The document discusses visualizing RNA structures and sequences. It provides background on RNA families database Rfam and the process of building RNA families from literature and annotation. It also touches on priorities for RNA visualization tools, including scale, informativeness, and inclusiveness, and provides some example visualizations like secondary structure, alignment, taxonomic distribution, and genomic context. Conflicting priorities between curators and users are noted. Challenges in 2007 around quality control, the website, codebase, and community input are outlined.
The document summarizes research using genomics to study Sclerotinia homoeocarpa, the causal agent of dollar spot disease in turfgrass. Key points include:
1) Developing a global sample of S. homoeocarpa populations to study genetic structure and relationship to fungicide resistance.
2) Sequencing the S. homoeocarpa genome and comparing it to related species, identifying mating type loci and developing microsatellite markers.
3) Characterizing the cytochrome P450 lanosterol 14α-demethylase (CYP51) gene which is the target of DMI fungicides and investigating mechanisms of fungicide resistance.
RNA is a single-stranded nucleic acid made up of repeating nucleotides where the sugar is ribose and uracil bonds with adenine instead of thymine. There are three main types of RNA: messenger RNA which carries genetic information from DNA in the nucleus to the cytoplasm, ribosomal RNA which composes ribosomes and helps produce enzymes for protein production, and transfer RNA which brings amino acids to ribosomes for protein assembly.
This document summarizes an E-RARE funded project called RNA-ALS that aims to investigate the role of microRNAs in amyotrophic lateral sclerosis (ALS). The project brings together researchers from Canada, France, and Israel with expertise in motor neuron biology, RNA metabolism, disease modeling and clinical neurology. The goal is to identify microRNAs that regulate neurofilament mRNAs important for motor neuron function and determine if altering their expression could help keep motor neurons connected and functional for longer. The collaborative nature of the project leverages different expertise, resources like tissue banks, and funding streams to help advance understanding and treatment of ALS.
RNA has the function of copying genetic information from DNA and transporting it to be used for protein synthesis. It differs from DNA in that RNA is single-stranded, contains the sugar ribose instead of deoxyribose, and contains the base uracil instead of thymine. The length of mRNA is much shorter than DNA as it only contains the code for a single protein, while DNA contains the full genome.
The objectives are an understanding of:
▶ How “function” in a genomic context can be defined. This is a
surprisingly philosophical problem.
▶ Some strategies for determining if a genomic region is likely to
be functional or not.
Objectives are an understanding of:
▶ Homology search tools
▶ E-values
▶ how BLAST works
▶ how profile HMMs (hmmer) work
▶ which is the right tool for different questions
Sequence alignment & comparative genomics
▶ What’s the difference between homology and analogy?
▶ How homology is estimated?
▶ Where do sequence similarity scores come from?
▶ What are the BLOSUM protein scoring matrices?
▶ How are insertions and deletions scored?
Genome annotation & comparative genomics
An appreciation for:
▶ An overview of some techniques and methods are used for
comparative genomics
▶ An understanding of genome annotation methods, particularly
the advantages and disadvantages of the different methods:
▶ Sequence analysis (ORF finding)
▶ Comparative sequence analysis
▶ Experimental methods (RNAseq & mass-spectroscopy)
The document summarizes research using genomics to study Sclerotinia homoeocarpa, the causal agent of dollar spot disease in turfgrass. Key points include:
1) Developing a global sample of S. homoeocarpa populations to study genetic structure and relationship to fungicide resistance.
2) Sequencing the S. homoeocarpa genome and comparing it to related species, identifying mating type loci and developing microsatellite markers.
3) Characterizing the cytochrome P450 lanosterol 14α-demethylase (CYP51) gene which is the target of DMI fungicides and investigating mechanisms of fungicide resistance.
RNA is a single-stranded nucleic acid made up of repeating nucleotides where the sugar is ribose and uracil bonds with adenine instead of thymine. There are three main types of RNA: messenger RNA which carries genetic information from DNA in the nucleus to the cytoplasm, ribosomal RNA which composes ribosomes and helps produce enzymes for protein production, and transfer RNA which brings amino acids to ribosomes for protein assembly.
