Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text.)
(Updated article of the week text)
(48 intermediate revisions by the same user not shown)
Line 1: Line 1:
<!-- <div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig4 SprengholzQuantMethSci2018 14-2.png|240px]]</div> -->
'''"[[Journal:Defending our public biological databases as a global critical infrastructure|Defending our public biological databases as a global critical infrastructure]]"'''
'''"[[Journal:Eleven quick tips for architecting biomedical informatics workflows with cloud computing|Eleven quick tips for architecting biomedical informatics workflows with cloud computing]]"'''


[[Cloud computing]] has revolutionized the development and operations of hardware and software across diverse technological arenas, yet academic biomedical research has lagged behind despite the numerous and weighty advantages that cloud computing offers. Biomedical researchers who embrace cloud computing can reap rewards in cost reduction, decreased development and maintenance workload, increased reproducibility, ease of sharing data and software, enhanced security, horizontal and vertical scalability, high availability, a thriving technology partner ecosystem, and much more. Despite these advantages that cloud-based [[workflow]]s offer, the majority of scientific software developed in academia does not utilize cloud computing and must be migrated to the cloud by the user. In this article, we present 11 quick tips for designing biomedical informatics workflows on compute clouds, distilling knowledge gained from experience developing, operating, maintaining, and distributing software and virtualized appliances on the world’s largest cloud. Researchers who follow these tips stand to benefit immediately by migrating their workflows to cloud computing and embracing the paradigm of abstraction. ('''[[Journal:Eleven quick tips for architecting biomedical informatics workflows with cloud computing|Full article...]]''')<br />
Progress in modern biology is being driven, in part, by the large amounts of freely available data in public resources such as the International Nucleotide Sequence Database Collaboration (INSDC), the world's primary database of biological sequence (and related) [[information]]. INSDC and similar databases have dramatically increased the pace of fundamental biological discovery and enabled a host of innovative therapeutic, diagnostic, and forensic applications. However, as high-value, openly shared resources with a high degree of assumed trust, these repositories share compelling similarities to the early days of the internet. Consequently, as public biological databases continue to increase in size and importance, we expect that they will face the same threats as undefended cyberspace. There is a unique opportunity, before a significant breach and loss of trust occurs, to ensure they evolve with quality and security as a design philosophy rather than costly “retrofitted” mitigations. This perspective article surveys some potential quality assurance and security weaknesses in existing open [[Genomics|genomic]] and [[Proteomics|proteomic]] repositories, describes methods to mitigate the likelihood of both intentional and unintentional errors, and offers recommendations for risk mitigation based on lessons learned from [[cybersecurity]]. ('''[[Journal:Defending our public biological databases as a global critical infrastructure|Full article...]]''')<br />
<br />
<br />
''Recently featured'':
''Recently featured'':
: ▪ [[Journal:Welcome to Jupyter: Improving collaboration and reproduction in psychological research by using a notebook system|Welcome to Jupyter: Improving collaboration and reproduction in psychological research by using a notebook system]]
: ▪ [[Journal:Determining the hospital information system (HIS) success rate: Development of a new instrument and case study|Determining the hospital information system (HIS) success rate: Development of a new instrument and case study]]
: ▪ [[Journal:Developing a file system structure to solve healthcare big data storage and archiving problems using a distributed file system|Developing a file system structure to solve healthcare big data storage and archiving problems using a distributed file system]]
: ▪ [[Journal:Smart information systems in cybersecurity: An ethical analysis|Smart information systems in cybersecurity: An ethical analysis]]
: ▪ [[Journal:DataCare: Big data analytics solution for intelligent healthcare management|DataCare: Big data analytics solution for intelligent healthcare management]]
: ▪ [[Journal:Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome|Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome]]

Revision as of 15:16, 23 July 2019

"Defending our public biological databases as a global critical infrastructure"

Progress in modern biology is being driven, in part, by the large amounts of freely available data in public resources such as the International Nucleotide Sequence Database Collaboration (INSDC), the world's primary database of biological sequence (and related) information. INSDC and similar databases have dramatically increased the pace of fundamental biological discovery and enabled a host of innovative therapeutic, diagnostic, and forensic applications. However, as high-value, openly shared resources with a high degree of assumed trust, these repositories share compelling similarities to the early days of the internet. Consequently, as public biological databases continue to increase in size and importance, we expect that they will face the same threats as undefended cyberspace. There is a unique opportunity, before a significant breach and loss of trust occurs, to ensure they evolve with quality and security as a design philosophy rather than costly “retrofitted” mitigations. This perspective article surveys some potential quality assurance and security weaknesses in existing open genomic and proteomic repositories, describes methods to mitigate the likelihood of both intentional and unintentional errors, and offers recommendations for risk mitigation based on lessons learned from cybersecurity. (Full article...)

Recently featured:

Determining the hospital information system (HIS) success rate: Development of a new instrument and case study
Smart information systems in cybersecurity: An ethical analysis
Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome