bi Classical and Non-Classical Melatonin Receptor Agonist-Directed Micellization of Bipyridinium-Based Supramolecular Amphiphiles in Water By feeds.rsc.org Published On :: Soft Matter, 2020, Accepted ManuscriptDOI: 10.1039/D0SM00424C, PaperZhimin Sun, Lihui Xi, Kai Zheng, Zhao Zhang, Kim Baldridge, Mark Anthony OlsonThe addition of molecular recognition units into structures of amphiphiles is a means by which soft matter capable of undergoing template-directed micellization can be obtained. These supramolecular amphiphiles can bind...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Binary mixtures of active and passive particles on a sphere By feeds.rsc.org Published On :: Soft Matter, 2020, Advance ArticleDOI: 10.1039/D0SM00281J, CommunicationBao-quan Ai, Bu-yun Zhou, Xiao-miao ZhangAccording to the competition between rotational diffusion and polar alignment, we find three distinct phases: a mixed phase and two different demixed phases.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Layering of bidisperse charged nanoparticles in sedimentation By feeds.rsc.org Published On :: Soft Matter, 2020, Accepted ManuscriptDOI: 10.1039/D0SM00588F, Communication Open Access   This article is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported Licence.Xufeng Xu, Maarten Biesheuvel, Helmut Cölfen, Evan SpruijtBinary mixtures of charged nanoparticles become layered upon centrifugation as a result of minimization of the system free energy in sedimentation-diffusion equilibrium. Different factors were investigated experimentally for their effects...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Evaluation of the subtle trade-off between physical stability and thermo-responsiveness in crosslinked methylcellulose hydrogels By feeds.rsc.org Published On :: Soft Matter, 2020, Accepted ManuscriptDOI: 10.1039/D0SM00269K, PaperLorenzo Bonetti, Luigi De Nardo, Fabio Variola, Silvia FareMethylcellulose (MC) hydrogels, undergoing sol-gel reversible transition upon temperature changes, lend themselves to smart system applications. However, their reduced stability in aqueous environment and unsatisfactory mechanical properties limit the breadth...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Ordering of binary colloidal crystals by random potentials By feeds.rsc.org Published On :: Soft Matter, 2020, 16,4267-4273DOI: 10.1039/D0SM00208A, PaperAndré S. Nunes, Sabareesh K. P. Velu, Iryna Kasianiuk, Denis Kasyanyuk, Agnese Callegari, Giorgio Volpe, Margarida M. Telo da Gama, Giovanni Volpe, Nuno A. M. AraújoA random potential can control the number of defects in a binary colloidal crystal.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Systematic approach for wettability prediction using molecular dynamics simulations By feeds.rsc.org Published On :: Soft Matter, 2020, 16,4299-4310DOI: 10.1039/D0SM00197J, Paper Open Access   This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.Ahmed Jarray, Herman Wijshoff, Jurriaan A. Luiken, Wouter K. den OtterAn efficient approach for fast screening of liquids in terms of their wetting properties.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Harnessing biomimetic cryptic bonds to form self-reinforcing gels By feeds.rsc.org Published On :: Soft Matter, 2020, Advance ArticleDOI: 10.1039/D0SM00145G, PaperSantidan Biswas, Victor V. Yashin, Anna C. BalazsCryptic sites, which lay hidden in folded biomolecules, become exposed by applied force and form new bonds that reinforce the biomaterial.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Sustainable sorbitol-derived compounds for gelation of the full range of ethanol–water mixtures By feeds.rsc.org Published On :: Soft Matter, 2020, Advance ArticleDOI: 10.1039/D0SM00343C, PaperGlenieliz C. Dizon, George Atkinson, Stephen P. Argent, Lea T. Santu, David B. AmabilinoA combination of gelators prepared from sustainable sources combine in a synergic way to widen the scope for the compounds to immobilise liquids, as shown by imaging, diffraction and rheology measurements.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi Saddle-curvature instability of lipid bilayer induced by amphipathicpeptides: A molecular model By feeds.rsc.org Published On :: Soft Matter, 2020, Accepted ManuscriptDOI: 10.1039/D0SM00499E, PaperRachel Downing, Guilherme Volpe Bossa, Sylvio MayAmphipathic peptides that partition into lipid bilayers affect the curvature elastic properties oftheir host. Some of these peptides are able to shift the Gaussian modulus to positive values, thustriggering an...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
bi [ASAP] Describing Meta-Atoms Using the Exact Higher-Order Polarizability Tensors By dx.doi.org Published On :: Tue, 07 Apr 2020 04:00:00 GMT ACS PhotonicsDOI: 10.1021/acsphotonics.9b01776 Full Article
