ca Kaay Jones: The Jamaican who joins region in singing ‘We Got This’ By jamaica-star.com Published On :: Wed, 06 May 2020 05:01:07 -0500 Up-and-coming recording artiste Kaay Jones says she did not know she was becoming part of a transformational music project that would connect her to a wide cross section of talent in the Caribbean. Jones carries Jamaica's flag in a unified... Full Article
ca People just wah hear sumpn different - Govana finds captive audience as ‘Convo Pt 2’ hits a million views By jamaica-star.com Published On :: Thu, 07 May 2020 05:01:23 -0500 Back in January when dancehall artiste Govana released the track HAMANTS Convo, the storyline captivated listeners across the globe. For weeks, the song, which highlights infidelity in relationships, trended at number one on the local YouTube... Full Article
ca Buju Banton and John Legend create magical ‘Memories’ By jamaica-star.com Published On :: Fri, 08 May 2020 05:01:48 -0500 Closing 2019, reggae star Buju Banton celebrated the inking of a partnership deal with international entertainment group Roc Nation, founded by rapper Jay-Z. The artiste is on the promotional pathway for his 2020 album, Upside Down, which will be... Full Article
ca 488 confirmed COVID-19 cases in Jamaica By jamaica-star.com Published On :: Thu, 07 May 2020 18:37:50 -0500 The Ministry of Health and Wellness has reported ten new positive COVID-19 test results, pushing the tally of confirmed cases to 488. Among the ten new cases, eight are females, and two are males. Their ages range from four years to 39-years-... Full Article
ca J’can healthcare worker dies from COVID-19-related complications By jamaica-star.com Published On :: Thu, 07 May 2020 05:01:09 -0500 Antoniette Bryden has fond memories of her mother, Arlene Reid, 51, a healthcare worker originally from Yallahs, St Thomas, who died of COVID-19 in Brampton, Ontario, Canada, on April 27. Reid, a personal support worker (PSW) who worked part-time... Full Article
ca Diabetics, asthma sufferers urged to take extra COVID caution By jamaica-star.com Published On :: Thu, 07 May 2020 05:01:36 -0500 Persons with diabetes, cardiovascular disease, and conditions such as high blood pressure and asthma are being urged to be particularly careful as those comorbidities have been identified in persons with COVID-19 in Jamaica requiring hospital care... Full Article
ca The State of the Modern Political Economy By www8.gsb.columbia.edu Published On :: Wed, 29 Apr 2020 00:00:00 -0400 Professor Tano Santos, Professor Ray Horton, and Dean Emeritus Glenn Hubbard discuss the impact of the pandemic on American and international political economies. Full Article
ca COVID-19: Economic Implications for Japan and the United States By www8.gsb.columbia.edu Published On :: Fri, 01 May 2020 00:00:00 -0400 Exploring the economic implications of COVID-19 on Japan and the US. Full Article
ca Alumni and Students From Greater China Donate PPE to NY Healthcare Workers Desperate for Gear By www8.gsb.columbia.edu Published On :: Thu, 16 Apr 2020 00:00:00 -0400 As the pandemic ebbed in China, alumni from the region raised more than $2.1 million to send crucial protective gear to New York healthcare workers. Full Article
ca Alumni Food Entrepreneurs Team Up to Feed NYC Healthcare Workers By www8.gsb.columbia.edu Published On :: Wed, 29 Apr 2020 00:00:00 -0400 Fundraising efforts, along with a generous donation from Beyond Meat, founded by Ethan Brown ’08, helps restaurant P.S. Kitchen, owned by April Tam Smith ’10 and Graham Smith ’21, provide meals to healthcare workers. Full Article
ca Beyond CARES: Economist Glenn Hubbard on Government Response to COVID-19 By www8.gsb.columbia.edu Published On :: Fri, 08 May 2020 00:00:00 -0400 Hubbard asks: Can we design a more effective plan, in case of a next time? Full Article
ca What Next After the Facebook and Cambridge Analytica Revelations? By feedproxy.google.com Published On :: Wed, 23 May 2018 11:00:00 +0000 Research Event 2 July 2018 - 6:00pm to 7:30pm Chatham House, London Event participants Silkie Carlo, Director, Big Brother WatchProfessor David Kaye, UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, University of California, Irvine, School of Law Professor Lorna McGregor, Principal Investigator and Co-Director of the ESRC, Human Rights, Big Data and Technology ProjectJames Williams, Oxford Internet InstituteChair: Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House Please note this event was originally scheduled on 13 June 2018 and has been postponed to 2 July 2018.Technology companies, social media platforms and other internet intermediaries dominate the digital age, and harnessing data in algorithmic and artificial intelligence systems is widespread, from political campaigns to judicial sentencing.The recent Facebook and Cambridge Analytica revelations provide a sharp illustration of the risks to human rights and democracy posed by data-mining and "platform capital".These revelations have focused public and policy debate on two key issues. First, they raise questions of how accountability and remedies can be effectively achieved, particularly where companies close in the wake of such revelations. Second, key questions arise on what regulation should look like.Facebook has pledged to respect privacy of its users better, but how effective is self-regulation? There has been heavy emphasis on the role that the EU General Data Protection Regulation (GDPR) can play to improve the protection of privacy and data protection, but will it be enough? What are the implications for international law - how can the established standards in human rights and data protection respond to these challenges?This event, co-hosted with the ESRC, Human Rights, Big Data and Technology Project, will be followed by a drinks reception.Read the meeting summary on the Human Rights, Big Data and Technology Project website. Department/project International Law Programme, International Law Discussion Group Full Article
