Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Private Files

Thus with the fall of France began a unique alliance, intimate and unbusinesslike, between the three men. The letters and cables never got to the Dearborn official files. Sorenson and Ford kept them in private files. "Naturally," Dollfus wrote, "the advantages that we have are because we belong to the Ford family, but advantages which we cannot overestimate under the present circumstances."... [Pg.254]

The database section of MAECIS gives the user access to a large public database or allows him to create a private one. The public database is available for use by any authorized person in a read only mode. The actual maintenance of the data is done by our Technical Information staff who are responsible for the accuracy of the data. To allow a chemist to use the tools available in MAECIS for experimental purposes, a private system is provided. Each chemist can have one or more private files containing "experimental" molecules which can be manipulated in the same manner as those in the public database. [Pg.11]

The private database system in MAECIS, on the other hand, is much simpler. It stores only a number and name assigned by the user along with the associated chemical structure. There is no attempt to register the compounds. The owner of a private file has full read and write control over his data. [Pg.12]

Along with the public and private databases, there are special public and private files for storing substructures and structure backbones. Backbones are structure elements,, a benzene ring, used to construct more complex chemical structures. Like the public database, the public substructures and backbones can be changed only by authorized people, but the private files are totally controlled by the individual user. [Pg.12]

This last point is very important- People who work with computers day in and day out are in the habit of logging on, reading their mail, and doing their work. Scientists who use the computer only as an adjunct to their work need opportunity to stay familiar with it, such as regular use of electronic mail, or keeping private files up-to-date. For such casual users, the retraining curve must not be too steep, or they will be discouraged. Of course, this is where an online HELP system or pull-down windows can prove invaluable. [Pg.26]

A number of commercial systems that were available at the time were evaluated. Several failed to meet all criteria, due to a lack of U.S. installations and/or U.S.-based system support groups. Those that failed were DARC/Questel, Telesystemes, Paris, France the NIH-EPA Chemical Information System CHEMPIX, developed by Moreaux of Roussel-Uclaf and marketed by Chemical Information Management Inc. and SYNLIB, marketed by Smith Kline Beckman. The Upjohn COUSIN system, developed by Dr J Howe, was not commercially available. Chemical Abstracts Service (CAS) private file support was considered too expensive. Security with the CAS file was also a concern of MSDRL since it could not be brought in-house. [Pg.93]

Private files and see Nelson, Thery, Medina, et al., Venezuelan Crude Oils ... [Pg.90]

Integrated Systems. Until recently, each of the numerous databases and sources of information available to chemists and technologists had to be searched iadividually, and selected results either ptinted for file storage or downloaded to an ia-house or private computer system for easy future access. [Pg.125]

The initial recording of research ideas and data is most always private and takes the form of laboratory notebooks and database files. The first communication of research data and ideas may or may not be private. Oral and informal written communication occurs between research colleagues and teams. In the era of e-mail and listserves, these initial written communications may also be public in that they exist on the Internet. If there is a financial or proprietary interest in the research, the first communication may be in the form of a patent application. [Pg.765]

A survey on the use of antidepressive agents by an entire country s child and adolescent psychiatric services was recently conducted in Denmark (5 million inhabitants) by sending a questionnaire to all child and adolescent psychiatric departments and specialists with private practices. The response rate from all in- and outpatient clinics as well as from specialists with their own practice was 93.5%. Thirty-two departments and specialists received the survey and 30 were returned. Practitioners were asked to go through their files and report the number of children on medication and the indications for the treatment. Altogether, approximately 5000 children and adolescents were in psychiatric care (out of approximately 1 million children and adolescents in the age group 0-19 years). Of these, 400 (8%) were treated with an antidepressant on the date of the survey (February 8). [Pg.748]

Personal computers have introduced new ways to handle private bibliographic and text files. The most important factors to consider to achieve satisfactory results in building a bibliographic or text database are the (ype of information to be stored and Ihc needs of the user. Types of information include correspondence, research results and documentation, meeting notes, and bibliographic references. Needs of the user to be considered should include the potential number of users of the dalabase. restrictions tor the access and display of the information because of privacy or proprietary reasons, and the retrieval mechanisms (e g., by keyword, authority list, controlled vocabulary, author, title, date, or other document or information attributes). In addition, criteria for selecting and encoding information for the dalabase need to be established. [Pg.832]

The CheshireManager s constructor has no access modifier it cannot be instantiated outside its package. Its client can acquire it only through its factory object, which makes sure its instantiation is controlled. The constructor calls the private init() method. The init() method initializes a CheshireJNI object(cheshireJni), a CheshireUtil object(cheshireUtil), a CheshireReturn object(cheshireReturn), and a Cheshire id(cCatld). The init() method makes sure the creation of these objects is successful. Otherwise it throws exceptions. Lastly, the init() method loads the Cheshire scripts that it needs to do its works from the file system. At this point, the CheshireManager is ready to receive service calls. [Pg.177]

Every analytical laboratory, governmental, private, or university, has a standard set of procedures that provide both general and specific information to laboratory members. These fall into certain categories, including the laboratory s standard operating procedures (SOPs), quality assurance/quality control manuals (QA/QC manuals), procedural manuals, analytical method files, and laboratory information management systems... [Pg.23]

Imperial sovereigns. Tatyana shifted the mouse to call up the relevant file. Acquisition orders, along with directives for the procurement of a lot of other antiques and artefacts from museums and private collections. Plus, somewhere here - she frowned, switching windows and scrolling the list - a directive to secrete a half-coin on the persons specified. ... [Pg.124]

When Rudolf requested his landlord to withdraw the termination, threatening otherwise he would file a counter-complaint, the landlord threatened eviction. For private reasons, among them that his wife was expecting her second child, he submitted, found a new residence and... [Pg.416]

The physical property system is supported by a data file on both conventional compounds and on typical coal analyses and data. The data bank contains correlation constants for over 400 conventional compounds and extensive data for thirteen characteristic coals. A Data File Management system permits a user to modify the data files, to create his own private data files, and... [Pg.302]

I have reviewed what the FDA has made available through the Freedom of Information Act as its complete file on ECT. There are dozens of recommendations from state-funded and private patient rights and advocacy groups to ban ECT, and hundreds more from patients who feel that they have been permanently damaged by the treatment. It is astonishing that the FDA has ignored or rejected such an avalanche of official recommendations and personal reports and protests. [Pg.228]

The defense attorney was not permitted to question the crimes themselves and had to accept the views of his time as his own if he did not wish to fall out of favor with the Court and the public. This could even result in his being accused of sympathizing with his client s deeds and belonging to the latter s criminal clique, which earned him a trial of his own. As well, the defendants were rarely granted access to the case files and could not speak with their clients in private. [Pg.125]


See other pages where Private Files is mentioned: [Pg.105]    [Pg.262]    [Pg.104]    [Pg.105]    [Pg.400]    [Pg.105]    [Pg.262]    [Pg.104]    [Pg.105]    [Pg.400]    [Pg.131]    [Pg.1083]    [Pg.462]    [Pg.7]    [Pg.151]    [Pg.154]    [Pg.199]    [Pg.19]    [Pg.253]    [Pg.6]    [Pg.62]    [Pg.94]    [Pg.832]    [Pg.131]    [Pg.628]    [Pg.177]    [Pg.8]    [Pg.205]    [Pg.27]    [Pg.143]    [Pg.146]    [Pg.140]    [Pg.99]   


SEARCH



Private

Privatization

© 2024 chempedia.info