bi [ASAP] Probing the Radiative Electromagnetic Local Density of States in Nanostructures with a Scanning Tunneling Microscope By dx.doi.org Published On :: Wed, 06 May 2020 04:00:00 GMT ACS PhotonicsDOI: 10.1021/acsphotonics.0c00264 Full Article
bi [ASAP] Strong Optical Feedback Stabilized Quantum Cascade Laser By dx.doi.org Published On :: Fri, 08 May 2020 04:00:00 GMT ACS PhotonicsDOI: 10.1021/acsphotonics.0c00189 Full Article
bi Future Accessibility Guidelines—for People Who Can’t Wait to Read Them By feedproxy.google.com Published On :: Tue, 03 Dec 2019 12:00:00 +0000 Alan Dalton uses this, the International Day of Persons with Disabilities, to look back at where we’ve come from, to evaluate where we are, and to look forward to what’s coming next in the future of accessibility guidelines. Happy United Nations International Day of Persons with Disabilities! The United Nations have chosen “Promoting the participation of persons with disabilities and their leadership: taking action on the 2030 Development Agenda” for this year’s observance. Let’s see how the World Wide Web Consortium (W3C)’s Web Accessibility Initiative (WAI) guidelines of accessibility past, present, and yet-to-come can help us to follow that goal, and make sure that the websites—and everything else!—that we create can include as many potential users as possible. Guidelines of Accessibility Past The W3C published the Web Content Accessibility Guidelines (WCAG) 1.0 on 5th May 1999, when most of us were playing Snake on our Nokia 3210s’ 1.5” monochrome screens…a very long time ago in technology terms. From the start, those guidelines proved enlightening for designers and developers who wanted to avoid excluding users from their websites. For example, we learned how to provide alternatives to audio and images, how to structure information, and how to help users to find the information they needed. However, those guidelines were specific to the web technologies of the time, resulting in limitations such as requiring developers to “use W3C technologies when they are available […]”. Also, those guidelines became outdated; I doubt that you, gentle reader, consult their technical documentation about “directly accessible applets” or “Writing for browsers that do not support FRAME” in your day-to-day work. Guidelines of Accessibility Present The W3C published the Web Content Accessibility Guidelines (WCAG) 2.0 on 11th December 2008, when most of us were admiring the iPhone 3G’s innovative “iPhone OS 2.0” software…a long time ago in technology terms. Unlike WCAG 1, these guidelines also applied to non-W3C technologies, such as PDF and Flash. These guidelines used legalese and future-proofed language, with terms such as “time-based media” and “programmatically determined”, and testable success criteria. This made these guidelines more difficult for designers and developers to grasp, but also enabled the guidelines to make their way into international standards (see EN 301 549 — Accessibility requirements suitable for public procurement of ICT products and services in Europe and ISO/IEC 40500:2012 Information technology — W3C Web Content Accessibility Guidelines (WCAG) 2.0) and even international law (see EU Directive 2016/2102 … on the accessibility of the websites and mobile applications of public sector bodies). More importantly, these guidelines enabled designers and developers to create inclusive websites, at scale. For example, in the past 18 months: Intercom made their web Messenger accessible, achieving Level-AA conformance; Vimeo made accessibility updates to their video player to achieve Level-AA conformance; Stripe designed a new accessible colour system to conform with success criterion 1.4.3 (“Contrast (Minimum)”). The updated Web Content Accessibility Guidelines (WCAG) 2.1 arrived on 5th June last year—almost a 10-year wait for a “.1” update!—and added 17 new success criteria to help bring the guidelines up to date. Those new criteria focused on people using mobile devices and touchscreens, people with low vision, and people with cognitive and learning disabilities. (If you need to get up to speed with these guidelines, take 36 minutes to read “Web Content Accessibility Guidelines—for People Who Haven’t Read Them” and Web Content Accessibility Guidelines 2.1—for People Who Haven’t Read the Update.) Guidelines of Accessibility Yet to Come So, what’s next? Well, the W3C hope to release another minor update (WCAG 2.2) in November 2020. However, they also have a Task Force working on produce major new guidelines with wider scope (more people, more technologies) and fewer limitations (easier to