Red-Hot Facts About Women with Red Hair | Divine Caroline

It can be hard to grow up with red hair, constantly getting called names like ginger and carrot top. Having the rarest hair color might make a redhead feel awkward, but it turns out that there are some special attributes that make them pretty unique. Maybe theyre the ones who have more fun. At the very least, their hair doesnt go gray.

The Rarity of Red In the late 1990s, scientists discovered that gene mutation causes red headedness. Specifically, its a variant of the melanocortin 1 receptor (MC1R), one of the key proteins that determines hair and skin color. The mutated gene is recessive, so in order for someone to have red hair, she has to inherit two copies of the gene, one from each parent. Lots of people, especially those with Northern European ancestry, carry one copy of MC1R, but relatively few carry the two copies required for flaming tresses. Red hair can occur in any ethnicity, but the greatest concentration of redheads originates in Northern Europe, near the U.K. Scotland has the highest percentage of natural redheads, with 13 percent and Ireland is a close second, with 10 percent. Only about 2 percent of people in the United States have naturally red hair.

If red hair is so rare, why does it occur so often in the same geographic area? Some biologists think that its an evolutionary adaptation. In cold and dark climates, fair coloring lets the skin absorb more light, which encourages the body to retain heat and produce more vitamin D. Also, for most of human history, people didnt stray very far from the place where they were born and intermarried with people with similar genetic traits. When there were plenty of people carrying the gene, their children were very likely to get two copies of the mutated MC1R. Now that people migrate more, carriers of MC1R are more likely to intermarry with non-carriers. Thats good for genetic diversity, but maybe not so good for the survival of redheads in general.

For the past few years, theres been a rumor that redheads are going extinct, but thats not exactly true. Because of intermarriage, the numbers are declining, but there will always be redheads, because there will always be carriers of the MC1R gene. It might be less likely that one carrier will meet another and have redheaded children, but its always a possibility. In fact, its not so far-fetched to imagine a future where everyone knows exactly whats in his or her genome, and MC1R carriers can choose to have children with fellow carriers, maximizing the likelihood that their children will have red hair.

A Redheaded Knockout? The mutated MC1R gene has some other surprising effects. Although doctors and medical practitioners have long speculated that redheads were harder to sedate, a recent study from the University of Louisville determined that redheads really do require more anesthesia during surgery.

The researchers ran an experiment where they put women under sedation, and then tested their response to pain. The redheaded patients required 20 to 30 percent more anesthetic than other women to achieve the same level of sedation. Scientists at the university also tried to replicate the experiment with mice, and found that animals with a MC1R mutation required more sedation, too. They theorize that the mutated gene somehow has implications beyond hair color, and perhaps affects hormones or enzymes involved in our neurological system.

The Siren Song of Red Hair Throughout history, redheads have been mistrusted and maligned. In medieval Europe, the infamous witch-hunting manual, Malleus Maleficarum, instructed that red hair and green eyes were marks of a witch, as were freckles, which redheads tend to have aplenty. This belief might have stemmed from the general consensus that redheads were evil, wanton, and hot-tempered. In the Bible, Mary Magdalene and Judas Iscariot are often portrayed as redheads, as was Lilith, Adams first wife who insisted on sexual equality. Even Jonathan Swift, in his 1726 classic Gullivers Travels, characterized redheads as being wanton and promiscuous.

There might actually be some truth to the myth of the lustful redhead. A recent study by a sex researcher in Hamburg, Germany found that women with red hair had sex more often. Another survey in England duplicated those findings, and reported that redheads had sex an average of three times per week, compared to twice per week for blondes and brunettes. For these studies, it didnt matter whether the womens hair was naturally red or Natural Instincts. Of all the women who color their hair, 30 percent choose to become redheadsmore than the 27 percent who go brunette and the 26 percent who go blonde. Some scientists theorize that these women are capitalizing on the perception of the fiery redhead to signal to men that they are looking for partners.

Even if redheads do have to endure a lifetime of sunburns and being called ginger, their hair doesnt just make them stand out, it makes them incredibly unique. Some famous fiery redheads include Queen Elizabeth I, Galileo, Thomas Jefferson, Napoleon, and Vincent Van Gogh. More recent redheads include comedienne Lucille Ball and birth control pioneer Margaret Sanger. Not exactly a bad crowd to be associated with, if you ask me. If this is the company that redheads keep, then Im off to the salon.

Read more:

Red-Hot Facts About Women with Red Hair | Divine Caroline

NanoEngineering Doctoral Degree Program | NanoEngineering

The Ph.D. Program is intended to prepare students for a variety of careers in research and teaching. The emphasis is on research. All students, in consultation with their advisors, develop appropriate course programs that will prepare them for the Preliminary Qualifying Examination and for their dissertation research. These programs must be planned to meet the time limits established to advance to candidacy and to complete the requirements of the degree. A Ph.D. in NanoEngineering requires the selection of a specific focus [Biomedical Nanotechnology, Molecular and Nanomaterials, or Nanotechnologies for Energy and the Environment], and consists of the successful completion of 10 courses: the 5 required core courses, 3 electives from the students selected focus, and 2 electives from any of the two remaining focuses, the ENG-10X courses (for team engineering, leadership, and entrepreneur skills) or from an approved list of electives from other departments across campus, with advisors consent. While only one degree title is offered, NanoEngineering, the choice of a specific focus area is to ensure that the graduate student curriculum is both tailored to their interest and sufficiently in-depth to ensure a complete understanding of their field of interest.

After completing the M.S. degree (or meeting equivalent requirements) and meeting the minimum standard on the comprehensive examination to be admitted to or continue in the Ph.D. program, a student must:

In principle, it should be possible to finish the M.S. degree in three quarters, and a Ph.D. in an additional three years. Ph.D. time limits are as follows: Pre-candidacyfour years; Support limitsix years; Total time limitseven years. (See Graduate Studies Ph.D. Time Limits for further explanation.)

Departmental Examinations All Ph.D. Students are required to pass four examinations. The first is a written Comprehensive Examination, which should be taken within three to four quarters of full-time graduate study. The second is a Literature Review Examination (detailed below). The third is the Ph.D. Senate Exam (often referred to as Advancement to Candidacy Exam). The last is the Dissertation Defense.

The Comprehensive Examination The examination will consist of questions from each of the five-core courses. A passing grade is 60 percent for successful completion of the Masters degree, and 70 percent for qualification to the Ph.D. program. The examination will not exceed six hours in duration. The examination is usually administered the week after spring-quarter finals week in June. Typically, students take the exam after one year of full-time enrollment. This exam may only be retaken once before the end of the second year of study.

The Literature Review Examination The Literature Review Examination tests the students ability to prepare and present a comprehensive overview of a topic based on existing journal literature. It should be a comprehensive discussion of the literature, scientific theory, problems or theoretical deficiencies, and possible areas of research in some area related to nanoscience or nanoengineering. The topic may be in the general area in which the student plans to pursue his or her thesis research, or it may be in an unrelated field of NanoEngineering. The topic must be approved by the three faculty member committee in advance of the seminar. The Literature Review Examination will conclude with a short preliminary overview of the students research project or their research proposal. This exam must occur within one year of the student having passed the Comprehensive Examination.

The Ph.D. Senate Exam: Upon completion of formal course requirements, each student will be required to take a written and oral qualifying examination that will advance the student to candidacy in the Ph.D. Program. It is often known as the Senate Exam or Advancement to Candidacy exam. Prior to this examination, each student, in consultation with his or her faculty advisor, will establish a dissertation committee of five faculty members. The committee will include the students Ph.D. advisor as the Chair of the committee. The committee will consist of three faculty members who are affiliated with the NanoEngineering Department. At least two of the five-committee members must be from a department other than the committee chairs department and at least one of these two must be tenured. The thesis advisor will have the major responsibility for the students research and dissertation.

At UCSD, the University Candidacy/Senate Examination is a requirement for a Graduate Student to complete satisfactorily, once a thesis project has been decided upon. It is strongly recommended, except in special circumstances, that the student complete this examination prior to the end of the first 3 years in the Program. The format for this examination is consistent with the highest standards held by UCSD. The Student should write a detailed Candidacy report in the format of an NIH, NSF, or similar grant proposal. The project and the report should be interdisciplinary and should have input from the thesis advisor. Any publications or supplementary material may be attached. It is expected that the student will meet at least annually with the Committee to update the members on his/her progress.

Dissertation Defense: This is the final Ph.D. examination. Upon completion of the dissertation research project, the candidate writes a dissertation that must be successfully defended in an oral examination and public presentation conducted by the doctoral committee. A complete copy of the students dissertation must be submitted to each member of the doctoral committee two weeks before the defense. It is understood that this copy of the dissertation given to committee members will not be the final copy, and that the committee members may request changes in the text at the time of the defense. This examination may not be conducted earlier than three quarters after the date of advancement to doctoral candidacy. Acceptance of the dissertation by the Office of Graduate Studies and the University Librarian represents the final step in completion of all requirements for the Ph.D. degree.

