165 research outputs found

    Rights of the Surviving Spouse under the Pennsylvania Wills and Estates Statutes

    Get PDF
    The rights of the surviving spouse in the estate of his deceased mate are governed by three statutes in Pennsylvania. The first of these is section 2 of the Intestate Act which sets forth the intestate share. Then there is section 11 of the Estates Act which allows a surviving spouse to treat as testamentary certain inter vivos conveyances. Finally, section 8 of the Wills Act provides the right to take against the will. It is the purpose of this paper to examine the latter two sections in light of how the Pennsylvania courts have applied them

    Wills - Legacies - Stock Splits

    Get PDF
    The Supreme Court of Pennsylvania has held that a legatee is entitled to shares resulting from a stock split which occurred after the execution of a will and codicil but prior to death of testator where testator had disposed of all such stock owned by him at time he wrote the will and codicil. Marks Will, 435 Pa. 155, 255 A.2d 512 (1969)

    Building a Tiered Approach to In Vitro Predictive Toxicity Screening: A Focus on Assays with In Vivo Relevance

    Get PDF
    One of the greatest challenges facing the pharmaceutical industry today is the failure of promising new drug candidates due to unanticipated adverse effects discovered during preclinical animal safety studies and clinical trials. Late stage attrition increases the time required to bring a new drug to market, inflates development costs, and represents a major source of inefficiency in the drug discovery/development process. It is generally recognized that early evaluation of new drug candidates is necessary to improve the process. Building in vitro data sets that can accurately predict adverse effects in vivo would allow compounds with high risk profiles to be deprioritized, while those that possess the requisite drug attributes and a lower risk profile are brought forward. In vitro cytotoxicity assays have been used for decades as a tool to understand hypotheses driven questions regarding mechanisms of toxicity. However, when used in a prospective manner, they have not been highly predictive of in vivo toxicity. Therefore, the issue may not be how to collect in vitro toxicity data, but rather how to translate in vitro toxicity data into meaningful in vivo effects. This review will focus on the development of an in vitro toxicity screening strategy that is based on a tiered approach to data collection combined with data interpretation

    Automated Synthesis of Long Communication Delays for Testing

    Get PDF
    Planetary-Ohio Network Emulator (p- ONE) is a computer program for local laboratory testing of high bandwidth data-communication systems subject to long delays in propagation over interplanetary distances. p-ONE is installed on a personal computer connected to two bidirectional Ethernet interfaces, denoted A and B, that represent local-area networks at opposite ends of a long propagation path. Traffic that is to be passed between A and B is encapsulated in IP (Internet Protocol) packets (e.g., User Data Protocol, UDP). Intercepting this traffic between A and B in both directions, p-ONE time-tags each packet and stores it in memory or on the hard disk of the computer for a user-specified interval that equals the propagation delay to be synthesized. At the expiration of its storage time, each such packet is sent to its destination (that is, if it was received from A, it is sent to B, or vice versa). The accuracy of the p-ONE software is very high, with zero packet loss through the system and negligible latency. Optionally, p-ONE can be configured to delay all network traffic to and from all network addresses on each Ethernet interface or to selectively delay traffic between specific addresses or traffic of specific types. p-ONE works well with Linux and is also designed to be compatible with other operating systems

    Land-Based Learning: A Learning Paradigm for Building Community and Sustainable Farms

    Get PDF
    Mitigating complex problems is increasingly essential to sustaining life on Earth. Empowering current and future generations to address these problems requires rethinking traditional education approaches. This article serves as a primer for land-based learning—defined as a pedagogical approach in which learners collaborate with community members to implement place-based interventions within agricultural systems to increase the sustainability of their community. As an introduction to land-based learning, the article (a) describes critical checkpoints within land-based learning, (b) illuminates the role of Extension educators in facilitating land-based learning, and (c) introduces a case study of land-based learning in Michigan\u27s Upper Peninsula

    Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    Get PDF
    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link
    • …
    corecore