understand, easier to use) in November 2022. These next guidelines will have a different name, because they will cover more than “Web” and “Content”. Andrew Kirkpatrick (Adobe’s Head of Accessibility) named the Task Force “Silver” (because the initials of “Accessibility Guidelines” form the symbol of the silver element). The Silver Task Force want the next major accessibility guidelines to: take account of more disabilities; apply to more technologies than just the web, including virtual reality, augmented reality, voice assistants, and more; consider all the technologies that people use, including authoring tools, browsers, media players, assistive technologies (including screen readers and screen magnifiers), application software, and operating systems. That’s quite a challenge, and so the more people who can help, the better. The Silver Task Force wanted an alternative to W3C’s Working Groups, which are made up of employees of organisations who are members of the W3C, and invited experts. So, they created a Silver Community Group to allow everyone to contribute towards this crucial work. If you want to join right now, for free, just create a W3C account. Like all good designers, the Silver Task Force and Silver Community Group began by researching. They examined the problems that people have had when using, conforming to, and maintaining the existing accessibility guidelines, and then summarised that research. From there, the Silver Community Group drafted ambitious design principles and requirements. You can read about what the Silver Community Group are currently working on, and decide whether you would like to get involved now, or at a later stage. Emphasise expertise over empathy Remember that today’s theme is “Promoting the participation of persons with disabilities and their leadership: taking action on the 2030 Development Agenda”. (The United Nations’ 2030 Development Agenda is outside the scope of this article, but if you’re looking to be inspired, read Alessia Aquaro’s article on Public Digital’s blog about how digital government can contribute to the UN’s Sustainable Development Goals.) In line with this theme, if you don’t have a disability and you want to contribute to the Silver Community Group, resist the temptation to try to empathise with people with disabilities. Instead, take 21 minutes during this festive season to enjoy the brilliant Liz Jackson explaining how empathy reifies disability stigmas, and follow her advice. Choose the right route I think we can expect the next Accessibility Guidelines to make their way into international standards and international law, just like their predecessors. We can also expect successful companies to apply them at scale. If you contribute to developing those guidelines, you can help to make sure that as many people as possible will be able to access digital information and services, in an era when that access will be crucial to every aspect of people’s lives. As Cennydd Bowles explained in “Building Better Worlds”, “There is no such thing as the future. There are instead a near-infinity of potential futures. The road as-yet-untravelled stretches before us in abundant directions. We get to choose the route. There is no fate but what we make.” About the author Alan Dalton worked for Ireland’s National Disability Authority for 9½ years, mostly as Accessibility Development Advisor. That involved working closely with public sector bodies to make websites, services, and information more accessible to all users, including users with disabilities. Before that, he was a consultant and trainer for Software Paths Ltd. in Dublin. In his spare time, he maintains StrongPasswordGenerator.com to help people stay safe online, tweets, and takes photos. More articles by Alan Full Article Code accessibility
bi Usability and Security; Better Together By feedproxy.google.com Published On :: Sun, 22 Dec 2019 12:00:00 +0000 Divya Sasidharan calls into question the trade-offs often made between security and usability. Does a secure interface by necessity need to be hard to use? Or is it the choice we make based on years of habit? Snow has fallen, snow on snow. Security is often synonymous with poor usability. We assume that in order for something to be secure, it needs to by default appear impenetrable to disincentivize potential bad actors. While this premise is true in many instances like in the security of a bank, it relies on a fundamental assumption: that there is no room for choice. With the option to choose, a user almost inevitably picks a more usable system or adapts how they interact with it regardless of how insecure it may be. In the context of the web, passwords are a prime example of such behavior. Though