2,333 research outputs found
Strategies for Integrating Wellness into Practicum Supervision
The high-stress work of the counseling profession has been linked to burnout and counselor impairment. This poses major ethical concerns for counseling practice. It has been suggested in the counseling literature that well-counselors are more helpful to their clients compared to those experiencing impairment and distress. Effective counselors are individuals continuously working toward enhancing their personal and professional wellness. Promoting student health and wellness begins with integrating this belief within counselor training programs. Wellness strategies may provide supervisors with tools to increase student wellness, prevent burnout, and assist in protecting clients from impaired counselors. This is essential because beginning counselors in training may not have knowledge about the importance of wellness as it relates to professional practice. This manuscript identifies the need to infuse wellness initiatives into the supervision experiences of master’s level counselors in training (CITs). Wellness models and concepts are discussed, a model for integrating wellness into CITs’ practicum supervisory experiences is proposed, and implications and future research directions are shared
A low-Mr factor isolated from Escherichia coli inhibits eukaryotic in vitro protein synthesis
AbstractThe effect of a low-Mr factor, partially purified from E. coli B, was investigated in E. coli, reticulocyte, and wheat germ lysate in vitro protein synthesis systems. Equal concentrations of factor were needed to inhibit protein synthesis in the eukaryotic system as compared to the prokaryotic system. Experiments suggested that the factor inhibits the initiation step in the eukaryotic systems
Vol. 36, No. 1
Janus: Otherwise Known As The Death Of Stare Decisis, But Only As It Relates To Unions, by Amanda R. Clark and Susan M. Matta
Recent Developmentshttps://scholarship.kentlaw.iit.edu/iperr/1107/thumbnail.jp
Quantum computers based on electron spins controlled by ultra-fast, off-resonant, single optical pulses
We describe a fast quantum computer based on optically controlled electron
spins in charged quantum dots that are coupled to microcavities. This scheme
uses broad-band optical pulses to rotate electron spins and provide the clock
signal to the system. Non-local two-qubit gates are performed by phase shifts
induced by electron spins on laser pulses propagating along a shared waveguide.
Numerical simulations of this scheme demonstrate high-fidelity single-qubit and
two-qubit gates with operation times comparable to the inverse Zeeman
frequency.Comment: 4 pages, 4 figures, introduction is clarified, the section on
two-qubit gates was expanded and much more detail about gate fidelities is
given, figures were modified, one figure replaced with a figure showing gate
fidelities for relevant parameter
Effects of behavioral statistics on game performances of secondary school female basketball players
This study was designed to assess the effects of integrating
player gathered statistics on players' performance in a senior
secondary school girls' basketball team. The nine subjects ranged
in age from 16-19 years. A multiple baseline design replicated
across behaviors and subjects was selected for the study.
Behaviors tested were; offensive rebounds, defensive rebounds, and
assists for the forwards; steal's, deflections, and assists for the
guards. Each player, while on the bench, was required to collect
statistics on a playing teammate. Upon substitution, these roles
were reversed. At the conclusion of the game the coach and team
manager pro-rated the player gathered behavior rates to actual time
played. When the players had finished changing they perused their
game data and established and recorded their personal performance
standards for the next game in their notebooks. At practice between games, and in warm-ups prior to a contest each player checked her
notebook and reminded herself of her goals. Concurrent feedback was
provided to each individual throughout the games as progress
information toward personal goal attainment.
Of the 26 behaviors tested, 20 altered with respect to increase
in magnitude. The six behaviors not achieving changes in magnitude
according to the pre-established criteria positively altered with
regard to variability. All behaviors altered due to the experimental
intervention. The effect was greater than one would expect by chance
and deemed the method of gathering behavioral statistics, establishing goals, pro-rating the data, and providing concurrent feedback during
a game to be effective for significantly altering behaviors in the
subjects of the study
Ultrafast optical spin echo for electron spins in semiconductors
Spin-based quantum computing and magnetic resonance techniques rely on the
ability to measure the coherence time, T2, of a spin system. We report on the
experimental implementation of all-optical spin echo to determine the T2 time
of a semiconductor electron-spin system. We use three ultrafast optical pulses
to rotate spins an arbitrary angle and measure an echo signal as the time
between pulses is lengthened. Unlike previous spin-echo techniques using
microwaves, ultrafast optical pulses allow clean T2 measurements of systems
with dephasing times T2* fast in comparison to the timescale for microwave
control. This demonstration provides a step toward ultrafast optical dynamic
decoupling of spin-based qubits.Comment: 4 pages, 3 figure
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just “Ma Bell” to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice. In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA) which mandated a standardized lawful intercept interface on all local phone switches. Since its passage, technology has continued to progress, and in the face of new forms of communication—Skype, voice chat during multiplayer online games, instant messaging, etc.—law enforcement is again experiencing problems. The FBI has called this “Going Dark”: their loss of access to suspects’ communication. According to news reports, law enforcement wants changes to the wiretap laws to require a CALEA-like interface in Internet software.
CALEA, though, has its own issues: it is complex software specifically intended to create a security hole—eavesdropping capability—in the already-complex environment of a phone switch. It has unfortunately made wiretapping easier for everyone, not just law enforcement. Congress failed to heed experts’ warnings of the danger posed by this mandated vulnerability, and time has proven the experts right. The so-called “Athens Affair,” where someone used the built-in lawful intercept mechanism to listen to the cell phone calls of high Greek officials, including the Prime Minister, is but one example. In an earlier work, we showed why extending CALEA to the Internet would create very serious problems, including the security problems it has visited on the phone system.
In this paper, we explore the viability and implications of an alternative method for addressing law enforcements need to access communications: legalized hacking of target devices through existing vulnerabilities in end-user software and platforms. The FBI already uses this approach on a small scale; we expect that its use will increase, especially as centralized wiretapping capabilities become less viable.
Relying on vulnerabilities and hacking poses a large set of legal and policy questions, some practical and some normative. Among these are:
(1) Will it create disincentives to patching?
(2) Will there be a negative effect on innovation? (Lessons from the so-called “Crypto Wars” of the 1990s, and in particular the debate over export controls on cryptography, are instructive here.)
(3) Will law enforcement’s participation in vulnerabilities purchasing skew the market?
(4) Do local and even state law enforcement agencies have the technical sophistication to develop and use exploits? If not, how should this be handled? A larger FBI role?
(5) Should law enforcement even be participating in a market where many of the sellers and other buyers are themselves criminals?
(6) What happens if these tools are captured and repurposed by miscreants?
(7) Should we sanction otherwise illegal network activity to aid law enforcement?
(8) Is the probability of success from such an approach too low for it to be useful?
As we will show, these issues are indeed challenging. We regard the issues raised by using vulnerabilities as, on balance, preferable to adding more complexity and insecurity to online systems
Millisecond spin-flip times of donor-bound electrons in GaAs
We observe millisecond spin-flip relaxation times of donor-bound electrons in
high-purity n-GaAs . This is three orders of magnitude larger than previously
reported lifetimes in n-GaAs . Spin-flip times are measured as a function of
magnetic field and exhibit a strong power-law dependence for fields greater
than 4 T . This result is in qualitative agreement with previously reported
theory and measurements of electrons in quantum dots.Comment: 4 pages, 4 figure
- …