ca Protection of the Wounded and Medical Care-Givers in Armed Conflict: Is the Law Up to the Job? By feedproxy.google.com Published On :: Wed, 27 Feb 2019 10:21:55 +0000 Research Event 16 May 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Françoise Bouchet-Saulnier, Legal Director, Médecins Sans FrontièresEzequiel Heffes, Thematic Legal Adviser, Geneva CallRain Liivoja, Associate Professor, University of QueenslandMaciej Polkowski, Head, Health Care in Danger Initiative, International Committee of the Red CrossChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House This meeting, supported by the British Red Cross, is the first in a series of three to commemorate the 70th anniversary of the 1949 Geneva Conventions. The meeting will focus on the protection of the wounded and sick in armed conflict and will also include discussion of challenges to the protection of medical care and of health providers.Attacks on health care personnel and facilities have increased in recent years, as have the instances in which proceedings have been brought against those providing medical care to wounded fighters, including under counter-terrorism measures.The Geneva Conventions and their Protocols give protection to the wounded and sick and to healthcare providers, but is the law adequate? Is the law sufficiently widely known? How can the law be more fully implemented? What particular challenges arise in non-international armed conflicts?This event will be followed by a drinks reception. Department/project International Law Programme, The Limits on War and Preserving the Peace Full Article
ca State Cyber Interventions Below the Threshold of the Use of Force: Challenges in the Application of International Law By feedproxy.google.com Published On :: Wed, 17 Apr 2019 10:45:01 +0000 Invitation Only Research Event 30 April 2019 - 10:00am to 4:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House Under what circumstances will a state-sponsored cyberattack on another state that falls below the threshold of the use of force be a breach of international law – for example, hacking into another state’s electoral databases, usurping inherently governmental functions such as parliamentary processes or an attack on another state’s financial system? In the dynamic field of state cyber operations, persistent, low-level cyberattacks are increasing, as are multilateral attempts to attribute the attacks to the states responsible. There is general agreement that international law applies to cyberspace but the question is how it applies and with what consequences. This meeting will bring together a small group of academics and practitioners to explore the application of international law to states’ cyber operations that interfere in the internal affairs of another state and which fall below the threshold of the use of force. What is the law on non-intervention in international law and how does it apply to states’ cyber activities? Does the Nicaragua case represent the best expression of the law in this area including the requirement of coercion? And are there any other principles of international law that are relevant? The meeting will also consider processes and procedures for agreeing on the law and best practices. The purpose of the meeting will be to inform a research paper by Chatham House. Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project International Law Programme Full Article
ca Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
ca Online Disinformation and Political Discourse: Applying a Human Rights Framework By feedproxy.google.com Published On :: Tue, 05 Nov 2019 11:03:02 +0000 6 November 2019 Although some digital platforms now have an impact on more people’s lives than does any one state authority, the international community has been slow to hold to account these platforms’ activities by reference to human rights law. This paper examines how human rights frameworks should guide digital technology. Download PDF Kate Jones Associate Fellow, International Law Programme @katejones77 LinkedIn 2019-11-05-Disinformation.jpg A man votes in Manhattan, New York City, during the US elections on 8 November 2016. Photo: Getty Images. SummaryOnline political campaigning techniques are distorting our democratic political processes. These techniques include the creation of disinformation and divisive content; exploiting digital platforms’ algorithms, and using bots, cyborgs and fake accounts to distribute this content; maximizing influence through harnessing emotional responses such as anger and disgust; and micro-targeting on the basis of collated personal data and sophisticated psychological profiling techniques. Some