passwords were implemented as a way to drastically reduce the risk of attack, they proved to be marginally effective. In the name of convenience, complex, more secure passwords were shirked in favor of easy to remember ones, and passwords were liberally reused across accounts. This example clearly illustrates that usability and security are not mutually exclusive. Rather, security depends on usability, and it is imperative to get user buy-in in order to properly secure our applications. Security and Usability; a tale of broken trust At its core, security is about fostering trust. In addition to protecting user accounts from malicious attacks, security protocols provide users with the peace of mind that their accounts and personal information is safe. Ironically, that peace of mind is incumbent on users using the security protocols in the first place, which further relies on them accepting that security is needed. With the increased frequency of cyber security threats and data breaches over the last couple of years, users have grown to be less trusting of security experts and their measures. Security experts have equally become less trusting of users, and see them as the “the weakest link in the chain”. This has led to more cumbersome security practices such as mandatory 2FA and constant re-login flows which bottlenecks users from accomplishing essential tasks. Because of this break down in trust, there is a natural inclination to shortcut security altogether. Build a culture of trust not fear Building trust among users requires empowering them to believe that their individual actions have a larger impact on the security of the overall organization. If a user understands that their behavior can put critical resources of an organization at risk, they will more likely behave with security in mind. For this to work, nuance is key. Deeming that every resource needs a similarly high number of checks and balances diminishes how users perceive security and adds unnecessary bottlenecks to user workflows. In order to lay the foundation for good security, it’s worth noting that risk analysis is the bedrock of security design. Instead of blindly implementing standard security measures recommended by the experts, a better approach is to tailor security protocols to meet specific use cases and adapt as much as possible to user workflows. Here are some examples of how to do just that: Risk based authentication Risk based authentication is a powerful way to perform a holistic assessment of the threats facing an organization. Risks occur at the intersection of vulnerability and threat. A high risk account is vulnerable and faces the very real threat of a potential breach. Generally, risk based authentication is about calculating a risk score associated with accounts and determining the proper approach to securing it. It takes into account a combination of the likelihood that that risk will materialize and the impact on the organization should the risk come to pass. With this system, an organization can easily adapt access to resources depending on how critical they are to the business; for instance, internal documentation may not warrant 2FA, while accessing business and financial records may. Dynamically adaptive auth Similar to risk based auth, dynamically adaptive auth adjusts to the current situation. Security can be strengthened and slackened as warranted, depending on how risky the access point is. A user accessing an account from a trusted device in a known location may be deemed low risk and therefore not in need of extra security layers. Likewise, a user exhibiting predictive patterns of use should be granted quick and easy access to resources. The ability to adapt authentication based on the most recent security profile of a user significantly improves the experience by reducing unnecessary friction. Conclusion Historically, security failed to take the user experience into account, putting the onus of securing accounts solely on users. Considering the fate of password security, we can neither rely on users nor stringent security mechanisms to keep our accounts safe. Instead, we should aim for security measures that give users the freedom to bypass them as needed while still protecting our accounts from attack. The fate of secure systems lies in the understanding that security is a process that must constantly adapt to face the shifting landscape of user behavior and potential threats. About the author Divya is a web developer who is passionate about open source and the web. She is currently a developer experience engineer at Netlify, and believes that there is a better workflow for building and deploying sites that doesn’t require a server—ask her about the JAMstack. You will most likely find her in the sunniest spot in the room with a cup of tea in hand. More articles by Divya Full Article UX security