Teaching Experience: Prior to the dissertation defense, the candidate must serve at least once as a teaching assistant, with the responsibility to hold a problem-solving section one hour a week.

Annual Evaluation: In the spring of each year, the faculty advisor evaluates each doctoral students overall performance in course work, research, and prospects for financial support for future years. A written assessment is given to the student after the evaluation. If a students work is found to be inadequate, the faculty may determine that the student cannot continue in the graduate program.

Go here to read the rest:

NanoEngineering Doctoral Degree Program | NanoEngineering

Delaware Beaches – Visit Delaware – Delaware Vacation

Imagine a beach thats full of simple pleasures, with an edge of sophisticated fun. See yourself at the Delaware beaches on a quiet summer morning, strolling with coffee past galleries and cottages, or bicycling down a lonely seaside path. Think of the fun the day will hold lying on the sand serenaded by the steady lapping of waves, knowing the evening will stretch gently before you, full of tasty moments at creatively inspired restaurants and tempting prizes at some kitschy-artsy shop.

Thats the Delaware beach experience, unlike any youve had. Each beach has its own personality, from fun-and-friendly Rehoboth to young-and-lively Dewey. Up and down the coast, two distinct lifestyles beckon at the Delaware beaches the breezy oceanside action and the quieter bayside charm.

At the Delaware beaches, the question isnt what to do, its how to do it all. At the Delaware beaches, visitors find a family-friendly, wholesome sort of charm that keeps them coming back for generations. At the Delaware beaches, lifes cares somehow seem to melt, the moment you smell the ocean breeze.

So take your pick, and make your own memory at the Delaware beaches.

Read more here:

Delaware Beaches - Visit Delaware - Delaware Vacation

delaware-beaches – Delawareonline.com | Delaware news

Dogfish Head, Burley Oak team up for new brew

This winter, don't hibernate. Decorate

Milton's Xmas in Nov: New tree lights up town park

Five Sussex Central alumni inducted into hall of fame

Woodland Ferry keeps history alive

Lewes Polar Bear Plunge in Rehoboth Beach

At the Beach: Colbie Caillat, Andy Grammer and Gloriana

9 weird, icky and odd things to do in Delaware

Ghost Pepper Ice Cream: Waiver required

BBC Tavern, Espuma owners open Rehoboth eatery

Another stolen lifeguard stand bobs into view

2 hurt by robbers near Rehoboth Beach

Rehoboth says yes to new Dogfish brewpub

Podcast: Gov. Jack Markell talks Firefly, movies, TV

Rehoboth board makes waves over swimming pools

In Rehoboth, are pools a problem?

George Clinton in a funky mood before Dewey show

Cape fishing pier may reopen in September

See the article here:

delaware-beaches - Delawareonline.com | Delaware news

Delaware Beach, Ocean City Maryland Beach Guide & Business …

Beach-Net is designed and maintained by Coastal Images, Inc a Delaware Web Design Company in Fenwick Island, Delaware

Welcome to Beach-Net!, your travel guide for the Atlantic Ocean beach resorts of Ocean City, Maryland and Bethany Beach, Dewey Beach, Fenwick Island, Lewes and Rehoboth Beach, Delaware. Keep up to date with beach events in our Delaware & Maryland Beach Events Calendar, or the latest in Beach Weather, What's Here and What's New and be sure to visit the home pages of our local businesses.

Beach-Net is the home for Delaware & Maryland's Most popular beach web cams: Bethany Beach Web Cam | Rehoboth Beach Web Cam | Ocean City, Maryland Web Cam

Vacation Reservations

Delaware & Maryland Beaches

Beach Communities

Sales & Vacation Rentals

If you would like your business listed on Beach-net Contact us here!

Delaware Web Design & Internet Advertising - Coastal Images Inc.

Home | The Ocean | The Bay | Things To Do at the Beach | Restaurants & Dining | Hotels - Motels & Lodging Shopping | Beach Directions | Our Towns | Beach Real Estate & Vacation Rentals | Whats New What's Here | Beach Weather | Our Advertisers | Beach Maps

View original post here:

Delaware Beach, Ocean City Maryland Beach Guide & Business ...

Gulf Aerospace

Gulf Aerospace, Inc. is a Repair Station for unlimited aircraft accessories Class I & II and other accessories. Gulf Aerospace is engaged in the maintenance of aircraft accessories for military aircraft as well as air carriers and commercial operators. We are a small privately held company that has been in business since 1984. We specialize in L-100, C-130, L-188, P-3 and helicopter accessory repair.

We perform work for most divisions of the U.S. Government, Lockheed, most of the major engine repair facilities in the world, as well as many foreign governments and MRO entities.

Generally, the articles we repair fall into four service categories: pneumatics, hydraulics, fuel and electromechanical. You may view some of our test equipment and the equipment's specific parameters under Services. We repair most actuators, ATMs (air turbine machines), fans, gearboxes, generators, lights, motors, pumps, regulators, starters, turbines (cooling turbines), valves and winches.

Please see our Marketing List for an application that will allow you to find specific part numbers within our capabilities by listing the part number or the first few characters. You may also contact our Operations Manager at:

Operations Telephone: 813-855-4838 Fax: 813-891-1351 Email:

PLEASE NOTE: Gulf Aerospace, Inc. does not sell parts. Occasionally we have excess inventory which we list on the Inventory Locator Service.

Read this article:

Gulf Aerospace

Medical schools in New York (United States)

Page 1 of 2 Columbia University (College of Physicians and Surgeons) The College of Physicians and Surgeons is guided by the principle that medical education is university education. The acquisition of knowledge and ski... Address:630 West 168th Street New York University (Mount Sinai School of Medicine) Commitment to excellence in research, education, and patient care form the foundation that makes Mount Sinai School of Medicine (MSSM) in Manhattan on... Address:One Gustave L. Levy Place Cornell University (Joan & Sanford I. Weill Medical College) Founded in 1898, and affiliated with what is now NewYork-Presbyterian Hospital since 1927, Weill Medical College of Cornell University is among the to... Address:1300 York Avenue New York University (School of Medicine) The mission of the medical school is threefold: the training of physicians, the search for new knowledge, and the care of the sick. The three are inse... Address:530 First Avenue Yeshiva University (Albert Einstein College of Medicine) The Albert Einstein College of Medicine is one of the nations premier institutions for medical education, basic research and clinical investigation. ... Address:Jack and Pearl Resnick Campus, 1300 Morris Park Av. Albany Medical College One of the nation's oldest private medical schools, prides itself in offering an intimate, collegial environment which fosters humane values and g... Address:47 New Scotland Avenue New York Medical College New York Medical College owes its founding in 1860 to the vision of a group of civic leaders in New York City who believed that medicine should be pra... Address:Chartered 1860 University of Rochester (School of Medicine) The first Dean of the Medical School, Nobel Laureate George Hoyt Whipple, M.D., came to Rochester in 1921 to put a revolutionary concept into practice... Address:601 Elmwood Ave, Box 601A State University of New York at Buffalo (School of Medicine) This School is now 154 years old and was the founding faculty of this University. Up until 1962 it was part of a private University but, in that year,... Address:3435 Main Street Stony Brook University (School of Medicine) Stony Brook University's School of Medicine is located in the Health Sciences Center on the east side of Nicolls Road in Stony Brook, New York. Th... Address:Health Sciences Center Level 4

Go here to read the rest:

Medical schools in New York (United States)

What Libertarianism Is | Mises Daily

Property, Rights, and Liberty

Libertarians tend to agree on a wide array of policies and principles. Nonetheless, it is not easy to find consensus on what libertarianism's defining characteristic is, or on what distinguishes it from other political theories and systems.

Various formulations abound. It is said that libertarianism is about individual rights, property rights, the free market, capitalism, justice, or the nonaggression principle. Not just any of these will do, however. Capitalism and the free market describe the catallactic conditions that arise or are permitted in a libertarian society, but do not encompass other aspects of libertarianism. And individual rights, justice, and aggression collapse into property rights. As Murray Rothbard explained, individual rights are property rights. And justice is just giving someone his due, which depends on what his rights are.

The nonaggression principle is also dependent on property rights, since what aggression is depends on what our (property) rights are. If you hit me, it is aggression because I have a property right in my body. If I take from you the apple you possess, this is trespass aggression only because you own the apple. One cannot identify an act of aggression without implicitly assigning a corresponding property right to the victim.

So capitalism and the free market are too narrow, and justice, individual rights, and aggression all boil down to, or are defined in terms of, property rights. What of property rights, then? Is this what differentiates libertarianism from other political philosophies that we favor property rights, and all others do not? Surely such a claim is untenable.

