Steven presented three slides with some critical commentary as an off the cuff introduction the panel session. This was not a formal presentation but some comments that he prepared during the workshop.
Journal of Forensic Science & Criminology (JFSC) is an open access, significant and reliable source of contemporary knowledge on advancements in the field of forensic science. JFSC publishes peer reviewed research articles, critical reviews and short communications focused on forensic science and criminology. JFSC encompasses the full spectrum of forensic science including forensic biology, forensic chemistry, cyber forensics and crime scene investigation
This presentation was provided by Bruce Rosenblum of Atypon, during the NISO hot topic event "Preprints." The virtual conference was held on April 21, 2021.
Twitter for Journal Clubs and Medical EducationPaul Sufka
Twitter for Journal Clubs and Medical Education – Hennepin County Medical Center (HCMC) Grand Rounds 10/15/2015
Additional notes: http://paulsufka.com/hcmc
Using Web 2.0 Principles to Become Librarian 2.0: RSSBrian Gray
The document discusses the use of RSS (Really Simple Syndication) feeds by libraries and librarians. It defines RSS and describes how RSS feeds allow users to subscribe to constantly updated content like blog posts, photos, podcasts, and circulation records. It also discusses how libraries can use RSS feeds to share new resources and stay current, as well as tools like RSS readers and OPML files that allow feeds to be accessed and shared.
Charleston 2012: Altmetrics: Analyzing the Value in Scholarly ContentWilliam Gunn
This document discusses altmetrics, which analyze the value of scholarly content beyond traditional citations. It summarizes Mendeley, a company that collects research data from users to provide altmetric measures of impact. Mendeley extracts data from the 2 million user profiles and 300 million documents uploaded to its platform. This data allows for faster and more comprehensive measurement of research impact than citation-based metrics alone. The document argues altmetrics are important to better understand what works in research and to serve all research stakeholders more quickly.
This presentation was provided by Kathryn Funk of the National Library of Medicine, during the NISO hot topic event "Preprints." The virtual conference was held on April 21, 2021.
Using Web 2.0 Principles to Become Librarian 2.0: BlogsBrian Gray
This document summarizes key points about using blogs, including:
- Blogs are websites with dated entries that often include links and allow for comments, categories, tags, and RSS feeds.
- Considerations for blogs include their purpose, openness of commenting, moderation, legal issues, and authorship policies.
- Surveys show many organizations and workplaces are using blogs, though policies around employee blog content vary.
- Tips for authoring blogs effectively include using regular posting patterns, tags, citations, links, and participating in comment discussions.
Journal of Forensic Science & Criminology (JFSC) is an open access, significant and reliable source of contemporary knowledge on advancements in the field of forensic science. JFSC publishes peer reviewed research articles, critical reviews and short communications focused on forensic science and criminology. JFSC encompasses the full spectrum of forensic science including forensic biology, forensic chemistry, cyber forensics and crime scene investigation
This presentation was provided by Bruce Rosenblum of Atypon, during the NISO hot topic event "Preprints." The virtual conference was held on April 21, 2021.
Twitter for Journal Clubs and Medical EducationPaul Sufka
Twitter for Journal Clubs and Medical Education – Hennepin County Medical Center (HCMC) Grand Rounds 10/15/2015
Additional notes: http://paulsufka.com/hcmc
Using Web 2.0 Principles to Become Librarian 2.0: RSSBrian Gray
The document discusses the use of RSS (Really Simple Syndication) feeds by libraries and librarians. It defines RSS and describes how RSS feeds allow users to subscribe to constantly updated content like blog posts, photos, podcasts, and circulation records. It also discusses how libraries can use RSS feeds to share new resources and stay current, as well as tools like RSS readers and OPML files that allow feeds to be accessed and shared.
Charleston 2012: Altmetrics: Analyzing the Value in Scholarly ContentWilliam Gunn
This document discusses altmetrics, which analyze the value of scholarly content beyond traditional citations. It summarizes Mendeley, a company that collects research data from users to provide altmetric measures of impact. Mendeley extracts data from the 2 million user profiles and 300 million documents uploaded to its platform. This data allows for faster and more comprehensive measurement of research impact than citation-based metrics alone. The document argues altmetrics are important to better understand what works in research and to serve all research stakeholders more quickly.
This presentation was provided by Kathryn Funk of the National Library of Medicine, during the NISO hot topic event "Preprints." The virtual conference was held on April 21, 2021.
Using Web 2.0 Principles to Become Librarian 2.0: BlogsBrian Gray
This document summarizes key points about using blogs, including:
- Blogs are websites with dated entries that often include links and allow for comments, categories, tags, and RSS feeds.
- Considerations for blogs include their purpose, openness of commenting, moderation, legal issues, and authorship policies.
