Archive for January, 2011

Spring 2011 Seminar Course Invites You!

Spring 2011 Upcoming Seminar

Spring 2011 Upcoming Seminar

The MIS Seminar Course is being scheduled with a diverse group of information systems practitioners and experts from industry and academia. This course is to familiarize you with contemporary challenges in information systems management. All of you are expected to listen attentively, think critically, and pose constructive questions about the presentations.

Seminar Schedule

1/31 (Mo) Prof. Abbe Mowshowitz


This talk is about the meaning, advantages and disadvantages of virtual organization. Computer-based information systems that can act as mediators and brokers support far reaching innovations in organization and management. Computers mediate between individuals by providing channels of communication in the form of messaging systems; they act as brokers in matching buyers and sellers, employees and employers, resources and work processes, etc. The explosive growth of electronic commerce on the Internet has made such functions commonplace. Computer-based mediation and brokerage lie at the heart of virtual organization, a powerful and flexible mode of organization founded on a separation of requirements from the ways in which requirements are met. Separating these elements allows managers to switch easily from one way of meeting a requirement (e.g., for an employee, a supplier, partner, etc.) to another. Used systematically, switching brings huge increases in productivity provided transaction costs are held in check. The price of this increased efficiency is that, practiced regularly, switching weakens personal loyalty and trust. We will examine socio-technical foundations of virtual organization, some applications of switching, and directions for further research.
2/7 (Mo) Mark J. Lee

Sr. Medical Grant Assoc., Cardiovascular Research Foundation

PADMA Development Genome-wide expression experiments, using microarray technology for instance, is guiding the direction of biological research and providing leads not available from analysis of a single or few genes. While these experiments generate enormous amounts of data, it is not always obvious early in the experimentation process, if a trend in gene expression either supports an existing paradigm or provides clues to an alternative or novel paradigm. In fact, discerning useful, relevant information from such voluminous data is challenging. To facilitate data management and synergize hypothesis building and testing, we designed the Pathogen Associated Drosophila MicroArray (PADMA) Database. PADMA provides easy retrieval and comparison of microarray results from various immunity-related experiments available in the public domain. PADMA also allows researchers to upload their unpublished/proprietary microarray-results confidentially, and compare it with datasets housed within PADMA. We tested PADMA by using a preliminary microarray dataset from parasitic wasp-infected wild-type Drosophila larvae host. We uncovered unexpected trends in the host gene expression, especially in key immunity pathway components and targets, which allowed us to reshape and revise our hypotheses. Thus, PADMA can be a useful and powerful tool in evaluating, revising, and refining scientific hypotheses, among many other functions. PADMA’s role as a Drosophila immunity-related gene expression information system will grow and expand as more datasets are added, and consequently, more researchers reap the benefits of a simple, yet powerful tool.
2/14 (Mo) Krish Ramalingram

Project Manager, CCNY Civil Enginnering

City-Wide Nitrogen Removal Processes The New York City Department of Environmental Protection has been engaged in a continuous process to develop a nitrogen removal program to reduce the nitrogen mass discharge from its waste water treatment plants, (WWTPs), from 49,158 kg/d to 20,105 kg/d by the year 2017 as recommended by the Long Island Sound Study. As part of the process, a comprehensive research effort was undertaken involving bench, pilot and full scale studies to identify the most effective way to upgrade and optimize the existing WPCPs. Primary and secondary sludge in all WWTPs in New York City are stabilized using the anaerobic digestion process. The stabilized sludge is then dewatered using centrifuges. The centrate produced during dewatering contains high concentration of ammonia but low concentration of biodegradable organic carbon as measured by the BOD test. In some WWTPs, the ammonia in the centrate may be as high as 25% to 40% of the ammonia in the influent wastewater to the treatment plant. The City has been actively developing a tool kit of options to treat this stream including adapting state of the art technologies such as the SHARON and ANAMMOX processes. This presentation will trace the major milestones and developments along the way and will present the current status of the program as it has evolved thru the years. Krish Ramalingam has been working with waste water treatment plants in New York City for the last several years and has extensive experience in the area of municipal wastewater treatment. He has been the Project Manager for the Applied Research Program for New York City Department of Environmental Protection (NYCDEP) for the past 15 years and is well versed with process control and operational issues at the WWTPs and with asset management and sustainable infrastructure problems for NYCDEP.
2/28 (Mo) Ariful H. Mondal

Analyst, MIS Division, NYPD

Role of Information Technology to Fight Crime The research of criminal activities and study of its uniqueness and inclinations in 21 century is impossible without utilizing the power of information technologies. New information technologies allow dynamically map out the activity of delinquent groups at the fundamentally new level hence, helps to prevent sophisticated delinquency. Knowing where about of an offender no longer requires hours of investigation but, merely few button clicks on a computer. Recidivist Tracking and Reporting Database (RTRD) is a Tracking database that is being developed by New York City Police Department (NYPD). Goal of RTRD is to keep track of various types of recidivist. Starting from their pedigree information, all their criminal activity Incarceration history warrant history and narcotics use is compiled in single place. Using Entity Analytics Solutions RTRD monitors the activity of delinquents in real time and by doing so RTRD notifies law enforcement officers, via email, of any new criminal activity of a known recidivist as soon the new data is entered into computer system. Law enforcement officers are also notified when an offender goes to prison, released from prison or moved from one prison to another prison. All these things are possible because todays information technology let us connect to different data source across different Agencies countywide. There are many other computer applications like RTRD in NYPD’s arsenal to fight different types of crime. Today’s world where criminals are committing sophisticated crime using many different means, it is vital to use the muscle of information technology to fight those crimes.
3/7 (Mo) Dr. Stewart Russell