After all, a property right is simply the exclusive right to control a scarce resource. Property rights specify which persons own that is, have the right to control various scarce resources in a given region or jurisdiction. Yet everyone and every political theory advance some theory of property. None of the various forms of socialism deny property rights; each version will specify an owner for every scarce resource. If the state nationalizes an industry, it is asserting ownership of these means of production. If the state taxes you, it is implicitly asserting ownership of the funds taken. If my land is transferred to a private developer by eminent domain statutes, the developer is now the owner. If the law allows a recipient of racial discrimination to sue his employer for a sum of money, he is the owner of the money.

Protection of and respect for property rights is thus not unique to libertarianism. What is distinctive about libertarianism is its particular property assignment rules: its view concerning who is the owner of each contestable resource, and how to determine this.

A system of property rights assigns a particular owner to every scarce resource. These resources obviously include natural resources such as land, fruits of trees, and so on. Objects found in nature are not the only scarce resources, however. Each human actor has, controls, and is identified and associated with a unique human body, which is also a scarce resource. Both human bodies and nonhuman, scarce resources are desired for use as means by actors in the pursuit of various goals.

Accordingly, any political theory or system must assign ownership rights in human bodies as well as in external things. Let us consider first the libertarian property assignment rules with respect to human bodies, and the corresponding notion of aggression as it pertains to bodies. Libertarians often vigorously assert the "nonaggression principle." As Ayn Rand said, "So long as men desire to live together, no man may initiate do you hear me? No man may start the use of physical force against others." Or, as Rothbard put it:

The libertarian creed rests upon one central axiom: that no man or group of men may aggress against the person or property of anyone else. This may be called the "nonaggression axiom." "Aggression" is defined as the initiation of the use or threat of physical violence against the person or property of anyone else. Aggression is therefore synonymous with invasion.

In other words, libertarians maintain that the only way to violate rights is by initiating force that is, by committing aggression. (Libertarianism also holds that, while the initiation of force against another person's body is impermissible, force used in response to aggression such as defensive, restitutive, or retaliatory/punitive force is justified.)

Now in the case of the body, it is clear what aggression is: invading the borders of someone's body, commonly called battery, or, more generally, using the body of another without his or her consent. The very notion of interpersonal aggression presupposes property rights in bodies more particularly, that each person is, at least prima facie, the owner of his own body.

Nonlibertarian political philosophies have a different view. Each person has some limited rights in his own body, but not complete or exclusive rights. Society or the state, purporting to be society's agent has certain rights in each citizen's body, too. This partial slavery is implicit in state actions and laws such as taxation, conscription, and drug prohibitions.

The libertarian says that each person is the full owner of his body: he has the right to control his body, to decide whether or not he ingests narcotics, joins an army, and so on. Those various nonlibertarians who endorse any such state prohibitions, however, necessarily maintain that the state, or society, is at least a partial owner of the body of those subject to such laws or even a complete owner in the case of conscriptees or nonaggressor "criminals" incarcerated for life. Libertarians believe in self-ownership. Nonlibertarians statists of all stripes advocate some form of slavery.

Without property rights, there is always the possibility of conflict over contestable (scarce) resources. By assigning an owner to each resource, legal systems make possible conflict-free use of resources, by establishing visible boundaries that nonowners can avoid. Libertarianism does not endorse just any property assignment rule, however. It favors self-ownership over other-ownership (slavery).

The libertarian seeks property assignment rules because he values or accepts various grundnorms such as justice, peace, prosperity, cooperation, conflict-avoidance, and civilization. The libertarian view is that self-ownership is the only property assignment rule compatible with these grundorms; it is implied by them.

As Professor Hoppe has shown, the assignment of ownership to a given resource must not be random, arbitrary, particularistic, or biased, if it is actually to be a property norm that can serve the function of conflict-avoidance. Property title has to be assigned to one of competing claimants based on "the existence of an objective, intersubjectively ascertainable link between owner and the" resource claimed. In the case of one's own body, it is the unique relationship between a person and his body his direct and immediate control over his body, and the fact that, at least in some sense, a body is a given person and vice versa that constitutes the objective link sufficient to give that person a claim to his body superior to typical third party claimants.

Moreover, any outsider who claims another's body cannot deny this objective link and its special status, since the outsider also necessarily presupposes this in his own case. This is so because, in seeking dominion over the other and in asserting ownership over the other's body, he has to presuppose his own ownership of his body. In so doing, the outsider demonstrates that he does place a certain significance on this link, even as (at the same time) he disregards the significance of the other's link to his own body.

Libertarianism recognizes that only the self-ownership rule is universalizable and compatible with the goals of peace, cooperation, and conflict-avoidance. We recognize that each person is prima facie the owner of his own body because, by virtue of his unique link to and connection with his own body his direct and immediate control over it he has a better claim to it than anyone else.

Libertarians apply similar reasoning in the case of other scarce resources namely, external objects in the world that, unlike bodies, were at one point unowned. In the case of bodies, the idea of aggression being impermissible immediately implies self-ownership. In the case of external objects, however, we must identify who the owner is before we can determine what constitutes aggression.

As in the case with bodies, humans need to be able to use external objects as means to achieve various ends. Because these things are scarce, there is also the potential for conflict. And, as in the case with bodies, libertarians favor assigning property rights so as to permit the peaceful, conflict-free, productive use of such resources. Thus, as in the case with bodies, property is assigned to the person with the best claim or link to a given scarce resource with the "best claim" standard based on the goals of permitting peaceful, conflict-free human interaction and use of resources.

Unlike human bodies, however, external objects are not parts of one's identity, are not directly controlled by one's will, and significantly they are initially unowned. Here, the libertarian realizes that the relevant objective link is appropriation the transformation or embordering of a previously unowned resource, Lockean homesteading, the first use or possession of the thing. Under this approach, the first (prior) user of a previously unowned thing has a prima facie better claim than a second (later) claimant, solely by virtue of his being earlier.

Why is appropriation the relevant link for determination of ownership? First, keep in mind that the question with respect to such scarce resources is: who is the resource's owner? Recall that ownership is the right to control, use, or possess, while possession is actual control "the factual authority that a person exercises over a corporeal thing." The question is not who has physical possession; it is who has ownership.

Thus, asking who is the owner of a resource presupposes a distinction between ownership and possession between the right to control, and actual control. And the answer has to take into account the nature of previously unowned things namely, that they must at some point become owned by a first owner.

The answer must also take into account the presupposed goals of those seeking this answer: rules that permit conflict-free use of resources. For this reason, the answer cannot be whoever has the resource or whoever is able to take it is its owner. To hold such a view is to adopt a might-makes-right system, where ownership collapses into possession for want of a distinction. Such a system, far from avoiding conflict, makes conflict inevitable.

Instead of a might-makes-right approach, from the insights noted above it is obvious that ownership presupposes the prior-later distinction: whoever any given system specifies as the owner of a resource, he has a better claim than latecomers. If he does not, then he is not an owner, but merely the current user or possessor. If he is supposed an owner on the might-makes-right principle, in which there is no such thing as ownership, it contradicts the presuppositions of the inquiry itself. If the first owner does not have a better claim than latecomers, then he is not an owner, but merely a possessor, and there is no such thing as ownership.

More generally, latecomers' claims are inferior to those of prior possessors or claimants, who either homesteaded the resource or who can trace their title back to the homesteader or earlier owner. The crucial importance of the prior-later distinction to libertarian theory is why Professor Hoppe repeatedly emphasizes it in his writing.

Thus, the libertarian position on property rights is that, in order to permit conflict-free, productive use of scarce resources, property titles to particular resources are assigned to particular owners. As noted above, however, the title assignment must not be random, arbitrary, or particularistic; instead, it has to be assigned based on "the existence of an objective, intersubjectively ascertainable link between owner" and the resource claimed. As can be seen from the considerations presented above, the link is the physical transformation or embordering of the original homesteader, or a chain of title traceable by contract back to him.

Not only libertarians are civilized. Most people give some weight to some of the above considerations. In their eyes, a person is the owner of his own body usually. A homesteader owns the resource he appropriates unless the state takes it from him "by operation of law." This is the principal distinction between libertarians and nonlibertarians: Libertarians are consistently opposed to aggression, defined in terms of invasion of property borders, where property rights are understood to be assigned on the basis of self-ownership in the case of bodies. And in the case of other things, rights are understood on the basis of prior possession or homesteading and contractual transfer of title.

This framework for rights is motivated by the libertarian's consistent and principled valuing of peaceful interaction and cooperation in short, of civilized behavior. A parallel to the Misesian view of human action may be illuminating here. According to Mises, human action is aimed at alleviating some felt uneasiness. Thus, means are employed, according to the actor's understanding of causal laws, to achieve various ends ultimately, the removal of uneasiness.