- Surveys show many organizations and workplaces are using blogs, though policies around employee blog content vary.
- Tips for authoring blogs effectively include using regular posting patterns, tags, citations, links, and participating in comment discussions.
The document discusses an institutional policy portfolio approach for scholarly publication and dissemination. It advocates that institutions require faculty to assign limited rights to the institution and deposit works in an institutional repository. Institutions should support open access publishing through direct and indirect funding. A portfolio approach should constrain funding by evaluating how faculty publication choices impact dissemination goals of accessibility, rapid access, discoverability, reusability, cost effectiveness, quality assurance and prestige.
BFRS Aldershot Event Feedback - 12th March 2015Stacey Holmes
The document provides a summary of a careers event organized by British Forces Resettlement Services (BFRS) that was held on March 12, 2015 in Aldershot, Hampshire. Over 40 exhibitors representing various industries attended the event. Feedback was collected from both exhibitors and attendees through surveys. Exhibitors were generally pleased with the event organization, venue, and level of interest from attendees. Many attendees found the event useful and said they would attend another one in the future. The feedback will help BFRS improve future career events for military veterans transitioning to civilian employment.
Managing a (different) Data Deluge - SPARC OA conferenceCameron Neylon
Presentation from the Implementation Panel of the SPARC OA conference in Kansas City.
The talk discusses the challenges that arise when Open Access publishing rises to be a majority of scholarly publishing. Different systems are required to manage payments, metadata transfer and funder compliance for institutions, researchers, funders and publishers.
This document discusses issues related to assigning credit and authorship for scholarly works. It raises questions about who has authority to determine credit, how credit should be defined and counted, and how to address potential bias. It also notes that proper credit requires infrastructures to support design, conceptualization, methodology, software and validation. Collaboration will be needed from various individuals and organizations to further develop solutions.
From research life cycle to networks: The role of the libraryCameron Neylon
Google for "research life cycle" and you'll find a million images. Everyone has their own cycle, not all of them compatible. In this talk I argue that we need to move from a cycle conception of research information flows towards one based on networks. The library has the skills and values to act as a professional guide to this terriroty.
Talk by J. Eisen for NZ Computational Genomics meetingJonathan Eisen
This document discusses phylogeny-driven approaches to studying microbial diversity using ribosomal RNA gene sequences. It provides background on how advances in sequencing technology and appreciation of microbial diversity have enabled microbiome research. The document outlines several uses of phylogeny in microbiome studies, including constructing species phylogenies using rRNA sequences and assigning taxonomy to environmental sequences via rRNA phylotyping. It describes challenges with analyzing large rRNA datasets and introduces an automated pipeline called STAP that generates high-quality multiple sequence alignments and phylogenetic trees to classify sequences and analyze species diversity in a manner that scales to large datasets.
This document discusses constructing a liquid fluoride thorium reactor (LFTR) in Singapore. It begins by providing an overview and context for Singapore's need for alternative energy sources. It then discusses lessons that can be learned from risks involved in offshore oil drilling, such as BP's Deepwater Horizon accident, and how those risks apply to nuclear energy technologies like LFTR. The document outlines two action plans: a research and development committee and a public education exhibition to address social and technological safety concerns surrounding LFTR adoption. It concludes by reiterating the goal of applying offshore drilling risk lessons to inform the construction of an LFTR in Singapore.
Assignment 2 - Power drill Grapevine "It's like Yik Yak, but for opinions ab...MATCHmaster
Assignment 2 - Power drill Grapevine
"It's like Yik Yak, but for opinions about Power drills"
GET ANSWER FROM EXPERTS AT ESSAYLINK.NET
Overview
This is an individual assignment in which you will explore the use of data interchange between web servers and browsers, dynamic construction of page content, and API design, using PHP, JavaScript, and JSON.
Important: This assignment specification is generated just for you. Do not distribute this specification. Timelines and Expectations
Percentage value of task: 20%
Due: Refer to Course Description
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) feeds and their benefits for libraries. It explains what RSS is, how RSS readers work, and how libraries can use RSS feeds. Some key points are:
- RSS allows users to subscribe to updates from websites and receive short summaries of new content without visiting each site, making it easier to monitor multiple sites.
- Libraries can use RSS to share updates on new materials, events, and more. Databases and publisher websites often allow creating RSS alerts from search results and tables of contents.
