1. Oct 2024
    1. Friday Set out early a fair morning Passed the mouth Bear Creek 25 yds. Wide at 6 Miles, Several Small Islands in the river the wind a head from the West the Current exceedingly rapid Came to on the point of the Osarges River on the Labd Side of Missouries this osages river Verry high, felled all the Trees in the point to Make observations Sit up untill 12 oClock taken oservation this night

      Observation: Noticed a letter being written which discuss the waterways on a Friday morning

      Interpretation: How Lewis or Clark describe their journey exploring the rivers and observing the trees as well.

  2. docdrop.org docdrop.org
    1. Children are more successful in school when they are able to pay at-tention, when they get along with peers and teachers, and when they are not preoccupied or depressed because of troubles at home. Using the same SAT-type metric as for reading scores, figure 3.1 shows that, according to teachers, children from more affluent families are more engaged than their low-income peers.

      I think kids do better in school when they can focus, get along with others, and aren’t weighed down by problems at home. For children from low-income families, outside factors can make it really hard to thrive. Things like family stress, lack of access to healthcare, or emotional struggles can slow down their physical and mental development. When kids are distracted by issues like financial strain or tension at home, it affects not only their academic performance but also their overall well-being.

    2. It is easy to imagine how the childhood circumstances of these two young men may have shaped their fates. Alexander lived in the suburbs while Anthony lived in the city center. Most of Alexander's suburban neighbors lived in families with incomes above the $125,000 that now sep-arates the richest 20 percent of children from the rest. Anthony Mears's school served pupils from families whose incomes were near or below the $27,000 threshold separating the bottom 20 percent (see figure 2.4). With an income of more than $300,000, Alexander's family was able to spend far more money on Alexander's education, lessons, and other enrichment activities than Anthony's parents could devote to their son's needs. Both of Alexander's parents had professional degrees, so they knew all about what Alexander needed to do to prepare himself for college. An-thony's mother completed some classes after graduating from high school, but his father, a high school dropout, struggled even to read. And in con-trast to Anthony, Alexander lived with both of his parents, which not only added to family income but also increased the amount of time available for a parent to spend with Alexander.

      This shows how greatly family income and socioeconomic background affect school results. From access to better schools to lots of resources for extracurricular activities, Alexander's family wealth and suburban surroundings give him major benefits that help him succeed in his academics and in life. Anthony's family, on the other hand, battles lower educational achievement and financial uncertainty, which reduces chances for academic excellence and parental participation in his schooling. The disparity in family structure is also quite important since Alexander gains from the presence of both parents, which not only raises household income but also improves the availability of parental time and support.

    3. When parent-child relationships are warm, children respond well. When children respond well, harsh parenting practices are less common

      This stands out to me so much because of how parenting is reflected based on everything that happens in life. In a household with constant worries and stress the parent tends to reflect those worries on their kids. It is either shown through a parents anger and always responding as if they're annoyed, yelling, and just anxious, which that tends to affect their kids behavior in school or wherever they may be. We look at things different when it comes to spending money.

    1. Built in the open Concourse's RFC process and governance model invite anyone to become a contributor, developing the project roadmap by collaborating in the open.
    1. Our burdens are heavy & call loud for justice! call loud for mercy! I Therefore, take the liberty Sir, to address you myself upon the subject of slaviry, and ask you a few questions respecting Mr. Duane’s politicks

      Observation: The heaviness that the slaves felt from being in slavery and wanting justice and being shown mercy and wanted to ask Thomas Jefferson Questions.

      Interpretation:This sentence in the letter was describing the emotion that the anonymous slave felt and also others that was slaves which was feeling burden and wanting to seek justice while also want to experience mercy.

    1. This includes non-renewable resourcecrimes such as illegally producing,distributing, mining fuels, minerals, orprecious metals or gemstones.
      • 2015 -> Volkswagen selling diesel cars as environmentally friendly and fuel efficient which caused high levels of air pollution
    2. only legalwhen it is regulated by the provincialor territorial government
      • Weiwei incident
    3. Theft, Robbery,and Fraud
      • Unlike theft, robbery involves stealing a property while a victim is involved, but the distinction is left to the police

      • Fraud example -> Scam emails that asks for our personal information

      • Another example of fraud is ponzi's scam

    4. The WayfairConspiracy
      • Wayfair was accused of smuggling children and selling them on the market, but it's not grounded in credible evidence

      • 2020

    5. Bill C-36
      • Happened for the protection of sex workers, but forced them to go to underground sex-work

      • Prevented easier screener in part of the sex worker

    6. Psychological control including:
      • Eg. Chemical dependency, grooming through a false sense of love and obligation, etc.

      • Exploits the human need for connection, even when there's exploitation and abuse involved

      • Stockholm syndrome -> Captive develops a bond with their captor as a defense mechanism under extreme defense

    7. Human trafficking and human smuggling are distinguishable.
      • Trafficking involves trafficking transporting people to another country without their consent, for the purpose of forcing them to be involved in sex trades or in forced labour

      • What, why, and how are the three elements of human trafficking

      • Smuggling involves transporting people to another country consensuallly, often by means of coercion and deception.

      • Smuggling victims are often involved due to unsafe environments in their home country and seeking a better help elsewhere

    8. Corporate-State Crime
      • Engaging in collective behavior for mutual benefit
      • Eg. Challenger Explosion in 1986 ->
    9. State Crime
      • Perpetrated by the government, individuals in the government, or an individual in the government
      • Eg. War crimes Real life example: Residential schools of Canada
      • State crimes occur mostly for money
    10. Occupational Crime
      • Business-relate crime such as stealing money from employer -> Embezzlement
      • Eg. Ponzi scheme -> Taking advantage of people in what seems to be a legitimate business
    11. Corporate Crime
      • Group of organization or individuals in that organization engages in illegal acts
      • Eg. bribing, insider trading
      • Real life example: Jordan Belfort who commited stock price fixing

    Annotators

  3. docdrop.org docdrop.org
    1. Perhaps even more puzzling, why has it been so difficult to confront and transform the features embedded in the school structure that arc responsible for facilitating success for some and failure for ochers

      This has always been an issue that has been known. In this diverse society the teachers themselves pick and choose who they want to help out and see succeed. Big public schools have always to be known to segregate people of color because they do not think they have the same capacity as thers to be able to educationally succeed. On the other hand, in a school very diverse majority of the time we all tend to push very hard but because of the feeling of being let down and not having support we tend to slack off and not do the full potential.

    1. Over the next 19 years, the Muslims conquered most of Spain and were threatening to conquer France until stopped by Charles Martel

      why did charles martel stoped the muslims from conquering france?

    1. The accompanying argument in that all scientific contributions from non-European civilizations were technology-based, not science-based

      wonder why they think its non science based?

    1. Case: patient is named case #2, male

      Disease Assertion: UCD/OTCD

      Family Info:

      Case Presenting HPOs: Hyperammonemia (HP:0001987), oriticaciduria (HP:0003218), low plasma citrulline (HP:0003572), neonatal onset(HP:0003623), Hyperglutaminemia (HP:0003217)

      Case HPO FreeText:

      Case NOT HPOs:

      Case NOT HPO Free Text:

      Case Previous Testing: GDNA was isolated from lymphocytes. To examine the small mutations in the coding region of the OTC gene, all 10 exons and their flanking intron regions were amplified using PCR, and the nucleotide sequences of the amplified products were determined. To determine the intron 5 sequence of case 2, PCR was performed using primers OTCex5F and OTCint5R, and primers OTCint5F and OTCex6R (Table 1, Fig. 3). The amplified products were subcloned into the pT7 vector and the inserted DNA was sequenced using an automated DNA sequencer. Allopurinol test

      Supplemental Data: TABLE 1, Notes:

      Variant: NM_000531.6: c.540+265G>A

      ClinVarID: NA

      CAID: CA658658977

      gnomAD:

      Gene Name: OTC (ornithine transcarbamylase)

    1. Reviewer #2 (Public review):

      Goldstein et al. provide a thorough characterization of the interaction of attention and eye movement planning. These processes have been thought to be intertwined since at least the development of the Premotor Theory of Attention in 1987, and their relationship has been a continual source of debate and research for decades. Here, Goldstein et al. capitalize on their novel urgent saccade task to dissociate the effects of endogenous and exogenous attention on saccades towards and away from the cue. They find that attention and eye movements are, to some extent, linked to one another but that this link is transient and depends on the nature of the task. A primary strength of the work is that the researchers are able to carefully measure the time course of the interaction between attention and eye movements in various well-controlled experimental conditions. As a result, the behavioral interplay of two forms of attention (endogenous and exogenous) are illustrated at the level of tens of milliseconds as they interact with the planning and execution of saccades towards and away from the cued location. Overall, the results allow the authors to make meaningful claims about the time course of visual behavior, attention, and the potential neural mechanisms at a timescale relevant to everyday human behavior.

    2. Reviewer #3 (Public review):

      The present study used an experimental procedure involving time-pressure for responding, in order to uncover how the control of saccades by exogenous and endogenous attention unfolds over time. The findings of the study indicate that saccade planning is influenced by the locus of endogenous attention, but that this influence was short-lasting and could be overcome quickly. Taken together, the present findings reveal new dynamics between endogenous attention and eye movement control and lead the way for studying them using experiments under time-pressure.