This document summarizes an E-RARE funded project called RNA-ALS that aims to investigate the role of microRNAs in amyotrophic lateral sclerosis (ALS). The project brings together researchers from Canada, France, and Israel with expertise in motor neuron biology, RNA metabolism, disease modeling and clinical neurology. The goal is to identify microRNAs that regulate neurofilament mRNAs important for motor neuron function and determine if altering their expression could help keep motor neurons connected and functional for longer. The collaborative nature of the project leverages different expertise, resources like tissue banks, and funding streams to help advance understanding and treatment of ALS.
RNA has the function of copying genetic information from DNA and transporting it to be used for protein synthesis. It differs from DNA in that RNA is single-stranded, contains the sugar ribose instead of deoxyribose, and contains the base uracil instead of thymine. The length of mRNA is much shorter than DNA as it only contains the code for a single protein, while DNA contains the full genome.
The objectives are an understanding of:
▶ How “function” in a genomic context can be defined. This is a
surprisingly philosophical problem.
▶ Some strategies for determining if a genomic region is likely to
be functional or not.
Objectives are an understanding of:
▶ Homology search tools
▶ E-values
▶ how BLAST works
▶ how profile HMMs (hmmer) work
▶ which is the right tool for different questions
Sequence alignment & comparative genomics
▶ What’s the difference between homology and analogy?
▶ How homology is estimated?
▶ Where do sequence similarity scores come from?
▶ What are the BLOSUM protein scoring matrices?
▶ How are insertions and deletions scored?
Genome annotation & comparative genomics
An appreciation for:
▶ An overview of some techniques and methods are used for
comparative genomics
▶ An understanding of genome annotation methods, particularly
the advantages and disadvantages of the different methods:
▶ Sequence analysis (ORF finding)
▶ Comparative sequence analysis
▶ Experimental methods (RNAseq & mass-spectroscopy)
Does RNA avoidance dictate protein expression level?Paul Gardner
Selection against mRNA:ncRNA interactions is observed across bacterial and archaeal genomes. Stochastic interactions between abundant ncRNAs and mRNAs may influence protein expression levels by inhibiting translation. Analysis of highly conserved genes in over 1,500 bacterial and 100 archaeal genomes provides evidence that mRNA and ncRNA sequences have evolved to avoid stable interactions, suggesting such interactions are selectively avoided to prevent inaccurate regulation of protein levels.
1) The document discusses machine learning and random forests, a popular machine learning method.
2) Random forests use decision trees built from random subsets of variables and data, and aggregate results to improve accuracy.
3) Examples using random forests to classify iris data are shown, including evaluating variable importance and classification accuracy.
This document discusses clustering and classification techniques for analyzing multivariate data. It begins by explaining that multivariate data involves collecting measurements of multiple features for each item. The document then outlines two main styles of analysis: 1) classification (supervised learning), which involves using known class labels to develop a procedure for classifying new items, and 2) clustering (unsupervised learning), which aims to find groups within the data without known class labels. Common techniques are discussed for both classification and clustering. Examples of applications are also provided.
- Monte Carlo methods use randomness to solve problems by running simulations of random samples and processes. This allows evaluating the significance of observed statistics.
- The modern version was developed in the 1940s for use in nuclear weapons projects. It involves generating random samples from an assumed model and comparing statistics to observed values.
- As an example, points in spatial data can be tested for random distribution by comparing properties of the real data to randomly generated point data, like minimum distances between points.
The document discusses resampling techniques called the jackknife and bootstrap. The jackknife involves deleting each observation from the dataset and recalculating statistics to estimate bias, standard error, and confidence intervals. The bootstrap resamples the dataset with replacement many times to estimate properties of statistics like the mean. Both techniques are used to assess reliability of estimates and account for uncertainty without assumptions about the population distribution. The document provides examples applying these methods to estimate standard deviation, confidence intervals for the median, and properties of regression.
