2,348 research outputs found

    Michigan: We Are All Migrants Here

    Get PDF
    This report is a clarion call from two Michigan economic development organizations to recognize and support the significant contributions that immigrants are making to the revival of the Michigan economy. The authors are concerned that the gains that the state has made in creating an immigrant-friendly environment are being undermined by policies of the Trump Administration. Although immigrants constitute only 6 percent of the state's population, they punch above their weight on many indices of economic activity, including being 25 percent of the state's high-tech start-ups and running firms that employ over 150,000 other people. Immigrants have also brought an infusion of talent and labor to offset the decline in the native-born population over the last 15 years. The authors summarize the many initiatives the state has taken with the support of state, municipal, and industry leaders to promote the state as an immigrant-friendly destination, including the creation of the Michigan Office of New Americans by Republican Governor Rick Snyder. However, policies of the Trump Administration, such as the scaling back of H-1B visas, the travel ban affecting predominantly Muslim countries, and reductions in refugee admissions, threaten to reverse these gains

    The prognostic significance of the mixed lineage leukaemia partial tandem duplication in acute myeloid leukaemia

    Get PDF
    This study concerns a specific molecular genetic mutation, the mixed lineage leukaemia partial tandem duplication ( MLL PTD). MLL is a transcriptional regulator that known to be instrumental in both normal haematopoiesis and in leukaemogenesis. This study aimed to evaluate the prognostic importance of this abnormality through investigation of its influence on clinical outcome, its utility as a marker of minimal residual disease (MRD) and the downstream effects of its expression. A qualitative PCR assay was established and determined the frequency of MLL PTD to be 5.2% in de novo AML. MLL PTD was found to be a useful independent marker being associated with a greater risk of relapse and a reduction of relapse free survival and overall survival. A quantitative PCR (QPCR) assay was developed that reliably distinguished AML-related MLL PTDs from the low level of background MLL PTDs occurring normally. Despite a high rate of cytogenetic clonal evolution MLL PTD expression remained stabled between diagnosis and relapse, making it a suitable marker for MRD. Results also suggested the QPCR assay could determine onset of remission and prediction of relapse. Gene expression profiling was used to identify a gene signature unique to the MLL PTD and was found to be distinct from that associated with MLL translocation. Analysis of the gene signature also identified three candidate chemotherapy compounds predicted to antagonise the effects of the MLL PTD. The results of this study could prove instrumental in improving the treatment of MLL PTD patients

    Securing the Internet of Healthcare

    Get PDF
    Cybersecurity, which includes the security of information technology (IT), is critical to ensuring that society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government’s campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140 million Americans’ credit reports, cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and main street. But these discussions often miss the problems replete in the expansive supply chains on which many of these products and services we depend on are built; this is particularly true in the medical device context. The problem recently made national news with the voluntary recall of more than 400,000 pacemakers that were found to be vulnerable to hackers, necessitating a firmware update. This Article explores the myriad vulnerabilities in the supply chain for medical devices, investigates existing FDA cybersecurity and privacy regulations to identify any potential governance gaps, and suggests a path forward to boost cybersecurity due diligence for manufacturers by making use of new approaches and technologies, including blockchain

    Where and How Wolves (Canis lupus) Kill Beavers (Castor canadensis)

    Get PDF
    Beavers (Castor canadensis) can be a significant prey item for wolves (Canis lupus) in boreal ecosystems due to their abundance and vulnerability on land. How wolves hunt beavers in these systems is largely unknown, however, because observing predation is challenging. We inferred how wolves hunt beavers by identifying kill sites using clusters of locations from GPS-collared wolves in Voyageurs National Park, Minnesota. We identified 22 sites where wolves from 4 different packs killed beavers. We classified these kill sites into 8 categories based on the beaver-habitat type near which each kill occurred. Seasonal variation existed in types of kill sites as 7 of 12 (58%) kills in the spring occurred at sites below dams and on shorelines, and 8 of 10 (80%) kills in the fall occurred near feeding trails and canals. From these kill sites we deduced that the typical hunting strategy has 3 components: 1) waiting near areas of high beaver use (e.g., feeding trails) until a beaver comes near shore or ashore, 2) using vegetation, the dam, or other habitat features for concealment, and 3) immediately attacking the beaver, or ambushing the beaver by cutting off access to water. By identifying kill sites and inferring hunting behavior we have provided the most complete description available of how and where wolves hunt and kill beavers

