1. Last 7 days
    1. el receptor tipo Toll 4 actúa como un objetivo molecular predominante para los ácidos grasos saturados en el hipotálamo, desencadenando la red de señalización intracelular que induce una respuesta inflamatoria y determina la resistencia a las señales anorexigénicas.

      .

    2. Las ratas alimentadas con una dieta rica en grasas monoinsaturadas no desarrollan resistencia hipotalámica a la leptina, mientras que la mutación de pérdida de función del receptor tipo Toll 4 y la inhibición inmunofarmacológica de dicho receptor protegen a los ratones de la obesidad inducida por la dieta.

      .

    3. En modelos animales de obesidad inducida por la dieta, la activación de una respuesta inflamatoria en el hipotálamo produce resistencia molecular y funcional a las hormonas anorexigénicas insulina y leptina

      Intro

    1. I'm not saying that bigotry and violence and rape are good things. Clearly they're terrible. But they're also common occurrences in contemporary media and secondary schools. So is protection even possible?

      I don't think this is a strong argument for those wanting to protect. This would be the reason they would want to do more protection

    2. As my favorite librarian, Julie Vignol of South Eugene High School, says, "If teens are going to be able to vote at 18, shouldn't they be reading the most controversial and interesting books as teenagers so they learn to think and discuss and debate and change minds? Isn't thinking a big part of becoming a responsible voter?"If we censor and limit teens' reading material, don't we then stunt their intellectual development?

      This is a solid argument.

    1. proceso de dividir una tarea compleja y larga, en pequeñas subtareas lo suficientemente simples como para realizarse con una de estas instrucciones básicas.

      No muchas personas tienen en cuenta este proceso al momento de adentrarse en la programación y por eso les resulta tan complejo, a mi me paso en mis inicios con HTML ya que consideraba una página web como un único ecosistema de código donde cualquier cambio puede afectar a el resto y sería imposible de editar. Ahora se que teniendo claridad en la representación del texto y sus respectivos detalles se puede crear la página bloque a bloque.

    1. Libraries are recognized for their firm belief in the right to access in-formation, and this naturally extends to the right to access and understandtreatment and disease information.

      This made me realize how important libraries are in helping people access and understand reliable health information.

    2. The result of these stresses and omissions is that crucial information isnever given or, if it is given, it often gets lost

      This helped me realize how easy it is for people to misunderstand health information, which shows why evaluating information is so important.

    3. Authority of health information is critical in the environment of theResource Centre.

      This source is useful because it emphasizes evaluating reliable information, although it mainly focuses on a library setting.

    4. Strategiesfor effective collaboration will be outlined in the context of health literacypromotion efforts.

      This is a strong academic source because it outlines strategies and is based on research in a real-world case study.

    5. A working definition of health information literary is “the set of abilitiesneeded to: recognize a health information need; identify likely informationsources and use them to retrieve relevant information; assess the qualityof the information and its applicability to a specific situation; and analyze,understand, and use the information to make good health decisions”

      This section defines health information literacy as the ability to find, evaluate, and use health information to make decisions.

    6. Information literacy is a setof abilities enabling individuals to “recognize when information is neededand have the ability to locate, evaluate, and use effectively the neededinformation”

      This explains that health information literacy involves recognizing, finding, evaluating, and using information effectively.

    Annotators

    1. For a historical perspective on the importance of health literacy, listen to a presentation from Dr. Rima Rudd. Dr. Rudd is a health literacy expert at the Harvard T.H. Chan School of Public Health. The title of her presentation is "Health Literacy Research Findings and Insights: Increasing Organizational Capacity for Shaping Public Health Messages."

      Reading this changed how I think about responsibility, because it showed that organizations also play a role in helping people understand health information. This is important for real life since not everyone has the same level of knowledge or access.

    2. Using health literacy best practices can build trust and advance health equity. Trust is an important part of a person's willingness to engage in care and behaviors that promote health.

      This source helped me understand that health literacy is more than just reading or understanding information. It also involves actually using it to make decisions. It connects to the "Evaluate" concept because people need to thing critically about health information before acting on it.

    3. New definitions

      This acticle is useful because it provides updated definitions and explains why health literacy matters. It is not biased but it is focused on educating the public rather debating the topic which makes it strong for understanding basics.

    4. The resources on this site will help you learn about health literacy and what you, your organization, or community can do to improve it. The goals and strategies in the National Action Plan to Improve Health Literacy are a good place to begin.

      This souce is reliable because it comes from the CDC, a trusted public health organization. The information is clearly explained and based on updated research, althought it is more information and educational rather than presenting different viewpoints or arguments.

    5. The definition of health literacy was updated in August 2020 with the release of the U.S. government's Healthy People 2030 initiative. The update addresses personal health literacy and organizational health literacy and provides the following definitions: Personal health literacy is the degree to which individuals have the ability to find, understand, and use information and services to inform health-related decisions and actions for themselves and others. Organizational health literacy is the degree to which organizations equitably enable individuals to find, understand, and use information and services to inform health-related decisions and actions for themselves and others.

      This section explains that health literacy is the ability to find, understand, and use health information to make decisions. It also introduces the idea that organizations play a role in helping people access and understand this information, not just individuals.

    6. The new definitions: Emphasize people's ability to use health information rather than just understand it Focus on the ability to make "well-informed" decisions rather than "appropriate" ones Acknowledge that organizations have a responsibility to address health literacy Incorporate a public health perspective

      The updated definition focuses more on using information rather than just understanding it. It also emphasizes making well informed decisions and recognizes that health literacy is connected to public health and equity

    1. e self-attributes

      there are so many components for plannign that everytime I have a new teacher I realized all the work you add to one lesson! all the components you need to attend to to be able to support students! How!? How did I do this every day for so many years! how can we help teachers realized that it will be better, yet we have students that have different needs! how do we provide more time for teachers to plan and be ready for every diverse students we have in the classroom. The self attributes supported the thinking I have been having with teachers who are new to the resource of HMH.

    1. En conjunto, estos datos sugieren que TLR4 es un vínculo molecular entre la nutrición, los lípidos y la inflamación, y que el sistema inmunitario innato participa en la regulación del equilibrio energético y la resistencia a la insulina en respuesta a los cambios en el entorno nutricional.

      .

    2. la cual activa la transcripción de muchos genes proinflamatorios que codifican moléculas proinflamatorias, incluidas citocinas, quimiocinas y otros efectores de la respuesta inmunitaria innata

      .

    3. Los TLR son una familia de receptores de reconocimiento de patrones que desempeñan un papel fundamental en el sistema inmunitario innato al activar vías de señalización proinflamatorias en respuesta a patógenos microbianos

      .

    4. Se ha planteado la hipótesis de que los AGL, cuyos niveles están elevados en la obesidad debido a una mayor liberación del tejido adiposo expandido, causan resistencia a la insulina

      .

    5. TLR4 es el receptor de LPS y desempeña un papel fundamental en la inmunidad innata. La estimulación de TLR4 activa vías proinflamatorias e induce la expresión de citocinas en diversos tipos celulares. Las vías inflamatorias se activan en los tejidos de animales y humanos obesos y desempeñan un papel importante en la resistencia a la insulina asociada a la obesidad. Aquí mostramos que los ácidos grasos nutricionales, cuyos niveles circulantes suelen estar aumentados en la obesidad, activan la señalización de TLR4 en adipocitos y macrófagos, y que la capacidad de los ácidos grasos para inducir la señalización inflamatoria en células o tejido adiposo y macrófagos se ve atenuada en ausencia de TLR4.

      TRL 4 - Acidos grados

    1. The second aspect of teacher as collaborator is deeper collaboration with professional colleagues. Teachers gravitate toward greater transparency as they collaborate to assess starting points, design learning experiences, and reflect on student progress. The common language and knowledge build- ing about practices is a powerful catalyst for change and a vehicle for forg- ing new relationships within grades and departments and across schools, regions, and globally.

      This part resonated with my current goal of getting teachers to collaborate more and have deeper conversations and planning. My struggle is to have dual language teacher who need to plan in Spanish focusing only in English during collaboration time. I wonder what else can we do to support all teachers.

    1. here is an emphasis on planning, being clear about the purposes and outcomes of lessons (both by the teachers and students), having expectations or targets of what the impact should be, and then continually evaluating the impact of the teacher on the learner. It is important, however, to note that while the emphasis in this book is very much on the teacher, this does not mean that students cannot learn via other sources (such as the Internet, peers, family) or that they cannot become their own teachers. Such self-learning is surely a goal of our teaching efforts.

      Planning with students in mind support the whole child, when teachers plan with all its components in mind they are making sure they are targetting different needs, to be able to do this there's need to be a time and opporutnities for teachers to plan together, understand the lesson and plan for access and challenge so every student has access to the target for the day.