      The results achieved by the present study advance our understanding of vision, eye movements, and their control by brain mechanisms for attention. In addition, they demonstrate how tasks involving time-pressure can be used to study the dynamics of cognitive processes. Therefore, the present study seems highly important not only for vision science, but also for psychology, (cognitive) neuroscience, and related research fields in general.

      I think the authors' addressed all of the reviewers' points successfully and in detail, so that I don't have any further suggestions or comments.

    3. Author response:

      The following is the authors’ response to the original reviews.

      Reviewer #1 (Public Review):

      The main research question could be defined more clearly. In the abstract and at some points throughout the manuscript, the authors indicate that the main purpose of the study was to assess whether the allocation of endogenous attention requires saccade planning [e.g., ll.3-5 or ll.247-248]. While the data show a coupling between endogenous attention and saccades, they do not point to a specific direction of this coupling (i.e., whether endogenous attention is necessary to successfully execute a saccade plan or whether a saccade plan necessarily accompanies endogenous attention).

      Thanks for the suggestion. We have modified the text in the abstract and at various points in the text to make it more clear that the study investigates the relationship between attention and saccades in one particular direction, first attentional deployment and then saccade planning.

      Some of the analyses were performed only on subgroups of the participants. The reporting of these subgroup analyses is transparent and data from all participants are reported in the supplementary figures. Still, these subgroup analyses may make the data appear more consistent, compared to when data is considered across all participants. For instance, the exogenous capture in Experiments 1 and 2 appears much weaker in Figure 2 (subgroup) than Figure S3 (all participants). Moreover, because different subgroups were used for different analyses, it is often difficult to follow and evaluate the results. For instance, the tachometric curves in Figure 2 (see also Figure 3 and 4) show no motor bias towards the cue (i.e., performance was at ~50% for rPTs <75 ms). I assume that the subsequent analyses of the motor bias were based on a very different subgroup. In fact, based on Figure S2, it seems that the motor bias was predominantly seen in the unreliable participants. Therefore, I often found the figures that were based on data across all participants (Figures 7 and S3) more informative to evaluate the overall pattern of results.

      Indeed, our intent was to dissociate the effects on saccade bias and timing as clearly as possible, even if that meant having to parse the data into subgroups of participants for different analyses. We do think conceptually this is the better strategy, because the bias and timing effects were distinct and not strongly correlated with specific participants or task variants. For instance, the unreliable participants were somewhat more consistently biased in the same direction, but the reliable participants also showed substantial biases, so the difference in magnitude was relatively modest. This can be more easily appreciated now that the reliable and unreliable participants are indicated in Figures 3 and 5. The impact of the bias is also discussed further in the last paragraphs of the Results, which note that the bias was not a reliable predictor of overall success during informed choices.

      Reviewer #3 (Public Review):

      (1) In this experimental paradigm, participants must decide where to saccade based on the color of the cue in the visual periphery (they should have made a prosaccade toward a green cue and an antisaccade away from a magenta cue). Thus, irrespective of whether the cue signaled that a prosaccade or an antisaccade was to be made, the identity of the cue was always essential for the task (as the authors explain on p. 5, lines 129-138). Also, the location where the cue appeared was blocked, and thus known to the participants in advance, so that endogenous attention could be directed to the cue at the beginning of a trial (e.g., p. 5, lines 129-132). These aspects of the experimental paradigm differ from the classic prosaccade/antisaccade paradigm (e.g. Antoniades et al., 2013, Vision Research). In the classic paradigm, the identity of the cues does not have to be distinguished to solve the task, since there is only one stimulus that should be looked at (prosaccade) or away from (antisaccade), and whether a prosaccade or antisaccade was required is constant across a block of trials. Thus, in contrast to the present paradigm, in the classic paradigm, the participants do not know where the cue is about to appear, but they know whether to perform a prosaccade or an antisaccade based on the location of the cue.

      The present paradigm keeps the location of the cue constant in a block of trials by intention, because this ensures that endogenous attention is allocated to its location and is not overpowered by the exogenous capture of attention that would happen when a single stimulus appeared abruptly in the visual field. Thus, the reason for keeping the location of the cue constant seems convincing. However, I wondered what consequences the constant location would have for the task representations that persist across the task and govern how attention is allocated. In the classic paradigm, there is always a single stimulus that captures attention exogenously (as it appears abruptly). In a prosaccade block, participants can prioritize the visual transient caused by the stimulus, and follow it with a saccade to its coordinates. In an antisaccade block, following the transient with a saccade would always be wrong, so that participants could try to suppress the attention capture by the transient, and base their saccade on the coordinates of the opposite location. Thus, in prosaccade and antisaccade blocks, the task representations controlling how visual transients are processed to perform the task differ. In the present task, prosaccades and antisaccades cannot be distinguished by the visual transients. Thus, such a situation could favor endogenous attention and increase its influence on saccade planning, even though saccade planning under more naturalistic conditions would be dominated by visual transients. I suggest discussing how this (and vice versa the emphasis on visual transients in the classic paradigm) could affect the generality of the presented findings (e.g., how does this relate to the interpretation that saccade plans are obligatorily coupled to endogenous attention? See, Results, p. 10, lines 306-308, see also Deubel & Schneider, 1996, Vision Research).

      Great discussion point. There are indeed many ways to set up an experiment where one must either look to a relevant cue or look away from it. Furthermore, it is also possible to arrange an experiment where the behavior is essentially identical to that in the classic antisaccade task without ever introducing the idea of looking away from something (Oor et al., 2023). More important than the specific task instructions or the structure of the event sequence, we think the fundamental factors that determine behavior in all of these cases are the magnitudes of the resulting exogenous and endogenous signals, and whether they are aligned or misaligned. Under urgent conditions, consideration of these elements and their relevant time scales explains behavior in a wide variety of tasks (see Salinas and Stanford, 2021). Furthermore, a recent study (Zhu et al., 2024) showed that the activation patterns of neurons in monkey prefrontal cortex during the antisaccade task can be accurately predicted from their stimulus- and saccade-related responses during a simpler task (a memory guided saccade task). This lends credence to the idea that, at the circuit level, the qualities that are critical for target selection and oculomotor performance are the relative strengths of the exogenous and endogenous signals, and their alignment in space and time. If we understand what those signals are, then it no longer matters how they were generated. The Discussion now includes a paragraph on this issue.

      (2) Discussion (p. 16, lines 472-475): The authors suppose that "It is as if the exogenous response was automatically followed by a motor bias in the opposite direction. Perhaps the oculomotor circuitry is such that an exogenous signal can rapidly trigger a saccade, but if it does not, then the corresponding motor plan is rapidly suppressed regardless of anything else.". I think this interesting point should be discussed in more detail. Could it also be that instead of suppression, other currently active motor plans were enhanced? Would this involve attention? Some attention models assume that attention works by distributing available (neuronal) processing resources (e.g., Desimone & Duncan, 1995, Annual Review of Neuroscience; Bundesen, 1990, Psychological Review; Bundesen et al., 2005, Psychological Review) so that the information receiving the largest share of resources results in perception and is used for action, but this happens without the active suppression of information.

      The rebound seen after the exogenously driven changes is certainly interesting, and we agree that it could involve not only the suppression of a specific motor plan but also enhancement of another (opposite) plan. However, we think that, given the lack of prior data with the requisite temporal precision, further elaboration of this point would just be too speculative in the context of the point that we are trying to make, which is simply that the underlying choice dynamics are more rapid and intricate than is generally appreciated.

      (3) Methods, p. 19, lines 593-596: It is reported that saccades were scored based on their direction. I think more information should be provided to understand which eye movements entered the analysis. Was there a criterion for saccade amplitude? I think it would be very helpful to provide data on the distributions of saccade amplitudes or on their accuracy (e.g. average distance from target) or reliability (e.g. standard deviation of landing points). Also, it is reported that some data was excluded from the analysis, and I suggest reporting how much of the data was excluded. Was the exclusion of the data related to whether participants were "reliable" or "unreliable" performers?

      The reported results are based on all saccades (detected according to a velocity threshold) that were produced after the go signal and in a predominantly horizontal direction (within ± 60° of the cue or non-cue), which were the vast majority (> 99%). Indeed, most saccades were directed to the choice targets, with 95% of them within ± 14.2° of the horizontal plane. The excluded (non-scored) trials were primarily fixation breaks plus a small fraction of trials with blinks, which compromised saccade determination. There was no explicit amplitude criterion; applying one (for instance, excluding any saccades with amplitude < 2°) produced minimal changes to the data. Overall, saccade amplitudes were distributed unimodally with a median of 7.7° and a 95% confidence interval of [3.7°, 9.7°], whereas the choice targets were located at ± 8° horizontally. This is now reported in the Methods.

      As far as data exclusion, analyses were based on urgent trials (gap > 0); non-urgent (gap < 0) trials were excluded from calculation of the tachometric curves simply because they might correspond to a slightly different regime (go signal after cue onset) and to long processing times in the asymptotic range (rPT in 200–300 ms) or beyond, which are not as informative. However, including them made no appreciable difference to the results. No data were excluded based on participant performance or identity; all psychometric analyses were carried out after the selection of trials based on the scoring criteria described above. This is now stated in the Methods.