This document contains the notes from a lecture on contingency tables and related statistical methods. It introduces contingency tables and how they can be used to analyze relationships between variables. It discusses Fisher's exact test and the chi-squared test for assessing independence in contingency tables. Examples are provided to demonstrate contingency table analysis and visualization of results. Additional resampling methods like bootstrapping and Monte Carlo simulation are also mentioned.
1. The document discusses regression analysis and linear regression models. It defines key terms used in regression including the famous five values, sums of squares, variance, covariance, correlation, slope, and intercept.
2. Methods for assessing the explanatory power and fit of regression models are presented, including the coefficient of determination (r2), standard errors for slope and intercept, and partitioning total sum of squares.
3. The importance of model checking is emphasized through assessing residuals, influence points, and considering alternative transformations to improve linearity.
This document provides an overview of linear regression analysis. It defines key terms like residuals, error sum of squares (SSE), and the "famous five" values needed to perform regression (sums of x, y, x-squared, y-squared, and x times y). Linear regression finds the line of best fit by minimizing SSE. The slope of the regression line is calculated as the covariance (SSxy) divided by variance (SSx). Regression guarantees to pass through the point of mean x and mean y.
Analysis of covariation and correlationPaul Gardner
The document discusses correlation and covariance in biology. It defines correlation as a relationship between two or more variables, while covariance is a measure of how two random variables vary together. The document provides examples of calculating correlation coefficients between variables using formulas for covariance, variance, and the correlation coefficient r. It warns that correlation does not necessarily imply causation and provides tips for interpreting correlated data.
This document discusses statistical tests for comparing two samples, specifically Fisher's F test, Student's t-test, and Wilcoxon rank-sum test. It provides an example comparing ozone concentrations between two market gardens (Gardens A and B) using these tests. The F test showed the variances between gardens were not significantly different. The t-test and Wilcoxon test both found the mean ozone concentration was significantly higher in Garden B than Garden A.
The document discusses analyzing single samples and making inferences about population parameters. It addresses three key questions for single samples: what is the mean, is the mean significantly different from expectations, and how certain we are of the mean estimate. Parametric or non-parametric methods must be used depending on whether the data meets assumptions like normality. The normal distribution and central limit theorem allow drawing inferences from sample means. Examples demonstrate calculating probabilities for different parts of the normal distribution using z-scores and the standard normal distribution.
The document discusses measures of centrality in biology. It lists some common measures of centrality used to describe datasets, including the mean. It then shows a graph with many data points distributed around a central mean.
The document provides an overview of key concepts for the BIOL209: Fundamentals course, including:
- Instructor-provided slides had no impact on attendance but adversely affected exam performance.
- Note-taking and self-testing improves learning. Some students may experience math anxiety or stereotype threat.
- The scientific method involves forming hypotheses and testing them through experimentation and analysis of data.
- Understanding statistical and experimental design principles is important for reproducing and interpreting results. Randomization, replication, and controlling for confounding variables strengthen experimental conclusions.
Random RNA interactions control protein expression in prokaryotesPaul Gardner
Presented at the NZSBMB/NZMS Conference in Christchurch 2016
CustomScience Award
A core assumption of gene expression analysis is that mRNA abundances broadly correlate with protein abundance, but these two can be imperfectly correlated. Some of the discrepancy can be accounted for by two important mRNA features: codon usage and mRNA secondary structure. We present a new global factor, called mRNA:ncRNA avoidance, and provide evidence that avoidance increases translational efficiency. We demonstrate a strong selection for the avoidance of stochastic mRNA:ncRNA interactions across prokaryotes, and that these have a greater impact on protein abundance than mRNA structure or codon usage. By generating synonymously variant green fluorescent protein (GFP) mRNAs with different potential for mRNA:ncRNA interactions, we demonstrate that GFP levels correlate well with interaction avoidance. Therefore, taking stochastic mRNA:ncRNA interactions into account enables precise modulation of protein abundance.