    1. feedback

      As we prepare to engage in our final professional learning of the year, feedback is part of this learning. These check list has helped connect with my research and what I will be presenting. I will be using this checklist to have teachers evaluate themselves on where they are within feedback.

    1. Además de la disfunción metabólica en los órganos periféricos, la obesidad y la inflamación asociada a la obesidad también se han relacionado con alteraciones en la función cerebral, particularmente en áreas que regulan la homeostasis energética y el metabolismo sistémico. El hipotálamo controla circuitos neuroendocrinos, incluido el sistema de melanocortina, que regulan el comportamiento alimentario y el gasto energético. Se ha demostrado que las dietas ricas en grasas y calorías inducen procesos inflamatorios en el hipotálamo antes de la inducción de estos eventos en los tejidos periféricos

      Que descandena la infl inducida por por la obesidad

    2. También hay evidencia de que la hipoxia se desarrolla a medida que el tejido adiposo se expande debido a la hipoperfusión relativa del tejido adiposo en crecimiento o al aumento del consumo de oxígeno ( 18 ), y la hipoxia celular puede a su vez iniciar la inflamación al inducir el programa genético HIF1

      Que descandena la infl inducida por por la obesidad

    3. Una vez activadas, estas vías pueden aumentar la síntesis y secreción de quimiocinas como la proteína quimioatrayente de monocitos-1 (MCP1) de adipocitos o hepatocitos, lo que lleva a la infiltración de macrófagos proinflamatorios.

      Que descandena la infl inducida por por la obesidad

      AGL

    4. Diferentes especies lipídicas que se elevan debido a la dieta o la obesidad también pueden contribuir a la inflamación. Los ácidos grasos libres pueden promover la inflamación al unirse indirectamente a TLR4 y TLR2

      Que descandena la infl inducida por por la obesidad

      Ver mas del tema de lo AGL

    5. n embargo, el LPS derivado del intestino es un factor circulante sistémico, por lo que probablemente sea un amplificador de los procesos inflamatorios, en lugar de un mecanismo desencadenante específico del tejido.

      Que descandena la infl inducida por por la obesidad

    6. Se han investigado numerosos mecanismos en modelos de roedores de obesidad dietética y genética (12 ,13 ). Por ejemplo, la obesidad da lugar a una mayor permeabilidad intestinal, lo que resulta en niveles circulantes más altos de LPS de especies bacterianas Gram positivas intestinales (14 ). Este LPS derivado del intestino puede iniciar una cascada inflamatoria a través de la activación de receptores de reconocimiento de patrones (PRR) como TLR4 en las células adiposas

      Que descandena la infl inducida por por la obesidad

    7. Los desencadenantes precisos de la inflamación asociada a la obesidad no se comprenden bien y también pueden diferir de un tejido a otro. Si bien la obesidad está estrechamente asociada con un aumento de los marcadores inflamatorios en el hígado, el tejido adiposo, el músculo esquelético, los islotes pancreáticos y el cerebro, las relaciones temporales precisas entre estos eventos en roedores o humanos obesos siguen siendo inciertas

      Que descandena la infl inducida por por la obesidad

    8. esta reacción inmunitaria inicia una respuesta crónica en el tejido adiposo que involucra una variedad de células T efectoras, células B, células NK y otras que producen citocinas que gobiernan la acumulación y actividad de los macrófagos M1 proinflamatorios

      Activacion del sistema inmunitario innato en la obesidad

    9. El aumento en el número de macrófagos, así como un aumento en la proporción de macrófagos M1 a M2, es un sello distintivo de la inflamación del tejido adiposo que acompaña a la obesidad y se asocia con el desarrollo de resistencia a la insulina y enfermedad metabólica

      Activacion del sistema inmunitario innato en la obesidad

    10. Los macrófagos experimentan cambios drásticos durante la obesidad, con un aumento en el número total de macrófagos que se debe en gran medida al reclutamiento de macrófagos polarizados M1, que muestran un fenotipo más proinflamatorio y secretan citocinas como el TNF-α.

      Activacion del sistema inmunitario innato en la obesidad

    11. un grupo de expertos ha proporcionado revisiones que profundizan en los mecanismos por los cuales la inflamación inducida por la obesidad influye en la homeostasis metabólica, analizando los modos y mecanismos de inflamación en diferentes tejidos y cómo podrían contribuir a la enfermedad

      intro

    12. s, la inflamación inducida por la obesidad es única porque involucra múltiples órganos, incluyendo el tejido adiposo, el páncreas, el hígado, el músculo esquelético, el corazón y el cerebro. Estas características de la inflamación inducida por la obesidad representan un desafío para comprender los mecanismos subyacentes y la manera en que impactan los sistemas metabólicos.

      intro

    13. La naturaleza de la inflamación inducida por la obesidad difiere de otros paradigmas inflamatorios, ya que implica una activación tónica del sistema inmunitario innato que afecta la homeostasis metabólica, en algunos casos a lo largo de la vida.

      intro

    14. Numerosos estudios indican que la inflamación se produce como consecuencia de la obesidad, y hallazgos recientes sugieren que puede desempeñar un papel causal en la generación de resistencia a la insulina, secreción defectuosa de insulina y alteración de otros aspectos de la homeostasis energética.

      intro

    15. Gran parte de lo que se ha aprendido sobre la respuesta inmunitaria a la obesidad proviene de estudios en tejido adiposo, aunque es evidente que la inflamación también ocurre en otros órganos. Los depósitos de grasa normalmente contienen múltiples células inmunitarias que, en conjunto, vigilan y mantienen la integridad y la sensibilidad hormonal de los adipocitos.

      Activacion del sistema inmunitario innato en la obesidad

    16. las complicaciones de salud asociadas, como la resistencia a la insulina, la diabetes tipo 2, las enfermedades cardiovasculares, las enfermedades hepáticas, el cáncer y la neurodegeneración.

      .

    1. As we have noted, the collaborative learning phase of instruction is too often neglected. If used at all, it tends to be a special event rather than an established instructional routine. When done right, collaborative learning is a way for students to consolidate their thinking and understanding. Negotiating with peers, discussing ideas and information, and engaging in inquiry with others gives students the opportunity to use what they have learned during focused and guided instruction. Collaborative learning is not the time to introduce new infor- mation to students. This phase of instruction is a time for stu- dents to apply what they already know in novel situations or engage in a spiral review of previous knowledge. It is important, too, that you allow collaborative learning to be a little experimental, a little messy. In order for students to consol- idate their thinking and interact meaningfully with the content and one another, they need to encounter tasks that will reveal their partial understandings and misconceptions as well as confirm what they already know. In other words, wrestling with a problem is anecessary condition of collaborative learning. If you are pretty

      When we plan for opportunities for students to collaborate we are uplifting possibilities. We are letting students learn from eachother, hear different ideas and perspectives and make sense of the learning or skill. It is part of 21 century skill and we need to preplan these times. Gradual release is part of these learning and you do it together is what is missing in the amount of minutes we have to teach curriculum.

    1. Resources Limited health literacy: Reports and evidence Several reports document that limited health literacy affects many types of health conditions, diseases, situations, and outcomes, including health status and costs.

      I think this article works for researching health literacy because it provides great information from a reliable source. It also provides more reliable sources that have additional information on the topic, allowing you to continue your research even more from this article.

    2. Limited health literacy and limited literacy are not the same, but they are related. Strong literacy and numeracy skills help people understand and use health information and services, but research shows that most people say that information and services are unfamiliar, complicated, and too technical.

      This article is a good source because it has a lot of helpful information. It also is from the CDC, so it is a reliable source to use for correct information when it comes to health.

    3. Health literacy is important for everyone because, at some point in our lives, we all need to be able to find, understand, and use health information and services. Taking care of our health is part of everyday life, not just when we visit a doctor, clinic, or hospital. Health literacy can help us prevent health problems, protect our health, and better manage health problems when they arise.

      This article provides information on what health literacy is and how health literacy affects people. It also provides information on how to develop one's skills.

    1. One of the best things parents can do is advocate for financial literacy in their school district, she says. “Perhaps the local business community can pay for training teachers,” she adds.

      I believe this article would be a good resource for research on financial literacy and how to teach it to people. I believe the points the article makes and the description of each really gives some details that would help prepare people to be financially literate.

    2. Adding personal finance classes to school curriculum could help. “For this generation, I don’t think there is any solution other than putting financial literacy in schools,” Lusardi says. Just as students learn math and English, they should learn financial literacy because it is also a basic skill that young people need, she argues.

      This is a helpful article because it allows people to find 5 ways to help with financial literacy and goes into detail about each helpful tip provided by the authors.

    3. Two financial education experts share their perspectives on making money lessons stick.

      This article is primarily written to tackle financial literacy and help provide ways to make an education on financial literacy really stick with someone.

