157 research outputs found

    A content analysis of the back of the book indexes of hymnals of the Baptist, Episcopal and Methodist denominations in the United States

    Get PDF
    This paper documents the content analysis of back of the book indexes of selected Methodist, Episcopal and Baptist denominational hymnals published between 1801 and 1996 and designated for use by these American congregations. The study was conducted to ascertain if any denominational and chronological trends in the indexing of these hymnals exist; if so, to determine what they are, the significance of these differences, to speculate on the reasons these differences exist and to explore the ramifications of these differences to the fields of hymnology and information science. An important historical discovery was that metrical and alphabetical tune indexes appeared at the same time that scores began to be included in hymnals (1855). Additionally, although the three denominations share more than half the contents of their individual hymnbooks, each group favors a particular set of indexes

    Closed circuits : kinship, neighborhood and incarceration in urban Portugal

    Get PDF
    The notion that prisons are a ‘world apart’, with their walls severing prisoners from their external relationships, and incarceration an interruption, ‘time away’ spent in a separate social universe, has provided an adequate framework for understanding the social realities of imprisonment in the past. But it has also created an analytical dead angle that prevents us from identifying the ramifying social effects of concentrated incarceration upon both the prison and heavily penalized lower-class neighborhoods. This article addresses these effects with data from an ethnographic revisit of a major women’s prison in Portugal, where the recomposition of the inmate population that has accompanied the rapid inflation of the country’s carceral population is especially pronounced and entails the activation of wide-ranging carceralized networks bringing kinship and neighborhood into the prison as well as the prison into the domestic world. The analysis focuses on the ways whereby these constellations have transformed the experience of confinement and the texture of correctional life, calling for a reconsideration of the theoretical status of the prison as a ‘total institution’ and for exploring anew the boundary that separates it (or not) from outside worlds.Wenner-Gren Foundation for Anthropological Research

    Evidence for bystander signalling between human trophoblast cells and human embryonic stem cells

    Get PDF
    Maternal exposure during pregnancy to toxins can occasionally lead to miscarriage and malformation. It is currently thought that toxins pass through the placental barrier, albeit bilayered in the first trimester, and damage the fetus directly, albeit at low concentration. Here we examined the responses of human embryonic stem (hES) cells in tissue culture to two metals at low concentration. We compared direct exposures with indirect exposures across a bi-layered model of the placenta cell barrier. Direct exposure caused increased DNA damage without apoptosis or a loss of cell number but with some evidence of altered differentiation. Indirect exposure caused increased DNA damage and apoptosis but without loss of pluripotency. This was not caused by metal ions passing through the barrier. Instead the hES cells responded to signalling molecules (including TNF-α) secreted by the barrier cells. This mechanism was dependent on connexin 43 mediated intercellular ‘bystander signalling’ both within and between the trophoblast barrier and the hES colonies. These results highlight key differences between direct and indirect exposure of hES cells across a trophoblast barrier to metal toxins. It offers a theoretical possibility that an indirectly mediated toxicity of hES cells might have biological relevance to fetal development

    The Job Itself: The Effects of Functional Units on Work Autonomy among Public and Academic Librarians

    Get PDF
    Job autonomy is a topic that should be of concern to both library managers and employees because job autonomy may predict job satisfaction and retention. This article describes job autonomy among public and academic librarians using data reported by respondents to the Workforce Issues in Library and Information Science (WILIS 1) Research Project1 survey. The authors extracted a subset of the LIS professionals, public and academic librarians, focusing on the autonomy measures and the variables related to the broad areas of responsibility: administration; access and collections; information services, education and research; digital information technology and Web access; and information technology and consulting. Findings indicate that there are significant differences in perceived autonomy based on areas of responsibility. Administrators and information technology librarians reported higher autonomy, regardless of type of library. Also, public librarians have less freedom in scheduling their time than academic librarians. As today's professionals seek more autonomy and flexibility, managers struggle with the pressure of increased attention to accountability within their organizations. Library administrators will need to find a balancing point in order to maintain organizational effectiveness.published or submitted for publicatio

    Remediating Third-Party Software Vulnerabilities on U.S. Army Information Systems

    Get PDF
    Information systems belonging to the DoD and U.S. Army experience cyber attacks on a daily basis. Increasingly, these attacks are targeting popular third-party applications, instead of focusing on vulnerabilities in Microsoft software. The DoD responded to this threat by adopting Citadel Hercules, which did not find a willing audience with the U.S. Army. Instead, the Army adopted Microsoft Systems Management Server (SMS), followed by System Center Configuration Manager (SCCM) 2007 to meet this threat. After more than five years, the rollout of SCCM to all organizations within the U.S. Army is still incomplete. This study provides an overview of the threats facing U.S. Army information systems and looks at how the Army has addressed this challenge in the past. Next, the study takes a system engineering approach to identifying an optimal tool for mitigating third-party vulnerabilities and suggests potential alternatives to SCCM. In addition, the study utilizes a cost benefit analysis approach to aid in evaluating the potential Return on Investment (ROI) provided by each tool. The purpose of this study is to answer the question What is the most optimal solution for mitigating vulnerabilities in third-party applications on U.S. Army information systemshttp://archive.org/details/remediatingthird109457410Major, United States Arm

    The Home Advocate

    No full text
    Weekly newspaper from Jefferson, Texas that includes local, state and national news along with some advertising

    The Home Advocate

    No full text
    Weekly newspaper from Jefferson, Texas that includes local, state and national news along with some advertising
    • …
    corecore