- RSS readers allow aggregating feeds in one place and accessing updates on demand rather than getting email notifications. This can improve patron experiences and reduce email spam.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...guest8e3df4
This document discusses RSS (Really Simple Syndication) and its benefits for libraries. It defines RSS as a format for delivering regularly changing web content, allowing users to subscribe to feeds to receive updated content. The document outlines how RSS benefits users by allowing them to receive updates without visiting websites and monitor many sites at once. It also discusses how libraries can use RSS feeds to share new materials, updates, and customized reading lists with patrons.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) and its benefits for libraries. It defines RSS as a format for delivering regularly changing web content, allowing users to subscribe to feeds to receive updated content. The document outlines how RSS benefits users by allowing them to receive updates without visiting websites and monitor many sites at once. It also discusses how libraries can use RSS feeds to share new materials, updates, and customized reading lists with patrons.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) feeds and their benefits for libraries. It explains what RSS is, how RSS readers work, and how libraries can use RSS feeds. Some key points are that RSS feeds allow users to receive automatic updates from websites without visiting each site, and that libraries can offer RSS feeds from databases, publication tables of contents, and other constantly updated content.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) and its benefits for libraries. RSS allows users to subscribe to regularly updated content like news headlines, blog posts, or library catalog updates and receive them in an aggregated reader without visiting individual websites. The document outlines what RSS is, how to access RSS feeds through desktop or web-based readers, and how libraries can use RSS to share new materials and resources with patrons. It suggests RSS may become an important tool for current awareness and content delivery as patrons expect information to be easily accessible through feeds.
Customer Data Integration Architecture GudelinbesNandeep Nagarkar
This document provides a summary of the current MCV database architecture, outlines key issues ("pain points"), and proposes a re-architecture. The current system lacks distinct ETL processes and has data integrity issues. The proposed re-architecture includes: external source/application/ETL/outbound data layers; revisiting the data model; separating ETL functions from application code; using the Oracle data dictionary; and addressing security, scalability and potential ETL tool migration. Details of each new layer and appendixes on ETL and data integrity are provided. The intended audience is the project team to review compliance and use as a design roadmap.
Using Web 2.0 Principles to Become Librarian and Educator 2.0 - RSS FeedsBrian Gray
This document discusses the use of RSS (Really Simple Syndication) feeds to receive updates from websites without visiting each site individually. It provides an overview of what RSS is, the benefits of using RSS such as receiving updates without email notifications, and how to access RSS using desktop readers, web-based readers, or email-based readers. It also discusses how libraries can use RSS feeds to share updates and resources with patrons, and how patrons may start to judge the currency of library services based on their use of RSS feeds.
This document proposes and evaluates three query recommendation strategies based on large-scale web access logs and a web page archive. The strategies augment queries with additional terms from noun, URL, or web community feature spaces. Experimental results show that strategies based on noun and community features extract more related search queries than a URL-based strategy. Query logs are an effective source for query recommendation.
This document provides an overview and introduction to SQL and relational databases. It discusses the brief history and standards of SQL, as well as popular database management systems like Oracle, SQL Server, and MySQL. Basic relational database concepts are explained such as constraints, data integrity, and different types of relationships. The document aims to serve as a reference for SQL developers, database administrators, and students to learn Oracle SQL, T-SQL, and MySQL.
This document provides a design overview of the Web Accessible Alumni Database software. It includes deployment diagrams, architectural designs, data structure details, use case realizations, and interface designs. The system allows alumni to complete surveys, add and update their entries, and search for other alumni to email. It consists of a web server and client using HTML and JSP. The designated faculty member can make changes to surveys, collected data fields, and email capabilities.
Using Web 2.0 Principles to Become Librarian 2.0: RSS FeedsBrian Gray
The document discusses RSS (Really Simple Syndication) feeds and how they can help librarians (Librarian 2.0) and patrons. It defines RSS feeds and their benefits like receiving automatic updates from websites without visiting them directly. It explains how RSS readers work and how libraries can use RSS feeds to share updates on new materials, events and more. The document suggests RSS may influence how patrons judge a library's resources if the library offers RSS options.
RSS is playing an increasing role in delivering information on the web by allowing content from websites, blogs, databases and other sources to be accessed through RSS feeds. Libraries, publishers and database providers are making more of their content available through RSS feeds. As RSS and other web technologies continue to evolve, they are likely to have a greater impact on how libraries and researchers access and manage scientific information, especially as users adopt new mobile devices.
The document is a software requirements specification (SRS) for a web accessible alumni database. It includes sections describing the purpose, scope, functions, and requirements of the system. The main functions are for alumni to access a home page, fill out a survey, create or update an entry in the database, and search for or email other alumni. The SRS provides details on each use case, including flow diagrams, step-by-step descriptions and references to further requirement specifications. It also covers non-functional requirements regarding compatibility and security.