      (4) Results, p. 9, lines 262-266: Some data analyses are performed on a subset of participants that met certain performance criteria. The reasons for this data selection seem convincing (e.g. to ensure empirical curves were not flat, line 264). Nevertheless, I suggest to explain and justify this step in more detail. In addition, if not all participants achieved an acceptable performance and data quality, this could also speak to the experimental task and its difficulty. Thus, I suggest discussing the potential implications of this, in particular, how this could affect the studied mechanisms, and whether it could limit the presented findings to a special group within the studied population.

      The ideal (i.e., best) analysis for determining the cost of an antisaccade for each individual participant (Fig. 4c) was based on curve fitting and required task performance to rise consistently above chance at long rPTs in both pro and anti trials. This is why the mentioned conditions on the fits were imposed. This is now explained in the text. This ideal analysis was not viable for all tachometric curves not necessarily because of task difficulty but also because of high variability or high bias in a particular experiment/condition. It is true that the task was somewhat difficult, but this manifested in various ways across the dataset, so attempting to draw a clean-cut classification of participants based on “difficulty” may not be easy or all that informative (as can be gleaned from Fig. S1). There simply was a range of success levels, as one might expect from any task that requires some nontrivial cognitive processing. Also note that no participants were excluded flat out from analysis. Thus, at the mentioned point in the text, we simply note that a complementary analysis is presented later that includes all participants and all conditions and provides a highly consistent result (namely, Fig. 7e). Then, in the last section of the Results, where Fig. 7 is presented, we point out that there is considerable variance in performance at long rPTs, and that it relates to both the bias and the difficulty of the task across participants.   

      Reviewer #1 (Recommendations For The Authors):

      (1) I have some questions related to the initial motor bias:

      a) Based on Figure S3, which shows the tachometric curves using data from all participants, there only seems to be a systematic motor bias in Experiments 1 and 3 but no bias in Experiments 2 and 4. It is unclear to me why this is different from the data shown in Figure 7.

      For the bars in Fig. 7, accuracy (% correct) was computed for each participant and then averaged across participants, whereas for the data in Fig. S3, trials were first pooled across participants and then accuracy was computed for each rPT bin. The different averaging methods produce slightly different results because some participants had more trials in the guessing range than others, and different biases.  

      b) Based on Figure 7 (and Figure S3), there was no motor bias in Experiment 4. Based on the correlations between motor bias and time difference between pro and antisaccades, I would expect that the rise points between pro and antisaccades would be more similar in this Experiment. Was this the case?

      No. Figs. 3c and S3d show that the rise times of pro and anti trials for Experiment 4 still differ by about 30 ms (around the 75% correct mark), and the rest of the panels in those figures show that the difference is similar for all experiments. What happens is that Figs. 7 and S3 show that on average the bias is zero for Experiment 4, but that does not mean that the average difference in rise times is zero because there is an offset in the data (correlation is not the same as regression). The most relevant evidence is in Fig. 6c, which shows that, for an overall bias of zero, one would still expect a positive difference in rise times of about 25–30 ms. This figure now includes a regression line, and the corresponding text now explains the relationship between bias and rise times more clearly. Thanks for asking; this is an important point that was not sufficiently elaborated before.

      c) If I understand correctly, the initial motor bias was predominantly observed in participants who were classified as 'unreliable performers' (comparing Figure S2 and Figure 2). Was there a correlation between the motor bias and overall success in the task? In other words: Was a strong motor bias generally disadvantageous?

      Good question. Participants classified as ‘unreliable’ were somewhat more consistently biased in the same direction than those classified as ‘reliable’, but the distinction in magnitude was not large. This can be better appreciated now in Fig. 5 by noting the mix of black (reliable) and gray labels (unreliable) along the x axes. The unreliable participants were also, by definition, less accurate in their asymptotic performance in at least one experiment (Fig. S1). In general, however, this classification was used simply to distinguish more clearly the two main effects in the data (timing cost and bias). In fact, the motor bias was not a reliable predictor of performance during informed choices: across all participants, the mean accuracy in the asymptotic range (rPT > 200 ms) had a weak, non-significant correlation with the bias (ρ = ‒0.07, p = 0.7). So, no, the motor bias did not incur an obvious disadvantage in terms of overall success in the task. Its more relevant effect was the asymmetry in performance that it promoted between pro- and antisaccade trials (Fig. 6c). This is now explained at the end of the Results.

      (2) One of the key analyses of the current study is the comparison of the rPT required to make informed pro and antisaccades (ll.246 ff). I think it would be informative for readers to see the results of this analysis separately for all four experiments. For instance, based on Figure 4a and b, it looks like the rise points were actually very similar between pro and antisaccades in Experiment 1.

      We agree that the ideal analysis would be to compute the performance rise point for pro- and antisaccade curves for each experiment and each participant, but as is now noted in the text, this requires a steady and substantial rise in the tachometric curve, which is not always obtained at such a fine-grained level; the underlying variability can be glimpsed from the individual points in Fig. 7a, b. Indeed, in Fig. 4a, b the mean difference between pro and anti rise points appears small for Experiment 1 — but note that the two panels include data from only partially overlapping sets of participants; the figure legend now makes this more clear. Again, this is because the required fitting procedure was not always reliable in both conditions (pro and anti) for a given subject in a given experiment. Thus, panels a and b cannot be directly compared. The key results are those in Fig. 4c, which compare the rise points in the two conditions for the same participants (11 of them, for which both rise points could be reliably determined). In that case the mean difference is evident, and the individual effect consistent for 9 of the 11 participants (as now noted).

      A similar comparison for Experiments 1 or 2 individually would include fewer data points and lose statistical power. However, on average, the results for Experiments 1 and 2 (separately) were indeed very similar; in both cases, the comparison between pro and anti curves pooled across the same qualifying participants as in Fig. 4c produced results that were nearly identical to those of Fig. 4d (as can be inferred from Fig. 2a, b). Furthermore, results for the four individual experiments pooled across all participants are presented in Figure S3, which shows delayed rises in antisaccade performance consistent with the single participant data (Fig. 4c).

      (3) Figure 3: It would be helpful to indicate the reliable performers that were used for Figure 3a in the bar plots in Figure 3b. Same for Figures 3c and d.

      Done. Thanks for the suggestion.

      (4) Introduction: The literature on the link between covert attention and directional biases in microsaccades seems relevant in the context of the current study (e.g., Hafed et al., 2002, Vision Res; Engbert & Kliegl, 2003, Vision Res; Willett & Mayo, 2023, Proc Natl Acad Sci USA).

      Yes, thanks for the suggestion. The introduction now mentions the link between attentional allocation and microsaccade production.

      (5) ll.395ff & Figure 7f: Please clarify whether data were pooled across all four experiments for this analysis.

      Yes, the data were pooled, but a positive trend was observed for each of the four experiments individually. This is now stated.

      (6) ll.432-433: There is evidence that the attentional locus and the actual saccade endpoint can also be dissociated (e.g., Wollenberg et al., 2018, PLoS Biol; Hanning et al., 2019, Proc Natl Acad Sci USA).

      True. We have rephrased accordingly. Thanks for the correction.

      (7) ll.438-440: This sentence is difficult to parse.

      Fixed.

      Reviewer #2 (Recommendations For The Authors):

      The manuscript is well-written and compelling. The biggest issue for me was keeping track of the specifics of the individual experiments. I think some small efforts to reinforce those details along the way would help the reader. For example, in the Figure 3 figure legend, I found the parenthetical phrase "high luminence cue, low luminence non-cue)" immensely helpful. It would be helpful and trivial to add the corresponding phrase after "Experiment 4" in the same legend.

      Thanks for the suggestion. Legends and/or labels have been expanded accordingly in this and other figures.

      Line 314: "..had any effect on performance,..." Should there be a callout to Figure 2 here?

      Done.

      It wasn't clear to me why the specific high and low luminance values (48 and 0.25) were chosen. I assume there was at least some quick perceptual assessment. If that's the case or if the values were taken from prior work, please include that information.

      Done.

      Reviewer #3 (Recommendations For The Authors):

      Minor points. Please note that the comments made in the public review above are not repeated here.

      (1) Introduction, p. 2, lines 41-45: It is mentioned that the effects of covert attention or a saccade can be quite distinct. I suggest specifying in what way.

      Done.

      (2) Introduction, p. 2, lines 46-47: It is said that the relation between attention and saccade planning was still uncertain and then it is stressed that this was the case for more natural viewing conditions. However, the discussed literature and the experimental approach of the current study still rely on experimental paradigms that are far from natural viewing conditions. Thus, I suggest either discussing the link between these paradigms and natural viewing in more detail or leaving out the reference to natural viewing at this point (I think the latter suggestion would fit the present paper best).

      We followed the latter suggestion.

      (3) Introduction (e.g. p. 3, lines 55-58): The authors discuss the effects that sustaining fixation might have on attention and eye movements. Recently, it has been found that maintaining fixation can ameliorate cognitive conflicts that involve spatial attention (Krause & Poth, 2023, iScience). It seems interesting to include this finding in the discussion, because it supports the authors' view that it is necessary to study fixation and eye movements rather than eye movements alone to uncover their interplay with attention and decision-making.

      Thanks for the reference. The reported finding is certainly interesting, but we find it somewhat tangential to the specific point we make about strong fixation constraints — which is that they suppress internally driven motor activity, including biases, that are highly informative of the relationship between attention and saccade planning (lines 466‒472, 541‒561). Whether fixation state has other subtle consequences for cognitive control is an intriguing, important issue, for sure. But we would rather maintain the readers’ focus on the reasons why less restrictive fixation requirements are relevant for understanding the deployment of attention.

