Criteria
The Distinguished Service Cross is awarded to a person who, while serving in any capacity with the Army, distinguishes himself or herself by extraordinary heroism not justifying the award of a Medal of Honor; while engaged in an action against an enemy of the United States; while engaged in military operations involving conflict with an opposing/foreign force; or while serving with friendly foreign forces engaged in an armed conflict against an opposing Armed Force in which the United States is not a belligerent party. The act or acts of heroism must have been so notable and have involved risk of life so extraordinary as to set the individual apart from his or her comrades.
Read more about this topic: Distinguished Service Cross (United States)
Famous quotes containing the word criteria:
“There are ... two minimum conditions necessary and sufficient for the existence of a legal system. On the one hand those rules of behavior which are valid according to the systems ultimate criteria of validity must be generally obeyed, and on the other hand, its rules of recognition specifying the criteria of legal validity and its rules of change and adjudication must be effectively accepted as common public standards of official behavior by its officials.”
—H.L.A. (Herbert Lionel Adolphus)
“Every sign is subject to the criteria of ideological evaluation.... The domain of ideology coincides with the domain of signs. They equate with one another. Wherever a sign is present, ideology is present, too. Everything ideological possesses semiotic value.”
—V.N. (Valintin Nikolaevic)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)