Civilized man feels uneasy at the prospect of violent struggles with others. On the one hand, he wants, for some practical reason, to control a given scarce resource and to use violence against another person, if necessary, to achieve this control. On the other hand, he also wants to avoid a wrongful use of force. Civilized man, for some reason, feels reluctance, uneasiness, at the prospect of violent interaction with his fellow man. Perhaps he has reluctance to violently clash with others over certain objects because he has empathy with them. Perhaps the instinct to cooperate is a result of social evolution. As Mises noted,

There are people whose only aim is to improve the condition of their own ego. There are other people with whom awareness of the troubles of their fellow men causes as much uneasiness as or even more uneasiness than their own wants.

Whatever the reason, because of this uneasiness, when there is the potential for violent conflict, the civilized man seeks justification for the forceful control of a scarce resource that he desires but which some other person opposes. Empathy or whatever spurs man to adopt the libertarian grundnorms gives rise to a certain form of uneasiness, which gives rise to ethical action.

Civilized man may be defined as he who seeks justification for the use of interpersonal violence. When the inevitable need to engage in violence arises for defense of life or property civilized man seeks justification. Naturally, since this justification-seeking is done by people who are inclined to reason and peace (justification is after all a peaceful activity that necessarily takes place during discourse), what they seek are rules that are fair, potentially acceptable to all, grounded in the nature of things, and universalizable, and which permit conflict-free use of resources.

Libertarian property rights principles emerge as the only candidate that satisfies these criteria. Thus, if civilized man is he who seeks justification for the use of violence, the libertarian is he who is serious about this endeavor. He has a deep, principled, innate opposition to violence, and an equally deep commitment to peace and cooperation.

For the foregoing reasons, libertarianism may be said to be the political philosophy that consistently favors social rules aimed at promoting peace, prosperity, and cooperation. It recognizes that the only rules that satisfy the civilized grundnorms are the self-ownership principle and the Lockean homesteading principle, applied as consistently as possible.

And as I have argued elsewhere, because the state necessarily commits aggression, the consistent libertarian, in opposing aggression, is also an anarchist.

This article is adapted from a "What Libertarianism Is," in Jrg Guido Hlsmann & Stephan Kinsella, eds., Property, Freedom, and Society: Essays in Honor of Hans-Hermann Hoppe (Mises Institute, 2009). An abbreviated version of this article was incorporated into the author's speech "Intellectual Property and Libertarianism," presented at Mises University 2009 (July 30, 2009; audio).

Original post:

What Libertarianism Is | Mises Daily

Italian Futurism Events, Exhibitions, Scholarship

CALL FOR PAPERS: Columbia Seminar in Modern Italian Studies Due: April 25

For those interested in presenting a paper at the Columbia Seminar in Modern Italian Studies, please submit an abstract of what you propose by April 25, 2016. The abstract should be no more than 300 words. In your email please also include a copy of your CV, and two suggestions for a respondent to your paper with their email information. Respondents should be within reasonable commuting distance to New York City.

Please note the following: seminar presenters are expected to have a completed PhD and be able to present their work and engage in dialogue in English; also, travel funding is limited and determined on a case by case basis; finally, attendees to the seminar come from a variety of fields within Italian Studies, so please calibrate your proposal for an audience beyond your particular area of specialization.

All materials should be emailed to modernitalianseminar@gmail.com.

For your information, the mission statement of the seminar is as follows:

This seminar is concerned with political, social, cultural, and religious aspects of Italian life from 1815 to the present. In recent years, the seminar has stressed an interdisciplinary approach to Italian studies, increasing the participation of anthropologists and scholars of art, film, and literature. The seminar generally meets on the second Friday of the month during the academic year to discuss a paper presented by a member or an invited speaker. Papers cover a wide range of topics, approaches, and methodologies.

Today at 4:39pm No Comments

Belated congrats to Dan Hurlin and the Red Wing Performing group on their Jim Henson Foundation Grant for "Demolishing Everything with Amazing Speed"

"Demolishing Everything with Amazing Speed" is a collection of four plays, written specifically for the puppet stage by Italian Futurist painter Fortunato Depero in 1917. Penned by hand in Depero's notebooks, they have been translated into English for the first time and will receive their world premiere approximately 100 years after they were written, revealing startling similarities between our world and the culture of WWI. As the Futurists embraced the technology of their day (automobiles, airplanes, telephones, etc.) so this production will embrace the technology of ours with live feed, filmed and computer animated sequences, and 3-D printed puppets.

Timeline Photos

Feb 4th 6:46pm No Comments

Link:

Italian Futurism Events, Exhibitions, Scholarship

Stem Cell Therapy || Spinal Cord Injury || Stem Cell …

Spinal Cord Injury

Damage to the spinal cord usually results in impairments or loss of muscle movement, muscle control, sensation and body system control.

Presently, post-accident care for spinal cord injury patients focuses on extensive physical therapy, occupational therapy, and other rehabilitation therapies; teaching the injured person how to cope with their disability.

A number of published papers and case studies support the feasibility of treating spinal cord injury with allogeneic human umbilical cord tissue-derived stem cells and autologous bone marrow-derived stem cells.

Feasibility of combination allogeneic stem cell therapy for spinal cord injury: a case report co-authored by Stem Cell Institute Founder Dr. Neil Riordan references many of them. Published improvements include improved ASIA scores, improved bladder and/or bowel function, recovered sexual function, and increased muscle control.

The adult stem cells used to treat spinal cord injuries at the Stem Cell Institute come from two sources: the patients own bone marrow (autologous mesenchymal and CD34+) and human umbilical cord tissue(allogeneic mesenchymal). Umbilical cords are donated by mothers after normal, healthy births.

A licensed anesthesiologist harvests bone marrow from both hips under light general anesthesia in a hospital operating room. This procedure takes about 1 1/2 2 hours. Before they are administered to the patient, these bone marrow-derived stem cells must pass testing for quality, bacterial contamination (aerobic and anaerobic) and endotoxin.

All donated umbilical cords are screened for viruses and bacteria to International Blood Bank Standards.

Only about 1 in 10 donated umbilical cords pass our rigorous screening process.

Through retrospective analysis of our cases, weve identified proteins and genes that allow us to screen several hundred umbilical cord donations to find the ones that we know are most effective. We only use these cells and we call them golden cells.

We go through a very high throughput screening process to find cells that we know have the best anti-inflammatory activity, the best immune modulating capacity, and the best ability to stimulate regeneration.

The bodys immune system is unable to recognize umbilical cord-derived mesenchmyal stem cells as foreign and therefore they are not rejected. HUCT stem cells have been administered thousands of times at the Stem Cell Institute and there has never been a single instance rejection (graft vs. host disease). Umbilical cord-derived mesenchymal stem cells also proliferate/differentiate more efficiently than older cells, such as those found in the fat and therefore, they are considered to be more potent.

VIDEO Watch Professor Arnold Caplan explain how this works.

Our stem cell treatment protocol for spinal cord injury calls for a total of 16 injections over the course of 4 weeks.

The bone marrow-derived and umbilical cord tissue-derived stem cells are both administered intravenously by a licensed physician.

They are also injected intrathecally (into the spinal fluid) by an experienced anesthesiologist. Intrathecal injection enables the stem cells to bypass the blood-brain barrier and migrate to the injury site within the spinal canal.

*Upon availability

Proper follow-up is essential for us to monitor your condition after treatment. It also helps us evaluate treatment efficacy and improve our protocols based on reported outcomes over time.

Therefore, one of our medical staff will be contacting you at the following intervals: 1 month, 3 months, 4 months, and 1 year.

Yes, we do. Several of our spinal cord injury patients currently volunteer to speak with prospective patients. Your patient coordinator will be happy to put you in touch with them once your treatment evaluation has been completed.

Weve also published written testimonials, news articles and videos from our spinal cord injury patients. Please take a look!

You may contact us by telephone 1 (800) 980-STEM (toll-free in US) and 1 (954) 358-3382.

To apply for stem cell treatment, please complete this stem cell therapy patient application form.

*Please not that the above treatment outline is typical. However, actual treatment scheduling might vary slightly.

Read more:

Stem Cell Therapy || Spinal Cord Injury || Stem Cell ...

Overview of Stem Cell Therapy

By: Ian Murnaghan BSc (hons), MSc - Updated: 24 Dec 2015 | *Discuss

With the wealth of information available on stem cell therapy, it can be overwhelming to read through what is often complex and confusing material. A quick fact sheet on stem cell therapy is a good way to familiarise yourself with the subject and decide if further reading is of interest or benefit.

Finally, there are additional issues even when cells are identified, isolated and grown. The new cells require implantation in a person and they must then essentially learn how to effectively function alongside a person's own tissues. For instance, if you imagine a cardiac cell being implanted, think about the fact that it may not beat with the same rhythm of a person's heart cells and is thus ineffective. A person's immune system may also recognise the transplanted cells as foreign bodies and this can trigger an immune reaction that results in rejection of the new cells.