state authorities distort political debate by restricting, filtering, shutting down or censoring online networks.Such techniques have outpaced regulatory initiatives and, save in egregious cases such as shutdown of networks, there is no international consensus on how they should be tackled. Digital platforms, driven by their commercial impetus to encourage users to spend as long as possible on them and to attract advertisers, may provide an environment conducive to manipulative techniques.International human rights law, with its careful calibrations designed to protect individuals from abuse of power by authority, provides a normative framework that should underpin responses to online disinformation and distortion of political debate. Contrary to popular view, it does not entail that there should be no control of the online environment; rather, controls should balance the interests at stake appropriately.The rights to freedom of thought and opinion are critical to delimiting the appropriate boundary between legitimate influence and illegitimate manipulation. When digital platforms exploit decision-making biases in prioritizing bad news and divisive, emotion-arousing information, they may be breaching these rights. States and digital platforms should consider structural changes to digital platforms to ensure that methods of online political discourse respect personal agency and prevent the use of sophisticated manipulative techniques.The right to privacy includes a right to choose not to divulge your personal information, and a right to opt out of trading in and profiling on the basis of your personal data. Current practices in collecting, trading and using extensive personal data to ‘micro-target’ voters without their knowledge are not consistent with this right. Significant changes are needed.Data protection laws should be implemented robustly, and should not legitimate extensive harvesting of personal data on the basis of either notional ‘consent’ or the data handler’s commercial interests. The right to privacy should be embedded in technological design (such as by allowing the user to access all information held on them at the click of a button); and political parties should be transparent in their collection and use of personal data, and in their targeting of messages. Arguably, the value of personal data should be shared with the individuals from whom it derives.The rules on the boundaries of permissible content online should be set by states, and should be consistent with the right to freedom of expression. Digital platforms have had to rapidly develop policies on retention or removal of content, but those policies do not necessarily reflect the right to freedom of expression, and platforms are currently not well placed to take account of the public interest. Platforms should be far more transparent in their content regulation policies and decision-making, and should develop frameworks enabling efficient, fair, consistent internal complaints and content monitoring processes. Expertise on international human rights law should be integral to their systems.The right to participate in public affairs and to vote includes the right to engage in public debate. States and digital platforms should ensure an environment in which all can participate in debate online and are not discouraged from standing for election, from participating or from voting by online threats or abuse. Department/project International Law Programme, Cyber, Sovereignty and Human Rights, Rights, Accountability and Justice Full Article
ca The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
ca 12-LOX catalyzes the oxidation of 2-arachidonoyl-lysolipids in platelets generating eicosanoid-lysolipids that are attenuated by iPLA2{gamma} knockout [Signal Transduction] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 The canonical pathway of eicosanoid production in most mammalian cells is initiated by phospholipase A2-mediated release of arachidonic acid, followed by its enzymatic oxidation resulting in a vast array of eicosanoid products. However, recent work has demonstrated that the major phospholipase in mitochondria, iPLA2γ (patatin-like phospholipase domain containing 8 (PNPLA8)), possesses sn-1 specificity, with polyunsaturated fatty acids at the sn-2 position generating polyunsaturated sn-2-acyl lysophospholipids. Through strategic chemical derivatization, chiral chromatographic separation, and multistage tandem MS, here we first demonstrate that human platelet-type 12-lipoxygenase (12-LOX) can directly catalyze the regioselective and stereospecific oxidation of 2-arachidonoyl-lysophosphatidylcholine (2-AA-LPC) and 2-arachidonoyl-lysophosphatidylethanolamine (2-AA-LPE). Next, we identified these two eicosanoid-lysophospholipids in murine myocardium and in isolated platelets. Moreover, we observed robust increases in 2-AA-LPC, 2-AA-LPE, and their downstream 12-LOX oxidation products, 12(S)-HETE-LPC and 12(S)-HETE-LPE, in calcium ionophore (A23187)-stimulated murine platelets. Mechanistically, genetic ablation of iPLA2γ markedly decreased the calcium-stimulated production of 2-AA-LPC, 2-AA-LPE, and 12-HETE-lysophospholipids in mouse platelets. Importantly, a potent and selective 12-LOX inhibitor, ML355, significantly inhibited the production of 12-HETE-LPC and 12-HETE-LPE in activated platelets. Furthermore, we found that aging is accompanied by significant changes in 12-HETE-LPC in murine serum that were also markedly attenuated by iPLA2γ genetic ablation. Collectively, these results identify previously unknown iPLA2γ-initiated signaling pathways mediated by direct 12-LOX oxidation of 2-AA-LPC and 2-AA-LPE. This oxidation generates previously unrecognized eicosanoid-lysophospholipids that may serve as biomarkers for age-related diseases and could potentially be used as targets in therapeutic interventions. Full Article