The document discusses an institutional policy portfolio approach for scholarly publication and dissemination. It advocates that institutions require faculty to assign limited rights to the institution and deposit works in an institutional repository. Institutions should support open access publishing through direct and indirect funding. A portfolio approach should constrain funding by evaluating how faculty publication choices impact dissemination goals of accessibility, rapid access, discoverability, reusability, cost effectiveness, quality assurance and prestige.
BFRS Aldershot Event Feedback - 12th March 2015Stacey Holmes
The document provides a summary of a careers event organized by British Forces Resettlement Services (BFRS) that was held on March 12, 2015 in Aldershot, Hampshire. Over 40 exhibitors representing various industries attended the event. Feedback was collected from both exhibitors and attendees through surveys. Exhibitors were generally pleased with the event organization, venue, and level of interest from attendees. Many attendees found the event useful and said they would attend another one in the future. The feedback will help BFRS improve future career events for military veterans transitioning to civilian employment.
Managing a (different) Data Deluge - SPARC OA conferenceCameron Neylon
Presentation from the Implementation Panel of the SPARC OA conference in Kansas City.
The talk discusses the challenges that arise when Open Access publishing rises to be a majority of scholarly publishing. Different systems are required to manage payments, metadata transfer and funder compliance for institutions, researchers, funders and publishers.
This document discusses issues related to assigning credit and authorship for scholarly works. It raises questions about who has authority to determine credit, how credit should be defined and counted, and how to address potential bias. It also notes that proper credit requires infrastructures to support design, conceptualization, methodology, software and validation. Collaboration will be needed from various individuals and organizations to further develop solutions.
From research life cycle to networks: The role of the libraryCameron Neylon
Google for "research life cycle" and you'll find a million images. Everyone has their own cycle, not all of them compatible. In this talk I argue that we need to move from a cycle conception of research information flows towards one based on networks. The library has the skills and values to act as a professional guide to this terriroty.
Talk by J. Eisen for NZ Computational Genomics meetingJonathan Eisen
This document discusses phylogeny-driven approaches to studying microbial diversity using ribosomal RNA gene sequences. It provides background on how advances in sequencing technology and appreciation of microbial diversity have enabled microbiome research. The document outlines several uses of phylogeny in microbiome studies, including constructing species phylogenies using rRNA sequences and assigning taxonomy to environmental sequences via rRNA phylotyping. It describes challenges with analyzing large rRNA datasets and introduces an automated pipeline called STAP that generates high-quality multiple sequence alignments and phylogenetic trees to classify sequences and analyze species diversity in a manner that scales to large datasets.
This document discusses constructing a liquid fluoride thorium reactor (LFTR) in Singapore. It begins by providing an overview and context for Singapore's need for alternative energy sources. It then discusses lessons that can be learned from risks involved in offshore oil drilling, such as BP's Deepwater Horizon accident, and how those risks apply to nuclear energy technologies like LFTR. The document outlines two action plans: a research and development committee and a public education exhibition to address social and technological safety concerns surrounding LFTR adoption. It concludes by reiterating the goal of applying offshore drilling risk lessons to inform the construction of an LFTR in Singapore.
Assignment 2 - Power drill Grapevine "It's like Yik Yak, but for opinions ab...MATCHmaster
Assignment 2 - Power drill Grapevine
"It's like Yik Yak, but for opinions about Power drills"
GET ANSWER FROM EXPERTS AT ESSAYLINK.NET
Overview
This is an individual assignment in which you will explore the use of data interchange between web servers and browsers, dynamic construction of page content, and API design, using PHP, JavaScript, and JSON.
Important: This assignment specification is generated just for you. Do not distribute this specification. Timelines and Expectations
Percentage value of task: 20%
Due: Refer to Course Description
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) feeds and their benefits for libraries. It explains what RSS is, how RSS readers work, and how libraries can use RSS feeds. Some key points are:
- RSS allows users to subscribe to updates from websites and receive short summaries of new content without visiting each site, making it easier to monitor multiple sites.
- Libraries can use RSS to share updates on new materials, events, and more. Databases and publisher websites often allow creating RSS alerts from search results and tables of contents.
- RSS readers allow aggregating feeds in one place and accessing updates on demand rather than getting email notifications. This can improve patron experiences and reduce email spam.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...guest8e3df4
This document discusses RSS (Really Simple Syndication) and its benefits for libraries. It defines RSS as a format for delivering regularly changing web content, allowing users to subscribe to feeds to receive updated content. The document outlines how RSS benefits users by allowing them to receive updates without visiting websites and monitor many sites at once. It also discusses how libraries can use RSS feeds to share new materials, updates, and customized reading lists with patrons.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) and its benefits for libraries. It defines RSS as a format for delivering regularly changing web content, allowing users to subscribe to feeds to receive updated content. The document outlines how RSS benefits users by allowing them to receive updates without visiting websites and monitor many sites at once. It also discusses how libraries can use RSS feeds to share new materials, updates, and customized reading lists with patrons.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) feeds and their benefits for libraries. It explains what RSS is, how RSS readers work, and how libraries can use RSS feeds. Some key points are that RSS feeds allow users to receive automatic updates from websites without visiting each site, and that libraries can offer RSS feeds from databases, publication tables of contents, and other constantly updated content.