The potential of stem cell therapy to ease human suffering and dramatically affect disease has motivated scientists to research ways of enhancing current stem cell therapies and develop new ones. Stem cell therapy remains a new science but the results have thus far been impressive enough that scientists are eagerly studying ways to treat the many diseases that you or a loved one may suffer from one day.

You might also like...

Share Your Story, Join the Discussion or Seek Advice..

Mona - 24-Dec-15 @ 9:57 AM

Maureen - 16-Oct-15 @ 3:40 AM

Dr. Lawrence - 16-Apr-15 @ 11:53 AM

ExploreStemCells - 31-Mar-15 @ 11:56 AM

Abdul Bashir - 28-Mar-15 @ 8:26 PM

mahendra - 22-Jan-15 @ 3:48 PM

mahendra - 22-Jan-15 @ 3:32 PM

Bala - 8-Oct-14 @ 8:34 AM

R - 28-Sep-14 @ 9:52 AM

Nivia Gomez - 23-Sep-14 @ 11:11 PM

Vivek - 7-Sep-14 @ 7:30 AM

mahen - 28-Aug-14 @ 9:49 AM

DOLLY - 24-Oct-11 @ 3:09 AM

monica - 23-Oct-11 @ 6:25 PM

Title:

(never shown)

See original here:

Overview of Stem Cell Therapy

Stem Cells – Learn Genetics

explore

Stem cells play many important roles in our bodies from embryonic development through adulthood.

learn more

Stem cells can now be created from differentiated cells.

learn more

Learn about some different types of stem cells and their potential for treating diseases.

interactive explore

Send activating signals to stem cells and watch them get to work!

learn more

Stem cell therapies have been curing diseases for decades.

explore

Researchers are working on new ways to use stem cells in medicine.

learn more

New developments in research are changing the conversation about stem cells.

Supported by a Science Education Partnership Award (SEPA) Grant No. R25RR023288 from the National Center for Research Resources, a component of the NIH. The contents provided here are solely the responsibility of the authors and do not necessarily represent the official views of NIH.

APA format: Genetic Science Learning Center (2014, June 22) Stem Cells. Learn.Genetics. Retrieved March 28, 2016, from http://learn.genetics.utah.edu/content/stemcells/ MLA format: Genetic Science Learning Center. "Stem Cells." Learn.Genetics 28 March 2016 <http://learn.genetics.utah.edu/content/stemcells/> Chicago format: Genetic Science Learning Center, "Stem Cells," Learn.Genetics, 22 June 2014, <http://learn.genetics.utah.edu/content/stemcells/> (28 March 2016)

Read the original post:

Stem Cells - Learn Genetics

Miami Stem Cell Treatment Center

The Advancement of Stem Cell Technology

At the Miami Stem Cell Treatment Center we provide consultation relating to clinical research and deployment of stem cell therapy for patients suffering from diseases that may have limited treatment options. Stem cell therapy is not for everyone but under the right circumstances and under the right conditions there may be an opportunity for stem cell therapy to be effective. But stem cell therapy is not, at present time, is not the holy grail we all would like it to be.

Our expertise involves a deep commitment and long-term understanding, knowledge and experience in clinical research and the advancement of regenerative medicine.

We firmly support respected guidance regarding stem cell therapy indicating that it should be autologous, include ONLY minimal manipulation of regenerative cells, and be consistent with homologous use.

We do NOT advise the addition of chemicals or enzymes to produce the stromal vascular fraction (SVF).

We believe that treatment protocols ought to be reviewed and approved by an IRB (Institutional Review Board) which is registered with the U.S. Department of Health, Office of Human Research Protection (OHRP) or United States F.D.A, or both.

Because we are committed to the principles and ideals of regenerative medicine, we are continuously updating, researching, and learning more on how to help patients and advance the state of the art of regenerative medicine. Accordingly we provide all patients who are interested in considering stem cell therapy an honest opinion as to the potential benefits and risks of stem cell therapy for their presenting condition.

At the Miami Stem Cell Treatment Center we will review your medical records and condition, and then consider an array of ongoing IRB-approved protocols, registered with Clnicaltrials.gov, a service of the National Institute of Health and the National Library of Congress, to provide patients with a wide variety of treatment options and considerations for medical disorders that may benefit from adult stem cell-based regenerative therapy.

Read more:

Miami Stem Cell Treatment Center

Stem Cell Treatment, Non-Surgical Stem Cell Therapy

PROVIDING NON-SURGICAL ALTERNATIVE TO JOINT AND BACK PROBLEMS

Experience Counts- Located in Jacksonville, Florida, we are the leader in Adult Stem Cell and Platelet-Rich Plasma (PRP) Procedures. We have performed these procedures for more than ten years with over 90 % results and ZERO side effects.

Top Stem Cell Center in the World:Unique Proven Clinical Protocols, over ten years of experience and hundreds of satisfied patients is why people from around the world come to us for their adult stem cell and Platelet-Rich Plasma Procedures.

FIVE reasons you need to know before you decide. You will see why people around the world choose us over other Clinics.

Glaring Differences

SmartChoice

Clinic

Other Leading Stem Cell Clinics (including Regenexx, Cell surgical Networks and others)

1. Gene and Cellular tests to evaluate your stem cell functions.

YES

NO

2. Use BOTH Bone Marrow and Fat Stem Cells, along with PRP.

YES

NO

3. Process Your Stem Cells with safety and use no dangerous chemicals like collagenase.

YES

NO

4. Use Dynamic Ultrasound Guided Injections for Precision and safety (and NOT use X-Rays that can damage your cells).

YES

NO

5. Improve body functions with proprietary Hormones and Supplements, so you get the best possible clinical outcome.

YES

NO

After successfully using SmartChoice Procedures over the past five years to treat many patients with various orthopedic and sports medicine conditions from around the country, we truly believe that Adult Stem cells are making a seismic change in the science of medicine.

We hope the information provided in this website regarding our innovative, non-surgical SmartChoice Joint Procedures will help guide you in your decision to find alternatives to surgery for your spineand joints.

Learn More

And if you are considering a knee, hip or other joint replacement, you might want to learn about how the adult stem cells and PRP procedures stack up against these risky orthopedic surgeries.

For many patients, the Knee or Hip Joint Replacement may not be an option due to their younger age, especially considering the fact that we are living longer and more active lifestyle and the Joint Replacement may not last for more than 10 to 15 years. Also, the injuries may not be serious enough to require any surgery in first place.

As an alternative to the knee and hip (and other joints) surgery or replacement, SmartChoice Joint Procedures may help alleviate joint pain and the medical condition that causes it with a simple office injection procedure. We encourage the patients to walk the same day and most experience almost no downtime after our procedures.

Learn More

Got a question for Dr Garg, M.D. about Stem Cell and PRP Procedures?

Please fill out the form below and Stem Cell Expert Dr Garg will answer your question. Thank You.

Patient Stories

"What a difference it has made"

We are in Kissimmee just now and am managing to play golf without any pain. We were over in Kissimmee in October 2014 and played golf for the first time since I had the stem cell replacement and couldn't believe that I had no pain at all. This is great. Please pass on my appreciation to Dr Garg for the great work he did on my knees. What a difference it has made.

Thanks

Marion C., Lives in Scotland

More Testimonials

Disclaimer: Platelet Rich Plasma, Stem Cells from fat or bone marrow, and other treatments and modalities mentioned in this web site are medical techniques that may or may not be considered mainstream. As with any medical treatment, results will vary among individuals, and there is no implication that you will heal or receive the same outcome as patients herein. There could be pain or other substantial risks involved. These concerns should be discussed with your health care provider prior to any treatment so that you have proper informed consent and understand that there are no guarantees to healing.

THE INFORMATION IN THIS WEBSITE IS OFFERED FOR EDUCATIONAL PURPOSES ONLY AND DOES NOT IMPLY OR GIVE MEDICAL ADVICE. THE PHOTOS USED MAY BE MODELS AND NOT PATIENTS.

See the rest here:

Stem Cell Treatment, Non-Surgical Stem Cell Therapy

International Space Station panoramic tour / Highlights …

This 360 panorama allows you to explore the International Space Stations third module, Zvezda. Launched on 12 July 2000, the Russian module supplies life support for the Station and crewquarters. All five of Europes Automated Transfer Vehicles docked with the module. The images to create this view were taken by ESA astronaut Samantha Cristoforetti during her Futura mission in 2015; the cosmonaut in the picture is Gennady Padalka.

Explore Zvezda in Flickr, Facebook or Youtubeformatwith your mobile phone and virtual-reality headset, or take the full tour including all Space Station modules with videos and extra information below. We will release a new Space Station module in 360 every week on Thursday.

Previous releases:

Click here to explore in full screen

Just before ESA astronaut Samantha Cristoforetti left the International Space Station after 199 days, she took up to 15 pictures inside each module. Now, the images have been stitched together to create this interactive panorama.

