738 research outputs found

    Culture Shock: The Exploitation of J-1 Cultural Exchange Workers

    Get PDF
    They come to experience all America has to offer. They hope to pay their way by working a summer job as they experience a new culture and learn English. They work in our hotels, restaurants, fast-food chains and amusement parks. They work for companies with names synonymous with the United States: McDonald's, Disney, Hilton and more. They're J-1 guest workers. Congress created the program more than 50 years ago "to increase mutual understanding between the people of the United States and the people of other countries by means of educational and cultural exchange." Foreign youths pay American job placement agencies designated by the Department of State -- called "sponsors" -- to be placed with U.S. employers in jobs that offer cultural exchange opportunities and, for trainees and interns, professional job training.This report is based on hundreds of interviews with J-1 Summer Work Travel participants and interns and trainees working across the South, primarily in the hospitality industry. These interviews revealed that regardless of the worker's country of origin or whether they participated in the Summer Work Travel Program or the Trainee and Intern Program, the experience is the same. The J-1 program must return to its original mission of cultural exchange. It also must have mechanisms in place to protect young U.S. workers in the job market. Recommendations for reform are offered at the end of this report

    Close to Slavery: Guestworker Programs in the United States

    Get PDF
    Under the current H-2 program overseen by the U.S. Department of Labor (DOL), employers brought about 106,000 guestworkers into this country in 2011 -- approximately 55,000 for agricultural work and another 51,000 for jobs in forestry, seafood processing, landscaping, construction and other non-agricultural industries.The H-2 program, which provides temporary farmworkers and non-farm laborers for a variety of U.S. industries, is rife with labor and human rights violations committed by employers who prey on a highly vulnerable workforce. It harms the interests of U.S. workers, as well, by undercutting wages and working conditions for those who labor at the lowest rungs of the economic ladder. This program should not be expanded or used as a model for immigration reform.It is virtually impossible to create a guestworker program for low-wage workers that does not involve systemic abuse. The H-2 guestworker program should not be expanded in the name of immigration reform and should not be the model for the future flow of workers to this country. If the current H-2 program is allowed to continue, it should be completely overhauled. Recommendations for doing so appear at the end of this report

    Jesus\u27 Shadow

    Full text link
    The poems in this collection are mainly drawn from personal experience, especially the experience of place as seen through the perspective of the I. Many of the poems have overtly spiritual themes. I envision even those poems that aren\u27t overtly spiritual as being prayer-like because both prayer and poetry require a connection to something outside the self as well as deep honesty about the self; There are some poems in this collection that are inspired mainly by research rather than personal experience. I focused much of this research on women\u27s issues and bringing to light women who have been overlooked by history. Though based on research, some still overlap with my personal experience. Miranda in Las Vegas is both about Shakespeare\u27s character from The Tempest and my own experiences as a woman living in Las Vegas. Thus, the intersection of several different themes hold together the poems of Jesus\u27 Shadow

    Role of cellular caspases, nuclear factor-kappa B and interferon regulatory factors in Bluetongue virus infection and cell fate

    Get PDF
    BACKGROUND: Bluetongue virus (BTV) infection causes haemorrhagic disease in ruminants and induces cell death. The pathogenesis in animals and in cell culture has been linked to BTV-induced apoptosis. RESULTS: In this report, we investigated BTV-induced apoptosis in cell culture in depth and show that both extrinsic (caspase-8 activation) and intrinsic (caspase-9 activation) pathways play roles in BTV apoptosis. Further, by using chemical inhibitors and knock-out cell lines, we show that these pathways act independently of each other in BTV infected cells. In addition to activation of caspase-8, -9 and executioner caspase-3, we also identified that BTV infection causes the activation of caspase-7, which results in the cleavage of poly (ADP-ribose) polymerase (PARP). BTV-induced cell death appears to be due to apoptosis rather than necrosis, as the HMBG-1 was not translocated from the nucleus. We also examined if NF-κB response is related to BTV-induced apoptosis as in reovirus. Our data suggests that NF-κB response is not linked to the induction of apoptosis. It is controlled by the degradation of only IκBα but not IκBβ, resulting in a rapid transient response during BTV infection. This was supported using an NF-κB dependent luciferase reporter gene assay, which demonstrated early response, that appeared to be suppressed by the late stage of BTV replication. Furthermore, virus titres were higher in the presence of NF-κB inhibitor (SN50), indicating that NF-κB has a role in initiating an antiviral environment. In addition, we show that BTV infection induces the translocation of interferon regulatory factors (IRF-3 and IRF-7) into the nucleus. The induction of IRF responses, when measured by IRF dependent luciferase reporter gene assay, revealed that the IRF responses, like NF-κB response, were also at early stage of infection and mirrored the timing of NF-κB induction. CONCLUSION: BTV triggers a wide range of caspase activities resulting in cell apoptosis. Although both NF-κB and IRF responses are induced by BTV infection, they are not sustained