    1. eaching that reflects a complete understanding . ee knowing and accommodating students’ eer aly aoe Sena on alized, transferable, contextualized, and social pias Se seat ES. the knowledge students bring with them

      When I plan with my novice teacher, we always talked about where students are within their learning. What is their prior knowledge and what do they bring to the table. This helps us focus our planning in what students need. Gathering data is eminent to know what studnets already know and what do they need.

    1. merary “undead” neurons. We find that undead neurons can be wired into circuits, can display activity, and can modify specific behaviors. The two undead RIM-like neurons participate in the RIM-containing circuit that computes movement. The presence of these two extra neurons results in animals th

      jhkjkjhkhj

    2. Note: This response was posted by the corresponding author to Review Commons. The content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Programmed cell death is prominent in developing nervous systems across evolution, but its function remains obscure. Recent work suggests that it might impact behavior, but an examination of its effects on behavior and underlying neuronal circuits in intact organisms has not been determined. In this manuscript we report that programmed cell death sculpts the developing nervous system and shapes innate behavior. Using synaptic labeling, in vivo calcium imaging, targeted rescue of programmed cell death, and automated high-resolution analysis of cell death mutants, we find that loss of programmed cell death alters animal behavior. These findings reveal that neuronal cell death during development provides a reservoir of fates and circuit connections that could be accessed on evolutionary time scales to modify innate behavioral programs. Our manuscript thus answers one of the major outstanding questions in developmental neuroscience—why programmed cell death is so prevalent—by identifying consequences for brain function at the subcellular, cellular, circuit, and behavioral level. This study will be of interest to those interested in evolution of the nervous system and behavior, developmental biology, and neural circuit development.

      We thank the reviewers for their careful attention to the manuscript. Both reviewers were enthusiastic about the work. Here we address their suggestions. As noted below, we have already addressed most of their points, and we discuss in detail the remaining point—whether it is possible to perform experiments for a more specific targeting of the undead RIM cell death event to provide additional evidence for its role in altering reversal behavior.

      2. Description of the planned revisions

      *Reviewer 1: “1. The argument that that differences in reversal behavior are likely attributable to the difference in RIM neuron numbers in the ced-3 rescue studies is very plausible. Nonethless, there remains the possibility that for some reason in animals with 4 RIMs there may be a more global effect on the fate of cells slated to die, unrelated to the number of RIMs. I think there are two ways to test this. (1) quantify the behavior in 2- vs. 4- RIM neurons in animals also containing a marker for other undead neurons, and see if there is any correlation between 4 RIMs and survival of unrelated neurons (but preferably reasonably closely related by lineage- in case that's the issue). (2) Since the authors are able to distinguish the undead cells, can they perform laser ablations on these cells and assess whether behavior is restored to normal values?” *

      • *We agree that this point is already very plausible. We also appreciate the reviewer’s suggestions on how to extend this conclusion.

      Regarding suggestion (1): Unfortunately there is not a reliable marker for undead neurons (although a current project in the lab is indeed to develop one). However, we note that the undead RIM sister cells adopt a RIM neuron fate in 96% of ced-3 mutants, while with other undead cells investigated neuron fate adoption ranged from 59% (ASEL) to 77% (ASER). This suggests that the undead RIM fate adoption is not strongly correlated with the fates of other undead cells.

      Regarding suggestion (2): We attempted to perform laser ablation of undead RIM neurons in ced-3 mutants, but we could not overcome the technical hurdles (despite our lab’s expertise in laser axotomy). We found that we could not reliably remove both undead RIMs without damaging the wildtype RIM that is in close proximity, especially in the quantities of animals necessary for behavioral experiments.

      As an alternative, we plan to perform more targeted experiments to manipulate cell death in the undead RIM to address the points raised by both reviewers. Our goal is to generate two strains. In one, programmed cell death is prevented specifically in the RIM neurons in wild type animals. We hope to achieve this by either transgenic expression of a gain-of-function mutation of ced-9, or else by RIM-specific RNAi against egl-1, ced-3 or ced-4. To do this we will use the RIM promoter tdc-1, which is confined to RIM and RIC. The second strain will allow cell death to occur only in RIM (and RIC) in animals that otherwise have no cell death. Here, we will drive wild-type ced-3 or ced-4 under the tdc-1 promoter in the corresponding mutant background.

      We note 2 caveats for both of these approaches: 1) RIC also has an undead sister; 2) Most probably, the tdc-1 promoter will not be active in time to block cell death. Caveat #2 is actually the reason why we did not do these experiments initially (instead we used the most specific promoter we could find that is expressed early in the RIM lineage, before RIM is born).

      However, we agree that if successful these experiments would complement the existing experiments, and we will build all these strains.

      Reviewer 2: “Mosaic rescue of RIM via stochastic loss of a rescue array helped demonstrate the contribution RIMu have to the locomotor phenotype. As the authors emphasise these animals have many other undead cells (outside of the reverse network). A conditional rescue of only the RIMu would greatly improve the strength of the claims made. Would a conditional RIM egl-1 knockdown (via RNAi) be possible to selectively inhibit apoptosis in those neurons. This experiment should be considered OPTIONAL. It may be that such specific promoters do not allow for egl-1 RNAi to function at the right time to rescue death.”

      • *We appreciate the reviewer’s suggestion. As stated above, we are working to perform an expanded version of these exact experiments, as well as their converse. However, as the reviewer notes, it is very possible that the timing of expression will prevent these approaches from working (Caveat #2 above).

      Reviewer 2: There is a slight issue with interpretation of the data with the mosaic GLR-1::tagRFP Fig 2M which reveals the postsynaptic compartment of one RIM even though there are two present. There seems to be no obvious apposition between pre/post and they somewhat seem to be floating in space. Why is this the case? One would have imagined that the structures in Fig 2L would be tiled composites of both AIB & RIM pre and postsynaptic elements coalescing. Can the authors provide an alternative explanation for this phenotype. Nevertheless, the data on Fig 2L seems solid.. that is animals with extra undead RIM cells have additional cell-type specific synaptic terminals

      We have selected a different micrograph that is more representative of the RIM post-synapses in ced-3 mutants. In this animal, the array labeling the post-synapses in RIM has been lost from one of the two RIM neurons, making it easier to discern that the post-synapses are apposed to the AIM pre-synaptic marker (Fig 1M).

      Reviewer 2: Clarity should be improved around the use of 'expected number' in figure 1. The description of the metric 'The 'expected number' is defined as the number of neurons of the type present in wild-type animals, plus the number of lineage-proximate undead cells.' suggests that expected (blue) regions of pie charts represents lineages with expected sum total of wt and extra undead cells. However, in reference to panel H 'The wild-type animal has two RIM neurons, and the ced-3(n717) animal has two additional RIMlike cells and is counted as contributing to the orange "more than expected" sector in panel (A)' it is said that the animals with 2 WT accompanied by each undead sister contributes to more than expected (orange) region. These appear inconsistent. Can you qualify?

      We thank the reviewer for this point and have added a schematic to clarify the quantification of undead cell fates (Fig. 1).

      Reviewer 2: Specific observations shown in supplemental data SI-L despite being cited in the text is not explained or formally referenced. The details of these panels should either be briefly explained/their inclusion qualified in the text or simply remove from the figure

      We have added reference to these figures in the main text “Undead cells are even capable of producing complex morphology, such as the highly branched dendrites of the PVD neurons (Figure S1I-L).” (p. 3)

      Reviewer 2: The dual image photomicrographs could be in green/ magenta or red/cyan to make colourblind friendly.

      We have updated micrograph colors to be colorblind friendly (Fig 1K-M, S1L).

      Reviewer 2: Do the authors have data with the pRIMtagRFP egl-nucGFP. If they do it would be useful to show it.

      We have added a micrograph of egl-1::GFP and RIM labeled using NeuroPAL (Fig. S2A).

      Reviewer 1: 2. The authors speculate, if I understand correctly, that the mechanism by which reversal frequencies are decreased in 4 RIM animals may be that the reversal state is stabilized, resulting in longer reversals and consequently fewer reversal events. This is a nice model that is testable. The authors could, for example, examine the connections of RIM neurons to the AVA neuron, a main command interneuron for reversal initiation, and assess whether there are indeed more such synapses. Furthermore, the authors can assess whether the frequency of AVA firing is decreased. Of course, there are other plausible mechanisms involving connectivity of other neurons onto AVA which could explain the phenomenon. The authors may wish to add a comment regarding this in the discussion.

      • *

      We thank the reviewer for this suggestion. There are multiple postsynaptic receptors expressed in AVA for RIM neurotransmitters and the contribution of each to reversal behavior is still being debated, making it challenging to dissect the contribution of each of these to the effects on reversal behavior mediated by the undead RIM. Given this, we believe that addressing this point experimentally is beyond the scope of this paper. We have added a sentence in the discussion commenting on this as a future direction for this work “The mechanism of the downstream circuit mediating the effects of the undead RIM could be determined through quantification of AVA postsynaptic receptors and examining reversal behavior of cell death mutants with knockouts of AVA receptors.”