Avoidance of stochastic RNA interactions can be harnessed to control protein ...Paul Gardner
Presented at the Computational RNA Biology conference in Hinxton, 17-19th October, 2016.
https://coursesandconferences.wellcomegenomecampus.org/events/item.aspx?e=584
A meta-analysis of computational biology benchmarks reveals predictors of pro...Paul Gardner
This meta-analysis of computational biology benchmarks found no significant predictors of algorithm accuracy. The author analyzed 84 benchmarks comparing the accuracy and speed of 203 bioinformatics methods. Metrics like journal impact factor, author citation counts, and method age showed weak or no correlation with accuracy rank. While fast methods underwent more development iterations, speed was also not predictive of accuracy. The author concludes that factors like author/journal prestige do not guarantee software quality, and heuristic approaches can perform as well as mathematically rigorous ones. Overall, the study found no clear predictors of a method's programming accuracy based on existing benchmarks.
This document provides an introduction to non-coding RNAs (ncRNAs). It discusses how RNA was proposed to have come before DNA and proteins in the RNA world hypothesis. It notes that RNA can store genetic information like DNA and have catalytic abilities like proteins. The document outlines different types and functions of ncRNAs, including how some act as guides for chemical modifications, regulate gene expression as sponges for small RNAs or proteins, or sense environmental signals as riboswitches or thermosensors. Examples of conserved ncRNA families and mechanisms are briefly described.
This document provides an introduction to RNA-seq (RNA sequencing). It begins by defining RNA and describing Crick's central dogma of molecular biology. It then discusses the different types of RNA, including messenger RNA, ribosomal RNA, transfer RNA, and various non-coding RNAs. The document goes on to explain that RNA-seq is a method for determining the RNA sequences in a sample and its applications, such as genome annotation, quantification of gene expression, and studying RNA structure and interactions. Finally, it notes that RNA-seq has identified thousands of new RNAs.
This document discusses RNA bioinformatics and RNA structure prediction. It begins by asking why RNA is important and notes that non-coding RNAs are as numerous as protein-coding genes. It then discusses RNA structure, including primary, secondary and tertiary structure. Key methods for RNA structure prediction include Nussinov's algorithm, which maximizes base pairing, and Zuker's algorithm, which predicts minimum free energy structures using a nearest neighbor model. Comparative sequence analysis can also help predict RNA structure by identifying covarying base pairs that are evolutionarily conserved.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Does RNA avoidance dictate protein expression level?Paul Gardner
Selection against mRNA:ncRNA interactions is observed across bacterial and archaeal genomes. Stochastic interactions between abundant ncRNAs and mRNAs may influence protein expression levels by inhibiting translation. Analysis of highly conserved genes in over 1,500 bacterial and 100 archaeal genomes provides evidence that mRNA and ncRNA sequences have evolved to avoid stable interactions, suggesting such interactions are selectively avoided to prevent inaccurate regulation of protein levels.
1) The document discusses machine learning and random forests, a popular machine learning method.
2) Random forests use decision trees built from random subsets of variables and data, and aggregate results to improve accuracy.
3) Examples using random forests to classify iris data are shown, including evaluating variable importance and classification accuracy.
This document discusses clustering and classification techniques for analyzing multivariate data. It begins by explaining that multivariate data involves collecting measurements of multiple features for each item. The document then outlines two main styles of analysis: 1) classification (supervised learning), which involves using known class labels to develop a procedure for classifying new items, and 2) clustering (unsupervised learning), which aims to find groups within the data without known class labels. Common techniques are discussed for both classification and clustering. Examples of applications are also provided.
- Monte Carlo methods use randomness to solve problems by running simulations of random samples and processes. This allows evaluating the significance of observed statistics.
- The modern version was developed in the 1940s for use in nuclear weapons projects. It involves generating random samples from an assumed model and comparing statistics to observed values.
- As an example, points in spatial data can be tested for random distribution by comparing properties of the real data to randomly generated point data, like minimum distances between points.