      (4) Results, p. 9, lines 264-266: It is reported that "The rise points were statistically the same across experiments for both prosaccades (p=0.08, n=10, permutation test)...", but the p-value seems quite close to significance. I suggest mentioning this and phrasing the sentence a bit more carefully.

      We now refer to the rise points as “similar”.

      (5) Figure 7 a-d: It might help readers who first skim through the figures before reading the text to use other labels for the bins on the x-axis that spell out the name of the phase in the trial. It might also help to visualize the bins on the plot of a tachymetric function (in this case, changing the labels could be unnecessary).

      Thanks for the suggestion. We added an insert to the figure to indicate the correspondence between labels and time bins more intuitively.

      (6) Methods, p. 18, lines 566-567: On some trials, participants received an auditory beep as a feedback stimulus. As this could induce a burst of arousal, I wondered how it affected the subsequent trials.

      This is an interesting issue to ponder. We agree that, in principle, the beep could have an impact on arousal. However, what exactly would be predicted as a consequence? The absence of a beep is meant to increase the urgency of the participant, so some effect of the beep event on RT would be expected anyway as per task instructions. Thus, it is unclear whether an arousal contribution could be isolated from other confounds. That said, three observations suggest that, at most, an independent arousal effect would be very small. First, we have performed multisensory experiments (unpublished) with auditory and visual stimuli, and have found that it is difficult to obtain a measurable effect of sound on an urgent visual choice task unless the experimental conditions are particularly conducive; namely, when the visual stimuli are dim and the sound is loud and lateralized. None of these conditions applies to the standard feedback beep. Second, because most trials are on time, the meaningful feedback signal is conveyed by the absence of the beep. But this signal to alter behavior (i.e., respond sooner) has zero intensity and is therefore unlikely to trigger a strong exogenous, automatic response. Finally, in our data, we can parse the trials that followed a beep (the majority) from those that did not (a minority). In doing so, we found no differences with respect to perceptual performance; only minor differences in RT that were identical for pro- and antisaccade trials. All this suggests to us that it is very unlikely that the feedback alters arousal significantly on specific trials, somehow impacting the tachometric curve (a contribution to general arousal across blocks or sessions is possible, of course, but would be of little consequence to the aims of the study).

      (7) Methods, p. 18, lines 574-577: I suggest referring to the colors or the conditions in the text as it was done in the experiments, just to prevent readers being confused before reading the methods.

      We appreciate the thought, but think that the study is easier to understand by pretending, initially, that the color assignments were fixed. This is a harmless simplification. Mentioning the actual color assignments early on would be potentially more confusing and make the description of the task longer and more contrived.

      (8) Methods, p. 18, Table 1: Given that the authors had a spectrophotometer, I suggest providing (approximate) measurements for the stimulus colors in addition to the luminance (i.e. not just RGB values).

      Unfortunately, we have since switched the monitor in our setup, so we don’t have the exact color measurements for the stimuli used at the time. We will keep the suggestion in mind for future studies though.

      References

      Oor EE, Stanford TR, Salinas E (2023) Stimulus salience conflicts and colludes with endogenous goals during urgent choices. iScience 26:106253.

      Salinas E, Stanford TR (2021) Under time pressure, the exogenous modulation of saccade plans is ubiquitous, intricate, and lawful. Curr Opin Neurobiol 70:154-162.

      Zhu J, Zhou XM, Constantinidis C, Salinas E, Stanford TR (2024) Parallel signatures of cognitive maturation in primate antisaccade performance and prefrontal activity. iScience.  doi: https://doi.org/10.1016/j.isci.2024.110488.

    1. The working day of a farmer was still very difficult, even with the technological improvements of the Medieval Age.

      I think the difficuility that they had were the seasons changing, the weather, or some of the work had to be done physically.

    2. This section focuses on technologies that appear to be natively "European." Other technologies (such as paper, gunpowder, the compass, stirrups, among others) were based on older developments in other regions, particularly China.

      intersting to show how other technologies are based from older developments from other regions.

    1. Product rule: ∂∂x(f (x)g(x)) = ∂f∂x g(x) + f (x) ∂g∂x (5.46)Sum rule: ∂∂x(f (x) + g(x)) = ∂f∂x + ∂g∂x (5.47)

      Interesting that backpropagation really is just the chain rule over and over again. I wonder why it took us so long to realize the strengths of DL.

    2. The Taylor series is a representation of a function f as an infinite sum ofterms. These terms are determined using derivatives of f evaluated at x0

      It's interesting that you do not see many Taylor series approaches in the context of deep neural networks. The idea that you can create nonlinear decision boundaries with nested perceptrons, but we do not use Taylor series, which appear powerful enough to do that too is interesting. Is it computational limits?

    1. unexpected events in ways that would not otherwise be possible

      like observing the glacier collapse/melting at certain point that no one would expect to happen

  4. www.bitbybitbook.com www.bitbybitbook.com
    1. they can enable certain kinds of research including the study of rare events, the estimation of heterogeneity, and the detection of small differences

      key points

    1. it might suggest new data that you should collect

      It's quite like the process of scholars doing research since we all are supposed to conduct our own research on the basis of preexisting findings. That's exactly why we want to do literature review.

    2. Twitter does not carefully sample users and does not work hard to maintain comparability over time

      issue of bias

    1. Welcome back.

      In this lesson, I'll be talking about Network Address Translation, or NAT, a process of giving a private resource outgoing only access to the internet.

      And a NAT gateway is the AWS implementation that's available within WPC.

      There's quite a bit of theory to cover, so let's get started.

      So what is NAT?

      Well, it stands for Network Address Translation.

      This is one of those terms which means more than people think that it does.

      In a strict sense, it's a set of different processes which can adjust ID packets by changing their source or destination IP addresses.

      Now, you've seen a form of this already.

      The internet gateway actually performs a type of NAT known as static NAT.

      It's how a resource can be allocated with a public IP version for address, and then when the packets of data leave those resources and pass through the internet gateway, it adjusts the source IP address on the packet from the private address to the public, and then sends the packet on, and then when the packet returns, it adjusts the destination address from the public IP address to the original private address.

      That's called static NAT, and that's how the internet gateway implements public IP version for addressing.

      Now, what most people think of when they think of NAT is a subset of NAT called IP Masquerading.

      And IP Masquerading hides a whole private side IP block behind a single public IP.

      So rather than the one private IP to one public IP process that the internet gateway does, NAT is many private IPs to one single IP.

      And this technique is popular because IP version 4 addresses are running out.

      The public address space is rapidly becoming exhausted.

      IP Masquerading, or what we'll refer to for the rest of this lesson as NAT, gives a whole private range of IP addresses outgoing only access to the public internet and the AWS public zone.

      I've highlighted outgoing because that's the most important part, because many private IPs use a single public IP.

      Incoming access doesn't work.

      Private devices that use NAT can initiate outgoing connections to internet or AWS public space services, and those connections can receive response data, but you cannot initiate connections from the public internet to these private IP addresses when NAT is used.

      It doesn't work that way.

      Now, AWS has two ways that it can provide NAT services.

      Historically, you could use an EC2 instance configured to provide NAT, but it's also a managed service, the NAT gateway, which you can provision in the VPC to provide the same functionality.

      So let's look at how this works architecturally.

      This is a simplified version of the Animals for Life architecture that we've been using so far.

      On the left is an application tier subnet in blue, and it's using the IP range 10.16.32.0/20.

      So this is a private only subnet.

      Inside it are three instances, I01, which is using the IP 10.16.32.10, I02, which is using 32.20, and I03, which is using 32.30.

      These IP addresses are private, so they're not publicly routable.

      They cannot communicate with the public internet or the AWS public zone services.

      These addresses cannot be routed across a public style network.

      Now, if we wanted this to be allowed, if we wanted these instances to perform certain activities using public networking, for example, software updates, how would we do it?

      Well, we could make the subnet's public in the same way that we've done with the public subnets or the web subnets, but we might not want to do that architecturally.

      With this multi-tier architecture that we're implementing together, part of the design logic is to have tiers which aren't public and aren't accessible from the public internet.

      Now, we could also host some kind of software update server inside the VPC, and some businesses choose to do that.

      Some businesses run Windows update services, all Linux update services inside their private network, but that comes with an admin overhead.

      NAT offers us a third option, and it works really well in this style of situation.

      We provision a NAT gateway into a public subnet, and remember, the public subnet allows us to use public IP addresses.

      The public subnet has a route table attached to it, which provides default IP version 4 routes pointing at the internet gateway.

      So, because the NAT gateway is located in this public web subnet, it has a public IP which is routable across the public internet, so it's now able to send data out and get data back in return.

      Now, the private subnet where the instances are located can also have its own route table, and this route table can be different than the public subnet route table.

      So, we could configure it so that the route table that's on the application subnet has a default IP version 4 route, but this time, instead of pointing at the internet gateway, like the web subnet users, we configure this private route table so that it points at the NAT gateway.

      This means when those instances are sending any data to any IP addresses that do not belong inside the VPC, by default, this default route will be used, and that traffic will get sent to the NAT gateway.

      So, let's have a look at how this packet flow works.

      Let's simulate the flow packets from one of the private instances and see what the NAT gateway actually does.