    3. Note: This preprint has been reviewed by subject experts for Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Referee #2

      Evidence, reproducibility and clarity

      Summary:

      The blockade of programmed cell death (PCD) results in the generation of supernumerary neurons from the rescue of normally dying progeny within a lineage. Many of these are the product of a lineage branch that produce a single surviving neuronal daughter.

      The authors show that for many such divisions the rescued sibling expresses fate markers associated with their normally surviving sibling. The authors use the RIM neurons and their role in reversal behaviour as a model. By generating supernumerary RIM interneurons, they show that these undead neurons correlate with an increase in synaptic terminals, with their normal presynaptic partners (AIBs), and that these same supernumerary neurons have an activity pattern preceding reversal events.

      Using mosaic experiments, based around the stochastic differences in the segregation of an extrachromosomal array, the authors are able to demonstrate that a strong component to alterations in locomotor behaviour is likely due to the supernumerary undead RIMu neurons.

      To address the impact of blockade of PCD more broadly the authors assayed 4 independent PCD blocking alleles (2x ced-3, 2x ced-4) and show that the rescue of many neurons alters normal turning dynamics associated with foraging and free feeding behavioural states.

      Interestingly, subtle differences in the behaviours of ced-3 mutant animals and ced-4 mutant animals may also hint at the broader significance of these genes beyond simply controlling the on/off PCD in these lineages. One possible issue with work published in this paradigm is that by generating undead neurons, by removing caspase activity, the intervention may also impact non-apoptotic caspase function.

      The study presented does not pose any issues relating to reproducibility or associated statistical analysis.

      Major comments:

      • Mosaic rescue of RIM via stochastic loss of a rescue array helped demonstrate the contribution RIMu have to the locomotor phenotype. As the authors emphasise these animals have many other undead cells (outside of the reverse network). A conditional rescue of only the RIMu would greatly improve the strength of the claims made. Would a conditional RIM egl-1 knockdown (via RNAi) be possible to selectively inhibit apoptosis in those neurons. This experiment should be considered OPTIONAL. It may be that such specific promoters do not allow for egl-1 RNAi to function at the right time to rescue death.
      • The changes in the RIM/AIB synaptic organisation and the correlation of observed RIM/RIMu activity coincident with reverse locomotor bouts strongly supports the assertion that these two features are causally linked.
      • One interpretation is that when the additional undead RIM neuron is present the cell-type specific connectivities are recapitulated i.e. many of the pre and post-synaptic elements of RIM/AIB look apposed see Fig 2L.
      • There is a slight issue with interpretation of the data with the mosaic GLR-1::tagRFP Fig 2M which reveals the postsynaptic compartment of one RIM even though there are two present. There seems to be no obvious apposition between pre/post and they somewhat seem to be floating in space. Why is this the case? One would have imagined that the structures in Fig 2L would be tiled composites of both AIB & RIM pre and postsynaptic elements coalescing. Can the authors provide an alternative explanation for this phenotype. Nevertheless, the data on Fig 2L seems solid.. that is animals with extra undead RIM cells have additional cell-type specific synaptic terminals.

      Minor comments:

      • Clarity should be improved around the use of 'expected number' in figure 1. The description of the metric 'The 'expected number' is defined as the number of neurons of the type present in wild-type animals, plus the number of lineage-proximate undead cells.' suggests that expected (blue) regions of pie charts represents lineages with expected sum total of wt and extra undead cells. However, in reference to panel H 'The wild-type animal has two RIM neurons, and the ced-3(n717) animal has two additional RIMlike cells and is counted as contributing to the orange "more than expected" sector in panel (A)' it is said that the animals with 2 WT accompanied by each undead sister contributes to more than expected (orange) region. These appear inconsistent. Can you qualify?
      • Specific observations shown in supplemental data SI-L despite being cited in the text is not explained or formally referenced. The details of these panels should either be briefly explained/their inclusion qualified in the text or simply remove from the figure
      • The dual image photomicrographs could be in green/ magenta or red/cyan to make colourblind friendly.
      • Do the authors have data with the pRIMtagRFP egl-nucGFP. If they do it would be useful to show it.

      Significance

      The work presented here complements similar studies performed on insects, illustrating that this biological motif holds true outside of that class. Showing this is a more general feature within other taxa broadens the appeal and will be of great interest to those in developmental biology, neural circuit development/function and evolutionary biology.

      Although the work does not illustrate a completely novel finding, it is rigorous and well-conceived, adding support to previous studies in the field and is an important jumping off point for future studies. The authors present compelling independent support that undead developmentally 'doomed' neurons retain the ability to differentiate, show molecular hallmarks of sibling fate, can integrate within networks and function.

    4. Note: This preprint has been reviewed by subject experts for Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Referee #1

      Evidence, reproducibility and clarity

      This is an interesting paper describing the neural circuit and behavioral consequences of blocking programmed cell death in C. elegans with a mutation in the apoptotic caspase ced-3. The authors survey several reporters for neurons whose sister cells normally die, and observe that undead cells can express markers of the normally living sister cell. They also show that ced-3 mutants exhibit a large variety of behavioral defects. They interrogate the effects of inappropriate survival of two RIM sister neurons in animals carrying a complement of 4 instead of 2 RIMs. The authors demonstrate that the presynaptic neuron AIB makes synapses onto the undead RIM neurons and show GCaMP activity in these neurons that correlates with reversal behavior, a normal function of RIM neurons. Animals with 4 RIM neurons have a reduced number of reversal events compared to wild type animals, suggesting circuit defects. Importantly, restoring ced-3 expression only in the RIM lineage partially restores reversal behavior frequency. The authors conclude that undead neurons interfere with the normal function of the nervous system by making aberrant connections that interfere with circuit activity.

      This paper is beautifully written. The logic is crystal clear, and the experiments are appropriate and rigorously executed. The conclusions are generally appropriate. I have a couple of comments that may be useful for the authors to consider:

      1. The argument that that differences in reversal behavior are likely attributable to the difference in RIM neuron numbers in the ced-3 rescue studies is very plausible. Nonethless, there remains the possibility that for some reason in animals with 4 RIMs there may be a more global effect on the fate of cells slated to die, unrelated to the number of RIMs. I think there are two ways to test this. (1) quantify the behavior in 2- vs. 4- RIM neurons in animals also containing a marker for other undead neurons, and see if there is any correlation between 4 RIMs and survival of unrelated neurons (but preferably reasonably closely related by lineage- in case that's the issue). (2) Since the authors are able to distinguish the undead cells, can they perform laser ablations on these cells and assess whether behavior is restored to normal values?
      2. The authors speculate, if I understand correctly, that the mechanism by which reversal frequencies are decreased in 4 RIM animals may be that the reversal state is stabilized, resulting in longer reversals and consequently fewer reversal events. This is a nice model that is testable. The authors could, for example, examine the connections of RIM neurons to the AVA neuron, a main command interneuron for reversal initiation, and assess whether there are indeed more such synapses. Furthermore, the authors can assess whether the frequency of AVA firing is decreased. Of course, there are other plausible mechanisms involving connectivity of other neurons onto AVA which could explain the phenomenon. The authors may wish to add a comment regarding this in the discussion.

      Significance

      This is an interesting paper describing the neural circuit and behavioral consequences of blocking programmed cell death in C. elegans with a mutation in the apoptotic caspase ced-3. The authors survey several reporters for neurons whose sister cells normally die, and observe that undead cells can express markers of the normally living sister cell. They also show that ced-3 mutants exhibit a large variety of behavioral defects. They interrogate the effects of inappropriate survival of two RIM sister neurons in animals carrying a complement of 4 instead of 2 RIMs. The authors demonstrate that the presynaptic neuron AIB makes synapses onto the undead RIM neurons and show GCaMP activity in these neurons that correlates with reversal behavior, a normal function of RIM neurons. Animals with 4 RIM neurons have a reduced number of reversal events compared to wild type animals, suggesting circuit defects. Importantly, restoring ced-3 expression only in the RIM lineage partially restores reversal behavior frequency. The authors conclude that undead neurons interfere with the normal function of the nervous system by making aberrant connections that interfere with circuit activity.

      The paper should be of interest to researchers studying neural circuit assembly and function, programmed cell death, behavior, and evolution of behavior and the nervous system.

    1. Almost all thesynthesized compounds showed satisfactory antibacterialactivity, and 6j exhibited significant antimicrobial activityagainst MRSA.

      QUESTION: The study shows that compound 6j has strong antibacterial activity and low cytotoxicity, but it does not explain how the addition of the thioguanine unit specifically alters binding interactions at the ribosome compared to existing drugs. How does the presence of the thioguanine moiety change the molecular mechanism of inhibition at the 50S ribosomal subunit relative to other pleuromutilin derivatives?

