Intelligence Is the Winning Strategy

2021 ◽  
Vol 30 (004) ◽  
pp. 114-127
Author(s):  
O.R. ZAKIROV
Keyword(s):  
Public Voices ◽  
2016 ◽  
Vol 14 (1) ◽  
pp. 115
Author(s):  
Mary Coleman

The author of this article argues that the two-decades-long litigation struggle was necessary to push the political actors in Mississippi into a more virtuous than vicious legal/political negotiation. The second and related argument, however, is that neither the 1992 United States Supreme Court decision in Fordice nor the negotiation provided an adequate riposte to plaintiffs’ claims. The author shows that their chief counsel for the first phase of the litigation wanted equality of opportunity for historically black colleges and universities (HBCUs), as did the plaintiffs. In the course of explicating the role of a legal grass-roots humanitarian, Coleman suggests lessons learned and trade-offs from that case/negotiation, describing the tradeoffs as part of the political vestiges of legal racism in black public higher education and the need to move HBCUs to a higher level of opportunity at a critical juncture in the life of tuition-dependent colleges and universities in the United States. Throughout the essay the following questions pose themselves: In thinking about the Road to Fordice and to political settlement, would the Justice Department lawyers and the plaintiffs’ lawyers connect at the point of their shared strength? Would the timing of the settlement benefit the plaintiffs and/or the State? Could plaintiffs’ lawyers hold together for the length of the case and move each piece of the case forward in a winning strategy? Who were plaintiffs’ opponents and what was their strategy? With these questions in mind, the author offers an analysis of how the campaign— political/legal arguments and political/legal remedies to remove the vestiges of de jure segregation in higher education—unfolded in Mississippi, with special emphasis on the initiating lawyer in Ayers v. Waller and Fordice, Isaiah Madison


Antibiotics ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 31
Author(s):  
Magdaléna Kapustová ◽  
Giuseppe Granata ◽  
Edoardo Napoli ◽  
Andrea Puškárová ◽  
Mária Bučková ◽  
...  

Nanotechnology is a new frontier of this century that finds applications in various fields of science with important effects on our life and on the environment. Nanoencapsulation of bioactive compounds is a promising topic of nanotechnology. The excessive use of synthetic compounds with antifungal activity has led to the selection of resistant fungal species. In this context, the use of plant essential oils (EOs) with antifungal activity encapsulated in ecofriendly nanosystems could be a new and winning strategy to overcome the problem. We prepared nanoencapsules containing the essential oils of Origanum vulgare (OV) and Thymus capitatus (TC) by the nanoprecipitation method. The colloidal suspensions were characterized for size, polydispersity index (PDI), zeta potential, efficiency of encapsulation (EE) and loading capacity (LC). Finally, the essential oil nanosuspensions were assayed against a panel of fourteen fungal strains belonging to the Ascomycota and Basidiomycota phyla. Our results show that the nanosystems containing thyme and oregano essential oils were active against various fungal strains from natural environments and materials. In particular, the minimum inhibitory concentration (MIC) and minimum fungicidal concentration (MFC) values were two to four times lower than the pure essential oils. The aqueous, ecofriendly essential oil nanosuspensions with broad-spectrum antifungal activity could be a valid alternative to synthetic products, finding interesting applications in the agri-food and environmental fields.


2020 ◽  
Vol 13 (1) ◽  
pp. 238
Author(s):  
Alice Giusti ◽  
Enrica Ricci ◽  
Laura Gasperetti ◽  
Marta Galgani ◽  
Luca Polidori ◽  
...  

Proper investment in mushroom production (farming and wild mushroom picking activities) may represent a winning strategy for many countries, including Italy, to better face the problems of food security and environmental impact, and to break away from imports, enhancing the local products. However, the risk related to the consumption of poisoning species requires governments to implement or reinforce effective control measures to protect consumers. Mushroom identification by phenotype observation is hardly applicable if morphologically-similar species, non-whole specimens, or clinical samples are involved. Genotypic analysis is a valid alternative. An ongoing research project involving the Experimental Zooprophylactic Institute of Lazio and Tuscany, the regional Mycological Inspectorate, the Tuscany Mycological Groups Association, and the Department of Veterinary Sciences of the University of Pisa aims to reinforce the collaboration among institutions for the management of mushroom poisoning. The core’s project aims to develop an internal genetic database to support the identification of wild and cultivated mushroom species in the Italian territory. The database will include Internal Transcribed Spacer (ITS) sequences retrieved from official databases (the NCBI GenBank and the BOLD system) which are considered to be reliable, after a proper selection process, and sequences from specimens collected directly and identified by expert mycologists. Once it is validated, the database will be available and further implementable by the official network of national laboratories.