ca Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain. Full Article
ca Deletion of fatty acid transport protein 2 (FATP2) in the mouse liver changes the metabolic landscape by increasing the expression of PPAR{alpha}-regulated genes [Lipids] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Fatty acid transport protein 2 (FATP2) is highly expressed in the liver, small intestine, and kidney, where it functions in both the transport of exogenous long-chain fatty acids and the activation of very-long-chain fatty acids. Here, using a murine model, we investigated the phenotypic impacts of deleting FATP2, followed by a transcriptomic analysis using unbiased RNA-Seq to identify concomitant changes in the liver transcriptome. WT and FATP2-null (Fatp2−/−) mice (5 weeks) were maintained on a standard chow diet for 6 weeks. The Fatp2−/− mice had reduced weight gain, lowered serum triglyceride, and increased serum cholesterol levels and attenuated dietary fatty acid absorption. Transcriptomic analysis of the liver revealed 258 differentially expressed genes in male Fatp2−/− mice and a total of 91 in female Fatp2−/− mice. These genes mapped to the following gene ontology categories: fatty acid degradation, peroxisome biogenesis, fatty acid synthesis, and retinol and arachidonic acid metabolism. Targeted RT-quantitative PCR verified the altered expression of selected genes. Of note, most of the genes with increased expression were known to be regulated by peroxisome proliferator–activated receptor α (PPARα), suggesting that FATP2 activity is linked to a PPARα-specific proximal ligand. Targeted metabolomic experiments in the Fatp2−/− liver revealed increases of total C16:0, C16:1, and C18:1 fatty acids; increases in lipoxin A4 and prostaglandin J2; and a decrease in 20-hydroxyeicosatetraenoic acid. We conclude that the expression of FATP2 in the liver broadly affects the metabolic landscape through PPARα, indicating that FATP2 provides an important role in liver lipid metabolism through its transport or activation activities. Full Article
ca COQ11 deletion mitigates respiratory deficiency caused by mutations in the gene encoding the coenzyme Q chaperone protein Coq10 [Lipids] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Coenzyme Q (Qn) is a vital lipid component of the electron transport chain that functions in cellular energy metabolism and as a membrane antioxidant. In the yeast Saccharomyces cerevisiae, coq1–coq9 deletion mutants are respiratory-incompetent, sensitive to lipid peroxidation stress, and unable to synthesize Q6. The yeast coq10 deletion mutant is also respiratory-deficient and sensitive to lipid peroxidation, yet it continues to produce Q6 at an impaired rate. Thus, Coq10 is required for the function of Q6 in respiration and as an antioxidant and is believed to chaperone Q6 from its site of synthesis to the respiratory complexes. In several fungi, Coq10 is encoded as a fusion polypeptide with Coq11, a recently identified protein of unknown function required for efficient Q6 biosynthesis. Because “fused” proteins are often involved in similar biochemical pathways, here we examined the putative functional relationship between Coq10 and Coq11 in yeast. We used plate growth and Seahorse assays and LC-MS/MS analysis to show that COQ11 deletion rescues respiratory deficiency, sensitivity to lipid peroxidation, and decreased Q6 biosynthesis of the coq10Δ mutant. Additionally, immunoblotting indicated that yeast coq11Δ mutants accumulate increased amounts of certain Coq polypeptides and display a stabilized CoQ synthome. These effects suggest that Coq11 modulates Q6 biosynthesis and that its absence increases mitochondrial Q6 content in the coq10Δcoq11Δ double mutant. This augmented mitochondrial Q6 content counteracts the respiratory deficiency and lipid peroxidation sensitivity phenotypes of the coq10Δ mutant. This study further clarifies the intricate connection between Q6 biosynthesis, trafficking, and function in mitochondrial metabolism. Full Article
ca Genetic Profile and Functional Proteomics of Anal Squamous Cell Carcinoma: Proposal for a Molecular Classification By feedproxy.google.com Published On :: 2020-04-01 Lucía Trilla-FuertesApr 1, 2020; 19:690-700Research Full Article
ca The DNA sensor cGAS is decorated by acetylation and phosphorylation modifications in the context of immune signaling By feedproxy.google.com Published On :: 2020-04-28 Bokai SongApr 28, 2020; 0:RA120.001981v1-mcp.RA120.001981Research Full Article
ca Chemical Genetics of AGC-kinases Reveals Shared Targets of Ypk1, Protein Kinase A and Sch9 By feedproxy.google.com Published On :: 2020-04-01 Michael PlankApr 1, 2020; 19:655-671Research Full Article