Kent State Workshop - Using Web 2.0 Principles to Become Librarian 2.0, RSS, ...Brian Gray
This document discusses RSS (Really Simple Syndication) and its benefits for libraries. RSS allows users to subscribe to regularly updated content like news headlines, blog posts, or library catalog updates and receive them in an aggregated reader without visiting individual websites. The document outlines what RSS is, how to access RSS feeds through desktop or web-based readers, and how libraries can use RSS to share new materials and resources with patrons. It suggests RSS may become an important tool for current awareness and content delivery as patrons expect information to be easily accessible through feeds.
Customer Data Integration Architecture GudelinbesNandeep Nagarkar
This document provides a summary of the current MCV database architecture, outlines key issues ("pain points"), and proposes a re-architecture. The current system lacks distinct ETL processes and has data integrity issues. The proposed re-architecture includes: external source/application/ETL/outbound data layers; revisiting the data model; separating ETL functions from application code; using the Oracle data dictionary; and addressing security, scalability and potential ETL tool migration. Details of each new layer and appendixes on ETL and data integrity are provided. The intended audience is the project team to review compliance and use as a design roadmap.
Using Web 2.0 Principles to Become Librarian and Educator 2.0 - RSS FeedsBrian Gray
This document discusses the use of RSS (Really Simple Syndication) feeds to receive updates from websites without visiting each site individually. It provides an overview of what RSS is, the benefits of using RSS such as receiving updates without email notifications, and how to access RSS using desktop readers, web-based readers, or email-based readers. It also discusses how libraries can use RSS feeds to share updates and resources with patrons, and how patrons may start to judge the currency of library services based on their use of RSS feeds.
This document proposes and evaluates three query recommendation strategies based on large-scale web access logs and a web page archive. The strategies augment queries with additional terms from noun, URL, or web community feature spaces. Experimental results show that strategies based on noun and community features extract more related search queries than a URL-based strategy. Query logs are an effective source for query recommendation.
This document provides an overview and introduction to SQL and relational databases. It discusses the brief history and standards of SQL, as well as popular database management systems like Oracle, SQL Server, and MySQL. Basic relational database concepts are explained such as constraints, data integrity, and different types of relationships. The document aims to serve as a reference for SQL developers, database administrators, and students to learn Oracle SQL, T-SQL, and MySQL.
This document provides a design overview of the Web Accessible Alumni Database software. It includes deployment diagrams, architectural designs, data structure details, use case realizations, and interface designs. The system allows alumni to complete surveys, add and update their entries, and search for other alumni to email. It consists of a web server and client using HTML and JSP. The designated faculty member can make changes to surveys, collected data fields, and email capabilities.
Using Web 2.0 Principles to Become Librarian 2.0: RSS FeedsBrian Gray
The document discusses RSS (Really Simple Syndication) feeds and how they can help librarians (Librarian 2.0) and patrons. It defines RSS feeds and their benefits like receiving automatic updates from websites without visiting them directly. It explains how RSS readers work and how libraries can use RSS feeds to share updates on new materials, events and more. The document suggests RSS may influence how patrons judge a library's resources if the library offers RSS options.
RSS is playing an increasing role in delivering information on the web by allowing content from websites, blogs, databases and other sources to be accessed through RSS feeds. Libraries, publishers and database providers are making more of their content available through RSS feeds. As RSS and other web technologies continue to evolve, they are likely to have a greater impact on how libraries and researchers access and manage scientific information, especially as users adopt new mobile devices.
The document is a software requirements specification (SRS) for a web accessible alumni database. It includes sections describing the purpose, scope, functions, and requirements of the system. The main functions are for alumni to access a home page, fill out a survey, create or update an entry in the database, and search for or email other alumni. The SRS provides details on each use case, including flow diagrams, step-by-step descriptions and references to further requirement specifications. It also covers non-functional requirements regarding compatibility and security.
Database Security Assessment Transcript You are a contracting office.docxwhittemorelucilla
Database Security Assessment Transcript You are a contracting officer's technical representative, a Security System Engineer, at a military hospital. Your department's leaders are adopting a new medical health care database management system. And they've tasked you to create a request for proposal for which different vendors will compete to build and provide to the hospital. A Request For Proposal, or RFP, is when an organization sends out a request for estimates on performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and for procurement and acquisitions. To complete the RFP, you must determine the technical and security specifications for the system. You'll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor's performance. Your learning will help you determine your system's requirements. As you discover methods of attack, you'll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.
