2,416 research outputs found

    The Venerable Titan: Fear, Threats, and the Making of American Foreign Policy, 1939-2003

    Get PDF

    U.S. National Security Policy Under Eisenhower and Kennedy

    Get PDF
    Streaming video requires RealPlayer to view.The University Archives has determined that this item is of continuing value to OSU's history.Presidents Dwight D. Eisenhower and John F. Kennedy had the same assessment of the Soviet Union during the Cold War rivalry that dominated world politics in the latter half of the 20 th century: that its implacable hostility, mounting military strength, and positive ideological appeal posed a fundamental threat to the security of the United States. Both accepted the basic goals of the Truman administration's containment strategy. However, the two presidents differed in their assessments of the extent of the Soviet threat, and in their judgments about how best to counter it. This led to quite different approaches to U.S. national security during the Eisenhower and Kennedy administrations.Ohio State University. Mershon Center for International Security StudiesEvent webpage, photos, lecture summary, streaming vide

    The role of cellular signalling pathways and translation initiation factors in Herpesvirus infection

    Get PDF
    As obligate intracellular parasites, viruses rely on host cells to replicate. Hsv-1 is a large double stranded DNA virus which is the cause of common cold sores and corneal blindness in humans. The defining feature of HSV-1 is its ability to exist in two discrete states. During lytic infection, productive virus replication results in cell death. After primary infection HSV-1 enters a second state in non-permissive cells, termed latency in vivo or quiescence in vitro, in which minimal activity of the viral genome allows it to colonize its host. While the lytic state of viral replication is relatively well characterised, understanding of latency has lagged due to a lack of invitro models that can facilitate detailed mechanistic study. This thesis investigates aspects of HSV-1 quiescence, specifically the role of host cell signalling and translation initiation during reactivation from a non productive state. To achieve these objectives, a new system was established to study HSV-1 quiescence. The system employs the use of serum starved and temperature elevated primary human cells which allow for efficient suppression of wild type HSV-1 replication, which that results in the formation of HSV-1 quiescent infection. Upon investigation of the kinase pathways required during reactivation from quiescence it was discovered that inhibition of the ERK signalling pathway resulted in a suppression of viral reactivation. Additionally, the activities of the down stream substrate of ERK, Mnk1, along with the mTORC1 substrate 4E-BP, both of which regulate the mRNA translation initiation factor eIF4E were shown to be required for efficient reactivation. To further investigate the role of translation initiation during reactivation, we employed the use 4EGi-1, a recently discovered small molecule inhibitor of eIF4F formation. During our investigations it was discovered that protein synthesis in primary cells was minimally dependent upon eIF4F yet highly sensitive to 4EGi-1 at concentrations that did not alter eIF4F levels but instead, increased the association of inactive eIF2a with initiation complexes. At these relatively low concentrations a potent suppression of mRNA translation was achieved yet tolerable to cells over prolonged periods. Critically, inhibition of translation resulted in suppression of both lytic replication and reactivation from quiescence suggesting that targeting mRNA translation may be a viable therapeutic avenue for treatment of HSV-1 infection

    Surveillance and Privacy in the Digital Age: A Primer for Public Relations

    Get PDF
    The notion that “Big Brother Is Watching” has been around for decades, it is an often-used catchphrase to describe surveillance or privacy infringements. The evolution of the Internet, cellular networks and the growth of high speed connections worldwide has allowed an endless supply of devices to connect to this global network and produce an infinite supply of very specific, personal data. Without question these technological advancements have revolutionized industries and enhanced lives. However, the opportunity for “Big Brother” to watch has similarly evolved at a rapid pace. Not only is “Big Brother” watching, but he is also doing things with the information he is seeing. The political and cultural implications of these often-secretive activities have only recently started to become a topic of discussion in the general media. This paper will explore some theories of surveillance and privacy that inform our understanding of the subject even today, identify the entities that represent “Big Brother” in the digital age and highlight some recent examples of their activities. Finally, this paper will provide some answers to questions for consideration about this topic, specifically within the discipline of Public Relations

    Decolonization and the Cold War

    Get PDF
    Throughout the Cold War era, the United States and the Soviet Union frequently faced the dilemma of whether to recognize or to confer legitimacy upon armed insurgencies vying to overturn established civil authority. The superpower conflict, at once ideological and geopolitical, came to encompass the entire globe by the 1950s, with the Third World emerging as the chief zone of competition between the two superpowers--as well as the main source and site of non-state armed groups. The potential transformations of these armed groups into governments threatened to alter the prevailing balance of regional and global power. Policymakers in Washington and Moscow, consequently, needed to calculate carefully how the granting of de jure or de facto recognition to a particular armed insurgency, or the accordance of some form of legitimacy to it, might affect broader Cold War goals. Why did the United States and the Soviet Union, this essay asks, choose to recognize some insurgencies, deny recognition to others, and actively oppose still others? How, for their part, did these various armed, non-state actors seek to gain support, recognition, and legitimacy from one, or both, of the superpowers? What factors best explain their relative successes or failures in those endeavors? the present article explores those larger questions by focusing specifically on armed decolonization movements, arguably the most common and most consequential of the non-state, armed groups that emerged throughout the post-1945 period. In each of the cases examined here, the superpowers sought to shape the outcome of the decolonization struggle, offering, or withholding military support and diplomatic recognition as a weapon of influence. In each case, the aspiring national liberation movement deployed a combination of armed strength and diplomatic advocacy in a bid for legitimacy and recognition, seeing the support of one or both superpowers as instrumental to the overarching goal of full-fledged sovereignty and acceptance within the prevailing international state-based system

    The Endless Tragedy: Euripides and Camus

    Get PDF
    Senior Project submitted to The Division of Languages and Literature of Bard College
    • 

    corecore