The document discusses resampling techniques called the jackknife and bootstrap. The jackknife involves deleting each observation from the dataset and recalculating statistics to estimate bias, standard error, and confidence intervals. The bootstrap resamples the dataset with replacement many times to estimate properties of statistics like the mean. Both techniques are used to assess reliability of estimates and account for uncertainty without assumptions about the population distribution. The document provides examples applying these methods to estimate standard deviation, confidence intervals for the median, and properties of regression.
This document contains the notes from a lecture on contingency tables and related statistical methods. It introduces contingency tables and how they can be used to analyze relationships between variables. It discusses Fisher's exact test and the chi-squared test for assessing independence in contingency tables. Examples are provided to demonstrate contingency table analysis and visualization of results. Additional resampling methods like bootstrapping and Monte Carlo simulation are also mentioned.
1. The document discusses regression analysis and linear regression models. It defines key terms used in regression including the famous five values, sums of squares, variance, covariance, correlation, slope, and intercept.
2. Methods for assessing the explanatory power and fit of regression models are presented, including the coefficient of determination (r2), standard errors for slope and intercept, and partitioning total sum of squares.
3. The importance of model checking is emphasized through assessing residuals, influence points, and considering alternative transformations to improve linearity.
This document provides an overview of linear regression analysis. It defines key terms like residuals, error sum of squares (SSE), and the "famous five" values needed to perform regression (sums of x, y, x-squared, y-squared, and x times y). Linear regression finds the line of best fit by minimizing SSE. The slope of the regression line is calculated as the covariance (SSxy) divided by variance (SSx). Regression guarantees to pass through the point of mean x and mean y.
Analysis of covariation and correlationPaul Gardner
The document discusses correlation and covariance in biology. It defines correlation as a relationship between two or more variables, while covariance is a measure of how two random variables vary together. The document provides examples of calculating correlation coefficients between variables using formulas for covariance, variance, and the correlation coefficient r. It warns that correlation does not necessarily imply causation and provides tips for interpreting correlated data.
This document discusses statistical tests for comparing two samples, specifically Fisher's F test, Student's t-test, and Wilcoxon rank-sum test. It provides an example comparing ozone concentrations between two market gardens (Gardens A and B) using these tests. The F test showed the variances between gardens were not significantly different. The t-test and Wilcoxon test both found the mean ozone concentration was significantly higher in Garden B than Garden A.
The document discusses analyzing single samples and making inferences about population parameters. It addresses three key questions for single samples: what is the mean, is the mean significantly different from expectations, and how certain we are of the mean estimate. Parametric or non-parametric methods must be used depending on whether the data meets assumptions like normality. The normal distribution and central limit theorem allow drawing inferences from sample means. Examples demonstrate calculating probabilities for different parts of the normal distribution using z-scores and the standard normal distribution.
The document discusses measures of centrality in biology. It lists some common measures of centrality used to describe datasets, including the mean. It then shows a graph with many data points distributed around a central mean.
The document provides an overview of key concepts for the BIOL209: Fundamentals course, including:
- Instructor-provided slides had no impact on attendance but adversely affected exam performance.
- Note-taking and self-testing improves learning. Some students may experience math anxiety or stereotype threat.
- The scientific method involves forming hypotheses and testing them through experimentation and analysis of data.
- Understanding statistical and experimental design principles is important for reproducing and interpreting results. Randomization, replication, and controlling for confounding variables strengthen experimental conclusions.
Random RNA interactions control protein expression in prokaryotesPaul Gardner
Presented at the NZSBMB/NZMS Conference in Christchurch 2016
CustomScience Award
A core assumption of gene expression analysis is that mRNA abundances broadly correlate with protein abundance, but these two can be imperfectly correlated. Some of the discrepancy can be accounted for by two important mRNA features: codon usage and mRNA secondary structure. We present a new global factor, called mRNA:ncRNA avoidance, and provide evidence that avoidance increases translational efficiency. We demonstrate a strong selection for the avoidance of stochastic mRNA:ncRNA interactions across prokaryotes, and that these have a greater impact on protein abundance than mRNA structure or codon usage. By generating synonymously variant green fluorescent protein (GFP) mRNAs with different potential for mRNA:ncRNA interactions, we demonstrate that GFP levels correlate well with interaction avoidance. Therefore, taking stochastic mRNA:ncRNA interactions into account enables precise modulation of protein abundance.