ca Characterization of Prenylated C-terminal Peptides Using a Thiopropyl-based Capture Technique and LC-MS/MS By feedproxy.google.com Published On :: 2020-04-13 James A. WilkinsApr 13, 2020; 0:RA120.001944v1-mcp.RA120.001944Research Full Article
ca Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility By feedproxy.google.com Published On :: 2020-04-20 Yunlei LiApr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017Research Full Article
ca Cell Cycle Profiling Reveals Protein Oscillation, Phosphorylation, and Localization Dynamics By feedproxy.google.com Published On :: 2020-04-01 Patrick HerrApr 1, 2020; 19:608-623Research Full Article
ca Proteaphagy in mammalian cells can function independent of ATG5/ATG7 By feedproxy.google.com Published On :: 2020-04-16 Tatjana GoebelApr 16, 2020; 0:RA120.001983v1-mcp.RA120.001983Research Full Article
ca Robust summarization and inference in proteome-wide label-free quantification By feedproxy.google.com Published On :: 2020-04-22 Adriaan StickerApr 22, 2020; 0:RA119.001624v1-mcp.RA119.001624Research Full Article
ca Dysregulation of Exosome Cargo by Mutant Tau Expressed in Human-Induced Pluripotent Stem Cell (iPSC) Neurons Revealed by Proteomics Analyses By feedproxy.google.com Published On :: 2020-04-15 Sonia PodvinApr 15, 2020; 0:RA120.002079v1-mcp.RA120.002079Research Full Article
ca Developments and Applications of Functional Protein Microarrays By feedproxy.google.com Published On :: 2020-04-17 Guan-Da SyuApr 17, 2020; 0:R120.001936v1-mcp.R120.001936Review Full Article
ca Identification of an Unconventional Subpeptidome Bound to the Behcet's Disease-associated HLA-B*51:01 that is Regulated by Endoplasmic Reticulum Aminopeptidase 1 (ERAP1) By feedproxy.google.com Published On :: 2020-05-01 Liye ChenMay 1, 2020; 19:871-883Research Full Article
ca Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
ca Immediate adaptation analysis implicates BCL6 as an EGFR-TKI combination therapy target in NSCLC By feedproxy.google.com Published On :: 2020-03-31 Yan Zhou TranMar 31, 2020; 0:RA120.002036v1-mcp.RA120.002036Research Full Article
ca Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism By feedproxy.google.com Published On :: 2020-05-01 Xing-Huang GaoMay 1, 2020; 19:852-870Research Full Article
ca Large-scale Identification of N-linked Intact Glycopeptides in Human Serum using HILIC Enrichment and Spectral Library Search By feedproxy.google.com Published On :: 2020-04-01 Qingbo ShuApr 1, 2020; 19:672-689Research Full Article
ca Selection of features with consistent profiles improves relative protein quantification in mass spectrometry experiments By feedproxy.google.com Published On :: 2020-03-31 Tsung-Heng TsaiMar 31, 2020; 0:RA119.001792v1-mcp.RA119.001792Research Full Article
ca Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue By feedproxy.google.com Published On :: 2020-05-01 Eva GriesserMay 1, 2020; 19:839-851Research Full Article
ca Virtual Issue: Technological Innovations By feedproxy.google.com Published On :: 2020-04-01 Anne-Claude GingrasApr 1, 2020; 19:572-573Editorial Full Article
ca Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker By feedproxy.google.com Published On :: 2020-04-01 Karl A. T. MakepeaceApr 1, 2020; 19:624-639Research Full Article
ca Mathematical light shines blindly on us By blogs.ams.org Published On :: Mon, 09 Dec 2019 18:57:58 +0000 By William Yslas Vélez Professor Emeritus University of Arizona “When I go to a Mexican restaurant I would gladly pay the musicians to stop playing.” John (not his real name) did not like the noise level. This statement came up … Continue reading → Full Article Changing Graduate Programs General Uncategorized
ca Gotta catch ’em all, URM! By blogs.ams.org Published On :: Thu, 19 Dec 2019 03:24:01 +0000 By Carrie Diaz Eaton and Pamela E. Harris We received the same email: Tuesday, Dec 17, 1:37 PM and Tuesday, Dec 17, 1:42 PM. No time to personalize the email. Simply change last names. After all, any one will do, … Continue reading → Full Article career advancement General Leadership Negotiating faculty / post doc positions Outreach postdocs Tenure Uncategorized
ca Strengthening Urban Preparedness and Resilience Against Biological Threats in Accra By feedproxy.google.com Published On :: Wed, 23 Jan 2019 17:40:01 +0000 Invitation Only Research Event 1 March 2019 - 10:30am to 2 March 2019 - 3:00pm Chatham House, London Capacity to contain and respond to biological threats varies considerably across the world. Yet such preparedness is vital for prevention, impact-reduction and resilience in the face of biological events, whether they be natural or deliberate outbreaks.Chatham House is conducting a series of meetings to strengthen urban preparedness for, and resilience against, biological threats in African countries. This meeting will examine the preparedness and prevention mechanisms in Accra, reviewing the comprehensiveness of city-level preparedness. This meeting will focus on the formation and implementation of city-level action plans in the context of preparedness for managing biological threats. It will also explore how local authorities are contributing to this effort with their knowledge and expertise.Attendance at this event is by invitation only. Department/project International Security Programme, Strengthening Urban Preparedness and Resilience against Biological Threats Nilza Amaral Project Manager, International Security Programme Email Full Article