Vascular Biology Department of Cardiology, NYU Medical Center

Medicine and Information Technology Health Information Technology (HIT) promises to improve the quality, efficiency and safety of healthcare. But the business model for HIT diverges sharply from the medical model of patient care. The deployment of a new implementation of a developed information technology in the hospital setting is typically accompanied by contractual arrangements developed by the business sector, designed to safeguard the vendor against liability, protect intellectual property, or to avoid destructive competition in the marketplace. These contractual goals address specific consequences of the use of HIT that impact the future health of the IT vendor, but they themselves may have unintended consequences that impact the health and safety of both patients and hospital administrative structure. In stark contrast to the competition in information systems development that defends the bottom line, health care systems have long been accustomed to relinquishing some profit for more advantageous patient outcomes. To take advantage of the full promise of HIT, development and deployment of information systems must be patient-outcome oriented, with a mechanism in place to address and mitigate unforeseen adverse consequences. I will review some relevant anecdotal cases, and present recent guidelines from two taskforces of the American Medical Informatics Association.
3/14 (Mo) Nelson Montesdeoca

Senior Consultant, CAST, Leader in Software Analysis and Management

Analysing Systems at Organizations This talk covers the evolution and evaluation of Information Systems in various technologies in the last twenty years. Our computation techniques have changed from batch process to on-line process, single thread to multi-thread, mainframe to client server, linear sequential programming to object oriented programming and hence to functional programming. How and what companies are doing to centralize process using code analyzer to unify business functions and procedures in order to improve Robustness, Security, Performance, Transferability and Changeability. These factors are directly tied with off-shore development and out sourcing of application in various industries. This talk will basically cover what has happened the last 20 years in the world of computer science and particularly to the programming and analysis of systems in industries, including the current needs to overcome the outsourcing factor that has been happening in the last 5 years.
3/21 (Mo) Dr. Daniel Lieuwen

Google Inc.

Google Sqaured Google Squared performs open domain information extraction at massive scale. This talk gives an overview of the techniques used and the user interface developed to help users navigate complex information about multiple comparable entities.
3/28 (Mo) Dr. Mark Arend

Project Manager, CCNY Optical Remote Sensing Lab., NOAA CREST

Information Technologies for Regional Atmospheric Monitoring There is a growing need for advanced information technologies in the environmental sciences. At the CCNY NOAA CREST Center and the Optical Remote Sensing Lab, a number of technologies are being explored to gather and process atmospheric information including sensor system networks, automated processes for gathering environmental information, embedded programming technologies for processing high data rate (GS/sec) remote sensing signals and high performance computer simulations for modeling dynamical systems. An overview of these technologies will be given and an emphasize will be placed on the importance and need for highly skilled computer scientists to solve some of the toughest problems being faced by people in the field of environmental sciences.
4/4 (Mo) Prof. Vasil Diyamandoglu

CCNY Civil Engineering Dept.

Reuse and Recycling of Materials
4/11 (Mo) Yegor Brynknov

Google Maps

Bringing good content to you on Google Maps: what challenges we face? There are at least three sources of problems we face: quality of data, understanding what the user actually wants and legal/political issues. I’ll talk about examples of all three kinds of challenges, and how they can or cannot be solved.
5/2 (Mo) Frederick Morris

Director, KPMG LLP

Limitations of software solutions in managing energy & infrastructure investments. This presentation examines certain issues faced by infrastructure investors in managing their portfolio of corporate investments in the Energy & Infrastructure sector. Because of the lack of flexibility of some widely used corporate software applications in allowing private equity investors to evaluate the multitude of strategic decisions they must make, these investors are increasingly requiring custom built financial models in excel to meet this need. The discussion will focus on the various types of business forecasting models required by private equity investor during the transaction and operational lifecycle of a typical portfolio company investment.
5/9 (Mo) Prof. Kevin Foster

CCNY Economics Dept.

Portfolio Theory and VaR Calculations applied to Public Finance US states face mounting deficits as the demand for programs such as unemployment insurance rises even while state tax revenue resources diminish. This study applies recent valuation methodologies developed for corporate debt obligations to municipal bonds. We propose a simple method for ameliorating some of the debt problem: states should begin to issue bonds with embedded macro options similar to catastrophe bonds, such as a bond with a principal amount that diminishes if a state encounters a macro benchmark such as negative job growth. This study estimates the likely interest rate premium that a state could expect to pay; this premium is of course likely to be related to the probability of the state hitting the benchmark, just as AAA companies pay a lower premium than BBB bond issuers, although volatility will also be important. The basic problem from the corporate bond literature is stated: given a bond with some likelihood of default (which can be viewed as embedded option), we want to find the rate of return that makes the bond equivalent to riskless US Treasuries. Municipal bonds typically have a lower interest rate to reflect their tax advantage however the riskiness of the issuer is also important. (Europe’s succession of Greek, Irish, Spanish, and Portuguese crises is apposite.) This information is suitable for estimating a Heath-Jarrow-Morton (1992) (HJM) discrete-time model or a continuous-time model such as the Collin-Dufresne, Goldstein, and Jones (2008) affine 3-factor term structure. The affine term structure is Markovian (recombining trees) while HJM is not (bushy trees). HJM has more free parameters so there is a tradeoff: HJM gives closer fit to current data but less out-of-sample power.
5/16 (Mo) Prof. Nelly Fazio


Cryptographic Content Protection From the perspective of Information Systems, Cryptography offers technologies to secure the gathering, processing, storing, distributing and use of information. In this talk, I will start by describing sample scenarios that exemplify the kind of thinking and techniques that are typical of the cryptographic approach. Next, I will discuss some of my research projects on digital content protection and their relevance to information systems.

Title is tentative until abstract is filled in. Abstract is filled in at least one week before the scheduled talk.

52 queries. 0.332 seconds.