Modern healthcare systems incorporate databases for effective and efficient management of patient healthcare. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle. Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and healthcare IT professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement.
System security engineers and other acquisition personnel can effectively assist vendors in building better healthcare database systems by specifying security requirements up front within the request for proposal (RFP). In this project, you will be developing an RFP for a new medical healthcare database management system.
Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project:
Deliverables
• An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.
• An MS-Excel spreadsheet with lab results.
There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: "Provide an Overview for Vendors."
Step 1: Provide an Overview for Vendors
As the contracting officer's technical representative (COTR), you are the liaison between your hospital and potential vendors. It is your duty to provide vendors with an overview of your organization. To do so, identify infor.
Example Of A Harvard Referenced Essay. Harvard - Referencing Guide - Subject ...Nicole Muyeed
Harvard Referencing Sample Paper | Chegg Writing. Essay Written With Harvard Referencing ― How to Write a Harvard Essay?. Example of essay with harvard referencing - Best Writing Aid & School .... Example Of Essay With Harvard Referencing Pdf. How To Harvard Reference A Quote - Complete Howto Wikies. Persuasive essay: Harvard referencing essay example. Surprising Harvard Essay ~ Thatsnotus. Harvard Referencing: 15 Amazing Tips You Need to Know. Harvard in-text citations - My Information Skills - LibGuides at TAFE .... How To Harvard Reference An Image - Complete Howto Wikies. Harvard References Guidelines and Examples | MindView Citation Software. Harvard reference essay sample.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
The document is a software requirements specification for a system to perform record matching over query results from multiple web databases. It describes the purpose, conventions, intended users, product scope, and references. It provides an overall description of the product perspective and functions, describes user classes and characteristics, operating environment, design constraints, and documentation. It outlines external interface requirements including user interfaces, hardware/software interfaces, and communications interfaces. It details system features and other non-functional requirements around performance, safety, security, quality, and business rules.
This document provides an overview of public vulnerability databases and resources that can be used by software developers. It summarizes several key resources including MITRE's CVE database, which standardizes names for known vulnerabilities, NIST's ICAT database which provides more details on vulnerabilities, and the CERT/CC and US-CERT websites which publish vulnerability advisories and notes. It encourages developers to consult these resources to stay informed about vulnerabilities in order to proactively prevent issues and learn from others' experiences.
Research Excellence is a Neo-Colonial AgendaCameron Neylon
Talk given at the On Think Tanks meeting in Geneva in February 2019. Discusses the way in which research excellence is constructed and tends to 'internationalise' networks. Using the Sabato-Botana triangle as a model it argues for the importance of localism and the need for contextualised conceptions of excellence if research is to deliver value for the communities that support it.
Network Enabled Research: Connectivity, groups and growth in the production o...Cameron Neylon
The document discusses how knowledge grows through networks and groups. It argues that knowledge is produced at boundaries between groups through contact and conflict. While larger networks can enable greater growth of knowledge, they also face challenges of discoverability, silos, and trust. Productive knowledge growth requires the right local network structures and institutions that support boundaries and conflict between groups. Diversity is important for knowledge creation, but so is community and identity, which encourage some level of exclusion. The right balance must be struck between opening and closing networks.
The document discusses the need for open indicators to measure open science. It notes that while open science policy is easy to mandate, achieving real culture change is difficult. It argues that open indicators are needed to align quantitative and qualitative narratives around open science and ensure consistency. Examples of potential open indicators include percentages of open access articles and measures of access to knowledge. The document advocates for measuring access in terms of citizen needs rather than limitations of specific databases. Overall it calls for open indicators to guide investment and evaluate progress in supporting the goals of open science.
Excellence is a neo-colonial agenda...and what we can do aboutCameron Neylon
Slides from a keynote at the meeting 'Perspectives of Research Excellence in the Global South' - argues that considering research excellence as a neo-colonial agenda helps to defuse the dangers that a North Atlantic attitude to 'biblio-excellence' creates but also offers opportunities for developing and transitional countries to take a leadership role on the future of research policy
The Power of Infrastructures and the Infrastructures of PowerCameron Neylon
This document discusses the power of infrastructures and infrastructures of power. It argues that infrastructures restructure available resources to create abundance. However, trust is the ultimate infrastructure layer and trust is a collective action problem that is difficult to establish. The document suggests that infrastructures need certain characteristics like broad coverage, stakeholder governance, non-discrimination, transparency and limitations on lobbying in order to build trust and ensure stability.
