47 research outputs found

    Faking It: Calculating Loss in Computer Crime Sentencing

    Get PDF

    Hematopoietic Stem and Progenitor Cells as Effectors in Innate Immunity

    Get PDF
    Recent research has shed light on novel functions of hematopoietic stem and progenitor cells (HSPC). While they are critical for maintenance and replenishment of blood cells in the bone marrow, these cells are not limited to the bone marrow compartment and function beyond their role in hematopoiesis. HSPC can leave bone marrow and circulate in peripheral blood and lymph, a process often manipulated therapeutically for the purpose of transplantation. Additionally, these cells preferentially home to extramedullary sites of inflammation where they can differentiate to more mature effector cells. HSPC are susceptible to various pathogens, though they may participate in the innate immune response without being directly infected. They express pattern recognition receptors for detection of endogenous and exogenous danger-associated molecular patterns and respond not only by the formation of daughter cells but can themselves secrete powerful cytokines. This paper summarizes the functional and phenotypic characterization of HSPC, their niche within and outside of the bone marrow, and what is known regarding their role in the innate immune response

    Mission Creep and Wiretap Act \u27Super Warrants\u27: A Cautionary Tale

    Get PDF
    Congress enacted the Wiretap Act in 1968 in an effort to combat organized crime while safeguarding the privacy of innocent Americans. However, the Act instead served to legitimize wiretapping, and its privacy protections have eroded over time. As a result, there has been a significant increase in wiretapping in the decades since the Act’s passage. As technology evolves, the Wiretap Act does less to protect Americans’ private communications from government interception. Nevertheless, policy makers see the Wiretap Act, with its “super-warrant” procedures, as the gold standard for statutory privacy protection. To the contrary, when considering how to regulate new and powerful surveillance technologies, advocates must not reflexively rely on the language of the Wiretap Act as a model for adequate privacy safeguards. They must consider whether, given the Act’s apparent flaws, it is possible to meaningfully balance the invasiveness of a new technique with the preservation of individual privacy. If so, drafters should focus on crafting statutory language that better implements the intended safeguards of the Act than the Act itself has. This Article describes the deterioration of the Wiretap Act’s protections and should serve as a cautionary tale to advocates as they propose new legislation in the face of modern surveillance tools

    Catecholamine stress alters neutrophil trafficking and impairs wound healing by β2-adrenergic receptor-mediated upregulation of IL-6.

    Get PDF
    Stress-induced hormones can alter the inflammatory response to tissue injury; however, the precise mechanism by which epinephrine influences inflammatory response and wound healing is not well defined. Here we demonstrate that epinephrine alters the neutrophil (polymorphonuclear leukocyte (PMN))-dependent inflammatory response to a cutaneous wound. Using noninvasive real-time imaging of genetically tagged PMNs in a murine skin wound, chronic, epinephrine-mediated stress was modeled by sustained delivery of epinephrine. Prolonged systemic exposure of epinephrine resulted in persistent PMN trafficking to the wound site via an IL-6-mediated mechanism, and this in turn impaired wound repair. Further, we demonstrate that β2-adrenergic receptor-dependent activation of proinflammatory macrophages is critical for epinephrine-mediated IL-6 production. This study expands our current understanding of stress hormone-mediated impairment of wound healing and provides an important mechanistic link to explain how epinephrine stress exacerbates inflammation via increased number and lifetime of PMNs

    The Horrible Game

    No full text
    (Statement of Responsibility) by Jennifer Stisa Granick(Thesis) Thesis (B.A.) -- New College of Florida, 1990(Electronic Access) RESTRICTED TO NCF STUDENTS, STAFF, FACULTY, AND ON-CAMPUS USE(Bibliography) Includes bibliographical references.(Source of Description) This bibliographic record is available under the Creative Commons CC0 public domain dedication. The New College of Florida, as creator of this bibliographic record, has waived all rights to it worldwide under copyright law, including all related and neighboring rights, to the extent allowed by law.(Local) Faculty Sponsor: Lewis, Eugen

    Mission Creep and Wiretap Act \u27Super Warrants\u27: A Cautionary Tale

    Get PDF
    Congress enacted the Wiretap Act in 1968 in an effort to combat organized crime while safeguarding the privacy of innocent Americans. However, the Act instead served to legitimize wiretapping, and its privacy protections have eroded over time. As a result, there has been a significant increase in wiretapping in the decades since the Act’s passage. As technology evolves, the Wiretap Act does less to protect Americans’ private communications from government interception. Nevertheless, policy makers see the Wiretap Act, with its “super-warrant” procedures, as the gold standard for statutory privacy protection. To the contrary, when considering how to regulate new and powerful surveillance technologies, advocates must not reflexively rely on the language of the Wiretap Act as a model for adequate privacy safeguards. They must consider whether, given the Act’s apparent flaws, it is possible to meaningfully balance the invasiveness of a new technique with the preservation of individual privacy. If so, drafters should focus on crafting statutory language that better implements the intended safeguards of the Act than the Act itself has. This Article describes the deterioration of the Wiretap Act’s protections and should serve as a cautionary tale to advocates as they propose new legislation in the face of modern surveillance tools
    corecore