      So, first, instance 1 generates some data.

      Let's assume that it's looking for software updates.

      So, this packet has a source IP address of instance 1's private IP and a destination of 1.3.3.7.

      For this example, let's assume that that's a software update server.

      Now, because we have this default route on the route table of the application subnet, that packet is routed through to the NAT gateway.

      The NAT gateway makes a record of the data packet.

      It stores the destination that the packet is for, the source address of the instance sending it, and other details which help it identify the specific communication in future.

      Remember, multiple instances can be communicating at once, and for each instance, it could be having multiple conversations with different public internet hosts.

      So, the NAT gateway needs to be able to uniquely identify those.

      So, it records the IP addresses involved, the source and destination, the port numbers, everything it needs, into a translation table.

      So, the NAT gateway maintains something called a translation table which records all of this information.

      And then, it adjusts the packet to the one that's been sent by the instance, and it changes the source address of this IP packet to be its own source address.

      Now, if this NAT appliance were anywhere for AWS, what it would do right now is adjust the packet with a public routable address. - Hi. - Let's do this directly.

      But remember, all the inside of the IPC really has directly attached to it a public IP version 4 address.

      That's what the internet gateway does.

      So, the NAT gateway, because it's in the web subnet, it has a default route, and this default route points at the internet gateway.

      And so, the packet is moved from the NAT gateway to the internet gateway by the IPC router.

      At this point, the internet gateway knows that this packet is from the NAT gateway.

      It knows that the NAT gateway has a public IP version 4 address associated with it, and so, it modifies the packet to have a source address of the NAT gateway's public address, and it sends it on its way.

      The NAT gateway's job is to allow multiple private IP addresses to masquerade behind the IP address that it has.

      That's where the term IP masquerading comes from.

      That's why it's more accurate.

      So, the NAT gateway takes all of the incoming packets from all of the instances that it's managing, and it records all the information about the communication.

      It takes those packets, it changes the source address from being those instances to its own IP address, its own external-facing IP address.

      If it was outside AWS, this would be a public address directly.

      That's how your internet router works for your home network.

      All of the devices internally on your network talk out using one external IP address, your home router uses NAT.

      But because it's in AWS, it doesn't have directly attached a real public IP.

      The internet gateway translates from its IP address to the associated public one.

      So, that's how the flow works.

      If you need to give an instance its own public IP version for address, then only the internet gateway is required.

      If you want to give private instances outgoing access to the internet and the AWS public services such as S3, then you need both the NAT gateway to do this many-to-one translation and the internet gateway to translate from the IP of the NAT gateway to a real public IP version for address.

      Now, let's quickly run through some of the key facts for the NAT gateway product that you'll be implementing in the next demo lesson.

      First, and I hope this is logical for you by now, it needs to run from a public subnet because it needs to be able to be assigned a public IP version for IP address for itself.

      So, to deploy a NAT gateway, you already need your VPC in a position where it has public subnets.

      And for that, you need an internet gateway, subnets configured to allocate public IP version for addresses and default routes for those subnets pointing at the internet gateway.

      Now, a NAT gateway actually uses a special type of public IP version for address that we haven't covered yet called an elastic IP.

      For now, just know that these are IP version for addresses, which is static.

      They don't change.

      These IP addresses are allocated to your account in a region and they can be used for whatever you want until you reallocate them.

      And NAT gateways use these elastic IPs, the one service which utilizes elastic IPs.

      Now, they're talking about elastic IPs later on in the course.

      Now, NAT gateways are an AZ resilient service.

      If you read the AWS documentation, you might get the impression that they're fully resilient in a region like an internet gateway.

      They're not, they're resilient in the AZ that they're in.

      So they can recover from hardware failure inside an AZ.

      But if an AZ entirely fails, then the NAT gateway will also fail.

      For a fully region resilient service, so to mirror the high availability provided by an internet gateway, then you need to deploy one NAT gateway in each AZ that you're using in the VPC and then have a route table for private subnets in that availability zone, pointing at the NAT gateway also in that availability zone.

      So for every availability zone that you use, you need one NAT gateway and one route table pointing at that NAT gateway.

      Now, they aren't super expensive, but it can get costly if you have lots of availability zones, which is why it's important to always think about your VPC design.

      Now, NAT gateways are a managed service.

      You deploy them and AWS handle everything else.

      They can scale to 45 gigabits per second in bandwidth and you can always deploy multiple NAT gateways and split your subnets across multiple provision products.

      If you need more bandwidth, you can just deploy more NAT gateways.

      For example, you could split heavy consumers across two different subnets in the same AZ, have two NAT gateways in the same AZ and just route each of those subnets to a different NAT gateway and that would quickly allow you to double your available bandwidth.

      With NAT gateways, you'll build based on the number that you have.

      So there's a standard hourly charge for running a NAT gateway and this is obviously subject to change in a different region, but it's currently about four cents per hour.

      And note, this is actually an hourly charge.

      So partial hours are billed as full hours.

      And there's also a data processing charge.

      So that's the same amount as the hourly charge around four cents currently per gigabyte of processed data.

      So you've got this base charge that a NAT gateway consumes while running plus a charge based on the amount of data that you process.

      So keep both of those things in mind for any NAT gateway related questions in the exam.

      Don't focus on the actual values, just focus on the fact they have two charging elements.

      Okay, so this is the end of part one of this lesson.

      It's getting a little bit on the long side, and so I wanted to add a break.

      It's an opportunity just to take a rest or grab a coffee.

      Part two will be continuing immediately from the end of part one.

      So go ahead, complete the video, and when you're ready, join me in part two.

    1. Welcome back.

      In this lesson I want to talk in detail about security groups within AWS.

      These are the second type of security filtering feature commonly used within AWS, the other type being network access control lists which we've previously discussed.

      So security groups and knuckles share many broad concepts but the way they operate is very different and it's essential that you understand those differences and the features offered by security groups for both the exam and real-world usage.

      So let's just jump in and get started.

      In the lesson on network access control lists I explained that they're stateless and by now you know what stateless and stateful mean.

      Security groups are stateful, they detect response traffic automatically for a given request and this means that if you allow an inbound or outbound request then the response is automatically allowed.

      You don't have to worry about configuring ephemeral ports, it's all handled by the product.

      If you have a web server operating on TCP 443 and you want to allow access from the public internet then you'll add an inbound security group rule allowing inbound traffic on TCP 443 and the response which is using ephemeral ports is automatically allowed.

      Now security groups do have a major limitation and that's that there is no explicit deny.

      You can use them to allow traffic or you can use them to not allow traffic and this is known as an implicit deny.

      So if you don't explicitly allow traffic then you're implicitly denying it but you can't and this is important you're unable to explicitly deny traffic using security groups and this means that they can't be used to block specific bad actors.

      Imagine you allow all source IP addresses to connect to an instance on port 443 but then you discover a single bad actor is attempting to exploit your web server.

      Well you can't use security groups to block that one specific IP address or that one specific range.

      If you allow an IP or if you allow an IP range or even if you allow all IP addresses then security groups cannot be used to deny a subset of those and that's why typically you'll use network access control lists in conjunction with security groups where the knuckles are used to add explicit denies.

      Now security groups operate above knuckles on the OSI7 layer stack which means that they have more features.

      They support IP and side-based rules but they also allow referencing AWS logical resources.

      This includes all the security groups and even itself within rules.

      I'll be covering exactly how this works on the next few screens.

      Just know at this stage that it enables some really advanced functionality.

      An important thing to understand is that security groups are not attached to instances nor are they attached to subnet.

      They're actually attached to specific elastic network interfaces known as ENIs.

      Now even if you see the user interface present this as being able to attach a security group to an instance know that this isn't what happens.

      When you attach a security group to an instance what it's actually doing is attaching the security group to the primary network interface of that instance.

      So remember security groups are attached to network interfaces that's an important one to remember for the exam.

      Now at this point let's step through some of the unique features of security groups and it's probably better to do this visually.

      Let's start with a public subnet containing an easy to instance and this instance has an attached primary elastic network interface.

      On the right side we have a customer Bob and Bob is accessing the instance using HDTBS so this means TCP but 443.

      Conceptually think of security groups as something which surrounds network interfaces in this case the primary interface of the EC2 instance.

      Now this is how a typical security group might look.

      It has inbound and outbound rules just like a network ACL and this particular example is showing the inbound rules allowing TCP port 443 to connect from any source.

      The security group applies to all traffic which enters or leaves the network interface and because they're stateful in this particular case because we've allowed TCP port 443 as the request portion of the communication the corresponding response part the connection from the instance back to Bob is automatically allowed.

      Now lastly I'm going to repeat this point several times throughout this lesson.

      Security groups cannot explicitly block traffic.

      This means with this example if you're allowing 0.0.0.0.0 to access the instance on port TCP port 443 and this means the whole IP version for internet then you can't block anything specific.

      Imagine Bob is actually a bad actor.

      Well in this situation security groups cannot be used to add protection.

      You can't add an explicit deny for Bob's IP address.

      That's not something that security groups are capable of.

      Okay so that's the basics.

      Now let's look at some of the advanced bits of security group functionality.

      Security groups are capable of using logical references.

      Let's step through how this works with a similar example to the one you just saw.

      We start with a VPC containing a public web subnet and a private application subnet.

      Inside the web subnet is the Categoram application web instance and inside the app subnet is the back-end application instance.