bi Four Ways Design Systems Can Promote Accessibility – and What They Can’t Do By feedproxy.google.com Published On :: Mon, 23 Dec 2019 12:00:00 +0000 Amy Hupe prepares a four bird roast of tasty treats so we can learn how the needs of many different types of users can be served through careful implementation of components within a design system. Design systems help us to make our products consistent, and to make sure we’re creating them in the most efficient way possible. They also help us to ensure our products are designed and built to a high quality; that they’re not only consistent in appearance, and efficiently-built, but that they are good. And good design means accessible design. 1 in 5 people in the UK have a long term illness, impairment or disability – and many more have a temporary disability. Designing accessible services is incredibly important from an ethical, reputational and commercial standpoint. For EU government websites and apps, accessibility is also a legal requirement. With that in mind, I’ll explain the four main ways I think we can use design systems to promote accessible design within an organisation, and what design systems can’t do. 1. Bake it in Design systems typically provide guidance and examples to aid the design process, showing what best practice looks like. Many design systems also encompass code that teams can use to take these elements into production. This gives us an opportunity to build good design into the foundations of our products, not just in terms of how they look, but also how they work. For everyone. Let me give an example. The GOV.UK Design System contains a component called the Summary list. It’s used in a few different contexts on GOV.UK, to summarise information. It’s often used at the end of a long or complex form, to let users check their answers before they send them, like this: Users can review the information and, if they’ve entered something incorrectly, they can go back and edit their answer by clicking the “Change” link on the right-hand side. This works well if you can see the change link, because you can see which information it corresponds to. In the top row, for example, I can see that the link is giving me the option to change the name I’ve entered because I can see the name label, and the name I put in is next to it. However, if you’re using a screen reader, this link – and all the others – will just say “change”, and it becomes harder to tell what you’re selecting. So to help with this, the GOV.UK Design System team added some visually-hidden text to the code in the example, to make the link more descriptive. Sighted users won’t see this text, but when a screen reader reads out the link, it’ll say “change name”. This makes the component more accessible, and helps it to satisfy a Web Content Accessibility Guidelines (WCAG 2.1) success criterion for links which says we must “provide link text that identifies the purpose of the link without needing additional context”. By building our components with inclusion in mind, we can make it easier to make products accessible, before anyone’s even had to think about it. And that’s a great starting point. But that doesn’t mean we don’t have to think about it – we definitely do. And a design system can help with that too. 2. Explain it Having worked as the GOV.UK Design System’s content designer for the best part of 3 years, I’m somewhat biased about this, but I think that the most valuable aspect of a design system is its documentation. (Here’s a shameless plug for my patterns Day talk on design system documentation earlier this year, if you want to know more about that.) When it comes to accessibility, written documentation lets us guide good practice in a way that code and examples alone can’t. By carefully documenting implementation rules for each component, we have an opportunity to distribute accessible design principles throughout a design system. This means design system users encounter them not just once, but repeatedly and frequently, in various contexts, which helps to build awareness over time. For instance, WCAG 2.1 warns against using colour as “the only visual means of conveying information, calling an action, prompting a response or distinguishing a visual element”. This is a general principle to follow, but design system documentation lets us explain how this relates to specific components. Take the GOV.UK Design System’s warning buttons. These are used for actions with serious, often destructive consequences that can’t easily be undone – like permanently deleting an