proprietary information
Recently Published Documents


TOTAL DOCUMENTS

112
(FIVE YEARS 18)

H-INDEX

15
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Marina Morgan ◽  
Naomi Eichenlaub

The objective of this poster is to provide an overview of a number of existing open source and proprietary information management systems for digital assets. We hope that this poster will assist libraries and other institutions in their process of researching and decision-making when considering implementing a management system for their digital collections.


2021 ◽  
Author(s):  
Marina Morgan ◽  
Naomi Eichenlaub

The objective of this poster is to provide an overview of a number of existing open source and proprietary information management systems for digital assets. We hope that this poster will assist libraries and other institutions in their process of researching and decision-making when considering implementing a management system for their digital collections.


2021 ◽  
Vol 73 (05) ◽  
pp. 36-38
Author(s):  
Trent Jacobs

Devon Energy considers its development of a new completions technology called Sealed Wellbore Pressure Monitoring (SWPM) to be one of the shale sector’s biggest breakthroughs in subsurface engineering. The approach to fracturing diagnostics represents a class of next-generation tools designed to make on-the-fly stimulation designs more practical than ever. But the innovation has done something else, too. It has raised old questions within a relatively new sector about the role of intellectual property (IP) protection. When SWPM was introduced to petrotechnicals outside of Devon, some initially questioned how or why the technique needed to be patented at all. The ingenuity behind SWPM could be boiled down to solving a math problem: How much fluid is pumped during the hydraulic fracturing treatment of one well before it travels across a known distance and applies pressure to the unperforated casing of a neighboring shut-in well? The ability to answer this question rapidly and with surety holds great value for any developer of multiwell pads. But, as some wondered, was this simply a formula that could be repeated and used as freely as a decade’s old equation found in a textbook? Was Devon being too protective over its discovery? Or was it simply being prudent? Earlier this year, Devon was granted a US patent for SWPM, the end of a process that began on a well pad in 2017. In the meantime, the company shared rights with other operators for field trials before striking a deal last summer with software developer Well Data Labs to market SWPM to the rest of the unconventional business. The drivers behind Devon’s IP strategy, what it learned while patenting SWPM, and what it hopes others in this space will take away from that experience are shared here by Chad Holeman, corporate counsel at Devon, and Kyle Haustveit, a co-inventor of SWPM and a subsurface engineering manager at Devon. JPT: Can you begin by explaining your philosophy around IP protection and how SWPM reflects that? Chad Holeman (CH): We talk about confidential and proprietary information with some degree of frequency. As an organization, I think that we’re further along on the spectrum of maturation as it relates to understanding what that means and safeguarding that information to the very best of our ability. One key is that you need to be able to differentiate trade secrets, or confidential proprietary information that you want to keep close to the vest, from the inventive concepts that you want to protect and can also commercialize, potentially monetize, or gain some other type of competitive advantage from. Inventive concepts such as SWPM fit that mold. Kyle Haustveit (KH): I think the concept of leaving value on the table is one of the biggest reasons we do this. A lot of operators have made massive investments into the digital revolution and multimillion-dollar investments into diagnostic programs to understand how we are breaking and draining the rock with our stimulations. Through all that have come a lot of new ideas.


Author(s):  
Deanna D. Caputo

Violence threat and insider threat assessment rely on successfully identifying, interpreting, and responding to concerning or malicious behaviors before egregious harm is done. Both types of threats benefit from multidisciplinary teams of experts skillfully putting together data points before physical, emotional, financial, reputational, or informational harm occurs. Usually the identified character (e.g., decision-making, interpersonal style, work style), stressors, and concerning behaviors demonstrated do not clearly indicate whether a person will assault coworkers, steal classified/proprietary information, sabotage systems, or proceed normally as a responsible employee. Empirically based risk factors and threat indicators provide opportunities to evaluate potential threats more appropriately earlier in the assessment process. This chapter is an overview of insider threat definitions and programs, what it takes to become an insider threat, and how research psychologists bring rigorous science to insider threat detection, providing a solid understanding of what is known and not known about nonviolent insider threats.


