2,657 research outputs found

    Using Virtual Servers to Teach the Implementation of Enterprise-level DBMSs: A Teaching Note

    Get PDF
    One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database applications. Choosing the best database package on which to base the hands-on activities for the class is one of the biggest difficulties of teaching it. Many schools end up using the lowest common denominator which is often a PC-based package such as MS Access. While this package is certainly adequate, basing the whole course on using this one package may be a disservice to the students. This is because in the real business world, the market is dominated by the larger, enterprise-level DBMSs such as Oracle, IBM DB2, and Microsoft SQL Server. However, getting the students access to one of these packages poses a whole series of other problems involving getting academic alliances and maintaining it on a server. This article describes a novel use of a server virtualization tool that is commonly used in the business world to allow students to gain experience in using several of the most popular enterprise-level DBMSs. Students benefit because they get more real-world experience out of the class and gain confidence that their skills will more readily transfer to jobs. Faculty also benefit by having more flexibility in how they can present the material

    User Preference Analysis of Internet Social Media services

    Get PDF
    The size, scope and significance of Internet Social Media (ISM) services have grown exponentially in recent years. This paper discusses the context, methodology, findings, and conclusions from an exploratory study that assessed users’ preferences of ISM services. The study uses a mixed methods approach to explain why ISM services are liked or disliked by users. This is an important area for research since users are the most important stakeholders of any ISM service. The outcomes of this exploratory study were sets of rankings of ISM services that were based entirely on users\u27 preferences. This has not been studied in prior research up to this point. As Internet social networks continue to grow in their popularity and usefulness, this study provides a better understanding of the preferences of ISM users that is valuable to both academia and practitioners. The ISM services that are compared in this study include Facebook, MySpace, Google Plus, LinkedIn, Twitter, YouTube, Groupon, Digg, Yelp, and Loopt

    System Development from a Legal Perspective

    Get PDF
    This paper discusses the potential for legal liability when software malfunctions and causes financial loss or harm to the user. The focus is on the systems developer as opposed to the vendor, although the samelegal issues may apply to vendors as well. Various theories in the U.S. legal system may form the basis for legal action, on the part of the purchaser or ultimate user, based upon the characteristics of the individual case. The legal theories examined, for their application to malfunctioning software, are breach of contract and the tort theories of fraud and computer malpractice

    Multiple strand displacement amplification of mitochondrial DNA from clinical samples

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Whole genome amplification (WGA) methods allow diagnostic laboratories to overcome the common problem of insufficient DNA in patient specimens. Further, body fluid samples useful for cancer early detection are often difficult to amplify with traditional PCR methods. In this first application of WGA on the entire human mitochondrial genome, we compared the accuracy of mitochondrial DNA (mtDNA) sequence analysis after WGA to that performed without genome amplification. We applied the method to a small group of cancer cases and controls and demonstrated that WGA is capable of increasing the yield of starting DNA material with identical genetic sequence.</p> <p>Methods</p> <p>DNA was isolated from clinical samples and sent to NIST. Samples were amplified by PCR and those with no visible amplification were re-amplified using the Multiple Displacement Amplificaiton technique of whole genome amplification. All samples were analyzed by mitochip for mitochondrial DNA sequence to compare sequence concordance of the WGA samples with respect to native DNA. Real-Time PCR analysis was conducted to determine the level of WGA amplification for both nuclear and mtDNA.</p> <p>Results</p> <p>In total, 19 samples were compared and the concordance rate between WGA and native mtDNA sequences was 99.995%. All of the cancer associated mutations in the native mtDNA were detected in the WGA amplified material and heteroplasmies in the native mtDNA were detected with high fidelity in the WGA material. In addition to the native mtDNA sequence present in the sample, 13 new heteroplasmies were detected in the WGA material.</p> <p>Conclusion</p> <p>Genetic screening of mtDNA amplified by WGA is applicable for the detection of cancer associated mutations. Our results show the feasibility of this method for: 1) increasing the amount of DNA available for analysis, 2) recovering the identical mtDNA sequence, 3) accurately detecting mtDNA point mutations associated with cancer.</p

    Optimizing information flow in small genetic networks. II: Feed forward interactions

    Get PDF
    Central to the functioning of a living cell is its ability to control the readout or expression of information encoded in the genome. In many cases, a single transcription factor protein activates or represses the expression of many genes. As the concentration of the transcription factor varies, the target genes thus undergo correlated changes, and this redundancy limits the ability of the cell to transmit information about input signals. We explore how interactions among the target genes can reduce this redundancy and optimize information transmission. Our discussion builds on recent work [Tkacik et al, Phys Rev E 80, 031920 (2009)], and there are connections to much earlier work on the role of lateral inhibition in enhancing the efficiency of information transmission in neural circuits; for simplicity we consider here the case where the interactions have a feed forward structure, with no loops. Even with this limitation, the networks that optimize information transmission have a structure reminiscent of the networks found in real biological systems

    Dark Matter in the Coming Decade: Complementary Paths to Discovery and Beyond

    Full text link
    In this report we summarize the many dark matter searches currently being pursued through four complementary approaches: direct detection, indirect detection, collider experiments, and astrophysical probes. The essential features of broad classes of experiments are described, each with their own strengths and weaknesses. The complementarity of the different dark matter searches is discussed qualitatively and illustrated quantitatively in two simple theoretical frameworks. Our primary conclusion is that the diversity of possible dark matter candidates requires a balanced program drawing from all four approaches.Comment: Report prepared for the Community Summer Study (Snowmass) 2013, on behalf of Cosmic Frontier Working Groups 1-4 (CF1: WIMP Dark Matter Direct Detection, CF2: WIMP Dark Matter Indirect Detection, CF3: Non-WIMP Dark Matter, and CF4: Dark Matter Complementarity); published versio
    corecore