514 research outputs found

    Class of {varphi}X174 Mutants Relatively Deficient in Synthesis of Viral RNA

    Get PDF
    Nonpermissive cells infected with {varphi}X174 gene D amber mutants synthesized some sixfold less viral RNA than permissive cells. The decrease was unaffected by increasing the multiplicity of infection and was a consequence of an overall decrease in all viral RNA species. It is suggested that the gene D product may function in replicative form DNA unwinding to expose the template for transcription

    Crossing Delancey

    Get PDF
    When Isabelle Grossman\u27s grandmother hires a matchmaker to find Isabelle a husband, Isabelle comes face-to-face with a part of her Jewish heritage that she would rather leave behind. As a modern New Yorker, she believes that progress and the old world cannot exist together... that is, until a pickle man teaches her otherwise. This play has all the elements of a great romantic comedy: a pretty girl, a suitor or two, a colorful cast of characters, and a very happy ending. Written by Susan Sandler and first performed in April 1985, Crossing Delancey challenges viewers not to leave their heritage behind while reaching toward the future.https://digitalcommons.cedarville.edu/theatre_productions/1020/thumbnail.jp

    You Can\u27t Take It with You

    Get PDF
    You Can\u27t Take It With You opened in New York in December of 1936 to instant critical and popular acclaim. Awarded the Pulitzer Prize in 1936, the comedy went on to run 837 performances on Broadway. The 1938 film version by Columbia Pictures won an Academy Award for best picture. This classic American comedy is the story of Alice Sycamore and Tony Kirby who find their romance complicated by the conflict between the eccentricities of the Vanderhof family and the strictly conservative Kirbys.https://digitalcommons.cedarville.edu/theatre_productions/1014/thumbnail.jp

    The Star-Spangled Girl

    Get PDF
    In this uproarious comedy, we are introduced to Andy and Norman, producers of a protest magazine. Sophie, an Olympic swimmer and all-American girl who just moved into the apartment next door, pays the young men a good-neighbor visit. From that moment on, Norman is hopelessly smitten. His love for Sophie becomes an obsession, and he literally drives her crazy by ignoring her rejection and constantly interfering in her life. Meanwhile, Andy is preoccupied with fending off creditors and charming the landlady to avoid being evicted for not paying the rent. The situation is eventually resolved through a series of hilarious happenings set forth with the masterly skill and inventiveness that are the hallmarks of Neil Simon.https://digitalcommons.cedarville.edu/theatre_productions/1011/thumbnail.jp

    First Constraints on Source Counts at 350 Microns

    Full text link
    We have imaged a \sim6 arcminute2^2 region in the Bo\"otes Deep Field using the 350 μ\mum-optimised second generation Submillimeter High Angular Resolution Camera (SHARC II), achieving a peak 1σ\sigma sensitivity of \sim5 mJy. We detect three sources above 3σ\sigma, and determine a spurious source detection rate of 1.09 in our maps. In the absence of 5σ5\sigma detections, we rely on deep 24 μ\mum and 20 cm imaging to deduce which sources are most likely to be genuine, giving two real sources. From this we derive an integral source count of 0.840.61+1.39^{+1.39}_{-0.61} sources arcmin2^{-2} at S>13S>13 mJy, which is consistent with 350 μ\mum source count models that have an IR-luminous galaxy population evolving with redshift. We use these constraints to consider the future for ground-based short-submillimetre surveys.Comment: accepted for publication in The Astrophysical Journa

    Moyo Vol. VII N 2

    Get PDF
    Durica, Paul. Editor\u27s Letter . 4. Spears, Amy L. As If Lipstick Was A Sign of My Declining Mind (How ChickRock Happened) . 5. Frey, Randall. Portrait of the Cartoonist as a Young Man . 6. Clements, Nina. Grease Me Up: One Woman\u27s Descent into the Depths of Pittsburgh Dinner Culture . 7. Levine, Robert. Under the Needle\u27s Point (The Healing Power of Acupuncture) . 8. Durica, Paul. The Glory that was/is Greek: Denison Three Years After the Decision . 12. Lamont, Jean. Smokin\u27 Joe Lights Up . 13. Durica, Paul. Ode on a Second Grecian Turn: An Interview with President Michele T. Myers . 14. Fisher, Dan. Lenane on the Social Scene . 19. Combe, Kirk. Intellectual Bio-Diversity: A Faculty Perspective on the Greek Residential Issue . 20. Williams, Adam. Elephants on the Floor Above and Brats in the Basement: Life on the North Quad . 22. Pfleeger, Jon. New Kid on the Block (Sigma Phi Epsilon\u27s President Speaks) . 23. Werne, Kirsten. Coffee Talk at the Bandersnatch (An Interview with Kevin Clay and Adam) . 29

    Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    Get PDF
    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems

    Research Progress Reports: Fruit and Vegetable Processing and Technology Division, Department of Horticulture [1967]

    Get PDF
    Evaluation of snap bean varieties for processing / Wilbur A. Gould and William Hildebolt -- Evaluation of various grape cultivars for processing. I. Table wines ; Recommended fruit varieties for canning and freezing / J. F. Gallander -- Evaluation of tomato varieties for processing / W. A. Gould, J. R. Geisman, C. S. Parrott, J. H. McClelland and W. N. Brown -- The effect of different levels of sugar and acid on the quality of apple fruit juice blends / James Gallander and Harold Stammer -- Epidermal sloughing of snap beans as influenced by processing variables / William Hildebolt and W. A. Gould -- Effect of stannous chloride on the color of glass packed kraut / J. R. Geisman -- Proteins and enzymes in the apple fruit in relation to variety and maturation ; Proteins and enzymes in tomato fruits / Robert L. Clements -- Effect of food additives on quality of canned tomatoes / Wilbur A. Gould -- Effects of selective herbicides on the composition and quality of tomatoes / W. A. Gould, J. R. Geisman, E. K. Alban and John Deppen -- Trace levels of pesticide residues in agricultural commodities in marketing channels / W. A. Gould, J. R. Geisman, E. K. Alban, John Deppen, and P. van Pottlesberghe -- Removal of DDT residues by unit operations in preparing and processing spinach / J. R. Geisman, John Deppen and Benita Yao -- The use of chlorine dioxide in handling and holding mechanically harvested tomatoes / J. R. Geisman, Winston D. Bash, Edwin Schmidt, Jr., Linda Hamrick and W. A. Gould -- Effect of mechanical harvesting and handling of tomatoes on quality of canned tomatoes / Wilbur A. Gould, J. R. Geisman, Edwin Schmidt, Jr., John McClelland and W. N. Brow
    corecore