These panoramas offer a snapshot of the International Space Station as it was in June 2015, after moving the Leonardo storage module to a new location

Explore the modules and zoom in to see more detail. Use the map or the arrow icons by the module hatches to go to another section.

You can explore every part of the Space Station and click on the play icons to watch an astronaut explain or demonstrate an item, and click on the text icons for web articles.

We recommend exploring in a full screen to do justice to this immersive interactive panorama.

The tour was improved with the assistance of Thomas Rauscher in Vienna, Austria, who helped to stitch the images together for some modules.

More here:

International Space Station panoramic tour / Highlights ...

Aerospace Jobs in Leesburg, VA | LinkedIn

CancelDismiss

Want more from your job alerts? Join LinkedIn so employers can find you.

CancelSave

Like this search?

Get notified when new jobs match what you're looking for

Rockville, MarylandMarch 17, 2016

This role is responsible for driving revenue from various online initiatives and direct marketing campaigns for multiple products in the ...

Greenway, VirginiaMarch 23, 2016

We are currently seeking a Manager in CIO Advisory for our Management Consulting practice to join us in our Tyson's Corner office.

Rockville, MarylandMarch 22, 2016

The goal of the interaction is to bring real world application, professional experience and relevance to what the educator is teaching.

Chantilly, VirginiaMarch 15, 2016

We are looking for a Signal Processing Digital HW Engineer to: Interface with program office and government personnel.

Chantilly, VirginiaMarch 8, 2016

Broad range of computer skills/experience including LINUX development or administration, networking such as TCP/UDP/DNS/IP and firewalls ...

Applied Defense Solutions, Inc.

Chantilly, VirginiaMarch 24, 2016

During the 10-year history of our small company, our highly technical staff has operational experience flying more than 20 satellites ...

Sterling, VirginiaMarch 18, 2016

NCS delivers the full spectrum of intelligence support, from strategic thought leadership to tactical operational support to leading edge...

Chantilly, VirginiaMarch 1, 2016

If you are a dynamic, successful, driven professional, Orbital ATK is the company that will further your experience and career growth.

Sterling, VirginiaFebruary 17, 2016

NCS delivers the full spectrum of intelligence support, from strategic thought leadership to tactical operational support to leading edge...

Chantilly, VirginiaMarch 1, 2016

Specifically focus upon techniques to perform statistical analysis looking for divergence from a typical pattern as well as out-of-family...

Integrity Applications Incorporated

Chantilly, VirginiaFebruary 23, 2016

We are always looking for bright, innovative and talented people to join our team of highly skilled professionals.IAI offerschallenging ...

Chantilly, VirginiaFebruary 13, 2016

We are always looking for bright, innovative and talented people to join our team of highly skilled professionals.

Chantilly, VirginiaMarch 1, 2016

If you are a dynamic, successful, driven professional, Orbital ATK is the company that will further your experience and career growth.

Chantilly, VirginiaFebruary 10, 2016

Apogee Integration is seeking a Systems Engineer to work in Chantilly, VA.

Chantilly, VirginiaMarch 1, 2016

If you are a dynamic, successful, driven professional, Orbital ATK is the company that will further your experience and career growth.

Chantilly, VirginiaMarch 25, 2016

We are looking for a Communications/Signal Processing Engineer to: A minimum of two years experience is also preferred.

Chantilly, VirginiaMarch 8, 2016

We are looking for a Senior Image Scientist to: Must have excellent verbal, written, and visual communication skills.

Chantilly, VirginiaMarch 21, 2016

Knowledge of the missions and experience working with Intelligence Community mission partners across the SIGINT discipline.

Chantilly, VirginiaMarch 14, 2016

We are seeking a Communication Systems Spectrum Engineer to provide spectrum management regulatory and policy expertise to design, ...

Chantilly, VirginiaMarch 15, 2016

We are looking for a Senior Communications Terminal Project Engineer to support, advise and provide programmatic and technical oversight ...

Chantilly, VirginiaMarch 8, 2016

We also apply more than 50 years of experience with space systems to projects for civil agencies like NASA and the National Oceanic and ...

Herndon, VirginiaMarch 25, 2016

The Boeing Company is seeking an Information Technology (IT) Systems Administrator interested in being a member of a fast-paced ...

Chantilly, VirginiaMarch 16, 2016

We are looking for a Senior Acquisition Engineer to perform General Systems Engineering and Integration (GSE&I) activities as part of the...

Chantilly, VirginiaMarch 9, 2016

We are looking for a Senior Acquisition Engineer to perform General Systems Engineering and Integration (GSE&I) activities as part of the...

Chantilly, VirginiaMarch 4, 2016

Experience with mission data processing systems & approaches. We are looking for an Senior Ground Segment Systems Engineer to:

LinkedIn Corporation 2016

See the article here:

Aerospace Jobs in Leesburg, VA | LinkedIn

North Atlantic Treaty Organization (NATO) | Britannica.com

North Atlantic Treaty Organization (NATO), military alliance established by the North Atlantic Treaty (also called the Washington Treaty) of April 4, 1949, which sought to create a counterweight to Soviet armies stationed in central and eastern Europe after World War II. Its original members were Belgium, Canada, Denmark, France, Iceland, Italy, Luxembourg, the Netherlands, Norway, Portugal, the United Kingdom, and the United States. Joining the original signatories were Greece and Turkey (1952); West Germany (1955; from 1990 as Germany); Spain (1982); the Czech Republic, Hungary, and Poland (1999); Bulgaria, Estonia, Latvia, Lithuania, Romania, Slovakia, and Slovenia (2004); and Albania and Croatia (2009). France withdrew from the integrated military command of NATO in 1966 but remained a member of the organization; it resumed its position in NATOs military command in 2009.

The heart of NATO is expressed in Article 5 of the North Atlantic Treaty, in which the signatory members agree that

an armed attack against one or more of them in Europe or North America shall be considered an attack against them all; and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defense recognized by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area.

NATO invoked Article 5 for the first time in 2001, after terrorist attacks organized by exiled Saudi Arabian millionaire Osama bin Laden destroyed the World Trade Center in New York City and part of the Pentagon outside Washington, D.C., killing some 3,000 people.

Article 6 defines the geographic scope of the treaty as covering an armed attack on the territory of any of the Parties in Europe or North America. Other articles commit the allies to strengthening their democratic institutions, to building their collective military capability, to consulting each other, and to remaining open to inviting other European states to join.

Barkley, Alben W.: North Atlantic Treaty signingEncyclopdia Britannica, Inc.After World War II in 1945, western Europe was economically exhausted and militarily weak (the western Allies had rapidly and drastically reduced their armies at the end of the war), and newly powerful communist parties had arisen in France and Italy. By contrast, the Soviet Union had emerged from the war with its armies dominating all the states of central and eastern Europe, and by 1948 communists under Moscows sponsorship had consolidated their control of the governments of those countries and suppressed all noncommunist political activity. What became known as the Iron Curtain, a term popularized by Winston Churchill, had descended over central and eastern Europe. Further, wartime cooperation between the western Allies and the Soviets had completely broken down. Each side was organizing its own sector of occupied Germany, so that two German states would emerge, a democratic one in the west and a communist one in the east.

In 1948 the United States launched the Marshall Plan, which infused massive amounts of economic aid to the countries of western and southern Europe on the condition that they cooperate with each other and engage in joint planning to hasten their mutual recovery. As for military recovery, under the Brussels Treaty of 1948, the United Kingdom, France, and the Low CountriesBelgium, the Netherlands, and Luxembourgconcluded a collective-defense agreement called the Western European Union. It was soon recognized, however, that a more formidable alliance would be required to provide an adequate military counterweight to the Soviets.

By this time Britain, Canada, and the United States had already engaged in secret exploratory talks on security arrangements that would serve as an alternative to the United Nations (UN), which was becoming paralyzed by the rapidly emerging Cold War. In March 1948, following a virtual communist coup dtat in Czechoslovakia in February, the three governments began discussions on a multilateral collective-defense scheme that would enhance Western security and promote democratic values. These discussions were eventually joined by France, the Low Countries, and Norway and in April 1949 resulted in the North Atlantic Treaty.

Spurred by the North Korean invasion of South Korea in June 1950, the United States took steps to demonstrate that it would resist any Soviet military expansion or pressures in Europe. General Dwight D. Eisenhower, the leader of the Allied forces in western Europe in World War II, was named Supreme Allied Commander Europe (SACEUR) by the North Atlantic Council (NATOs governing body) in December 1950. He was followed as SACEUR by a succession of American generals.

The North Atlantic Council, which was established soon after the treaty came into effect, is composed of ministerial representatives of the member states, who meet at least twice a year. At other times the council, chaired by the NATO secretary-general, remains in permanent session at the ambassadorial level. Just as the position of SACEUR has always been held by an American, the secretary-generalship has always been held by a European.