    2. Hydroxyl at the C-22position of pleuromutilin was activated with p-toluenesulfonylchloride30 to obtain intermediate 2 via nucleophilic sub-stitution.

      CONNECT: The nucleophilic substitution used to attach thioguanine to the activated pleuromutilin intermediate directly relates to SN2 reactions studied in organic chemistry. The tosylate group acts as a good leaving group, allowing the thioguanine nucleophile to attack the electrophilic carbon. This is consistent with the principle that better leaving groups increase reaction efficiency and yield.

    3. . Hydroxyl at the C-22position of pleuromutilin was activated with p-toluenesulfonylchloride30 to obtain intermediate 2 via nucleophilic sub-stitution. Intermediate 2 was then reacted with 6-thioguanineand triethylamine (TEA) in dimethylformamide (DMF) toform intermediate 3 in an 85% yield

      FACT: The synthesis begins by converting the C-22 hydroxyl group of pleuromutilin into a better leaving group using p-toluenesulfonyl chloride, forming an intermediate that undergoes nucleophilic substitution with 6-thioguanine. This reaction forms a new C–S bond (thioether linkage), which is important because thioether groups are known to enhance antibacterial activity in pleuromutilin derivatives.

  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Troll (slang). December 2023. Page Version ID: 1188437550. URL: https://en.wikipedia.org/w/index.php?title=Troll_(slang)&oldid=1188437550 (visited on 2023-12-05).

      From this article, this research argues that internet trolling is strongly linked to traits like sadism, meaning that trolls often genuinely enjoy causing emotional harm to others rather than just joking around. I found this especially interesting because it challenges the common idea that trolling is harmless or just for fun. Instead, it suggests that for some people, trolling reflects deeper personality tendencies, which makes the behavior more concerning.

    2. Whitney Phillips. Internet Troll Sub-Culture's Savage Spoofing of Mainstream Media [Excerpt]. Scientific American, May 2015. URL: https://www.scientificamerican.com/article/internet-troll-sub-culture-s-savage-spoofing-of-mainstream-media-excerpt/ (visited on 2023-12-05).

      I thought this source was interesting because it shows trolling is not always just for fun or to make people mad. Sometimes it is also used to prove a point, especially by showing how easily people believe weird stories online. That connects well to this chapter.

    3. A Modest Proposal. November 2023. Page Version ID: 1186969923. URL: https://en.wikipedia.org/w/index.php?title=A_Modest_Proposal&oldid=1186969923 (visited on 2023-12-05).

      I think "A Modest Proposal" is one of earliest examples of trolling where one pretends to be an intentionally exaggerated version of their opponents. In my personal opinion, I really "A Modest Proposal" and this particular type of trolling, especially when it's taken to such drastic lengths while still portraying a deep knowledge of the idea or person being critiqued.

    1. Additionally, the inauthentic arguments have long been observed, and were memorably explored by Jean-Paul Sartre as “Bad Faith” [g12]. “Bad faith” here means pretending to hold views or feelings, while not actually holding them (this may be intentional, or it may be through self-deception).

      This part of the reading stood out to me with the idea that trolling didn’t actually start with the internet, but has always been part of human behavior. The quote about “boys throwing stones at frogs for fun” really made me pause because it highlights how people can find enjoyment in causing harm even when the other side is genuinely affected. It made me think about how online spaces just amplify something that already exists rather than creating it from scratch. This connection of the concept of “bad faith” is especially interesting, since it frames trolling not just as joking or pranking, but as intentionally dishonest argumentation meant to disrupt others. This makes me question whether responding to trolls is even productive, since they’re not trying to engage in respectful good discussion in the first place, almost like ragebait.

    1. Trolling is when an Internet user posts inauthentically (often false, upsetting, or strange) with the goal of causing disruption or provoking an emotional reaction

      I like this definition because it shows trolling is more than just being rude online. The main thing is that the person is trying to mess up the conversation or get a reaction out of people. I think that makes it different from normal disagreement, even if both can look offensive sometimes.

    2. Some reasons people engage in trolling behavior include:

      I would have to say that there is an additional reason for trolling- the financial one. On some monetizable social media platforms, like Youtube or Twitter, more engagement means more revenue- so there is a trend of people who make intentionally outrageous statements/videos/other-content to drive up their engagement and their income (which I would say counts as trolling, especially since it's almost always at someone else's expense). This definitely doesn't account for most trolling, but it is noticeable.

    1. Competitive Pressure

      Finally, competitive pressure has a different impact depending on the group analysed.

      countries with a high level of e-commerce, it is positive but not significant

      Countries with low level of e-commerce, it has a negative and significant impact. -> competitive pressure has a negative impact on the decision to use e-business.

      So, H8 is rejected in both groups.

    2. Firm Size (H5)

      reject

      “Firm size is a key factor that influences the level of e-business use only in countries with a low level of e-commerce adoption.”

      In low e-commerce countries: Firm size does matter BUT the direction is opposite of the hypothesis

    3. Independent Variables:

      Perceived benefits: Scale 1–4 (impact of ICT)

      Firm size: Categories based on employees

      IT expertise/ Customer pressure/ Supplier pressure/Competitive pressure: Dummy

    4. long tail of preference distribution

      many niche (less popular) products that individually sell little, but together make up a large share of total demand

    5. Hard infrastructure characteristics

      Think of hard infrastructure as “what the platform technically allows or restricts.”

      It includes things like:

      The platform’s code and architecture

      What users can or cannot do

      How content is structured, accessed, and shared

  3. chem.libretexts.org chem.libretexts.org
    1. When a process occurs at constant pressure, the heat evolved (either released or absorbed) is equal to the change in enthalpy. Enthalpy (H) is the sum of the internal energy (U) and the product of pressure and volume (P⁢V) given by the equation: (1)H=U+P⁢V When a process occurs at constant pressure, the heat evolved (either released or absorbed) is equal to the change in enthalpy. Enthalpy is a state function which depends entirely on the state functions T, P and U. Enthalpy is usually expressed as the change in enthalpy (Δ⁢H) for a process between initial and final states: (2)Δ⁢H=Δ⁢U+Δ⁢P⁢V If temperature and pressure remain constant through the process and the work is limited to pressure-volume work, then the enthalpy change is given by the equation: (3)Δ⁢H=Δ⁢U+P⁢Δ⁢V Also at constant pressure the heat flow (q) for the process is equal to the change in enthalpy defined by the equation: (4)Δ⁢H=q By looking at whether q is exothermic or endothermic we can determine a relationship between Δ⁢H and q. If the reaction absorbs heat it is endothermic meaning the reaction consumes heat from the surroundings so q>0 (positive). Therefore, at constant temperature and pressure, by the equation above, if q is positive then Δ⁢H is also positive. And the same goes for if the reaction releases heat, then it is exothermic, meaning the system gives off heat to its surroundings, so q<0 (negative). If q is negative, then Δ⁢H will also be negative.
      •   Enthalpy Definition: Enthalpy (H) is the sum of internal energy (U) and the product of pressure and volume (PV).
      •   Enthalpy Change at Constant Pressure: At constant pressure, the change in enthalpy (ΔH) is equal to the heat flow (q) for the process.
      •   Relationship Between ΔH and q: If a reaction is endothermic (absorbs heat), ΔH is positive. If a reaction is exothermic (releases heat), ΔH is negative.
      
    1. his mythical imagebecomes a leitmotiv throughout the manga

      Vinland has an important role in the manga and the anime. It plays a central role in the narrative.

    Annotators

    1. Усилия реформаторов были направлены на пересмотр некоторых традиционных методов познания истины и подходов к интерпретации социальных аспектов ислама в соответствии с духом индустриальной эпохи ради упрочения позиций ислама в современном секуляризованном мире. В 20—30-х годах ХХ в. в мусульманском реформаторстве сложились два направления — обновленческое и охранительное. Обновленцы и охранители — это "братья-враги". У них и бого-словско-юридическая база одна, но разный взгляд на роль и место исламской общины в мире

      Вопрос1. Спор между иджтихадом и таклидом стал центральным вопросом, так как произошло разделение среди мусульман на обновленцев и охранителей, и появилась мысль о возможности права мусульманской общины на пересмотр устаревших подходов интерпретации социальных аспектов жизни

    2. таклида (принцип неуклонного следования суждениям средневековых авторитетов

      Вопрос1. Понятие таклида.

    1. The number of fund houses – 45. These are the number of mutual fund companies who have obtained the AMC license from SEBI.

