337 research outputs found

    Preliminary Explorations of an Occult Trickster Aesthetic

    Get PDF

    Sylvia Plath and Electracy

    Get PDF

    Epistemic Paternalism Online

    Get PDF
    New media (highly interactive digital technology for creating, sharing, and consuming information) affords users a great deal of control over their informational diets. As a result, many users of new media unwittingly encapsulate themselves in epistemic bubbles (epistemic structures, such as highly personalized news feeds, that leave relevant sources of information out (Nguyen forthcoming)). Epistemically paternalistic alterations to new media technologies could be made to pop at least some epistemic bubbles. We examine one such alteration that Facebook has made in an effort to fight fake news and conclude that it is morally permissible. We further argue that many epistemically paternalistic policies can (and should) be a perennial part of the internet information environment

    Algorithms and Autonomy

    Get PDF
    Algorithms influence every facet of modern life. However, delegating important decisions to machines gives rise to deep moral concerns about responsibility, transparency, fairness, and democracy. This book examines these concerns by connecting them to the human value of autonomy. This title is also available as Open Access on Cambridge Core

    What We Informationally Owe Each Other

    Get PDF
    ABSTRACT: One important criticism of algorithmic systems is that they lack transparency. Such systems can be opaque because they are complex, protected by patent or trade secret, or deliberately obscure. In the EU, there is a debate about whether the General Data Protection Regulation (GDPR) contains a “right to explanation,” and if so what such a right entails. Our task in this chapter is to address this informational component of algorithmic systems. We argue that information access is integral for respecting autonomy, and transparency policies should be tailored to advance autonomy. To make this argument we distinguish two facets of agency (i.e., capacity to act). The first is practical agency, or the ability to act effectively according to one’s values. The second is what we call cognitive agency, which is the ability to exercise what Pamela Hieronymi calls “evaluative control” (i.e., the ability to control our affective states, such as beliefs, desires, and attitudes). We argue that respecting autonomy requires providing persons sufficient information to exercise evaluative control and properly interpret the world and one’s place in it. We draw this distinction out by considering algorithmic systems used in background checks, and we apply the view to key cases involving risk assessment in criminal justice decisions and K-12 teacher evaluation. The link below is to an open access version of the chapter

    Flight Test Results of an Axisymmetric Channeled Center Body Supersonic Inlet at Off-Design Conditions

    Get PDF
    Flight-testing of a channeled center-body axisymmetric supersonic inlet design concept was conducted at the National Aeronautics and Space Administration (NASA) Dryden Flight Research Center in collaboration with the NASA Glenn Research Center (Cleveland, Ohio) and TechLand Research, Inc. (North Olmsted, Ohio). This testing utilized the Propulsion Flight Test Fixture, flown on the NASA F-15B research test bed airplane (NASA tail number 836) at local experiment Mach numbers up to 1.50. The translating channeled center-body inlet was designed by TechLand Research, Inc. (U.S. Patent No. 6,276,632 B1) to allow for a novel method of off-design flow matching, with original test planning conducted under a NASA Small Business Innovative Research study. Data were collected in flight at various off-design Mach numbers for fixed-geometry representations of both the channeled center-body design and an equivalent area smooth center-body design for direct comparison of total pressure recovery and limited distortion measurements

    Estimates of the Elasticities of Substitution Between Imports and Home Goods for the United States: Reply

    Full text link
    Following the two-stage budgeting approach in Deaton and Muellbauer (1980) and Deardorff and Stern (1986), the econometric estimates of import-demand elasticities in Shiells, Stern, and Deardorff (1986) were done holding within-group expenditure constant. Based on this assu;mption, the correct way to compute the rate at which imports displace the competing home good following the imposition of a tariff is to infer the cross-price elasticity of home-good demand from estimated import-demand elasticities using the group budget constraint. Employing this method, we show below that the increase in spending on home goods implied by our estimates must be less than the dollor-for-dollar assumption would imply. Rousslang's comparison of our estimates with the dollor-for dollar approach is based on the mistaken assumption that our estimates were obtained holding total expenditure, rather than within-group expenditure, constant.Research Seminar in International Economics, Department of Economics, University of Michiganhttp://deepblue.lib.umich.edu/bitstream/2027.42/100966/1/ECON409.pd