account. The example doesn’t tell you this, but the guidance explains that you shouldn’t rely on the red colour of warning buttons to communicate that the button performs a serious action, since not all users will be able to see the colour or understand what it signifies. Instead, it says, “make sure the context and button text makes clear what will happen if the user selects it”. In this way, the colour is used as an enhancement for people who can interpret it, but it’s not necessary in order to understand it. Making the code in our examples and component packages as accessible as possible by default is really important, but written documentation like this lets us be much more explicit about how to design accessible services. 3. Lead by example In our design systems’ documentation, we’re telling people what good design looks like, so it’s really important that we practice what we preach. Design systems are usually for members of staff, rather than members of the public. But if we want to build an inclusive workplace, we need to hold them to the same standards and ensure they’re accessible to everyone who might need to use them – today and in the future. One of the ways we did this in my team, was by making sure the GOV.UK Design System supports users who need to customise the colours they use to browse the web. There are a range of different user needs for changing colours on the web. People who are sensitive to light, for instance, might find a white background too bright. And some users with dyslexia find certain colours easier to read than others. My colleague, Nick Colley, wrote about the work we did to ensure GOV.UK Design System’s components will work when users change colours on GOV.UK. To ensure we weren’t introducing barriers to our colleagues, we also made it possible to customise colours in the GOV.UK Design System website itself. Building this flexibility into our design system helps to support our colleagues who need it, but it also shows others that we’re committed to inclusion and removing barriers. 4. Teach it The examples I’ve drawn on here have mostly focused on design system documentation and tooling, but design systems are much bigger than that. In the fortuitously-timed “There is No Design System”, Jina reminds us that tooling is just one of the ways we systematise design: …it’s a lot of people-focused work: Reviewing. Advising. Organizing. Coordinating. Triaging. Educating. Supporting.” To make a design system successful, we can’t just build a set of components and hope they work. We have to actively help people find it, use it and contribute to it. That means we have to go out and talk about it. We have to support people in learning to use it and help new teams adopt it. These engagement activities and collaborative processes that sit around it can help to promote awareness of the why, not just the what. At GDS, we ran workshops on accessibility in the design system, getting people to browse various web pages using visual impairment simulation glasses to understand how visually impaired users might experience our content. By working closely with our systems’ users and contributors like this, we have an opportunity to bring them along on the journey of making something accessible. We can help them to test out their code and content and understand how they’ll work on different platforms, and how they might need to be adjusted to make sure they’re accessible. We can teach them what accessibility means in practice. These kinds of activities are invaluable in helping to promote accessible design thinking. And these kinds of lessons – when taught well – are disseminated as colleagues share knowledge with their teams, departments and the wider industry. What design systems can’t do Our industry’s excitement about design systems shows no signs of abating, and I’m excited about the opportunities it affords us to make accessible design the default, not an edge case. But I want to finish on a word about their limitations. While a design system can help to promote awareness of the need to be accessible, and how to design products and services that are, a design system can’t make an organisation fundamentally care about accessibility. Even with the help of a thoughtfully created design system, it’s still possible to make really inaccessible products if you’re not actively working to remove barriers. I feel lucky to have worked somewhere that prioritises accessibility. Thanks to the work of some really brilliant people, it’s just part of the fabric at GDS. (For more on that work and those brilliant people, I can’t think of a better place to start than my colleague Ollie Byford’s talk on inclusive forms.) I’m far from being an accessibility