      The total number of AMC's in india is in 2 digits ? hmmmm. Ok, i guess its not simple to get license. That also means its actually possible to do a sub-auto search of all of them

    1. Here’s the trap I see solo designers stumble into: without real opposition or stakes, the world can feel too responsive. Everything bends to the player’s will, NPCs only exist when asked about, problems resolve too neatly, consequences don’t matter. This is the flat world problem; it’s not that nothing happens, it’s that everything happens on the player’s terms. The world isn’t a place but a vending machine.The fix is to give the world its own agency: NPCs pursue goals independently, situations escalate whether the player acts or not, danger has inherent signals. If you walk into a trap, it’s not random cruelty but a consequence of ignoring obvious warnings. You chose to ignore them.This means being generous with information and showing danger, letting the world teach the player how it works through early encounters and visible consequences. A trap that springs without warning is unfair, but a trap that’s clearly a trap and the player walks into it anyway is a choice.NPCs need motivations that don’t depend on the player noticing them. The villain is scheming whether or not your character is paying attention. The town guard has routines and goals. The mysterious noble is pursuing her own agenda. These things should be discoverable but not dependent on player intervention.

      Very good points here. Reminds me of similar points from Kate's OSR blog. The one about NPCs being independent. The difficulty I would say s the cognitive load of it all. I think most people want an interesting and engaging NPC but keeping up with that can be quite draining and is a skill I dont think everyone necessarily has. They might be able to do it but it's not easy for them.

    2. V1 of Archivium has a big issue with this, there is a MASSIVE mystery in the Archive… that you don’t know exist until you are many many shifts into the game, and which most players might never even uncover. Bad design! No biscuit!

      I would say a fourth layer that you don't know exists until deeper in the game isn't bad in and of itself so long as you're kept busy in the meantime.

    1. If you require more features than our Very Small Plan, then you can go up to ChMeetings Small, which costs the same as Breeze Basic per month ($25), but costs less per year (ChMeetings costs $250 Breeze Basic costs $300).

      At similar price points, ChMeetings Small and Breeze Basic are both priced at $25 per month. When billed annually, ChMeetings costs $250 per year, while Breeze Basic costs $300 per year. The included features and usage limits differ between the two plans.

      **Samir: ** Breeze don't have basic plan so we need to update

    2. ChMeetings might be a good choice if: You want to pay based on your church size and avoid extra fees. You absolutely need features such as easy-to-manage paid events, appointments, accounting, or mobile push notifications. You want a solution that keeps up with current technologies and makes updates often.

      ChMeetings may be a better fit if:

      • You prefer pricing that scales based on church size rather than a flat rate.
      • You require features such as event registration, appointments, built-in accounting, or mobile push notifications within a single platform.
      • You prioritize ongoing feature updates and platform changes.
    1. Resolving system gaps requires conversations, it’s easier to eject from the system at the slightest inconvenience, duplicate, and go your own way. Effectively hiding the time bomb of technical debt for the next unfortunate sucker. I think AI exacerbates this problem. I think AI can help you build faster (although data suggest otherwise), but I also believe that LLMs are the ultimate tool in the “Don’t talk to my coworkers” toolchain. Why talk to an expert who might tell me no, when the omniscient machine that always tells me yes is right here? Avoiding that friction doesn’t produce better products faster. It makes future conversations more difficult thanks to higher sunk costs and deeper entrenched opinions.

      and it feels like you’re doing the work but it’s easier, but you aren’t

    1. CLI has been on every Unix system since 1971. No schema injection. No server to maintain. No auth overhead. Composable with pipes. And your agent already knows how to use it.It’s been on every machine since 1971. We just forgot to look.

      yes, exactly. The arc of AI bends towards deterministic software tools. I see / sense it in many places. Except for bringing people in to use these tools

    2. Most of the conversation around MCP is about what it enables. If you flip it - and ask what agents actually need to run efficiently - the math looks pretty broken.

      mcp looks great if you start from the tool looking for a problem to solve. Starting from a problem there are tools more efficient.

    1. PTE also contains an access bit, a dirty bit, a present bit• Present bit: whether this page is in physical memory or on disk• Dirty bit: whether the page has been modified since it was broughtinto memory• Access bit: whether a page has been accessed 18

      | 位 | 含义 | OS 用途 | | ------- | ------- | ------ | | Present | 是否在 RAM | 缺页异常 | | Dirty | 是否被修改 | 是否写回磁盘 | | Access | 最近是否使用 | 页面置换 |

    2. Don’t you need tocompare offsetwith bounds?

      为什么分页不用?

      分页地址结构:

      虚拟地址 = VPN + offset

      例如页大小 4KB:

      offset 范围天然固定: 0 ~ 4095

      因为 offset 的位数固定。

      若页大小4KB:

      2^12 = 4096

      所以 offset 就是低12位。

      它天然不可能超过页大小。

  4. gold-developement-working-version-v-70-final.replit.app gold-developement-working-version-v-70-final.replit.app
    1. Best Practices Clear triggers: Define specific conditions for activation Focused scope: Each skill should do one thing well Informative prompts: Give Claude clear instructions Error handling: Account for edge cases in prompts Test thoroughly: Verify skills work across scenarios

      Similar good practices as compared to slashcommands. The first one is new and important: defining the trigger conditions well.

    2. Variables Available VariableDescription$CHANGED_FILESList of modified files$CURRENT_FILECurrently focused file$PROJECT_ROOTProject root directory$GIT_BRANCHCurrent git branch

      available variables (this is diff from the slashcommands it seems).

    3. Trigger Types TriggerDescriptiononFileChangeFiles matching glob pattern changeonCommandUser invokes a slash commandonGitHookGit operations (commit, push)onScheduleTime-based triggers

      Trigger types can be on file changes, command, git operations or schedule. So what is doing the monitoring for those triggers?

    4. 2. Create skill.json { "name": "test-runner", "description": "Automatically runs relevant tests when code changes", "triggers": { "onFileChange": ["**/*.ts", "**/*.tsx"], "onCommand": "/test" } }

      the json files specifies the triggers for a skill. Which can be a manual command, but also others like file changes. So one could shape any slashcommand as a skill too? To better daisychain them e.g.

    5. Skill Structure .claude/skills/ └── my-skill/ ├── skill.json # Skill configuration ├── prompt.md # Instructions for Claude └── scripts/ # Optional helper scripts └── helper.sh

      Skills have their own folder and are a folder with 2 files and subfolder for scripts. Json for config, prompt for instructions and scripts (shell)

      Shown here as project specific, but can be general I suppose.

    6. Skills are advanced automation capabilities that Claude can invoke automatically based on context. Skills vs Slash Commands FeatureSlash CommandsSkillsInvocationManual (/command)AutomaticTriggerUser types commandContext-basedComplexitySimple promptsScripts + promptsUse caseRepetitive tasksSmart automation

      Comparison w slash commands is a diff in trigger (me typing command or called by AI), simplicity (simple single prompts vs prompts and scripts), use cases (repetitive and smart automation) (repetitive warrants automation too imo)

    1. Include specific files with curly braces: <!-- .claude/commands/optimize.md --> Analyze {src/utils/helpers.ts} for optimization opportunities.

      one can reference outside files in slashcommands. E.g. to rerun test on something (although argument would work too). I see a diff in using a reference files as input, or as object of the command, not explained here though

    2. Single responsibility: Each command should do one thing well

      good practice 1, a single clear thing in a command. This, like similar advices for MCP agents and skills, pushes it to granular level. Meaning you could chain them. Similar usage as deterministic elements in CLI possible I'd say. This makes a command a single function in that sense

    3. Using Arguments Commands can accept arguments via $ARGUMENTS: <!-- .claude/commands/explain.md --> Explain $ARGUMENTS in simple terms. Provide: - What it does - Why it's useful - Example usageCopy to clipboard Usage: /explain the useCallback hook

      slash commands can accepts arguments

    1. Now, almost ten years later, it has become clear that memes are pres-ent, impactful and here to stay, not only in Russia, of course, but all overthe world – the examples ranging from Azerbaijan to the US illustratethat these instantly shareable, humorous bits of information and opinionplay a significant role in modern, digital politics.

      Memes ER politik, politik foregår næsten udelukkende digitalt

    Annotators

    1. De rechtbank komt, gelet op al het hiervoor overwogene, tot de conclusie dat in artikel 4.2, tweede lid, van de Woo noch in enig andere bepaling in de Woo het inzagerecht als bedoeld in artikel 67 van de Verordening is geregeld, omdat op grond van de Woo geen inzage kan worden verkregen in informatie die niet bij de minister berust en daar ook niet had behoren te berusten. Daarmee komt de Woo niet tegemoet aan de volle werking en het nuttig effect van artikel 67, eerste lid, tweede alinea, van de Verordening. De rechtbank is eveneens van oordeel dat de minister, gelet op de beginselen van loyale samenwerking en effectieve rechtsbescherming, op grond van artikel 67, eerste lid, van de Verordening en nu vast staat dat sprake is van milieu-informatie, is gehouden om naar aanleiding van het verzoek van eisers toepassing te geven aan artikel 67, eerste lid, tweede alinea, van de Verordening door de informatie waarom eisers hebben verzocht te verstrekken. Dit houdt in dat de minister de professionele gebruikers van gewasbeschermingsmiddelen dient te verzoeken om de door eisers gevraagde informatie uit het register aan de minister ter beschikking te stellen.