ca Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean By feedproxy.google.com Published On :: Thu, 07 Feb 2019 14:20:01 +0000 Invitation Only Research Event 8 March 2019 - 9:00am to 5:30pm Bridgetown, Barbados Event participants Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
ca The Implications of Drone Proliferation in Europe By feedproxy.google.com Published On :: Wed, 01 May 2019 10:55:01 +0000 Invitation Only Research Event 20 May 2019 - 9:30am to 21 May 2019 - 12:30pm Chatham House, London Several countries in Europe are currently developing, increasing or arming their drone capabilities. This increase in drone capability is taking place through procurement by individual states, bilateral projects – such as the French-German Future Combat Air Systems – and multinational efforts that include the development of the Eurodrone – a project by Germany, France, Italy and Spain – and the nEUROn which involves France, Greece, Italy, Spain, Sweden and Switzerland. In addition, the EU has recently approved the European Defence Fund which, along with funds for joint development of defence equipment and technology and for defence research, also includes direct funding to support the development of the Eurodrone. Other recent developments include the UK obtaining the MQ−9B SkyGuardian – an updated variant of the MQ-9 Reaper – and Germany signing a leasing agreement for the Israeli-made Heron TP. Also, in March 2019, the US State Department approved the sale of the MQ-9B SkyGuardian to Belgium and announced the provision of MQ-9 Reaper drones to the Netherlands. While the UK and France are the only countries in Europe so far to possess armed drones, Italy is on track to acquire armed drones in the near future. However, out of the European countries currently seeking to obtain unarmed drones – including Spain, Poland and Greece – only Switzerland has so far ruled out weaponizing its drones in the future. This Chatham House workshop will examine key issues pertaining to drone proliferation in Europe including: The risks and challenges of the increasing number and arming of drones. The risks for countries of not doing so in terms of geostrategic interests and the future battlefield.Opportunities for developing common standards on drone transfers and deployment across EU member states.Sharing and cooperation on drone use.What legal and policy implications might arise for European states as a result.With Brexit on the horizon, participants will also consider what impact this may have on future drone developments in Europe.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
ca Policy Implications of Armed Drone Use By feedproxy.google.com Published On :: Thu, 01 Aug 2019 13:15:02 +0000 This project brings together experts on the use of armed drones, including current and former military officials, academia, think-tanks and NGOs, to discuss and exchange perspectives based on their different experiences, with the aim of sharing knowledge and increasing understanding on these issues, and to inform and provide input into the European debate. With the increased use of armed drones in recent years, ethical and legal concerns have been raised in regard to civilian casualties, secrecy and lack of transparency and accountability for drone strikes.This project brings together experts on the use of armed drones, including current and former military officials, academia, think-tanks and NGOs, to discuss and exchange perspectives based on their different experiences, with the aim of sharing knowledge and increasing understanding on these issues, and to inform and provide input into the European debate. The experts explore the issues and controversies surrounding the use of drones outside formal armed conflict and study the broader policy implications in detail, particularly with regards to what this means for the UK and other European countries.Building on the findings from the workshops, this project will hold a simulation exercise to stress test critical areas of concern around the use of armed drones that are relevant for the UK and other EU member states.The discussions and the simulation exercise will provide opportunities for policy input on areas of mutual concern and feed into practical policy recommendations on the use of armed drones.This project builds on previous work on armed drones by the International Security Department and is funded by the Open Society Foundations. Past events (2) Research Event The Implications of Drone Proliferation in Europe 20 May 2019 Research Event Transparency and Accountability for Drone Use: European Approaches 11 March 2019 More on Policy Implications of Armed Drone Use Full Article