Avoidance of stochastic RNA interactions can be harnessed to control protein ...Paul Gardner
Presented at the Computational RNA Biology conference in Hinxton, 17-19th October, 2016.
https://coursesandconferences.wellcomegenomecampus.org/events/item.aspx?e=584
A meta-analysis of computational biology benchmarks reveals predictors of pro...Paul Gardner
This meta-analysis of computational biology benchmarks found no significant predictors of algorithm accuracy. The author analyzed 84 benchmarks comparing the accuracy and speed of 203 bioinformatics methods. Metrics like journal impact factor, author citation counts, and method age showed weak or no correlation with accuracy rank. While fast methods underwent more development iterations, speed was also not predictive of accuracy. The author concludes that factors like author/journal prestige do not guarantee software quality, and heuristic approaches can perform as well as mathematically rigorous ones. Overall, the study found no clear predictors of a method's programming accuracy based on existing benchmarks.
This document provides an introduction to non-coding RNAs (ncRNAs). It discusses how RNA was proposed to have come before DNA and proteins in the RNA world hypothesis. It notes that RNA can store genetic information like DNA and have catalytic abilities like proteins. The document outlines different types and functions of ncRNAs, including how some act as guides for chemical modifications, regulate gene expression as sponges for small RNAs or proteins, or sense environmental signals as riboswitches or thermosensors. Examples of conserved ncRNA families and mechanisms are briefly described.
This document provides an introduction to RNA-seq (RNA sequencing). It begins by defining RNA and describing Crick's central dogma of molecular biology. It then discusses the different types of RNA, including messenger RNA, ribosomal RNA, transfer RNA, and various non-coding RNAs. The document goes on to explain that RNA-seq is a method for determining the RNA sequences in a sample and its applications, such as genome annotation, quantification of gene expression, and studying RNA structure and interactions. Finally, it notes that RNA-seq has identified thousands of new RNAs.
This document discusses RNA bioinformatics and RNA structure prediction. It begins by asking why RNA is important and notes that non-coding RNAs are as numerous as protein-coding genes. It then discusses RNA structure, including primary, secondary and tertiary structure. Key methods for RNA structure prediction include Nussinov's algorithm, which maximizes base pairing, and Zuker's algorithm, which predicts minimum free energy structures using a nearest neighbor model. Comparative sequence analysis can also help predict RNA structure by identifying covarying base pairs that are evolutionarily conserved.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
Vizbi2013: Visualising RNA
1. Visualising RNA
Paul Gardner
paul.gardner@canterbury.ac.nz
University of Canterbury, Christchurch,
New Zealand.
March 20, 2013
Paul Gardner Visualising RNA
2. Feel free to share
Feel free to tweet (@ppgardne), Google+, tumblr, ...
Slides are available from
http://www.slideshare.net/ppgardne/.
Paul Gardner Visualising RNA
3. What is an RNA?
A Primary Structure
5 10 15 20 25 30 35 40 45 50 55 60 65 70 75
Ψ Ψ
5’ GCGGAUUUAGCUCAGDDGGGAGAGCGCCAGACUGAAYA.CUGGAGGUCCUGUGT.CGAUCCACAGAAUUCGCACCA 3’
B Secondary Structure C Tertiary Structure
75
3’A C 5’
C T ΨC 3’
5’ G C A Loop
Acceptor C G
Stem G C 70
GU T ΨC
D Loop 5A U Acceptor
15 UA Loop D Loop
DGA U U A 65 60 Stem
D A C UA
C U C G 10 GACAC
G G CUGUG G
G G A A G C 25 C 50
G U T ΨC
.
20
C GAG G 55
C G 45
AU
G C 40
A 30
C Ψ . Variable
Anticodon U A Anticodon
Loop
Loop G
A A
.