expert, but I can write about this because I’ve worked in an organisation where it’s always a central consideration. This shouldn’t be something to feel lucky about. It should be the default, but sadly we’re not there yet. Not even close. Earlier this year, Domino’s pizza was successfully sued by a blind customer after he was unable to order food on their website or mobile app, despite using screen-reading software. And in a recent study carried out by disability equality charity, Scope, 50% of respondents said that they had given up on buying a product because the website, app or in-store machine had accessibility issues. Legally, reputationally and most importantly, morally, we all have a duty to do better. To make sure our products and services are accessible to everyone. We can use design systems to help us on that journey, but they’re just one part of our toolkit. In the end, it’s about committing to the cause – doing the work to make things accessible. Because accessible design is good design. About the author Amy is a content specialist and design systems advocate who’s spent the last 3 years working as a Senior Content Designer at the Government Digital Service. In that time, she’s led the content strategy for the GOV.UK Design System, including a straightforward and inclusive approach to documentation. In January, Amy will continue her work in this space, in her new role as Product Manager for Babylon Health’s design system, DNA. More articles by Amy Full Article Process style-guides
bi Cigarette taxes and teen marijuana use [electronic resource] / D. Mark Anderson, Kyutaro Matsuzawa, Joseph J. Sabia By darius.uleth.ca Published On :: Cambridge, Mass. : National Bureau of Economic Research, 2020 Full Article
bi Drug courts [electronic resource] : a new approach to treatment and rehabilitation / James E. Lessenger, Glade F. Roper, editors By darius.uleth.ca Published On :: New York : Springer, [2007] Full Article
bi The scientist and the spy: a true story of China, the FBI, and industrial espionage / Mara Hvistendahl By library.mit.edu Published On :: Sun, 15 Mar 2020 08:09:28 EDT Dewey Library - HV7561.H85 2020 Full Article
bi Primary elections in the United States / Shigeo Hirano, Columbia University ; James M. Snyder, Jr., Harvard University By library.mit.edu Published On :: Sun, 22 Mar 2020 07:44:49 EDT Dewey Library - JK2071.H57 2019 Full Article
bi The conservative sensibility / George F. Will By library.mit.edu Published On :: Sun, 22 Mar 2020 07:44:49 EDT Dewey Library - JC573.2.U6 W54 2019 Full Article
bi Me the people: how populism transforms democracy / Nadia Urbinati By library.mit.edu Published On :: Sun, 29 Mar 2020 07:44:51 EDT Dewey Library - JC423.U776 2019 Full Article
bi Extreme reactions: radical right mobilization in Eastern Europe / Lenka Bustikova, Arizona State University By library.mit.edu Published On :: Sun, 29 Mar 2020 07:44:51 EDT Dewey Library - JC573.2.E852 B88 2020 Full Article
bi The suspect: an Olympic bombing, the FBI, the media, and Richard Jewell, the man caught in the middle / Kent Alexander & Kevin Salwen By library.mit.edu Published On :: Sun, 29 Mar 2020 07:44:51 EDT Dewey Library - HV8079.B62 A44 2019 Full Article
bi Militarization: a reader / Roberto J. González, Hugh Gusterson, Gustaaf Houtman, editors ; in collaboration with Catherine Besteman, Andrew Bickford, Catherine Lutz, Katherine T. McCaffrey, Austin Miller, David H. Price, David Vine By library.mit.edu Published On :: Sun, 5 Apr 2020 07:47:23 EDT Dewey Library - U21.2.M558 2019 Full Article
bi Italian populism and constitutional law: strategies, conflicts and dilemmas / Giacomo Delledonne, Giuseppe Martinico, Matteo Monti, Fabio Pacini, editors By library.mit.edu Published On :: Sun, 12 Apr 2020 09:49:18 EDT Online Resource Full Article
bi Stalin and Mao: a comparison of the Russian and Chinese revolutions / by Lucien Bianco ; translated from the French edition La récidive: Révolution russe, révolution chinoise by Krystyna Horko By library.mit.edu Published On :: Sun, 19 Apr 2020 10:15:39 EDT Dewey Library - HX550.R48 B5213 2018 Full Article
bi The political theory of neoliberalism / Thomas Biebricher By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - JC574.B54 2018 Full Article
bi Money rock: a family's story of cocaine, race, and ambition in the new South / Pam Kelley By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - HV5831.N8 K45 2018 Full Article
bi Tyranny comes home: the domestic fate of U.S. militarism / Christopher J. Coyne and Abigail R. Hall By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - UA23.C685 2018 Full Article