ca How Is New Technology Driving Geopolitical Relations? By feedproxy.google.com Published On :: Mon, 16 Sep 2019 14:20:01 +0000 Research Event 22 October 2019 - 6:00pm to 7:00pm Chatham House, London Event participants Rt Hon Baroness Neville-Jones DCMG, Minister of State for Security and Counter Terrorism (2010-11)Jamie Condliffe, Editor, DealBook Newsletter and Writer, Bits Tech Newsletter, The New York TimesJamie Saunders, Partner, Wychwood Partners LLP; Visiting Professor, University College LondonChair: Dr Patricia Lewis, Research Director, International Security Department, Chatham House New technology such as 5G, artificial intelligence, nanotechnology and robotics have become, now more than ever, intertwined with geopolitical, economic and trade interests. Leading powers are using new technology to exert power and influence and to shape geopolitics more generally.The ongoing race between the US and China around 5G technology is a case in point. Amid these tensions, the impact on developing countries is not sufficiently addressed.Arguably, the existing digital divide will increase leading developing countries to the early, if not hasty, adoption of new technology for fear of lagging behind. This could create opportunities but will also pose risks.This panel discusses how new technology is changing the geopolitical landscape. It also discusses the role that stakeholders, including governments, play in the creation of standards for new technologies and what that means for its deployment in key markets technically and financially.Finally, the panel looks at the issue from the perspective of developing countries, addressing the choices that have to be made in terms of affordability, development priorities and security concerns.This event was organized with the kind support of DXC Technology. Department/project International Security Programme Nicole Darabian Research Assistant, Cyber Policy, International Security Department Email Full Article
ca AI-driven Personalization in Digital Media: Political and Societal Implications By feedproxy.google.com Published On :: Mon, 02 Dec 2019 12:18:52 +0000 2 December 2019 The fallout from disinformation and online manipulation strategies have alerted Western democracies to the novel, nuanced vulnerabilities of our information society. This paper outlines the implications of the adoption of AI by the the legacy media, as well as by the new media, focusing on personalization. Download PDF Sophia Ignatidou Academy Associate, International Security Programme @SophiaIgnatidou LinkedIn 2019-12-02-AI-Driven-Personalization-small.jpg The Reuters and other news apps seen on an iPhone, 29 January 2019. Photo: Getty Images. SummaryMachine learning (ML)-driven personalization is fast expanding from social media to the wider information space, encompassing legacy media, multinational conglomerates and digital-native publishers: however, this is happening within a regulatory and oversight vacuum that needs to be addressed as a matter of urgency.Mass-scale adoption of personalization in communication has serious implications for human rights, societal resilience and political security. Data protection, privacy and wrongful discrimination, as well as freedom of opinion and of expression, are some of the areas impacted by this technological transformation.Artificial intelligence (AI) and its ML subset are novel technologies that demand novel ways of approaching oversight, monitoring and analysis. Policymakers, regulators, media professionals and engineers need to be able to conceptualize issues in an interdisciplinary way that is appropriate for sociotechnical systems.Funding needs to be allocated to research into human–computer interaction in information environments, data infrastructure, technology market trends, and the broader impact of ML systems within the communication sector.Although global, high-level ethical frameworks for AI are welcome, they are no substitute for domain- and context-specific codes of ethics. Legacy media and digital-native publishers need to overhaul their editorial codes to make them fit for purpose in a digital ecosystem transformed by ML. Journalistic principles need to be reformulated and refined in the current informational context in order to efficiently inform the ML models built for personalized communication.Codes of ethics will not by themselves be enough, so current regulatory and legislative frameworks as they relate to media need to be reassessed. Media regulators need to develop their in-house capacity for thorough research and monitoring into ML systems, and – when appropriate –proportionate sanctions for actors found to be employing such systems towards malign ends. Collaboration with data protection authorities, competition authorities and national electoral commissions is paramount for preserving the integrity of elections and of a political discourse grounded on democratic principles.Upskilling senior managers and editorial teams is fundamental if media professionals are to be able to engage meaningfully and effectively with data scientists and AI engineers. Department/project International Security Programme, Internet Governance Full Article