Y Loop
35
Paul Gardner Visualising RNA
4. What is Rfam?
Sister database to Pfam
Aims to annotate all ncRNA families
Consortium headed by Alex Bateman (Wellcome Trust Sanger
Institute), Sean Eddy (Janelia, Howard Hughes), Sam
Griffiths-Jones (Manchester, BBSRC), Paul Gardner
(University of Canterbury, RSNZ)
Paul Gardner Visualising RNA
5. Rfam: families of ncRNAs
http://rfam.sanger.ac.uk
http://rfam.janelia.org
Paul Gardner Visualising RNA
6. Building an Rfam family
A structure from literature
Pollard KS, et al. (2006). An RNA gene expressed during cortical development evolved rapidly in humans. Nature.
Paul Gardner Visualising RNA
8. Building an Rfam family
And the Wikipedia entry
Paul Gardner Visualising RNA
9. Conflicting priorities
A Curator’s priorities A User’s priorities
1. New families 1. FTP (Bioinformaticians)
2. Accuracy of models 2. Website
3. Annotation 3. Visualization
4. Functional codebase 4. Number of families
5. Website 5. Accuracy of models
6. Visualization 6. Annotation
Image credits: www.conflictdynamics.org
Paul Gardner Visualising RNA
10. 2007: challenges
Quality Control
Re-write the website and add some bling
Update codebase
Export annotation to Wikipedia
User community input via RNA Biology
Paul Gardner Visualising RNA
11. Visualisation priorities
SCALE
Two to two million sequences, 30 to 3,000 nucleotides long, 0
to 1,000 basepairs.
AUTOMATED: thousands of families.
INFORMATIVE
Generates biologically relevant hypotheses
INCLUSIVE
Make the most of our fantastic Bioinformatic & Visualisation
community.
Paul Gardner Visualising RNA
12. Examples
Caveat: none of these images I am showing are final solutions,
everything can be improved upon.
Secondary Structure Alignment
Taxonomic Distribution Genomic contexts & Gene
Order
Paul Gardner Visualising RNA
13. RNA Secondary Structure
5’ 3’
UM
VH
DU
UA HWY A GU
AG CU
U U
G G
A a
G A
Y A
U S
C a
M G
A U
C R
U W
U B
C U
W M
U U
u A
G G
G U
U R
C M
C Y
G C
U M
GU R
UUCUGA g a
0 1
Sequence conservation
Gardner, Bateman & Poole (2010) SnoPatrol: how many snoRNA genes are there?. Journal of Biology.
Paul Gardner Visualising RNA
16. New Taxonomic distributions: RybB
Sunbursts: concentric “pie charts”, each external ring
contains the “children” nodes of the internal ring.
Paul Gardner Visualising RNA
17. Alignments
When we have sequenced everything, how is this view going
to look?
Paul Gardner Visualising RNA
18. Genomic contexts & Gene Order
How can we display comparative gene-order information in a
scalable fashion?
Think of hundreds to thousands of genomes, tens to hundreds
of features.
Barquist L, et al. (2013). A comparison of dense transposon insertion libraries in the Salmonella serovars Typhi and
Typhimurium. Nucleic Acids Research.
Paul Gardner Visualising RNA
19. Open problems
Evolution and RNA structure
Scalable, alignment visualisation (and editing)
As alignments grow, we need to be able to be able to partition,
compress and summarize groupings of sequences. 1,000s of
sequences from the same species is not interesting to view, nor
is a screen full of gaps.
Expression and conservation levels
Genomic context & gene-order
Paul Gardner Visualising RNA
20. Thanks!
The Rfam Consortium:
Alex Bateman, Sean
Eddy, Sam
Griffiths-Jones, Sarah
Burge, Eric Nawrocki,
John Tate, Rob Finn,
Jennifer Daub, Ruth Visualisation Tools:
Eberhardt Ivo Hofacker, Yann
Ponti, Jim Proctor,
Ian Holmes, Irmtraud
Meyer, Zasha
Weinberg and many
others.
PPG is supported by a Rutherford Discovery Fellowship from Government funding, administered by the Royal
Society of New Zealand.
Paul Gardner Visualising RNA