2021 ◽  
Vol 2 (1) ◽  
pp. 1-23
Author(s):  
Ziya Alper Genç ◽  
Gabriele Lenzini ◽  
Daniele Sgandurra

To protect their digital assets from malware attacks, most users and companies rely on antivirus (AV) software. AVs’ protection is a full-time task against malware: This is similar to a game where malware, e.g., through obfuscation and polymorphism, denial of service attacks, and malformed packets and parameters, tries to circumvent AV defences or make them crash. However, AVs react by complementing signature-based detection with anomaly or behavioral analysis, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-acts, for instance, by using adversarial inputs to avoid detection, and so on. In this cat-and-mouse game, a winning strategy is trying to anticipate the move of the adversary by looking into one’s own weaknesses, seeing how the adversary can penetrate them, and building up appropriate defences or attacks. In this article, we play the role of malware developers and anticipate two novel moves for the malware side to demonstrate the weakness in the AVs and to improve the defences in AVs’ side. The first one consists in simulating mouse events to control AVs, namely, to send them mouse “clicks” to deactivate their protection. We prove that many AVs can be disabled in this way, and we call this class of attacks Ghost Control . The second one consists in controlling whitelisted applications, such as Notepad, by sending them keyboard events (such as “copy-and-paste”) to perform malicious operations on behalf of the malware. We prove that the anti-ransomware protection feature of AVs can be bypassed if we use Notepad as a “puppet” to rewrite the content of protected files as a ransomware would do. Playing with the words, and recalling the cat-and-mouse game, we call this class of attacks Cut-and-Mouse . We tested these two attacks on 29 AVs, and the results show that 14 AVs are vulnerable to Ghost Control attack while all 29 AV programs tested are found vulnerable to Cut-and-Mouse . Furthermore, we also show some weaknesses in additional protection mechanisms of AVs, such as sandboxing and CAPTCHA verification. We have engaged with the affected AV companies, and we reported the disclosure communication with them and their responses.


2002 ◽  
Vol 81 (4) ◽  
pp. 2 ◽  
Author(s):  
Gal Luft
Keyword(s):  

1985 ◽  
Vol 50 (1) ◽  
pp. 110-122
Author(s):  
Howard Becker

For any A ⊂ R, the Banach game B(A) is the following infinite game on reals: Players I and II alternately play positive real numbers a1; a2, a3, a4,… such that for n > 1, an < an−1. Player I wins iff ai exists and is in A.This type of game was introduced by Banach in 1935 in the Scottish Book [15], Problem 43. The (rather vague) problem which Banach posed was to characterize those sets A for which I (II) has a winning strategy in B(A). (There are three parts to Problem 43. In the first, Mazur defined a game G**(A) for every set A ⊂ R and conjectured that II has a winning strategy in G**(A) iff A is meager and I has a winning strategy in G**(A) iff A is comeager in some neighborhood; this conjecture was proved by Banach. Presumably Banach had this result in mind when he asked the question about B(A), and hoped for a similar type of characterization.) Incidentally, Problem 43 of the Scottish Book appears to be the first time infinite games of any sort were studied by mathematicians.This paper will not provide the reader with any answer to Banach's question. I know of no nontrivial way to characterize when player I (or II) wins, and I suspect there is none. This paper is concerned with a different (also rather vague) question: For which sets A is the Banach game B(A) determined? To say that B(A) is determined means, of course, that one of the players has a winning strategy for B(A).


2021 ◽  
pp. 2046147X2110140
Author(s):  
Roumen Dimitrov

In this paper I analyse a series of Australian MMR (measles-mumpsrubella) vaccination campaigns and policies from the last decade. Using the Bruno Latour’s Actor Network Theory (ATN), I locate human and non-human mediators – including the virus and vaccine – in the complex pro-vaccination alliance led by government campaigners. I identify the vaccine hesitant parents – a large group that ‘sits on the fence’ between the ‘vaccine confident’ and ‘vaccine refusing’ parents – as the main target of pro-vaccination campaigns. PR literature on pro-vaccination campaigns has applied ATN to the independence of the media as network agents. This paper contributes with the problematisation of several more actors such as the health workers, medical experts and the vaccine hesitant parents themselves. Even when they are keen members of a pro-vaccination network, they cannot be taken for granted. This is where understanding of stigma, silence and voice helps. To align their group interests and discourses, government should know how to communicate strategically – including how to communicate indirectly, avoiding stigma and keeping certain internal affinities and communicative distances intact. In conclusion, I make suggestions about strategic communication in pro-vaccination campaigns. Communication of statistical risks and side effects should be central. It is a winning strategy because it establishes a more credible balance between individual rights and collective obligations in achieving herd immunity. And mandating vaccination cannot replace communication. Research shows that legislating compulsory vaccination may have short-term and relatively small effects. They are almost negligible in the long run. Mandate may trigger compliance, but it also causes anger and mistrust. Mandating vaccine has negative side effects. It punishes with economic and cultural sanctions the socially disadvantaged, who are not active refusers. It also has the opposite effect on vaccine hesitant parents. It does not weaken but rather strengthens their resistance to the vaccine and pushes them to the lager of antivaxxers.


Resuscitation ◽  
2016 ◽  
Vol 107 ◽  
pp. e5-e6
Author(s):  
Federico Semeraro ◽  
Andrea Scapigliati ◽  
Samantha Di Marco ◽  
Adriana Boccuzzi ◽  
Marco De Luca ◽  
...  

Peace Review ◽  
2020 ◽  
Vol 32 (4) ◽  
pp. 471-479
Author(s):  
Lindsay Sarah Krasnoff ◽  
Sarah J. Hillyer ◽  
Carolyn R. Spellings
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document