bi The end of strategic stability?: Nuclear weapons and the challenge of regional rivalries / Lawrence Rubin and Adam N. Stulberg, editors By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - U263.E557 2018 Full Article
bi Race on the brain: what implicit bias gets wrong about the struggle for racial justice / Jonathan Kahn By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - HV9950.K34 2018 Full Article
bi Liberalism is not enough: race and poverty in postwar political thought / Robin Marie Averbeck By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - JC574.2.U6 A79 2018 Full Article
bi Revolutionary love: a political manifesto to heal and transform the world / Rabbi Michael Lerner By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - JK1726.L47 2019 Full Article
bi Gender equality in politics: implementing party quotas in Germany and Austria / Petra Ahrens, Katja Chmilewski, Sabine Lang, Birgit Sauer By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Online Resource Full Article
bi Presidential Rhetoric on Terrorism under Bush, Obama and Trump: Inflating and Calibrating the Threat After 9/11 / Gabriel Rubin By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Online Resource Full Article
bi Sacrificial limbs: masculinity, disability, and political violence in Turkey / Salih Can Açıksöz By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - UB365.T8 A27 2020 Full Article
bi STF jawan killed in Maoist attack in Bihar By archive.indianexpress.com Published On :: Fri, 20 Sep 2013 05:30:36 GMT Armed Maoists blew up a PWD building by exploding bombs in Parasi village. Full Article
bi What's ailing the Bihar's children? By archive.indianexpress.com Published On :: Sat, 21 Sep 2013 18:38:32 GMT After 684 deaths, countless tests, several visits by experts are no closer to getting the answer. Full Article
bi Nairobi mall attack brings back memories of 26/11 strike By archive.indianexpress.com Published On :: Wed, 25 Sep 2013 06:28:50 GMT Shot in the right leg, Devika, was the youngest witness in the trial of Ajmal Kasab. Full Article
bi Ishrat Jahan case: CBI questions Gujarat Law Minister Bhupendrasinh Chudasama By archive.indianexpress.com Published On :: Wed, 25 Sep 2013 16:40:08 GMT CBI said Chudasama was allegedly present during the meeting held for protecting police personnel. Full Article
bi JandK attack: Lesser-known militant outfit claims responsibility for strikes By archive.indianexpress.com Published On :: Thu, 26 Sep 2013 08:02:13 GMT 'Shohada Brigade' spokesperson said their mujhahideen are still fighting in Jammu. Full Article
bi Raghuram Rajan data backs Nitish Kumar plea: Bihar is 2nd most backward By archive.indianexpress.com Published On :: Thu, 26 Sep 2013 23:14:49 GMT "Least developed" index is dominated by non-UPA ruled states, which make up six of the bottom ten. Full Article
bi Three weeks after clashes, new births offer new hope in Muzaffarnagar By archive.indianexpress.com Published On :: Sun, 29 Sep 2013 00:07:34 GMT In Muzaffarnagar, three of the biggest relief camps in Kandhla, Basikala and Malakpur have seen the birth of about 27 babies. Full Article
bi Fodder scam: Lalu Prasad taken to Birsa Munda Central jail By archive.indianexpress.com Published On :: Mon, 30 Sep 2013 08:41:24 GMT The court has fixed October three for pronouncement of sentence against Yadav. Full Article
bi Army fights infiltration bid, says Pak special troops may be involved By archive.indianexpress.com Published On :: Wed, 02 Oct 2013 10:16:37 GMT Army's action came after reports of Pak troops occupying an uninhabited village emerged. Full Article
bi United Andhra leaders call for bandh today as Cabinet clears Telangana formation By archive.indianexpress.com Published On :: Thu, 03 Oct 2013 18:39:26 GMT Congress MPs, MLAs from Seemandhra say Cabinet move was hasty. Full Article
bi Cong MP Rajagopal to move SC against AP bifurcation decision By archive.indianexpress.com Published On :: Fri, 04 Oct 2013 06:02:17 GMT Move violates the federal principles and structure of the Constitution, Rajagopal said. Full Article
bi AP law minister quits over state bifurcation decision By archive.indianexpress.com Published On :: Fri, 04 Oct 2013 08:15:54 GMT Erasu was one of the dozen ministers who had submitted resignations to CM Reddy. Full Article
bi More trouble for Asaram: Parents demand CBI probe into 2008 ashram deaths By archive.indianexpress.com Published On :: Mon, 07 Oct 2013 15:53:56 GMT Parents of two children staged a sit-in protest demanding CBI probe into Ashram deaths. Full Article
bi Massive infiltration bid in Keran sector foiled: Army By archive.indianexpress.com Published On :: Tue, 08 Oct 2013 10:07:01 GMT 8 terrorists killed, 59 weapons including 18 AK rifles and war-like stores captured. Full Article