NATOs military organization encompasses a complete system of commands for possible wartime use. The Military Committee, consisting of representatives of the military chiefs of staff of the member states, subsumes two strategic commands: Allied Command Operations (ACO) and Allied Command Transformation (ACT). ACO is headed by the SACEUR and located at Supreme Headquarters Allied Powers Europe (SHAPE) in Casteau, Belgium. ACT is headquartered in Norfolk, Virginia, U.S. During the alliances first 20 years, more than $3 billion worth of infrastructure for NATO forcesbases, airfields, pipelines, communications networks, depotswas jointly planned, financed, and built, with about one-third of the funding from the United States. NATO funding generally is not used for the procurement of military equipment, which is provided by the member statesthough the NATO Airborne Early Warning Force, a fleet of radar-bearing aircraft designed to protect against a surprise low-flying attack, was funded jointly.

A serious issue confronting NATO in the early and mid-1950s was the negotiation of West Germanys participation in the alliance. The prospect of a rearmed Germany was understandably greeted with widespread unease and hesitancy in western Europe, but the countrys strength had long been recognized as necessary to protect western Europe from a possible Soviet invasion. Accordingly, arrangements for West Germanys safe participation in the alliance were worked out as part of the Paris Agreements of October 1954, which ended the occupation of West German territory by the western Allies and provided for both the limitation of West German armaments and the countrys accession to the Brussels Treaty. In May 1955 West Germany joined NATO, which prompted the Soviet Union to form the Warsaw Pact alliance in central and eastern Europe the same year. The West Germans subsequently contributed many divisions and substantial air forces to the NATO alliance. By the time the Cold War ended, some 900,000 troopsnearly half of them from six countries (United States, United Kingdom, France, Belgium, Canada, and the Netherlands)were stationed in West Germany.

Frances relationship with NATO became strained after 1958, as President Charles de Gaulle increasingly criticized the organizations domination by the United States and the intrusion upon French sovereignty by NATOs many international staffs and activities. He argued that such integration subjected France to automatic war at the decision of foreigners. In July 1966 France formally withdrew from the military command structure of NATO and required NATO forces and headquarters to leave French soil; nevertheless, de Gaulle proclaimed continued French adherence to the North Atlantic Treaty in case of unprovoked aggression. After NATO moved its headquarters from Paris to Brussels, France maintained a liaison relationship with NATOs integrated military staffs, continued to sit in the council, and continued to maintain and deploy ground forces in West Germany, though it did so under new bilateral agreements with the West Germans rather than under NATO jurisdiction. In 2009 France rejoined the military command structure of NATO.

From its founding, NATOs primary purpose was to unify and strengthen the Western Allies military response to a possible invasion of western Europe by the Soviet Union and its Warsaw Pact allies. In the early 1950s NATO relied partly on the threat of massive nuclear retaliation from the United States to counter the Warsaw Pacts much larger ground forces. Beginning in 1957, this policy was supplemented by the deployment of American nuclear weapons in western European bases. NATO later adopted a flexible response strategy, which the United States interpreted to mean that a war in Europe did not have to escalate to an all-out nuclear exchange. Under this strategy, many Allied forces were equipped with American battlefield and theatre nuclear weapons under a dual-control (or dual-key) system, which allowed both the country hosting the weapons and the United States to veto their use. Britain retained control of its strategic nuclear arsenal but brought it within NATOs planning structures; Frances nuclear forces remained completely autonomous.

A conventional and nuclear stalemate between the two sides continued through the construction of the Berlin Wall in the early 1960s, dtente in the 1970s, and the resurgence of Cold War tensions in the 1980s after the Soviet Unions invasion of Afghanistan in 1979 and the election of U.S. President Ronald Reagan in 1980. After 1985, however, far-reaching economic and political reforms introduced by Soviet leader Mikhail Gorbachev fundamentally altered the status quo. In July 1989 Gorbachev announced that Moscow would no longer prop up communist governments in central and eastern Europe and thereby signaled his tacit acceptance of their replacement by freely elected (and noncommunist) administrations. Moscows abandonment of control over central and eastern Europe meant the dissipation of much of the military threat that the Warsaw Pact had formerly posed to western Europe, a fact that led some to question the need to retain NATO as a military organizationespecially after the Warsaw Pacts dissolution in 1991. The reunification of Germany in October 1990 and its retention of NATO membership created both a need and an opportunity for NATO to be transformed into a more political alliance devoted to maintaining international stability in Europe.

After the Cold War, NATO was reconceived as a cooperative-security organization whose mandate was to include two main objectives: to foster dialogue and cooperation with former adversaries in the Warsaw Pact and to manage conflicts in areas on the European periphery, such as the Balkans. In keeping with the first objective, NATO established the North Atlantic Cooperation Council (1991; later replaced by the Euro-Atlantic Partnership Council) to provide a forum for the exchange of views on political and security issues, as well as the Partnership for Peace (PfP) program (1994) to enhance European security and stability through joint military training exercises with NATO and non-NATO states, including the former Soviet republics and allies. Special cooperative links were also set up with two PfP countries: Russia and Ukraine.

The second objective entailed NATOs first use of military force, when it entered the war in Bosnia and Herzegovina in 1995 by staging air strikes against Bosnian Serb positions around the capital city of Sarajevo. The subsequent Dayton Accords, which were initialed by representatives of Bosnia and Herzegovina, the Republic of Croatia, and the Federal Republic of Yugoslavia, committed each state to respecting the others sovereignty and to settling disputes peacefully; it also laid the groundwork for stationing NATO peacekeeping troops in the region. A 60,000-strong Implementation Force (IFOR) was initially deployed, though a smaller contingent remained in Bosnia under a different name, the Stabilization Force (SFOR). In March 1999 NATO launched massive air strikes against Serbia in an attempt to force the Yugoslav government of Slobodan Miloevi to accede to diplomatic provisions designed to protect the predominantly Muslim Albanian population in the province of Kosovo. Under the terms of a negotiated settlement to the fighting, NATO deployed a peacekeeping force called the Kosovo Force (KFOR).

The crisis over Kosovo and the ensuing war gave renewed impetus to efforts by the European Union (EU) to construct a new crisis-intervention force, which would make the EU less dependent on NATO and U.S. military resources for conflict management. These efforts prompted significant debates about whether enhancing the EUs defensive capabilities would strengthen or weaken NATO. Simultaneously there was much discussion of the future of NATO in the post-Cold War era. Some observers argued that the alliance should be dissolved, noting that it was created to confront an enemy that no longer existed; others called for a broad expansion of NATO membership to include Russia. Most suggested alternative roles, including peacekeeping. By the start of the second decade of the 21st century, it appeared likely that the EU would not develop capabilities competitive with those of NATO or even seek to do so; as a result, earlier worries associated with the spectre of rivalry between the two Brussels-based organizations dissipated.

North Atlantic Treaty Organization: flag-raising ceremony, 1999NATO photosDuring the presidency of Bill Clinton (19932001), the United States led an initiative to enlarge NATO membership gradually to include some of the former Soviet allies. In the concurrent debate over enlargement, supporters of the initiative argued that NATO membership was the best way to begin the long process of integrating these states into regional political and economic institutions such as the EU. Some also feared future Russian aggression and suggested that NATO membership would guarantee freedom and security for the newly democratic regimes. Opponents pointed to the enormous cost of modernizing the military forces of new members; they also argued that enlargement, which Russia would regard as a provocation, would hinder democracy in that country and enhance the influence of hard-liners. Despite these disagreements, the Czech Republic, Hungary, and Poland joined NATO in 1999; Bulgaria, Estonia, Latvia, Lithuania, Romania, Slovakia, and Slovenia were admitted in 2004; and Albania and Croatia acceded to the alliance in 2009.

Meanwhile, by the beginning of the 21st century, Russia and NATO had formed a strategic relationship. No longer considered NATOs chief enemy, Russia cemented a new cooperative bond with NATO in 2001 to address such common concerns as international terrorism, nuclear nonproliferation, and arms control. This bond was subsequently subject to fraying, however, in large part because of reasons associated with Russian domestic politics.

Events following the September 11 terrorist attacks in 2001 led to the forging of a new dynamic within the alliance, one that increasingly favoured the military engagement of members outside Europe, initially with a mission against Taliban forces in Afghanistan beginning in the summer of 2003 and subsequently with air operations against the regime of Muammar al-Qaddafi in Libya in early 2011. As a result of the increased tempo of military operations undertaken by the alliance, the long-standing issue of burden sharing was revived, with some officials warning that failure to share the costs of NATO operations more equitably would lead to unraveling of the alliance. Most observers regarded that scenario as unlikely, however.