ca Synergy in North Africa: Furthering Cooperation By feedproxy.google.com Published On :: Mon, 20 Jan 2020 15:57:54 +0000 21 January 2020 Discussions of North African integration have evoked ideas of a shared identity and a common destiny in the region. However, recent attempts to build regional blocs in North Africa have been unsuccessful. This paper examines the benefits of a ‘synergistic’ approach to North African cooperation. Read online Download PDF in English Download PDF in Arabic Dr Mohammed Masbah Associate Fellow, Middle East and North Africa Programme @MasbahMohammed LinkedIn Google Scholar Mohamed El Dahshan Associate Fellow, Middle East and North Africa Programme @eldahshan LinkedIn Google Scholar 2020-01-21-Market.jpg A Tunisian vendor poses as he sells white truffles at a market in the town of Ben Guerdane, 40km west of the Libyan border, in February 2016. Photo: Getty Images. SummaryNorth African integration is not a new idea. However, countries in the region have so far struggled to form a cohesive bloc with deep political, economic and social ties. Political instability has effectively deprioritized North African integration. A focus on thematic (political, economic and security) ‘synergies’ may provide a better framework for cooperation than seeking opportunities for all-encompassing ‘deep’ and ‘comprehensive’ integration.Governments of North Africa dedicate considerable resources to domestic security. Much of their efforts are conducted at the national-level and directed towards threats from terrorists, insurgents and militias. Improved security cooperation would achieve better outcomes and economies of scale, including efforts to tackle human trafficking.A new generation of jihadis has emerged in North Africa since 2011. Nearly 27 per cent of the 30,000 fighters who travelled to Syria are from the Maghreb. While government counterterrorism operations have been effective, countries have failed to address the root causes of radicalization.Border economies have suffered as a consequence of a security focus on terrorism and smuggling, which has rendered many previously accepted cross-border trade activities illegal. States have struggled to provide alternative livelihoods for those who have lost this source of income. Border forces tend to lack the right combination of capacity, training and equipment to secure borders and often resort to heavy-handed tactics.New thinking is required to develop a more human-centric and proactive approach to migration issues in the region, which continues to witness huge flows of migrants. The migration policy of Morocco, introduced through legislation in 2014, could be a model for North Africa.The countries of North Africa have varying economic profiles, ranging from economically diverse Morocco to oil-and-gas-dependant Libya. However, they all face similar challenges including unemployment (particularly among the young), poor public-service delivery, low FDI levels, an oversized public sector, ineffective tax collection, and high informality.Fostering entrepreneurship and the development of small and medium-sized enterprises (SMEs) are priorities for North African countries, particularly regarding job creation. Regulatory cooperation – such as harmonizing SME definitions, legislation and support institutions – across North Africa is an obvious area where further integration would encourage the development of start-ups and small businesses.With the advent of the fourth industrial revolution, North African governments must address their technological gaps and work to improve public–private cooperation. In some sectors, such as the fintech industry, North African countries can build upon nascent synergies that have developed organically, such as those of start-up incubators and angel investors that work across the region.Renewables, particularly solar energy production, are a promising development for North Africa. While regional initiatives, such as Desertec, have stalled due to political differences between countries, the sector has witnessed exponential growth in Tunisia, Egypt and Morocco, where the involvement of the private sector has proved successful. Department/project Middle East and North Africa Programme, North Africa Dialogues Full Article
ca Local Pathways Towards De-escalation of Libya's Conflict By feedproxy.google.com Published On :: Wed, 22 Jan 2020 10:20:01 +0000 Invitation Only Research Event 28 January 2020 - 3:00pm to 4:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Usama Otman Essed, Libya Center for Strategic & Future StudiesChair: Tim Eaton, Middle East and North Africa Programme, Chatham House A shaky truce remains broadly in place among rival Libyan forces fighting for control of Tripoli. However, a durable ceasefire to bring an end to the current bout of conflict, which was initiated by Khalifa Haftar’s Libyan Arab Armed Forces’ (LAAF) offensive on the capital in April 2019, has not been reached. In recent weeks attention has focused on talks hosted in Moscow and Berlin, with the former aimed at agreeing a ceasefire and the latter seeking to reach agreement among international actors to bring an end to external military support for Libyan warring actors, and to craft a way forward for future intra-Libyan talks. Yet, there has been little emphasis on Libyan actors – beyond Haftar and prime minister Fayez al-Serraj – in this process. This roundtable will bring together experts and policymakers to discuss means of de-escalating the conflict and seeking a lasting resolution through the development of interconnected intra-Libyan social and security negotiation tracks. Mr Usama Otman Essed of the Libya Center for Strategic and Future Studies (LCSFS) will present his research group’s ideas on these issues and discuss their ongoing efforts to promote dialogue among social and security actors.Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project Middle East and North Africa Programme Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email Full Article
Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email