      Art 67.1 1107/2009 is niet geregeld in de Woo, art 4.2. of elders, en eigenstandig van toepassing.

    2. Tegen deze achtergrond is de rechtbank van oordeel dat is beoogd met artikel 67, eerste lid, van de Verordening te voorzien in een algemene toegang tot informatie uit de registers van gebruikers van gewasbeschermingsmiddelen voor ten minste de in dit artikel genoemde derde partijen; ook wordt daarmee voorzien in de bevoegdheid van de bevoegde autoriteit om aan een professionele gebruiker te verzoeken om die informatie beschikbaar te stellen indien een verzoek om toegang tot die informatie is gedaan door ten minste een derde partij. Het verhogen van de gezondheid van mens, dier en milieu door middel van onder meer de traceerbaarheid van blootstellingen aan gewasbeschermingsmiddelen te verzekeren en de doeltreffendheid van het toezicht en controle te verbeteren is gebaat bij een toegang tot de informatie in de registers van onder meer professionele gebruikers. Die moet dan meer omvatten dan enkel de gevallen waarin concrete aanleiding bestaat om van overheidswege toezichtbevoegdheden aan te wenden om het gebruik van gewasbeschermingsmiddelen en mogelijk in dat verband begane overtredingen te onderzoeken. Daarbij is van belang dat uit de Verordening niet expliciet blijkt dat de controlerende functie van de toegang tot de registers is voorbehouden aan controle van overheidswege. Dat artikel 67, eerste lid, van de Verordening is ondergebracht in hoofdstuk VIII met de titel “controles”, betekent daarom dat de bevoegdheid van de bevoegde autoriteit om een verzoek te doen om informatie uit de registers is bedoeld om derde partijen toegang te geven tot informatie in de registers van professionele gebruikers van gewasbeschermingsmiddelen. Derde partijen, zoals omwonenden van percelen waarop gewasbeschermingsmiddelen worden gebruikt, worden met de verstrekking van informatie uit de registers in staat gesteld te controleren in hoeverre gewasbeschermingsmiddelen zijn ingezet in hun fysieke leefomgeving; dit stelt hen in staat tot het maken van gezondheidsoverwegingen.

      Rechtbank wijst af dat derden slechts toegang zouden hebben tot tbv controle door Minister verzamelde info bij de registerhouders. Derden krijgen expliciet toegang, via de bevoegde autoriteit, tot de registers van de gebruiker.

    3. Artikel 5.1, zevende lid, van de Woo betreft een implementatie van de Richtlijn 2003/4/EG10 over de toegang van het publiek tot milieu-informatie, zoals ook is neergelegd in het Verdrag van Aarhus.11 In de Richtlijn 2003/4/EG is in dit verband overwogen dat – een verruimde – toegang van het publiek tot milieu-informatie en verspreiding van die informatie bijdraagt aan een verhoogd milieubewustzijn, een vrije gedachtewisseling, een doeltreffender deelneming van het publiek aan de milieubesluitvorming en, uiteindelijk, tot een beter milieu. Ook overweegt de rechtbank in dit verband dat het in artikel 8 van het Europees Verdrag tot bescherming van de Rechten van de Mens en fundamentele vrijheden (het EVRM) opgenomen recht op privé- en familieleven met zich kan brengen dat op overheidsinstanties een positieve verplichting rust om informatie over -schade aan- het milieu met burgers delen. Zodat zij daarmee in staat worden gesteld gezondheidsafwegingen te maken.12

      Rechtbank noemt WOO 5.1. mbt milieugegevens, nav richtlijn 2003/4/EG , en het Verdrag v Aarhus (dat NL zelf heeft ondertekend).

    4. Artikel 67, eerste lid, tweede alinea, van de Verordening voorziet, naar het oordeel van de rechtbank, anders dan de Woo in een grondslag waaraan de minister in zijn hoedanigheid van bevoegde autoriteit de bevoegdheid ontleent om een professionele gebruiker van gewasbeschermingsmiddelen te verzoeken om relevante informatie uit diens register over het gebruik van gewasbeschermingsmiddelen ter beschikking te stellen indien derde partijen, zoals de drinkwaterindustrie, detailhandelaars of omwonenden een verzoek om toegang tot deze informatie doen aan de minister.

      Het is art 67.1 zelf die de grondslag geeft aan Minister als bevoegde autoriteit om gegevens op te vragen bij de particuliere houder, op verzoek van de genoemde soorten derde partijen. Dat is rechtstreeks v toepassing, want verordening. (Maar wat is dan de relevantie v het noemen van nationale wetgeving)

    5. De rechtbank is van oordeel dat de Woo, in het bijzonder artikel 4.2, tweede lid, niet voorziet in een doeltreffende wijze van uitoefenen van het inzagerecht uit artikel 67, eerste lid, van de Verordening, omdat de Woo het uitoefenen van het inzagerecht als bedoeld in de Verordening niet mogelijk maakt. De bevoegdheid tot het vorderen van informatie door een bestuursorgaan is in de Woo immers voorbehouden aan publieke informatie in documenten die bij het bestuursorgaan berusten of hadden behoren te berusten op grond van enig wettelijk voorschrift. Echter, daarvan is, zoals onder rechtsoverweging 10.1 al is overwogen, ten aanzien van de informatie in de registers van gebruikers van gewasbeschermingsmiddelen geen sprake: deze informatie berust immers niet bij de minister en had daar ook niet behoren te berusten.

      De WOO is niet v toepassing omdat de gegevens bij een particulier berusten en niet bij een overheid.

    6. De rechtbank is van oordeel dat de minister terecht met toepassing van de Woo in samenhang met de Verordening heeft besloten op het verzoek van eisers. Daartoe is van belang dat artikel 67, eerste lid, derde alinea, van de Verordening tegen de achtergrond van de nationale procedurele autonomie van lidstaten bepaalt dat de bevoegde autoriteiten overeenkomstig het toepasselijke nationale of Gemeenschapsrecht toegang tot de informatie in de registers verstrekken. Uit de wetsgeschiedenis van een wijziging van de Wgb blijkt dat de wetgever heeft beoogd dat verzoeken om toegang tot informatie als bedoeld in artikel 67 van de Verordening door de minister worden beoordeeld volgens de kaders van artikel 67 van de Verordening en de Wet openbaarheid van bestuur (de Wob).4 De Wob is hierop met ingang van 1 mei 2022 vervangen door de Woo.

      De WOO is waar de grondslag voor EG 1107/2009 uit voort zou moeten komen (is dat zo, het betreft immers milieugegevens bij een particulier?)

    7. Eisers betogen dat de informatie uit het register waar hun verzoek op ziet, niet bij de minister berust en daar ook niet had behoren te berusten als bedoeld in de Woo. Dit betekent volgens hen dat de minister op grond van de Woo niet bevoegd is om naar aanleiding van een verzoek om toegang tot informatie uit een register over het gebruik van gewasbeschermingsmiddelen die informatie te vorderen bij de professionele gebruiker van gewasbeschermingsmiddelen op wiens register het verzoek van eisers ziet. De rechtbank begrijpt het verdere betoog van eisers zo dat zij stellen dat de Verordening, anders dan de Woo, wel voorziet in deze bevoegdheid en dat de Woo om die reden het recht op toegang tot informatie uit artikel 67 van de Verordening frustreert.

      De Minister LNV is wel de bevoegde autoriteit maar niet de registerhouder. (dat is de gebruiker van pesticiden.)

    8. De rechtbank overweegt dat in artikel 4, vierde lid, van de Wet gewasbeschermingsmiddelen en biociden (de Wgb) is bepaald dat de minister van LVN belast is met het verstrekken van informatie als bedoeld in artikel 67, eerste lid, derde tekstblok, van de Verordening. Zij is van oordeel dat hieruit volgt dat de minister is aangewezen als de bevoegde autoriteit die is belast met het nemen van besluiten op verzoeken om toegang tot informatie als bedoeld in artikel 67, eerste lid, van de Verordening. Of andere bestuursorganen, zoals eisers stellen, ook informatie uit de registers dienen te verstrekken doet niet ter zake. Zij hebben hun verzoek nu eenmaal onder meer ingediend bij de minister en ook de besluiten op hun verzoek zijn afkomstig van de minister. Daarmee ligt in deze beroepsprocedure ter beoordeling voor of de minister die belast is met verstrekken van informatie uit de registers van professionele gebruikers van gewasbeschermingsmiddelen op goede gronden tot afwijzing van het verzoek van eisers is gekomen.