      Both of these are protected by security groups.

      We have A4L-web and A4L-app.

      Traffic wise we have Bob accessing the web instance over port TCP port 443 and because this is the entry point to the application which logically has other users than just Bob we're allowing TCP port 443 from any IP version for address and this means we have a security group with an inbound rule set which looks like this.

      In addition to this front-end traffic the web instance also needs to connect with the application instance and for this example let's say this is using TCP port 1337.

      Our application is that good.

      So how best to allow this communication?

      Well we could just add the IP address of the web instance into the security group of the application instance or if you wanted to allow our application to scale and change IPs then we could add the side arrangers of the subnets instead of IP addresses.

      So that's possible but it's not taking advantage of the extra functionality which security groups provide.

      What we could do is reference the web security group within the application security group.

      So this is an example of the application security group.

      Notice that it allows TCP port 1337 inbound but it references as the source a logical resource the security group.

      Now using a logical resource reference in this way means that the source reference of the A4L-web security group this actually references anything which has this security group associated with it.

      So in this example any instances which have the A4L-web security group attached to them can connect to any instances which have the A4L-web security group attached to them using TCP port 1337.

      So in essence this references this.

      So this logical reference within the application security group references the web security group and anything which has the web security group attached to it.

      Now this means we don't have to worry about IP addresses or side arrangers and it also has another benefit.

      It scales really well.

      So as additional instances are added to the application subnet and web subnet and as those instances are attached to the relevant security groups they're impacted by this logical referencing allowing anything defined within the security group to apply to any new instances automatically.

      Now this is critical to understand so when you reference a security group from another security group what you're actually doing is referencing any resources which have that security group associated with them.

      So this substantially reduces the admin overhead when you have multi-tiered applications and it also simplifies security management which means it's prone to less errors.

      Now logical references provide even more functionality.

      They allow self referencing.

      Let's take this as an example a private subnet inside AWS with an ever-changing number of application instances.

      Right now it's three but it might be three, thirty or one.

      What we can do is create a security group like this.

      This one allows incoming communications on port TCP 1337 from the web security group but it also has this rule which is a self-referential rule allowing all traffic.

      What this means is that if it's attached to all of the instances then anything with this security group attached can receive communication so all traffic from this security group and this effectively means anything that also has this security group attached to it.

      So it allows communications to occur to instances which have it attached from instances which have it attached.

      It handles any IP changes automatically which is useful in these instances within an auto scaling group which is provisioning and terminating instances based on load on the system.

      It also allows for simplified management of any intra-app communications.

      An example of this might be Microsoft the main controllers or managing application high availability within clusters.

      So this is everything I wanted to cover about security groups within AWS.

      So there's a lot of functionality and intelligence that you gain by using security groups versus network ACLs but it's important that you understand that while network ACLs do allow you to explicitly deny traffic security groups don't and so generally you would use network ACLs to explicitly block any bad actors and use security groups to allow traffic to your VPC based resources.

      You do this because security groups are capable of this logical resource referencing and that means AWS logical resources in security groups or even itself to allow this free flow of communications within a security group.

      At this point that is everything I wanted to cover in this lesson so go ahead and complete the video and when you're ready I'll look forward to you joining me in the next lesson.

    1. For every Stoic was a Stoic; but in Christendom where is the Christian?

      peak literature

    2. Let a Stoic open the resources of man

      Emerson seems like quite the stoic philosopher.

    1. rustworthy. I

      CONNECTION ANNOTATIONS

      Just as in the Trott and Lee LLM article, word vectors are described as a matchmaking site for words. AI generated photos could be viewed in a similar way. Not every date will result in a soul mate, therefore every match is not ideal. I often find myself frustrated when typing and my cell phone will decide that it is smarter than me and knows exactly what I am going to say next. I become irate when I hit send before, I realize those changes have been made and I sound as though I only completed my elementary school education. The same can be send for these photos, when an AI model acquires many photos to compile one master image, thought to be exactly what you are looking for, only to discover that AI is so generous, that they have provided the subject of the photo with an extra arm.

      1. Similar to how Trott and Lee LLM article phrased AI as being similar to "turning the water on, making sure it's coming out of the right faucet, and when it's not, running around to tighten and loosen all the valves until it does", AI generated photos (7:20) can create biases that then we must run around to resolve. The original information inputted to generate a photo is like the water. Once it is turned on and a photo is generated, but it's not the photo we were expecting, we then have to tweak and edit the information until we receive a desired outcome.
    1. large number of studies have focused on the task of identifying these motives, and overall, have found that financial gains are one, but by no means the only or even most important, motive. In fact, a review of exiting evidence (Franklin & Baron, 2015) indicates that the desire for autonomy or independence is ranked as the most important by entrepreneurs. Financial gain is second, followed, in descending order, by the desire to grow and develop as a person, to escape from unpleasant work environments, to acquire status and recognition, to contribute to the well-being of their communities and societies, and to contribute to solving important social problems

      does this make sense to you? Why or why not?

    2. Motiva-tion refers to internal states (often not open to direct observation) that energize and guide behavior, and underlie its persistence

      Motivation!

    3. when goals are so challenging as to be realistically unattainable, performance and motivation may both decrease.

      Goals ought to be SMART!

    4. motivation without cognition leads to undirected, random actions, while cognition without motivation lead to inaction—no overt actions occur. Only when the two function together does goal-directed, planned behavior occur.

      strategic behaviour...

    5. it is crucial to adopt challenging but attainable goals.

      perhaps this is where we might talk about S.M.A.R.T. goals...

    6. The process of converting ideas into reality

      one of my favourite definitions of entrepreneurship

    7. Since all entrepreneurs start with dreams of success and are highly motivated to attain them, an important question arises: why do so many experience disappointment instead of realization of these dreams?

      the motivating question -- what brings about success?

    8. entrepreneurs need many skills, relevant knowledge and experi-ence, personal characteristics, motives, and goals. Together, these aspects of human and psychological resources provide them with what might be viewed as the tools they need for success.

      what's in your toolbox?

    9. without entrepreneurs “nothing happens, the entrepreneurial process simply does not occur.”

      d'uh

    10. motiva-tion is intimately linked with cognition

      and intelligence (the successful type!)

    11. It is a basic theme of this chapter, however, that many of the causes of entrepreneurs’ success or failure, involve the entrepreneurs themselves

      !

    12. Whatever the specific goals individuals seek or whatever actions they view as helpful in reaching these goals, their purposeful, planned actions, reflects motivation.

      *

    1. Příběh o důležitosti rodiny, lásky a cti vyniká fascinujícím mistrovstvím animace japonského režiséra Mamoru Hosody. Devítiletý Kjúta je obyčejný kluk z moderního Tokia. Hodně věcí o životě ještě neví a neměl dosud ani tušení o tom, že vedle reálného světa existuje ještě skrytý fantazijní svět obývaný zvířaty. Až do chvíle, než se v něm náhodou sám ocitl. V kouzelném světě Džútengai ale nejsou lidé příliš vítáni a celou zemí navíc zmítají nepokoje s nástupem nového panovníka. Chlapce se ujme osamělý medvědí válečník, aby ho uchránil nebezpečí v neznámém světě. (AČFK)
    1. B

      Historical causality- this unique circumstance rose from __ Social causality- A may lead to B or increases the chances of B

    2. probability

      in certain contexts we can expect behavior but can never count on it in all instances

    3. a variety of causal chains

      follow many different "causal chains" to reach conclusions as opposed to one single cause and affect

    4. his recognition of the extreme difficulties in making entirely ex-haustive causal imputations.

      probability of human behavior doesn't come from notions of free will as much as it comes from the variety of situations and possibilities that can't always be accounted for in strict categories

    5. Weber argued, for example, that human action was truly unpredict-able only in the case of the insane,

      maybe Durkheim would differ

    1. eLife Assessment

      This technical study presents a novel sampling strategy for detecting synaptic coupling between neurons from dual pipette patch-clamp recordings in acute slices of mammalian brain tissue in vitro. The authors present solid evidence that this strategy, which incorporates automated patch clamp electrode positioning and cleaning for reuse with strategic neuron targeting, has the potential to substantially improve the efficiency of neuronal sampling with paired recordings. This technique and the extensions discussed will be useful for neuroscientists wanting to apply or already conducting automated multi-pipette patch clamp recording electrophysiology experiments in vitro for neuron connectivity analyses.

    2. Reviewer #1 (Public review):

      Summary:

      In this technical paper, the authors introduce an important variation on the fully automated multi-electrode patch-clamp recording technique for probing synaptic connections that they term "patch-walking". The patch-walking approach involves coordinated pipette route-planning and automated pipette cleaning procedures for pipette reuse to improve recording throughput efficiency, which the authors argue can theoretically yield almost twice the number of connections to be probed by paired recordings on a multi-patch electrophysiology setup for a given number of cells compared to conventional manual patch-clamping approaches used in brain slices in vitro. The authors show convincing results from recordings in mouse in vitro cortical slices, demonstrating the efficient recording of dozens of paired neurons with a dual patch pipette configuration for paired recordings and detection of synaptic connections. This approach will be of interest and valuable to neuroscientists conducting automated multi-patch in vitro electrophysiology experiments and seeking to increase efficiency of neuron connectivity detection while avoiding the more complex recording configurations (e.g., 8 pipette multi-patch recording configurations) used by several laboratories that are not readily implementable by most of the neuroscience community.