    Effectiveness of quality physical education in improving students' manipulative skill competency

    Get PDF
    AbstractPurposeThis study aimed to examine the extent to which the quality physical education teaching (QPET) practices contributed to improving 4th- and 5th-grade students' manipulative skill competency.MethodsParticipants were 9 elementary physical education (PE) teachers and their 4th- and 5th-grade students (n = 2709–3420). The students' skill competency was assessed with 3 manipulative skills using PE metrics assessment rubrics. The PE teachers' levels of QPET were assessed by coding 63 videotaped lessons using the assessing quality teaching rubrics (AQTR), which consisted of 4 essential dimensions including task design, task presentation, class management, and instructional guidance. Codes were confirmed through inter-rater reliability (82.4%, 84.5%, and 94%). Data were analyzed through descriptive statistics, multiple R2 regression models, and independent sample t tests.ResultsThis study indicated that the 4 essential dimensions of QPET were all significant contributors to students' manipulative skill competency. These predictors were significantly higher for boys than for girls in soccer and striking skills, while they were significantly higher for girls than for boys in throwing skill competency. Of the 4 essential dimensions of QPET, task presentation played the most significant role in contributing to all 3 skill competencies for both boys and girls. Further, students who experienced high QPET were significantly more skillfully competent than those students who did not have this experience.ConclusionIt was concluded that the QPET practices played a significantly critical role in contributing to students' manipulative skill competency

    Koinonia

    Get PDF
    Ways to Grow Our ProfessionVocational Education: A New Perspective, Brent Ellis Forging Ahead in Student Programs, Steve Austin Ways to Train OthersThe Steps to Thinking Well are as Easy as 1-2-3, Randy Blackford Ten Things Every RA Should Know, Brad Voyles Ways We Have LearnedI Learned Too, Sara Oyer One Year Later, Rob Loane Regular FeaturesPresident\u27s Corner Editor\u27s Disk ACSD Accoladeshttps://pillars.taylor.edu/acsd_koinonia/1015/thumbnail.jp

    Berry Important? Wolf Provisions Pups with Berries in Northern Minnesota

    Get PDF
    Wolves (Canis lupus) primarily provision pups by catching mammalian prey and bringing remains of the carcass to the pups at a den or rendezvous site via their mouths or stomach. In August 2017, we observed an adult wolf regurgitating wild blueberries (Vaccinium spp.) to pups at a rendezvous site in the Greater Voyageurs Ecosystem, Minnesota, USA, which is the only known observation of wolves provisioning pups with wild berries. This observation, in combination with other evidence from the Greater Voyageurs Ecosystem, suggests wild berries might be a more valuable food source for wolves in southern boreal ecosystems than previously appreciated

    Securing the Internet of Healthcare

    Get PDF
    Cybersecurity, including the security of information technology (IT), is a critical requirement in ensuring society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government\u27s campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140-million Americans\u27 credit reports, mitigating cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and Main Street. But oftentimes these discussions miss the problems replete in the often-expansive supply chains on which many of these products and services we depend on are built; this is particularly true in the medical device context. The problem recently made national news with the FDA-mandated recall of more than 400,000 pacemakers that were found to be vulnerable to hackers necessitating a firmware update. This Article explores the myriad vulnerabilities in the supply chain for medical devices, investigates existing FDA cybersecurity and privacy regulations to identify any potential governance gaps, and suggests a path forward to boost cybersecurity due diligence for manufacturers by making use of new approaches and technologies, including blockchain
    • …
    corecore