skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Betelgeuse: a review
Abstract Was Betelgeuse once in a binary star system? What causes it to vary over a vast range of timescales? Why did it dim dramatically in 2020? When and how will it explode? J. Craig Wheeler and Manos Chatzopoulos present a host of challenges to both observers and theorists.  more » « less
Award ID(s):
1813825
PAR ID:
10434421
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Astronomy & Geophysics
Volume:
64
Issue:
3
ISSN:
1366-8781
Page Range / eLocation ID:
3.11 to 3.27
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This study aimed to find how IT-related hobbies and interests impacted students’ educational and career decision-making. Methods: As part of a six-year-long, ATE-funded study of IT students at Ivy Tech Community College, our team conducted semi-structured, phenomenological interviews. These interviews were analyzed using keyword searches and a combined inductive-deductive approach to coding to explore how IT-related hobbies and interests interacted with other personal characteristics to inform student decisionmaking. Findings: Our team identified a potential link between early IT interest, IT-related hobbies, and persistence in IT education and careers. Many participants in the study had a moment of clarity where they realized that their IT hobby could become their career, the “hobby-to-career reckoning.” Contributions: This piece explores the potential connection between IT interests/hobbies and student outcomes within the field of IT while exploring the different social factors that may impact student decision-making and the role of the hobby-to-career reckoning in the decision-making process. This piece will give practitioners and researchers insight into how early interest in IT and IT-related hobbies may impact student decision-making about IT educational programs and careers. 
    more » « less
  2. This study aimed to find how IT-related hobbies and interests impacted students’ educational and career decision-making. Methods: As part of a six-year-long, ATE-funded study of IT students at Ivy Tech Community College, our team conducted semi-structured, phenomenological interviews. These interviews were analyzed using keyword searches and a combined inductive-deductive approach to coding to explore how IT-related hobbies and interests interacted with other personal characteristics to inform student decision-making. Findings: Our team identified a potential link between early IT interest, IT-related hobbies, and persistence in IT education and careers. Many participants in the study had a moment of clarity where they realized that their IT hobby could become their career, the “hobby-to-career reckoning.” Contributions: This piece explores the potential connection between IT interests/hobbies and student outcomes within the field of IT while exploring the different social factors that may impact student decision-making and the role of the hobby-to-career reckoning in the decision-making process. This piece will give practitioners and researchers insight into how early interest in IT and IT-related hobbies may impact student decision-making about IT educational programs and careers. 
    more » « less
  3. We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its many forms, shadow IT is the software or hardware present in a computer system or network that lies outside the typical review process of the responsible IT unit. We carry out a case study of an internally built legacy grants management system at the University of Maryland, Baltimore County that exemplifies the vulnerabilities, including cross-site scripting and SQL injection, typical of such unauthorized and ad-hoc software. We also conduct a survey of IT professionals at universities, colleges, and community colleges that reveals new and actionable information regarding the prevalence, usage patterns, types, benefits, and risks of shadow IT at their respective institutions. Further, we propose a security-based profile of shadow IT, involving a subset of elements from existing shadow IT taxonomies, which categorizes shadow IT from a security perspective. Based on this profile, survey respondents identified the predominant form of shadow IT at their institutions, revealing close similarities to findings from our case study. Through this work, we are the first to identify possible susceptibility factors associated with the occurrence of shadow IT related security incidents within academic institutions. Correlations of significance include the presence of certain graduate schools, the level of decentralization of the IT department, the types of shadow IT present, the percentage of security violations related to shadow IT, and the institution's overall attitude toward shadow IT. The combined elements of our case study, profile, and survey provide the first multifaceted view of shadow IT security at academic institutions, highlighting tension between its risks and benefits, and suggesting strategies for managing it successfully. 
    more » « less
  4. To repair a program does not mean to make it (absolutely) correct; it only means to make it more-correct than it was originally. This is not a mundane academic distinction: Given that programs typically have about a dozen faults per KLOC, it is important for program repair methods and tools to be designed in such a way that they map an incorrect program into a more-correct, albeit still potentially incorrect, program. Yet in the absence of a concept of relative correctness, many program repair methods and tools resort to approximations of absolute correctness; since these methods and tools are often validated against programs with a single fault, making them absolutely correct is indistinguishable from making them more-correct; this has contributed to conceal/ obscure the absence of (and the need for) relative correctness. In this paper we propose a theory of program repair based on a concept of relative correctness. We aspire to encourage researchers in program repair to explicitly specify what concept of relative correctness their method or tool is based upon; and to validate their method or tool by proving that it does enhance relative correctness, as defined. 
    more » « less
  5. null (Ed.)
    Living organisms need energy to stay alive; in cells, this energy is supplied in the form of a small molecule called adenosine triphosphate, or ATP, a nucleotide that stores energy in the bonds between its three phosphate groups. ATP is present in all living cells and is often referred to as the energy currency of the cell, because it can be easily stored and transported to where it is needed. However, it is unknown why cells rely so heavily on ATP when a highly similar nucleotide called guanosine triphosphate, or GTP, could also act as an energy currency. There are several examples of proteins that originally used GTP and have since evolved to use ATP, but it is not clear why this switch occurred. One suggestion is that ATP is the more readily available nucleotide in the cell. To test this hypothesis, Updegrove, Harke et al. studied a protein that helps bacteria transition into spores, which are hardier and can survive in extreme environments until conditions become favorable for bacteria to grow again. In modern bacteria, this protein uses ATP to provide energy, but it evolved from an ancestral protein that used GTP instead. First, Updegrove, Harke et al. engineered the protein so that it became more similar to the ancestral protein and used GTP instead of ATP. When this was done, the protein gained the ability to break down GTP and release energy from it, but it no longer performed its enzymatic function. This suggests that both the energy released and the source of that energy are important for a protein’s activity. Further analysis showed that the modern version of the protein has evolved to briefly hold on to ATP after releasing its energy, which did not happen with GTP in the modified protein. Updegrove, Harke et al. also discovered that the levels of GTP in a bacterial cell fall as it transforms into a spore, while ATP levels remain relatively high. This suggests that ATP may indeed have become the source of energy of choice because it was more available. These findings provide insights into how ATP became the energy currency in cells, and suggest that how ATP is bound by proteins can impact a protein’s activity. Additionally, these experiments could help inform the development of drugs targeting proteins that bind nucleotides: it may be essential to consider the entirety of the binding event, and not just the release of energy. 
    more » « less