      Strengths:

      (1) The authors introduce the theory and methods and show experimental results for a fully automated electrophysiology dual patch-clamp recording approach with a coordinated patch-clamp pipette route-planning and automated pipette cleaning procedures to "patch-walk" across an in vitro brain slice.

      (2) The patch-walking approach offers throughput efficiency improvements over manual patch clamp recording approaches, especially for investigators looking to utilize paired patch electrode recordings in electrophysiology experiments in vitro.

      (3) Experimental results are presented from in vitro mouse cortical slices demonstrating the efficiency of recording dozens of paired neurons with a two-patch pipette configuration for paired recordings and detection of synaptic connections, demonstrating the feasibility and efficiency of the patch-walking approach.

      (4) The authors suggest extensions of their technique while keeping the number of recording pipettes employed and recording rig complexity low, which are important practical technical considerations for investigators wanting to avoid the more complex recording configurations (e.g., 8-10 pipette multi-patch recording configurations) used by several laboratories that are not readily implementable by most of the neuroscience community.

    3. Reviewer #2 (Public review):

      Summary:

      In this study, the authors aim to combine automated whole-cell patch clamp recording simultaneously from multiple cells. Using a 2-electrode approach, they are able to sample as many cells (and connections) from one slice, as would be achieved with a more technically demanding and materially expensive 8-electrode patch clamp system. They provide data to show that this approach is able to successfully record from 52% of attempted cells, which was able to detect 3 pairs in 71 screened neurons. The authors state that this is a step forward in our ability to record from randomly connected ensembles of neurons.

      Strengths:

      The conceptual approach of recording multiple partner cells from another in a step wise manner indeed increases the number of tested connections. An approach that is widely applicable to both automated and manual approaches. Such a method could be adopted for many connectivity studies using dual recording electrodes.

      The implementation of automated robotic whole-cell patch-clamp techniques from multiple cells simultaneously is a useful addition to the multiple techniques available to ex vivo slice electrophysiologists.

      The approach using 2 electrodes, which are washed between cells is economically favourable, as this reduces equipment costs for recording multiple cells, and limits the wastage of capillary glass that would otherwise be used once.

      Weaknesses:

      (1) Based on the revised manuscript - a discussion of the implementation of this approach to manual methods is still lacking,

      (2) A comparison of measurements shown in Figure 2 to other methods has not been addressed adequately.

      (3) The morphological identification of neurons is understandably outside the remit of this project - but should be discussed and/or addressed. It was not suggested to perform detailed anatomical analysis - but to highlight the importance of this, and it should still be discussed

      (4) The revised manuscript does not clearly state which cells were included in the analysis as far as I can see - and indeed cells with Access Resistance >40 MOhm appear to still be included in the data.

    4. Reviewer #3 (Public review):

      Summary:

      In this manuscript, Yip and colleagues incorporated the pipette cleaning technique into their existing dual-patch robotic system, "the PatcherBot", to allow sequential patching of more cells for synaptic connection detection in living brain slices. During dual-patching, instead of retracting all two electrodes after each recording attempt, the system cleaned just one of the electrodes and reused it to obtain another recording while maintaining the other. With one new patch clamp recording attempt, new connections can be probed. By placing one pipette in front of the other in this way, one can "walk" across the tissue, termed "patch-walking." This application could allow for probing additional neurons to test the connectivity using the same pipette in the same preparation.

      Strengths:

      Compared to regular dual-patch recordings, this new approach could allow for probing more possible connections in brain slices with dual-patch recordings, thus having the potential to improve the efficiency of identifying synaptic connections

      Weaknesses:

      While this new approach offers the potential to increase efficiency, it has several limitations that could curtail its widespread use.

      Loss of Morphological Information: Unlike traditional multi-patch recording, this approach likely loses all detailed morphology of each recorded neuron. This loss is significant because morphology can be crucial for cell type verification and understanding connectivity patterns by morphological cell type.

      Spatial Restrictions: The robotic system appears primarily suited to probing connections between neurons with greater spatial separation (~100µm ISD). This means it may not reliably detect connections between neurons in close proximity, a potential drawback given that the connectivity is much higher between spatially close neurons. This limitation could help explain the low connectivity rate (5%) reported in the study.

      Limited Applicability: While the approach might be valuable in specific research contexts, its overall applicability seems limited. It's important to consider scenarios where the trade-off between efficiency and specific questions that are asked.<br /> Scalability Challenges: Scaling this method beyond a two-pipette setup may be difficult. Additional pipettes would introduce significant technical and logistical complexities.

    5. Author response:

      The following is the authors’ response to the original reviews.

      We thank the reviewers and editors for insightful feedback on how we could improve the manuscript. We have revised the manuscript and addressed the points raised.

      Regarding the technical issues raised about the quality of patch clamp recordings (Reviewer 2), we acknowledge that the upper limit of the access resistance cutoff should be lower and that the accepted change should be 10-20%. To this end, we have revised the manuscript to more accurately detail the quality metrics used. The access resistance for the neurons in paired recordings were below 40 MΩ (similar to the metric used by Kolb et al. 2019), and if the access changed above 50 MΩ, we stopped recording from that neuron. Furthermore, the inclusion of neurons in the histogram with access resistance above 50 MΩ was to highlight the total number of neurons patched but not necessarily used in paired recordings. As this was done with an automated robotic system, the neurons would still undergo an initial voltage clamp and current clamp protocol before the pipette would release the neuron and patch another cell. To the point of Reviewer 2, this patch-walk protocol could also be alternatively implemented using manual recording approaches and this point has been included in the revised manuscript.

      Regarding the spatial restrictions (Reviewer 3), we agree that the average intersomatic distance is higher than ideal. This was likely due to failed patch attempts; for instance, if one pipette successfully achieved whole cell, and the other pipette had several sequential failed patch attempts, the intersomatic distance (ISD) would increase with each failed attempt due to the user selected index of cells. Ideally, the pipettes would be walking across a slice with low ISD if the whole-cell success rate was closer to 100%. To overcome this challenge in future work, automated cell identification and tracking could enable the path planning to be continuously updated after each patch attempt. Given the whole-cell success rate efficiency for a given electrophysiologist, we believe that the automated robot could be improved in later versions to include routeplanning algorithms to minimize the distance between neurons. Alternatively, this patch-walk system could also be integrated to improve connectivity yields for manual recording approaches as well.

      For the point raised about morphological identification, we believe that while important, morphological identification is out of the scope for this project. Future work will include neuronal reconstruction. Regarding the other points, we will amend the manuscript to highlight other key metrics such as maximum time we could hold a neuron under the whole-cell configuration. Additionally, we agree with Reviewer 3 that some of the current language may cause confusion, and we will amend it accordingly.

      To all the reviewers, thank you for your time, understanding, and the opportunity to improve our manuscript.

    1. nging eudaimonia to such inquiries could reveal patterns ofeffects opposite to those observed for hedonic well-being (life satisfaction) in high-stress entrepreneurial pursuits. Su

      now that's interesting (working potentially against self-interest)

    2. Relatedness is, in fact, a basic human need in self-determination theory, along with competence and autonomy –all are framed asinherently intrinsic motives.

    3. r those who did not create ventures, human capital was negatively related to post-disaster functioning.

      ...

    4. m entrepreneurswho “do well by doing good.

      !

    5. ductive and heroic en-trepreneurs (Baumol, 1990; Davidsson and Wiklund, 2001) have been characterized as leading enterprises that contribute positivelyto the economy or society. Caring about impact of the business on the well-being of others is fundamental to formulating the virtuousentrepreneur. Such thinking calls for specification of the relevant others that need to be considered. Employees within the newbusiness venture are an obvious focus, but also important are how entrepreneurs impact their own families and the communities inwhich they reside.

      broader context (calling for more specific details)

    6. hese core virtues are then supported by other specific virtues, which include courage, self-confidence,toughness, and self-reliance.

      !!

    7. inesswill not be achieved if pursued as an end in its right; rather, happiness is a by-product of other more noble deeds. In the en-trepreneurial context, these more noble deeds presumably include caring about more than one's own self-gratification and profit as the business creator.

      another opportunity for me to share a Viktor Frankl quote: "Don't aim at success ... For success, like happiness, cannot be pursued; it must ensue"

    8. Virtue, as elaborated in Aristotle's Ethics, is fundamentally tied to how one functions in the community withinwhich one is embedded, whereas vicious evokes a way of behaving toward others that brings damage and harm. It is

      handy reminder...

    9. central point in elevating these contrasts is not to moralize, but rather to draw attention to the impact of these types of leaders on theeudaimonia of others (see Ryff, 2018). Stated otherwise, in both the traditional business world and in the entrepreneurial field, it iscritical to address the how the actions, motives, and priorities of those at the top impact the well-being of those who sitting belowthem in pervasive societal hierarchies

      a moral agenda, without moralizing ... hah

    10. Pleasure can also be tied to pathological needs, such as the sadistic gratification gained from inflicting pain on others.

      this idea of "happiness gone awry" is tied more to hedonism, but a psychopath could certainly get a sense of fulfilment from inflicting pain on others.

    11. daimonic well-being has been found to buffer against age-related increments in sleep disturbances across time (P

      wow!