Geophysics ◽  
2021 ◽  
pp. 1-47
Author(s):  
Sergey Alyaev ◽  
Mostafa Shahriari ◽  
David Pardo ◽  
Ángel Javier Omella ◽  
David Selvåg Larsen ◽  
...  

Modern geosteering is heavily dependent on real-time interpretation of deep electromagnetic (EM) measurements. We present a methodology to construct a deep neural network (DNN) model trained to reproduce a full set of extra-deep EM logs consisting of 22 measurements per logging position. The model is trained in a 1D layered environment consisting of up to seven layers with different resistivity values.A commercial simulator provided by a tool vendor is utilized to generate a training dataset.The dataset size is limited because the simulator provided by the vendor is optimized for sequential execution.Therefore,we design a training dataset that embracesthe geological rules and geosteering specifics supported by the forward model. We use this dataset to produce an EM simulator based on a DNN without access to the proprietary information about the EM tool configuration or the original simulator source code.Despite employing a relatively small training set size, the resulting DNN forward model is quite accurate for the considered examples: a multi-layer synthetic case and a section of a published historical operation from the Goliat Field.The observed average evaluation time of 0.15 milliseconds per logging position makes it also suitable for future use as part of evaluation-hungry statistical and/or Monte-Carlo inversion algorithms within geosteering workflows.


TEM Journal ◽  
2021 ◽  
pp. 351-357
Author(s):  
George Pashev ◽  
Silvia Gaftandzhieva

The basic workflows in the field of Criminal Investigations in Bulgaria which are incorporated in a proprietary information system are presented in this paper. Leading role in the investigation is the prosecutor, but in other countries, this role is more or less consistent with the role of the investigator. EMS monitors the operation of the process and suggests gaps in the work of the officials.


2021 ◽  
pp. 002234332096454
Author(s):  
William Akoto

A state’s decision to engage in cyber operations has important implications for its trade. Successful cyber espionage could yield valuable trade secrets that could boost domestic production and spur economic growth. On the other hand, uncovered cyber operations could invite devastating sanctions that retard economic development. In spite of this, the nexus between trade and cyber attacks has received little attention in the literature. In this article, I explore how a state’s trade relations affect its propensity to engage in cyber attacks. I develop a theoretical framework that links the composition of a state’s trade to its deficit in proprietary information relative to other states. I decompose trade into its inter- and intra-industry components and show that while inter-industry trade is associated with higher incidence of state-sponsored cyber attacks, intra-industry trade has the opposite effect. I also show that these effects are non-monotonic, varying by the share of inter- or intra-industry trade in total trade. The results also show that states that have a heavy concentration of high-tech industries such as aerospace, computers, and pharmaceuticals have a higher propensity to engage in cyber espionage operations. These results are robust to a variety of controls and specifications.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
HyunJun Na

PurposeThis study explores how the firm’s proprietary information has an impact on the bank loan contracts. It explains the propensity of using the competitive bid option (CBO) in the syndicate loans to solicit the best bid for innovative firms and how it changes based on industry competition and the degree of innovations. This research also examines how the interstate banking deregulation (Interstate Banking and Branching Efficiency Act) in 1994 affected the private loan contracts for innovative borrowers.Design/methodology/approachThe study uses various econometric analyses. First, it uses the propensity score matching analysis to see the impact of patents on pricing terms. Second, it uses the two-stage least square (2SLS) analysis by implementing the litigation and non-NYSE variables. Finally, it studies the impact of the policy change of the Interstate Banking and Branching Efficiency Act of 1994 on the bank loan contracts.FindingsFirms with more proprietary information pays more annual facility fees but less other fees. The patents are the primary determinants of the usage of CBO in the syndicate loans to solicit the best bid. While innovative firms can have better contract conditions by the CBO, firms with more proprietary information will less likely to use the CBO option to minimize the leakage of private information and the severe monitoring from the banks. Finally, more proprietary information lowered the loan spread for firms dependent on the external capital after the interstate banking deregulation.Originality/valueThe findings of this research will help senior executives with responsibility for financing their innovative projects. In addition, these findings should prove helpful for the lawmakers to boost economies.


Sign in / Sign up

Export Citation Format

Share Document