Original post:

North Atlantic Treaty Organization (NATO) | Britannica.com

First Amendment Rights [ushistory.org]

American Government 1. The Nature of Government a. The Purposes of Government b. Types of Government c. What Is a Democracy? d. Democratic Values Liberty, Equality, Justice 2. Foundations of American Government a. The Colonial Experience b. Independence and the Articles of Confederation c. Creating the Constitution d. The Bill of Rights 3. Federalism a. The Founders and Federalism b. Tipping the Scales Toward National Power c. Federal-State Relations Today: Back to States' Rights? 4. American Political Attitudes and Participation a. American Political Culture b. What Factors Shape Political Attitudes? c. Measuring Public Opinion d. Participating in Government e. Voting: A Forgotten Privilege? 5. How Do Citizens Connect With Their Government? a. Political Parties b. Campaigns and Elections c. Interest Groups d. The Media e. The Internet in Politics 6. Congress: The People's Branch? a. The Powers of Congress b. Leadership in Congress: It's a Party Matter c. The Importance of Committees d. Who Is in Congress? e. How a Bill Becomes a Law 7. The Presidency: The Leadership Branch? a. The Evolution of the Presidency b. All the President's Men and Women c. Selection and Succession of the President d. The President's Job e. Presidential Character 8. The Bureaucracy: The Real Government a. The Development of the Bureaucracy b. The Organization of the Bureaucracy c. Who Are the Bureaucrats? d. Reforming the Bureaucracy 9. The Judicial Branch a. The Creation of the Federal Courts b. The Structure of the Federal Courts c. The Supreme Court: What Does It Do? d. How Judges and Justices Are Chosen e. The Power of the Federal Courts 10. Civil Liberties and Civil Rights a. Rights and Responsibilities of Citizens b. First Amendment Rights c. Crime and Due Process d. Citizenship Rights 11. Policy Making: Political Interactions a. Foreign Policy: What Now? b. Defense Policy c. Economic Policy d. Social and Regulatory Policy 12. State and Local Governments a. State and Local Governments: Democracy at Work? b. Financing State and Local Government c. Who Pays for Education? 13. Comparative Political and Economic Systems a. Comparing Governments b. Comparing Economic Systems c. A Small, Small, World?

"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances." -First Amendment to the Constitution

A careful reading of the First Amendment reveals that it protects several basic liberties freedom of religion, speech, press, petition, and assembly. Interpretation of the amendment is far from easy, as court case after court case has tried to define the limits of these freedoms. The definitions have evolved throughout American history, and the process continues today.

The First Amendment guarantees freedom of religion in two clauses the "establishment" clause, which prohibits the government from establishing an official church, and the "free exercise" clause that allows people to worship as they please. Notice that the phrase "separation of church and state" does not appear in the First Amendment, nor is it found anywhere else in the Constitution. Most people do not realize that the phrase was actually coined later by Thomas Jefferson. In 1802, when he was President, he wrote the opinion that the First Amendment's freedom of religion clause was designed to build "a wall of separation between Church and State."

Court cases that address freedom of religion have dealt with the rejection of prayer in public schools, the denial of aid to parochial schools, the banning of polygamy (the practice of having more than one wife), the restriction of poisonous snakes and drugs in religious rites, and limiting the right to decline medical care for religious purposes.

Free speech is one of the most cherished liberties, but free speech often conflicts with other rights and liberties. The courts have had to consider the question, "What are the limits of free speech?"

The "clear and present danger" test is a basic principle for deciding the limits of free speech. It was set by the famous Schenck v. the United States case from World War I. Antiwar activist Charles Schenck was arrested for sending leaflets to prospective army draftees encouraging them to ignore their draft notices. The United States claimed that Schenck threatened national security, and the justices agreed. The principle was established that free speech would not be protected if an individual were a "clear and present danger" to United States security.

What is free speech? The definition is not easy, and the courts have identified three types of free speech, each protected at a different level:

Many of the same principles that apply to freedom of speech apply to the press, but one with special meaning for the press is prior restraint. The courts have ruled that the government may not censor information before it is written and published, except in the most extreme cases of national security.

Freedom of assembly and petition are closely related to freedom of speech, and have been protected in similar ways. Former Chief Justice Charles Evans Hughes wrote, "Peaceable assembly for lawful discussion cannot be made a crime." Generally, that point of view has prevailed. Freedom of assembly has to be balanced with other people's rights if it disrupts public order, traffic flow, freedom to go about normal business or peace and quiet. Usually, a group must apply for a permit, but a government must grant a permit provided that officials have the means to prevent major disruptions.

Report broken link

Report broken link

Report broken link

Report broken link

Report broken link

Report broken link

Report broken link

Report broken link

Original post:

First Amendment Rights [ushistory.org]

Jitsi | Tiki Suite

Please see: Openfire Meetings.

See also Jitsi provisioning via Tiki

Jitsi (previously SIP Communicator) is a cross-platform VOIP, videoconference, desktop sharing and chat client.

Jitsi is a core part of the Tiki Suite.

Protocols supported include SIP, XMPP/Jabber/Google Talk/Facebook chat, AIM/ICQ, Windows Live, Yahoo! Messenger and Bonjour.

Other features include: Call recording, Call & chat encryption, Noise suppression, Echo cancellation, File transfer, multi-user chat, Desktop streaming, Presence, Conference calls, Integration with Microsoft Outlook and Apple Address Book, Support for LDAP directories, Support for Google Contacts, On-line provisioning, Systray notifications, IPv6 support, Spell checker and many more.

License: LGPL http://jitsi.org/

Usage

To try out Jitsi via XMPP (with VOIP, videoconference, desktop sharing, etc.) you can use a Gmail account (which is also a XMPP account) or the jit.si service. Juts create an account and use that username at jit.si as jabber account in the Jitsi application.

If you are using Gmail, or Google for domains, use the Google Talk option in Jitsi. If you are using jit.si or a generic XMPP server, use the Jabber option in Jitsi.

A port for Android is in alpha

Jitsi is focused on a rich feature set, standards compliance and security.

There is the base package and 2 options. Many organizations will only need the base package, and they can add one or both options as they need them.

Advanced features (such as ZRTP encryption) require the client to support, but basic communication can be achieved by any XMPP client, including via a web interface.

The default real-time collaboration protocol is XMPP. However, we'll potentially add XMPP-IRC mirroring for transition/legacy reasons

This adds a web interface for Audio-Video-Chat collaboration with folks outside the team, by sending them a URL and using WebRTC

Alternatively, you can use BigBlueButton for this use case. BigBlueButton is more mature, very well integrated in Tiki and more focused towards online Learning. It is very easy to install, but it requires another server.

http://www.rtcquickstart.org/ICE-STUN-TURN-server-installation https://github.com/mozilla/togetherjs/issues/327

See more here:

Jitsi | Tiki Suite

Alleged cryptocurrency scam took in $21Mwith nominal …

Further Reading In a new report, the court-appointed receiver assigned to investigate an alleged cryptocurrency scam has found no evidence of "any legitimate Gemcoin or other viable business."

In October 2015, the Securities and Exchange Commission announced that it had sued a Southern California company over an alleged Ponzi scheme resulting in a loss to investors of at least $32 million. If the governments accusations are correct, that would make Gemcoin one of the largest digital-currency-based financial schemes ever.

Thelawsuit came days after the United States Marshals Service and the Arcadia Police Department froze assets and raided corporate officesin Arcadia, north of downtown Los Angeles. Alliance Finance Group and its assets were promptly put into the hands of a court-appointed receiver, whose job it remains to examine what went wrong.

Numerous online promotional videos in many languages claim that Gemcoins parent company Alliance Finance Group and subsidiary United States Fine Investment Arts (USFIA) controlled $50 billion in amber mine assets in Latin America. The companies touted the fact that because Gemcoin was "backed" by these amber mines, this cryptocurrency had inherent value.

According to the February 2016 report, the receiver, Thomas A. Seaman, located over $21 million in gross receipts through the end of 2015. He wrote:

At this point, due to the volume of electronic data and disorganized manner in which it was kept by the Receivership Entities, the Receiver has not yet been able to identify the entire scope of the USFIA enterprise, the number of investors, or specific amounts invested by investors and distributed to them. The Receiver's work to analyze and better understand the investor data, with the assistance of his forensic computer specialist, is ongoing.

Aside from some income generated by the hotel and rental properties, the Receivership Entities had no significant source of income other than money raised from investors. The Receiver has verified that virtually none of the assets described in online and written marketing materials actually exist. Instead of mines located around the world, millions of dollars in precious gems, and houses and cars available to be awarded to investors, the Receiver has found only costume jewelry, boxes of rocks, and bins filled with tens of thousands of little rings of nominal value.

Steve Chen and the companies associated with Gemcoin also face a proposed class-action lawsuit on behalf of alleged victims filed in state court in Los Angeles.

The lawyer who brought the state case, Long Liu, did not immediately respond to Ars request for comment.

"Before it was just speculation, but now we have concrete evidence to show where the money went and how it was transferred," Liu told the Pasadena Star-News this week. "All of these companies were set up to defraud investors and to hide the money."

Here is the original post:

Alleged cryptocurrency scam took in $21Mwith nominal ...