danger to the community. According to an interpretation advanced by some courts, gun possession offenses do not constitute crimes of violence within the meaning of the Act and therefore those charged with such crimes, even ifth ey have a prior felony conviction, are not subject to pre-trial detention. Arguing against this approach, the Article looks to the Bail Reform Act, the relevant federal case law, and the alarming statistics concerning the growing use of firearms in violent crimes to demonstrate that a more expansive interpretation that includes these crimes is not only appropriate, but more consistent with the plain language and original intent of the Act. The Article divides the current case law into two camps: the so-called Slim Majority Rule, favoring the treatment of unlawful firearms possession as a crime of violence; and the Minority View of case law, denying a detention hearing in these cases. Recognizing that there is a significant split among federal district and circuit courts about whether the Bail Reform Act permits a such a hearing, the Article carefully dissects the case law, the use of the term crime of violence in other statutory contexts and the reasoning underlying both approaches and concludes that the Minority View undermines the most basic purpose of the Bail Reform Act-to enhance public safety. As such, the Article advocates an approach that would allow courts, at a minimum, to hold detention hearings in gun cases to ensure that release of the accused would not pose a danger to the community

    Reforming Accretion Analysis Under the NLRA: Supplementing a Borrowed Analysis with Meaningful Policy Considerations

    Get PDF
    Current accretion analysis utilizes a variety of factors to determine whether to merge a non-unionized group of employees with a unionized group of employees within the same firm. The present construction of the analysis; however, ignores employee views and potential manipulation of the doctrine. By failing to account for these two important factors, current accretion analysis neglects two key concerns of the National Labor Relations Act - preventing employer discrimination and fostering uncoerced employee action and choice. This Note advocates a better approach, which gives proper weight to employee views and considers employer motive to control against the possibility of employers manipulating their workforces to avoid labor obligations

    The Adam Walsh Act\u27s Sex Offender Registration and Notification Requirements and the Commerce Clause: A Defense of Congress\u27s Power to Check the Interstate Movement of Unregistered Sex Offenders

    Get PDF
    The article discusses the Adam Walsh Act specifically the debate on the constitutionality of the Sex Offender Registration and Notification Act (SORNA) under the Commerce Clause. SORNA aims to set up a unified registry system to monitor sex abusers\u27 movements across states facilitating crime prevention and resolution. It cites U.S. Supreme Court rulings that have established the authority of Congress to regulate interstate travel and illegal activities even if the threat is local in nature

    Verification of Fault-Tolerant Clock Synchronization Systems

    Get PDF

    Verification of fault-tolerant clock synchronization systems

    Get PDF
    A critical function in a fault-tolerant computer architecture is the synchronization of the redundant computing elements. The synchronization algorithm must include safeguards to ensure that failed components do not corrupt the behavior of good clocks. Reasoning about fault-tolerant clock synchronization is difficult because of the possibility of subtle interactions involving failed components. Therefore, mechanical proof systems are used to ensure that the verification of the synchronization system is correct. In 1987, Schneider presented a general proof of correctness for several fault-tolerant clock synchronization algorithms. Subsequently, Shankar verified Schneider's proof by using the mechanical proof system EHDM. This proof ensures that any system satisfying its underlying assumptions will provide Byzantine fault-tolerant clock synchronization. The utility of Shankar's mechanization of Schneider's theory for the verification of clock synchronization systems is explored. Some limitations of Shankar's mechanically verified theory were encountered. With minor modifications to the theory, a mechanically checked proof is provided that removes these limitations. The revised theory also allows for proven recovery from transient faults. Use of the revised theory is illustrated with the verification of an abstract design of a clock synchronization system

    A verified design of a fault-tolerant clock synchronization circuit: Preliminary investigations

    Get PDF
    Schneider demonstrates that many fault tolerant clock synchronization algorithms can be represented as refinements of a single proven correct paradigm. Shankar provides mechanical proof that Schneider's schema achieves Byzantine fault tolerant clock synchronization provided that 11 constraints are satisfied. Some of the constraints are assumptions about physical properties of the system and cannot be established formally. Proofs are given that the fault tolerant midpoint convergence function satisfies three of the constraints. A hardware design is presented, implementing the fault tolerant midpoint function, which is shown to satisfy the remaining constraints. The synchronization circuit will recover completely from transient faults provided the maximum fault assumption is not violated. The initialization protocol for the circuit also provides a recovery mechanism from total system failure caused by correlated transient faults
    • …
    corecore