    Backward Design: A Handy Tool for Remote Teaching

    Full text link
    The Vanderbilt Law Library recently revamped its 1 L legal research curriculum. In order to ensure that the revamp was effective, the librarians utilized backward design, which requires that instructors formulate a set of teaching objectives prior to creating course materials. When the University transitioned to remote teaching as a result of COVID-19, the prior preparation as a group made the transition much easier because the teaching librarians were able to utilize the core concepts that were agreed to by all while still customizing their instruction to fit the needs of their individual sections and teaching styles

    'When I click "ok" I become Sassy – I become a girl.' Young people and gender identity: Subverting the ‘body’ in massively multi-player online role-playing games

    Get PDF
    This article is available open access through the publisher’s website through the link below. Copyright @ 2012 Taylor & Francis.This article explores young people's practices in the virtual spaces of online gaming communities. Based on a five-year ethnographic study of virtual worlds, it considers how young people construct and maintain identities within virtual social systems. In particular, the article discusses digital gender practices and considers the potential that these games offer for their young users to engage in alternate gender identities. We argue that these digital spaces offer spaces for the imagination and can enhance agency and, potentially, resistance. However, digital identity is simultaneously no ‘liberated space’ and it incorporates norms and practices that often mirror those of the material world. We argue that this ‘porosity’ is an important tool through which young people come to understand gender identity

    Characterization of a second open reading frame in genome segment 10 of bluetongue virus

    Get PDF
    Viruses have often evolved overlapping reading frames in order to maximise their coding capacity. Until recently, the segmented double-stranded (ds) RNA genome of viruses of the Orbivirus genus was thought to be monocistronic but the identification of the bluetongue virus (BTV) NS4 protein changed this assumption. A small open reading frame (ORF) in segment 10, overlapping the NS3 ORF in the +1 position that is maintained in more than 300 strains of the 26 different BTV serotypes and in more of 200 strains of the phylogenetically related African horse sickness (AHSV). In BTV, this ORF (named S10-ORF2 in this study) encodes a putative protein of 50-59 amino acid residues in length and appears to be under a strong positive selection. HA- or GFP-tagged versions of S10-ORF2 expressed from transfected plasmids localised within the nucleoli of transfected cells unless a putative nucleolar localisation signal was mutated S10-ORF2 inhibited gene expression, but not RNA translation, in transient transfection reporter assays. In both mammalian and insect cells, BTV S10-ORF2 deletion mutants (BTV8ΔS10-ORF2) displayed similar replication kinetics to wild type virus. In vivo, S10-ORF2 deletion mutants were pathogenic in mouse models of disease. Although further evidence is required for S10-ORF2 expression during infection, the data presented provide an initial characterisation of this open reading frame

    Defining and characterizing team resilience in elite sport

    Get PDF
    Objectives: The objectives of this study were to develop a definition of team resilience and to identify the resilient characteristics of elite sport teams. Design and Method: Focus groups consisting of a total of 31 participants were conducted with five elite teams from a range of sports. An interpretive thematic analysis using inductive and deductive reasoning was employed to analyze the data. Results and Conclusions: Team resilience was defined as a dynamic, psychosocial process which protects a group of individuals from the potential negative effect of the stressors they collectively encounter. It comprises of processes whereby team members use their individual and combined resources to positively adapt when experiencing adversity. Findings revealed four main resilient characteristics of elite sport teams: group structure, mastery approaches, social capital, and collective efficacy. This study extends resilience research in sport psychology by providing greater conceptual clarity of resilience at a team level. The implications of the findings for those conducting research in this area and for those consulting with elite sport teams are discussed

    Transparent fault tolerance for scalable functional computation

    Get PDF
    Reliability is set to become a major concern on emergent large-scale architectures. While there are many parallel languages, and indeed many parallel functional languages, very few address reliability. The notable exception is the widely emulated Erlang distributed actor model that provides explicit supervision and recovery of actors with isolated state. We investigate scalable transparent fault tolerant functional computation with automatic supervision and recovery of tasks. We do so by developing HdpH-RS, a variant of the Haskell distributed parallel Haskell (HdpH) DSL with Reliable Scheduling. Extending the distributed work stealing protocol of HdpH for task supervision and recovery is challenging. To eliminate elusive concurrency bugs, we validate the HdpH-RS work stealing protocol using the SPIN model checker. HdpH-RS differs from the actor model in that its principal entities are tasks, i.e. independent stateless computations, rather than isolated stateful actors. Thanks to statelessness, fault recovery can be performed automatically and entirely hidden in the HdpH-RS runtime system. Statelessness is also key for proving a crucial property of the semantics of HdpH-RS: fault recovery does not change the result of the program, akin to deterministic parallelism. HdpH-RS provides a simple distributed fork/join-style programming model, with minimal exposure of fault tolerance at the language level, and a library of higher level abstractions such as algorithmic skeletons. In fact, the HdpH-RS DSL is exactly the same as the HdpH DSL, hence users can opt in or out of fault tolerant execution without any refactoring. Computations in HdpH-RS are always as reliable as the root node, no matter how many nodes and cores are actually used. We benchmark HdpH-RS on conventional clusters and an HPC platform: all benchmarks survive Chaos Monkey random fault injection; the system scales well e.g. up to 1,400 cores on the HPC; reliability and recovery overheads are consistently low even at scale
    corecore