      De Minister van LNV is volgens de Wet gewasbeschermingsmiddelen en biociden (Wgb) de bevoegde autoriteit (dus niet bijv de provincies die er om vragen bij de Drentse leliekwekers)

    9. dat professionele gebruikers van gewasbeschermingsmiddelen registers bijhouden van de gewasbeschermingsmiddelen die zij gebruiken, met vermelding van de naam van het gebruikte gewasbeschermingsmiddel, het tijdstip en de dosis van de toepassing, alsook het gebied en het gewas waarop het gewasbeschermingsmiddel werd gebruikt en dat de professionele gebruikers die registers bewaren gedurende ten minste drie jaar. Relevante informatie uit deze registers stellen zij op verzoek ter beschikking van de bevoegde autoriteit. Derde partijen, zoals de drinkwaterindustrie, detailhandelaars of omwonenden kunnen zich tot de bevoegde instantie wenden met het verzoek om toegang tot deze informatie te verkrijgen. De bevoegde autoriteiten verstrekken toegang tot deze informatie overeenkomstig het toepasselijke nationale of het Gemeenschapsrecht.

      Tekst EG 1107/2009 Art 67.1. mbt toegang tot gegevens: de gebruiker van pesticiden houdt een register bij. Bevoegde autoriteit heeft daar toegang toe op verzoek. Derden, m.n. drinkwater orgs, detaihandel (afnemers neem ik aan) en omwonenden kunnen de bevoegde autoriteit om toegang verzoeken en dienen die te krijgen conform nationaal of gemeenschapsrecht. Vraag: wat is dan de NL grondslag volgens de recht?

    1. telur-nimfa-imago

      tiga tahapan utama dalam siklus hidup serangga yang mengalami metamorfosis tidak sempurna (hemimetabola), di mana bentuk muda (nimfa) mirip dengan dewasa (imago)

    2. Nietzsche benar-benar mengarang Thus Spoke Zarathustra dalam ledakan-ledakan inspirasi konstan (yang berasal dari “muse” mendalamnya) selama sepuluh hari.

      note; maksudnya locked in di bagian atau volume pertama, krna seluruh bukunya butuh 2-3 tahun an buat selesai 1883-1885 dalam 4 volume;

      • bagian Pertama: ditulis dengan sangat cepat hanya dalam waktu 10 hari (awal tahun 1883).
      • Bagian Kedua & Ketiga: Diselesaikan pada akhir tahun 1883 dan awal 1884.
      • Bagian Keempat: Ditulis pada tahun 1885
    1. object

      so a perceptual state with number would refere to a collection of objects and attribute a cardinality to them.

      to percieve a collection as being 5 in number is to attribute the abstract property 5 to the collection

    2. We will argue that the ANS represents numbers (i.e., that numbers serve as the referents of theANS), but under a unique mode of presentation that respects the imprecision inherent in the ANS(§6).

      in this way, even in SNS, numbers end up serving as ‘referents’ of ANS even if there is no symbol with the content of number and numerical properties are only implicitly reflected in computation

    Annotators

    1. ose and pay auditors rather than have the supplier do s

      many companies reduce costs by requiring their suppliers to pay for audits—and some even allow suppliers to choose the auditor -> “penny wise and pound foolish.”

    2. Align the activities of the purchasing department and the social responsibility team.

      Suppliers that failed an audit improved only after linking the future of the business relationship to the supplier’s labor standards by coordinating the activities of its own purchasing and social responsibility departments.

      When those departments were siloed, as they are in many companies, failing suppliers made no improvement.

    3. Announce audits in advance

      Although companies want a full picture of what’s going on at their suppliers, they also want their suppliers to improve.

    4. Serving once-tarnished buyers

      Because such buyers are particularly worried about facing similar criticism in the future

      More likely to be cautious when selecting new suppliers and to step up efforts to scrutinize them

      Such suppliers should be attractive to companies with unblem- ished records, which can piggyback on the due diligence of their once-compromised counterparts.

    5. Unions.

      Union

      enable workers to make management aware of hazards + share proposals for mitigating

      Help manager communicate with workers about health and safety standards and reinforce adherence to desired procedures.

    6. doption of lean management.

      After a factory adopted the lean system

      → Managers less likely to mistreat workers, more focus on retention

      -> increase workers’ skills -> better employment terms to retain workers

    7. ertified compliance with management system standards

      Require internal audits + continuous improvement systems

      Promote cross-functional problem-solving + action plans

    8. an reinforce or undermine

      Countries with high NGO density + strong media freedom (greater exposure of abuses) -> more improvement

      Less oversight environments (e.g., Bangladesh, China) → require closer monitoring

      Higher transparency environments (e.g., Honduras, Jordan) → relatively better improvement outcomes

      Factories differ in working conditions + willingness/ability to improve → Need firm-level predictors (factors inside an individual company)

    1. The canary trapsBetween 26 and 29 March, I planted four tests in my regular Substack Notes.Trap 1: the contradiction. On 25 March, I posted a note arguing that AI would not replace journalists but would replace the business model that pays for them. On 26 March, I posted a note praising an AI journalism tool that cross-references sources and flags inconsistencies. These two Notes are in deliberate tension. A human who read both might notice. An agent processing each note in isolation would praise both without registering the contradiction.Trap 2: unique phrases and cultural markers. I seeded Notes with references that require contextual knowledge to engage with meaningfully.Trap 3: the fabricated statistic. I embedded a made-up number in an otherwise plausible note about workplace AI adoption. The argument was real: employees spend time managing AI tools, and that time comes from somewhere. But the specific figure, ‘47 minutes,’ was invented. It referred to no study. It was wrapped in confident, specific language designed to sound like a real finding.Trap 4: direct engagement. I tagged specific accounts and asked questions that required a personal answer, not a response to the note’s content.

      Author used 'canary traps' to see if certain commenters might be automated AI. Contradiction between posts, cultural markers to see if they were engaged with, fake facts, and tagging suspected accounts directly in questions to see if they responded. The first three seem to me somewhat unethical and risky, as they expose legit accounts to the same thing, and in the first and third example you are deliberately adding inauthentic behaviour yourself towards your audience.

    2. When a response feels smooth, generic, and positive without engaging with the specific argument of a post, that is worth pausing on. Not every generic comment is automated. But the pattern is worth learning to see.

      yes, I see this on my blog now and then too.

    3. My most active commenters, the ones with 80+ comments, all show the lumpy, uneven patterns of genuine human engagement. High volume is not the signal. Systematic uniformity is.

      A sing of automation is the steady patterns spread equally over time. People are inconsistent, do things in bursts etc.

    4. It is full of real people who have decided that being present is too time-consuming, so they have automated the performance of presence instead.

      presence as performance. I think this is a key observation, bc we do a lot of presence as performance socially too. Ppl ensuring they're seen at some do, and leaving once their presence has been acknowledged. Ppl attending meetings but doing other work during it, nodding along at the right moments. Just the automation is new.

    5. The dead internet theory, the idea that the web is filling with fake accounts talking to fake accounts, is wrong. Or at least incomplete. The accounts are real. The people are real. What is automated is the act of engagement itself.A real person decided to be present on Substack. Then they delegated that presence to a machine.

      Author looked into commenting patterns and found several real accounts posting generated comments. This is the one angle that my [[Reverse Turing menszijn bewijs vaker nodig 20230505100459]] test does not cover.

    1. conséquences psychologiques majeures, révélant les réelles conséquences de cette surexposition.

      Peut être prendre en exemple le cas des enfants stars de Disney comme Miley Cyrus, Demi Lovato ou encore Selena Gomez qui ont grandi à travers la télé. Et qui ont évoqué ces conséquences.

    1. le groupe apprend à associer à une présence.

      Cette identité suit elle le joueur durant toute sa vie de joueur ou elle peut évoluer au fil du temps ? Celui qui était connu pour provoquer devient calme ou inversement.

    1. livres de connaître un succès fulgurant

      Ici tu parle de livres plus anciens ou peu visibles mais est ce qu'il n'y a pas aussi une "surexposition", une "sur recommandation" des livres les plus connu ou d'auteur qui sont très tendance sur BookTok et que des la sortie de leur nouveau livre celui est recommandé par tous ? Je pense notamment à l'autrice Morgane Moncomble, autrice de new romance. Est -ce que cela ne vient pas entraver la dynamique qui est de parler de livre peu connu pour leur donner une vraie visibilité ?

    1. équilibre entre donner l’illusion de tout partager avec ses abonnés tout en gardant le contrôle.

      Très intéressant. Mais cela ne peut pas avoir des limites et des dangers, car tout ne peut pas être contrôlé ? Par exemple avec la cas de Poupette Kenza, tout partagé en gardant le contrôle peut être difficile ou encore quand tout partager amène à des abonnés très investis dans la vie de l'influenceur voir très intrusifs ? Qu'en pense tu ?