    Being Green and Social Responsibility: Basic Concepts and Multiple Case Studies in Business Excellence

    Get PDF
    Through a qualitative business case approach, three major manufacturing firms in Pittsburgh, PA were reviewed for their eco-friendly sustainability strategic initiatives and products/services. Undoubtedly, use of green best practices are value adding steps for a company may be initially difficult to justify to spend the time and resources developing such a process. This is especially true when other core business needs are present, such as driving revenue, product development and meeting governmental or consumer expectations. However, green and sustainability initiatives may not be currently dictated needs, but many companies feel strongly that charting such a course would be to their stakeholders’ mutual advantage. As resources are being consumed more rapidly, it is logical to enact steps to ensure the sustainability of such scare resources. The added benefit of lower input needs greatly improves the companies’ stance in their market while also adding to the firms’ overall profitability

    Bovine herpesvirus regulatory proteins, bICP0 and VP16, are readily detected in trigeminal ganglionic neurons expressing the glucocorticoid receptor during the early stages of reactivation from latency.

    Get PDF
    Bovine herpesvirus 1 (BHV-1) establishes a life-long latent infection in sensory neurons following acute infection. Increased corticosteroid levels, due to stress, increases the incidence of reactivation from latency. Within minutes, corticosteroids activate the glucocorticoid receptor and transcription of promoters containing a glucocorticoid receptor element. A single intravenous injection of the synthetic corticosteroid dexamethasone consistently induces reactivation from latency in calves. Lytic cycle viral gene expression is detected within 6 hours after dexamethasone treatment of calves latently infected with BHV-1. Cellular transcription factors are induced by dexamethasone in trigeminal ganglionic neurons within 1.5 hours after dexamethasone treatment suggesting they promote viral gene expression during the early phases of reactivation from latency, which we operationally defined as the escape from latency. In this study, immunohistochemistry was utilized to examine viral protein expression during the escape from latency. Within 1.5 hours after dexamethasone treatment, bICP0 and a late protein (VP16) were consistently detected in a subset of trigeminal ganglionic neurons. Most neurons expressing bICP0 also expressed VP16. Additional studies revealed that neurons expressing the glucocorticoid receptor also expressed bICP0 or VP16 at 1.5 hours after dexamethasone treatment. Two other late proteins, glycoprotein C and D, were not detected until 6 hours after dexamethasone treatment and were detected in only a few neurons. These studies provide evidence that VP16 and the promiscuous viral trans-activator (bICP0) are expressed during the escape from latency suggesting they promote the production of infectious virus in a small subset of latently infected neurons

    Premature Expression of the Latency-Related RNA Encoded by Bovine Herpesvirus Type 1 Correlates With Higher Levels of Beta Interferon RNA Expression in Productively Infected Cells

    Get PDF
    Bovine herpesvirus type 1 (BHV-1) is an important pathogen that can initiate bovine respiratory disease complex. Like other members of the subfamily Alphaherpesvirinae, BHV-1 establishes latency in sensory neurons. The latency-related (LR) gene expresses a family of alternatively spliced transcripts in infected sensory neurons that have the potential to encode several LR proteins. An LR mutant virus that contains three stop codons near the 5’ terminus of the first open reading frame in the LR gene does not express two LR proteins or reactivate from latency. In addition, the LR mutant virus induces higher levels of apoptosis in trigeminal ganglionic neurons and grows less efficiently in certain tissues of infected calves. In spite of the reduced pathogenesis, the LR mutant virus, wild-type BHV-1, and the LR rescued virus exhibit identical growth properties in cultured bovine cells. In this study, we demonstrated that during early phases of productive infection the LR mutant virus expressed higher levels of LR-RNA relative to the LR rescued virus or wt BHV-1. Bovine kidney cells infected with the LR mutant virus also induced higher levels of beta interferon RNA and interferon response genes. These results suggest that inappropriate expression of LR-RNA, in the absence of LR protein expression, may influence the latency-reactivation cycle and pathogenic potential of BHV-1
    • …
    corecore