Will we still know ourselves? Identity and Community in a Transforming Knowle...Cameron Neylon
Keynote given at the NFAIS 2018 meeting in Alexandria, Virginia, USA on 28 February 2018
The world of information is transforming at a bewildering pace. The assumptions of yesterday, the stable institutions and cherished practices increasingly seem to be vanishing before our eyes. The first assumption of any new strategy seems to be “what would this look like if we built it from scratch, today”. And yet continuity matters, we don’t build new tools, institutions and practices from scratch, they evolve in a messy and contingent way from what we have available to us in the moment.
In this talk, Neylon unpicks the underlying drivers of change, and how they are coupled to a long history of how we manage information. Neylon will discuss how the different perspectives of important groups—scholars, publishers, funders, platform providers and the myriad of information professionals—lead to a partial focus that can make us simultaneously fearful of the change we see and blind to the shifts that actually matter.
If the arc of history bends towards justice then it follows that the arc of our knowledge and information environment necessarily bends towards greater scale and greater diversity. At the same time it is the values that underpin scholarship and the various ways in which we identify with the project of building knowledge, that drive us forward. If we are to take advantage of change, we need to understand what it is that must stay the same.
Beyond Open: Culture and Scaling in the Making of KnowledgeCameron Neylon
Open Access, Open Science, Open Government, Open Education. We often see these as new movements, set against an old world of broken – and closed – systems of scholarship and education. New technologies, primarily the web, have lifted the veil from our eyes to let us see this new world. If only we could build the right technology...mandate the right behavior then a new utopia of open scholarship will be upon us! The problem with this view is that it sees the disruption of the web as a one-off event that once worked through will provide a solution for all time. Framed that way this is obviously not true, but the challenge goes deeper than that. Scholarship, in its western institutionalized forms, has increased in scale continuously for at least 400 and possibly 2000 years. No social or institutional system can scale continuously over several order of magnitude. Therefore we must expect structural historical breaks.
The question is not how to fix scholarship, but how on earth it has managed to last this long? I will argue that what sits at the core of this survival is a set of normative cultural values that privilege openness. Their application has been far from perfect but the concepts of communication, criticism, civility and inclusion have deep roots in our institutions and communities. At the same time community and identity are critical to scholarship, and both of these imply exclusion and boundary work to define community. My argument is that the culture, forms and values of western scholarship have held these two tendencies in productive tension, allowing the academy to address the ongoing scaling (and consequent inclusion) problem through social, technical and economic innovation. Our challenge is not simply to solve today's problems, but to re-imagine our institutions so that they continuously generate and are able to adopt the innovations necessary to continue to solve the scaling problem into the indefinite future.
Slides for a presentation to the SCONUL conference in 2015. Focusses on the idea that there is an ongoing shift from working within life cycles to networks in the research world
The document discusses positive framings for open science through three lenses: (1) the economics of clubs as described by Elinor Ostrom, where openness can increase returns for the club over time; (2) knowledge as a product of translation between esoteric and exoteric realms as proposed by Ludwig Fleck, where openness facilitates translation; and (3) cultural science perspectives seeing science as a cultural practice sustained through open and diverse groups as suggested by Hartley and Potts. The document argues that openness has long been an aspiration in science to make knowledge more accessible and that open projects will always be works in progress that value diversity.
Openness in Scholarship: A return to core values?Cameron Neylon
The debate over the meaning, and value, of open movements has intensified. The fear of co-option of various efforts from Open Access to Open Data is driving a reassessment and re-definition of what is intended by “open”. In this article I apply group level models from cultural studies and economics to argue that the tension between exclusionary group formation and identity and aspirations towards inclusion and openness are a natural part of knowledge- making. Situating the traditional Western Scientific Knowledge System as a culture-made group, I argue that the institutional forms that support the group act as economic underwriters for the process by which groups creating exclusive knowledge invest in the process of making it more accessible, less exclusive, and more public-good-like, in exchange for receiving excludable goods that sustain the group. A necessary consequence of this is that our institutions will be conservative in their assessment of what knowledge-goods are worth of consideration and who is allowed within those institutional systems. Nonetheless the inclusion of new perspectives and increasing diversity underpins the production of general knowledge. I suggest that instead of positioning openness as new, and in opposition to traditional closed systems, it may be more productive to adopt a narrative in which efforts to increase inclusion are seen as a very old, core value of the academy, albeit one that is a constant work in progress.
Interpreting Shadows on the Elephant in the RoomCameron Neylon
Talk on the economics of sustainability models for scholarly communication given at ScienceEurope/LIBER workshop in Antwerp on 27 April 2017. Focuses on very fundamental issues of what happens in economic terms with scholarly communication and how cultural institutuions as well as formal institutions play a key role in supporting groups, clubs in economic terms, that take knowledge and covert to being more public like.
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...Cameron Neylon
This document discusses challenges in sustaining scholarly infrastructures as collective goods and lessons that can be learned from economist Olson's work. It notes that large groups have difficulty provisioning collective goods without special cases like oligopoly control, non-collective side benefits, or compulsory funding. Crossref is used as an example that transitioned through these phases over time. Membership models are less applicable for open data and if taxation models are needed, organizations will require community trust.
Sustainable Futures for Research CommunicationCameron Neylon
Slides for a talk given at Duke University on 7 October 2016. The talk focusses on political economics of scholarly publishing and routes forward to finding equitable and affordable ways to shift to Open Access.
The document contains a trigger warning for the presentation, noting that some content or elements may upset some audience members. It advises anyone who finds such warnings distressing or feels unable to cope with techniques like empathy, diversity of viewpoints, or differing experiences to leave and find a safe place to avoid such experiences.
How can we invest in future development of scholarly communications. Whose role is it and who is paying? In this talk, given at the UKSG meeting in 2016 I use the lens of culture to ask how scholarly communications needs to change, and where the opportunities lie for researchers and publishers.
No stories without evidence, no evidence without storiesCameron Neylon
Talk given at Sydney University on 4 August 2015.
Across many parts of our lives we are faced with the increasing availability of data to support decision making. With every element of the research process moving online, there are many new sources of data, as well as improved old sources of data, that can provide information on the performance, value and use of research and researchers.
But there is a problem. The proliferation of proxy data, and their naive equation with such weakly defined concepts as “quality” and “excellence”, have lead to a reliance on rankings and quantitative measures as institutional targets. More than this the adoption of these instrumental targets has lead us away from a critical discussion of institutional values, indeed of what the institution is for.
I will argue that it is only by moving away from such vague terms as “quality”, “excellence” and “impact” and focussing on institutional values and a well articulated mission that institutions of scholarship will continue to be relevant for the future. It is through interrogating the goals of the institution that the enormous potential resource of data on the research enterprise can be realised. Using the data effectively will allow us a window on how knowledge actually moves and is used. In combination with a clear sense of institutional goals this provides great opportunities for institutions to differentiate themselves from the pack.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
6. BCM Sequence Annotation Web Server Randall Smith rsmith at dot.bcm.tmc.edu Wed Aug 24 06:14:20 EST 1994 Announcing a new WWW Server: The BCM Sequence Annotation Server URL: http://dot.imgen.bcm.tmc.edu:9331/seq-annot/home.html Developed by Kanwal Gill, Brent Wiese, and Randall Smith Human Genome Center, Baylor College of Medicine, Houston TX USA We have created a "Sequence Annotation" WWW Server that allows researchers to add their own annotations to Entrez (NCBI) DNA and protein sequence reports. Our Annotation Server is intended as a method for investigators to easily share new information about sequences, e.g., new features, interesting sequence matches, domain identifications, etc. A user who wishes to make an annotation for an Entrez sequence will be given the chance to select an annotation type (eg coding region, variant, etc.). The user is then requested to enter a short annotation that will appear as an embedded link in an Entrez report. The annotator will then be prompted to enter an extended commentary which gives the further details about the annotation. The annotator may also enter some keywords that can be searched on and URL's that will lead to more information (eg, an entry in another database, a file of data on the annotator's home computer, etc). Only the annotations themselves are stored on our local server. When a user wishes to view an annotated record, our server requests a sequence report from the NCBI Entrez Server. The local annotations are then embedded within the returned report. As an initial entry, we have added several hundred annotations based on data kindly provided by Keith Robison. The annotations list probable coding regions within bacterial sequences that are not annotated as such in GenBank (see Table 2 of K. Robison, W. Gilbert and G.M. Church, "Large scale bacterial gene discovery by similarity search", Nature Genetics 7:205, 1994). We invite the biological community to use the server to view this data as well as to add data of their own. Users wishing to view the data need only the URL listed above and a graphical WWW browser such as Mosaic or Chimera. Users wishing to add data would be well-advised to also prepare the text of their annotation and extended commentary as well as to have their URL's (if any) in mind before beginning. Extensive on-line help is provided for both types of users. Suggestions and comments regarding how the server can best meet the needs of the biological community are welcome. There is a comments form provided in the server for typing in your comments. Comments may also be emailed to Randall Smith at rsmith at bcm.tmc.edu. ------------------------------------------------------------------------ Randall F. Smith Human Genome Center Department of Molecular and Human Genetics and W.M. Keck Center for Computational Biology Baylor College of Medicine Houston, TX 77030 USA rsmith at bcm.tmc.edu 713-798-4735; FAX: 713-798-5386 ------------------------------------------------------------------------