2,269 research outputs found

    The Venerable Titan: Fear, Threats, and the Making of American Foreign Policy, 1939-2003

    Get PDF

    U.S. National Security Policy Under Eisenhower and Kennedy

    Get PDF
    Streaming video requires RealPlayer to view.The University Archives has determined that this item is of continuing value to OSU's history.Presidents Dwight D. Eisenhower and John F. Kennedy had the same assessment of the Soviet Union during the Cold War rivalry that dominated world politics in the latter half of the 20 th century: that its implacable hostility, mounting military strength, and positive ideological appeal posed a fundamental threat to the security of the United States. Both accepted the basic goals of the Truman administration's containment strategy. However, the two presidents differed in their assessments of the extent of the Soviet threat, and in their judgments about how best to counter it. This led to quite different approaches to U.S. national security during the Eisenhower and Kennedy administrations.Ohio State University. Mershon Center for International Security StudiesEvent webpage, photos, lecture summary, streaming vide

    The role of cellular signalling pathways and translation initiation factors in Herpesvirus infection

    Get PDF
    As obligate intracellular parasites, viruses rely on host cells to replicate. Hsv-1 is a large double stranded DNA virus which is the cause of common cold sores and corneal blindness in humans. The defining feature of HSV-1 is its ability to exist in two discrete states. During lytic infection, productive virus replication results in cell death. After primary infection HSV-1 enters a second state in non-permissive cells, termed latency in vivo or quiescence in vitro, in which minimal activity of the viral genome allows it to colonize its host. While the lytic state of viral replication is relatively well characterised, understanding of latency has lagged due to a lack of invitro models that can facilitate detailed mechanistic study. This thesis investigates aspects of HSV-1 quiescence, specifically the role of host cell signalling and translation initiation during reactivation from a non productive state. To achieve these objectives, a new system was established to study HSV-1 quiescence. The system employs the use of serum starved and temperature elevated primary human cells which allow for efficient suppression of wild type HSV-1 replication, which that results in the formation of HSV-1 quiescent infection. Upon investigation of the kinase pathways required during reactivation from quiescence it was discovered that inhibition of the ERK signalling pathway resulted in a suppression of viral reactivation. Additionally, the activities of the down stream substrate of ERK, Mnk1, along with the mTORC1 substrate 4E-BP, both of which regulate the mRNA translation initiation factor eIF4E were shown to be required for efficient reactivation. To further investigate the role of translation initiation during reactivation, we employed the use 4EGi-1, a recently discovered small molecule inhibitor of eIF4F formation. During our investigations it was discovered that protein synthesis in primary cells was minimally dependent upon eIF4F yet highly sensitive to 4EGi-1 at concentrations that did not alter eIF4F levels but instead, increased the association of inactive eIF2a with initiation complexes. At these relatively low concentrations a potent suppression of mRNA translation was achieved yet tolerable to cells over prolonged periods. Critically, inhibition of translation resulted in suppression of both lytic replication and reactivation from quiescence suggesting that targeting mRNA translation may be a viable therapeutic avenue for treatment of HSV-1 infection

    Surveillance and Privacy in the Digital Age: A Primer for Public Relations

    Get PDF
    The notion that “Big Brother Is Watching” has been around for decades, it is an often-used catchphrase to describe surveillance or privacy infringements. The evolution of the Internet, cellular networks and the growth of high speed connections worldwide has allowed an endless supply of devices to connect to this global network and produce an infinite supply of very specific, personal data. Without question these technological advancements have revolutionized industries and enhanced lives. However, the opportunity for “Big Brother” to watch has similarly evolved at a rapid pace. Not only is “Big Brother” watching, but he is also doing things with the information he is seeing. The political and cultural implications of these often-secretive activities have only recently started to become a topic of discussion in the general media. This paper will explore some theories of surveillance and privacy that inform our understanding of the subject even today, identify the entities that represent “Big Brother” in the digital age and highlight some recent examples of their activities. Finally, this paper will provide some answers to questions for consideration about this topic, specifically within the discipline of Public Relations

    The Endless Tragedy: Euripides and Camus

    Get PDF
    Senior Project submitted to The Division of Languages and Literature of Bard College

    Private Nonindustrial Ownership of Forest Land: An Economic Theory of Owner Motivation and Management Intensity

    Get PDF
    • 

    corecore