37 research outputs found

    Improving Student Journal Visibility via the Directory of Open Access Journals

    Get PDF
    In this interview with Judith Barnsby, Directory of Open Access Journals (DOAJ), we look at how student-run journals could enhance their visibility by joining DOAJ. We highlight the general and student journal-specific application requirements for inclusion in DOAJ, known challenges with the application process, and recommendations for student journals that want to apply. The interview is conducted by Mariya Maistrovskaya, University of Toronto Libraries, the Interviewer

    An Atypical E3 Ligase Module in UBR4 Mediates Destabilization of N-degron Substrates

    Get PDF
    UBR4 is an E3 ligase (E3) of the N-degron pathway and is involved in neurodevelopment, age-associated muscular atrophy and cancer progression. The location and mechanistic classification of the E3 module within the 600 kDa protein UBR4 remains unknown. Herein, we identify and characterize, at a biochemical and structural level, a distinct E3 module within human UBR4 consisting of a novel “hemiRING” zinc finger, a helical-rich UBR Zinc-finger Interacting (UZI) subdomain, and a predicted backside interacting N-terminal helix. A structure of an E2 conjugating enzyme (E2)-E3 complex provides atomic level insight into the exquisite specificity of the hemiRING towards the E2s UBE2A/B. The UZI subdomain can be considered a component of the E3 module as it has a modest activating effect on the ubiquitin loaded E2 (E2∼Ub), which is complemented by the intrinsically high lysine reactivity of UBE2A. These findings reveal the mechanistic underpinnings of a neuronal N-degron E3 ligase, its specific recruitment of UBE2A, and highlight the underappreciated architectural diversity of cross-brace domains associated with ubiquitin E3 activity.<br/

    UBE2A and UBE2B are recruited by an atypical E3 ligase module in UBR4

    Get PDF
    UBR4 is a 574 kDa E3 ligase (E3) of the N-degron pathway with roles in neurodevelopment, age-associated muscular atrophy and cancer. The catalytic module that carries out ubiquitin (Ub) transfer remains unknown. Here we identify and characterize a distinct E3 module within human UBR4 consisting of a ‘hemiRING’ zinc finger, a helical-rich UBR zinc-finger interacting (UZI) subdomain, and an N-terminal region that can serve as an affinity factor for the E2 conjugating enzyme (E2). The structure of an E2–E3 complex provides atomic-level insight into the specificity determinants of the hemiRING toward the cognate E2s UBE2A/UBE2B. Via an allosteric mechanism, the UZI subdomain modestly activates the Ub-loaded E2 (E2∼Ub). We propose attenuated activation is complemented by the intrinsically high lysine reactivity of UBE2A, and their cooperation imparts a reactivity profile important for substrate specificity and optimal degradation kinetics. These findings reveal the mechanistic underpinnings of a neuronal N-degron E3, its specific recruitment of UBE2A, and highlight the underappreciated architectural diversity of cross-brace domains with Ub E3 activity.</p

    The Emergence and Development of Association Football: Influential Sociocultural Factors in Victorian Birmingham

    Get PDF
    This article explores the interdependent, complex sociocultural factors that facilitated the emergence and diffusion of football in Birmingham. The focus is the development of football in the city, against the backdrop of the numerous social changes in Victorian Birmingham. The aim is to fill a gap in the existing literature which seemingly overlooked Birmingham as a significant footballing centre, and the ‘ordinary and everyday’ aspects of the game’s early progression. Among other aspects, particular heed is paid to the working classes’ involvement in football, as previous literature has often focused on the middle classes and their influence on and participation in organized sport. As the agency of the working classes along with their mass participation and central role in the game’s development is unfolded, it is argued that far from being passive cultural beings, the working classes, from the beginnings, actively negotiated the development of their own emergent football culture

    Commentary on the UN GGE\u27s 2015 Cyber Norm Proposals

    No full text
    This publication contains a commentary on the voluntary, non-binding norms of responsible State behaviour from the 2015 report of the United Nations Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security. In an open call for comments, scholars, experts and enthusiasts were invited to submit recommendations, comments and guidance for understanding and interpreting the recommendations of the United Nations GGE. Many scholars and experts responded to this call and were involved in drafting this synthesis of views and perspectives.https://digitalcommons.usmalibrary.org/aci_books/1009/thumbnail.jp

    Insecure at any bit rate: why Ralph Nader is the true OG of the software design industry

    No full text
    The software design industry lacks standards for both code quality and security; as a result, code vulnerability at the time of a product’s release is often compromised at subsequent, critical junctures in its consumer-use phase. Exacerbating this problem is the fact that developers typically waive all liability for code errors and place the burden of security on unqualified, non-expert users. Although certain legal remedies exist in the US – often in the form of US Federal Trade Commission (FTC) enforcement actions classifying inadequate data security as an ‘unfair trade practice’ – they are limited in nature, infrequently utilised and are generally incapable of meaningfully protecting consumers. History has shown that other major technological advances, including developments in the aircraft and automotive industries, have occurred in similar unregulated manners, often resulting in negative and potentially dangerous outcomes for the public. To ensure the security of today’s software environment, change from within the industry – not unlike the Ralph Nader-inspired industry-wide automotive safety improvements in the 1970s – is necessary to create a shared liability model for software which protects users from poor development practices. Such a model, when coupled with certification standards and education, will result in a more secure software design industry

    Give Them an Inch, They\u27ll Take a Terabyte: How States May Interpret Tallinn Manual 2.0\u27s International Human Rights Law Chapter

    No full text
    The recent publication of Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, the “follow-on initiative [expanding Tallinn Manual 1.0’s] scope to include the public international law governing cyber operations during peacetime,”2 is a truly remarkable accomplishment in both cyber and international law. Unquestionably, it is the most comprehensive work ever written to describe how international law regulates cyber activities that take place below the use-of-force threshold. As this Article underscores, the significance of the Manual’s publication is further enhanced by its Chapter seeking to “articulate[] Rules indicating the scope of application and content of international human rights law [(IHRL)] bearing on cyber activities.
    corecore