    12. se with higher levels ofpurpose in life have been found to engage in more protective health behaviors (cancer screenings, cholesterol tests, flu shots)

      so it's not that a healthy attitude/mindset automatically confers health benefits - it may simply mean you avail yourself more of the services that correlate with health benefits...

    13. erhaps among some necessity entrepreneurs who lack educational advantage, there are individualswho nonetheless derive notable purpose from what they do. If so, they may show similar health protective benefits as those foundabove

      still sounding awfully parochial

    14. udaimonic well-being is relevant as a buffer or moderator of entrepreneurial stress. S

      yep

    15. epreneurialpursuits truly nurture eudaimonia because self-initiated work is a core forum for realization of personal talents and potential, notablebenefits may accrue in the physical health and longevity of the entrepreneu

      interesting...

    16. trepreneurial stress, high workloads and high business risk impact the en-trepreneur's health (e.g., anxiety, doctor visits), and how the health of the entrepreneur impacts subsequent entrepreneurial action

      two mutually related concerns!

      (entrepreneurial intention begets entrepreneurial action (or not, if entrepreneurial stress intervenes), but eventual action begets such stress inevitably, which begets other health concerns, which might affect future entrepreneurial intent/action...)

    17. Experiencing high levels of well-being (eudaimonic or hedonic) does not guarantee that one is leading a good life. Sadly, humanhistory offers horrific examples of purposefully engaged individuals whose mission was to annihilate whole groups of other people.

      a sobering reminder

    18. Those with higher profiles of purpose live longer (Boyle et al., 2009; Cohen et al., 2016; Hill and Turiano, 2014), and they havereduced risk of multiple outcomes:

      !!

    19. dback loops in which self-realization and growth beget further self-realization and growth vi

      !!

    20. ly experiences of core elements of eudaimonia such ashaving sense of purpose and meaning, feelings of mastery, and a perception of continuing self-realization and growth vis-à-vis thestresses of managing a self-initiated business. These daily experiences of eudaimonia may also predict differences in who frames dailystresses as challenges or hindrances.

      eudaemonia in the everyday! Super important. We don't just feel fulfilled when accomplishing significant tasks.

      How does eudaimonic well-being manifest in your mundane experiences?

    21. indrance stressors reduced entrepreneurs daily well-being because of increased rumination, whereas challenge stressors in-creased entrepreneurs' well-being f

      fascinating observation - different kinds of stressors produce different responses...

    22. istence, commitment, and effectiveproblem solving are undoubtedly key assets, along with how stresses are construed. However, overarching levels of purpose,meaning, mastery, growth, and autonomy also likely nourish, and are nourished by, such qualities. See

      mutual constitution!

    23. Once into the entrepreneurial endeavor, when the realities of long working hours, complex demands, and uncertainties come tothe fore –the demands and stresses of running one's own business become evident –aspects of eudaimonic well-being may emerge asimportant moderators of who persists over time versus terminates the new business venture. W

      well-being (Eudaemonia) moderates continued perseverance (not just starting ventures)

      a feeling of fulfilment (sense of accomplishment across the different components of well-being) leads to other positive feelings (positive affect / happiness), which in turn leads to more effort, engagement, success, etc...

    24. or those who are better educated and economically secure, the call of entrepreneurship may emerge fromhaving higher eudaimonia well before the new business venture takes shape. That is, those with a pre-existing sense of autonomy,mastery, and purpose, may be more likely to embark on the entrepreneurial path. Al

      proposed explanation...

    25. nthe non-entrepreneurial well-being literature, however, both hedonic and eudaimonic experience are often studied as antecedents,i.e., factors that predict other outcomes (e.g., morbidity, mortality, physiological risk). In

      compared to "regular" folk...

    26. roaden-and-build theory

      Broaden and build:

      While negative emotions have been associated with survival and protection in response to a threatening situation, positive emotions have been related to the ability to explore the environment, to be open to new information, to create and build new resources. According to this theory, positive emotions broaden the scope of attention, enabling flexible thinking. This in turn facilitates the development of new skills, networks, and capacities that are essential to adaptively handle a stressful event.

      In the long-term, people who experience more positive emotions are more satisfied with their lives, build more positive relationships with partners, get better jobs, or even have better health.

    27. Controlling for past income and prior health, self-employed individuals, in fact, experienced greater stress than employees. Furtherfindings showing a positive impact of such stress on income of the self-employed, but a negative impact on their health (assessed interms of health behaviors –alcohol use, smoking, physical activity, weight gain). T

      so ... these sort of findings aren't limited to necessity entrepreneurs ...

    28. entrepreneurs with higher well-being were more likely to persist in their endeavors. Other cross-time relationships between en-trepreneurial stress and psychological outcomes have focused on negative downward spirals. That is, exhausted and dissatisfiedentrepreneurs reported their work to be more demanding, which subsequently led to further exhaustion and dissatisfaction (e.g.,

      can't discount well-being. Mental health is important for physical (and financial) health!

    29. ntrepreneurs' negative affect directly predictedentrepreneurial effort toward tasks that were required immediately, whereas positive affect predicted venture effort beyond what isimmediately required.

      interesting ... the passion part of grit...

    30. olerate higher levels of stress because they care about other factors, such as autonomy, independence and self-orche-strated working conditions

      aha! Not all stress is bad. And stress can be mitigated by one's well-being (it actually has to be).

    31. tal health and well-beingreview elevated the theme of persistence –i.e., who stays with the entrepreneurial enterprise over time. M

      link back to grit!

    32. living as a muppet likely compromises numerous aspects of eudaimonia (environmental mastery, autonomy, personal growth,purpose in life, self-acceptance, relationships with others),

      ouch!

    33. Hedonic aspects (happiness, life satisfaction) may have greater prominence among independence-oriented entrepreneurs focused onself-direction and self-sufficiency, whereas eudaimonic well-being (especially aspects of personal growth and environmental mastery)may be key outcomes for growth-oriented entrepreneurs. T

      A thought provoking distinction...

    34. elf-employment among educationally and economically disadvantaged individuals, possibly accompanied byaccumulation of debt, captures a variety of entrepreneurship driven primarily by desperation. Al

      not very encouraging. Desperation and such conditions lead to stress (often of the chronic, not the acute type). And this stress has negative implications on one's health and well-being.

    35. he extent risk-taking innovators are better educated, and possibly more optimistic, extraverted, and conscientious, it is important to know if theirentrepreneurial activities enhance their eudaimonic well-being, even after adjusting for these other factors. So d

      ...

    36. worries behind one's financial situation and job security drive the compromised life satisfaction. A

      seems kind of obvious...

    37. oth relatedness and autonomy are core motives and core components of eudaimonic well-bein

      The same way money doesn't buy happiness, autonomy doesn't mean independence. Interesting...

    38. pportunity entrepreneurs report higher family and health satisfaction than necessityentrepreneurs, but both types report equal dissatisfaction with the lack of leisure time (Bi

      !!

    39. elf-employment that allows one to avoid re-quirements imposed by a boss or large organizational requirements may enhance the sense that one is living according to personalvalues and convictions, i.e., marching to one's own drummer (autonomy). Self-expression aspects of autonomy that involves pursuingpersonal goals that are in accord with one's values, likely contributes to a sense of realizing unique talents and capacities (personalgrowth). The opportunity to be in charge of, to lead and direct daily activities likely contributes to the sense effectively managingdemands in self-created contexts (environmental mastery). R

      Exactly!

    40. Whether different types of entrepreneurs vary in their mental health and well-being is a key question in

      !

    41. urther partitioned entrepreneurial motivation into three submotives: (a) negative freedom tied to the dislike ofhaving a boss and having to work within stifling organizational rules; (b) self-expression that involves working according to one'svalues, tastes, goals; and (c) opportunity that allows one to be in charge, to lead and direct.

      useful distinction!

    42. ough providing small loans topoor people to start new businesses was hailed as a way of promoting livelihoods and reducing poverty, findings showed thatbecoming a micro-entrepreneur resulted in higher levels of worry and depression, with no effects on life satisfaction and happiness.

      Dang! So social entrepreneurship can help change folks' economic status, but not necessarily their subjective well-being! It might actually worsen it ... hmmm.... even though it increases their autonomy.

      What's your take on this?

    43. dependence in self-employment contributes to greaterhappiness than traditional employment (ir

      What's your take on this?

    44. mine the hedonic well-being of self-employment borne out of necessity, indicated by lower educational status and higher financial strain. They found lowerlevels of reported life satisfaction compared to traditional wage earners. Si

      so, less money can = more problems!

    45. e is a fundamental differencebetween conceptualizing autonomy as a core psychological need versus conceptualizing autonomy as a key feature of well-being.Both are arguably important –one captures what fuels human activity (the motivational part) and the other examine whether suchcore motives and needs are met (the well-being part). A

      ooh - key distinction.

    46. nks between entrepreneurial experiences, eudaimonic well-being, and health, bro

      4th theme

    47. ntrepreneur's eudaimonic well-being (thriving and activatedaffect) than from their hedonic well-being (life satisfaction and contentment)

      the distinction, crystallized again...

    48. impact of entrepreneurs on the eudaimonic well-being of others (employees, families, communities). The

      5th theme...

    49. a) the degree to which entrepreneurs feel purposefully engaged in what they do; (b) whether they seethemselves as growing and making best use of their talents and potential over time; (c) the quality of their ties to others, includingemployees and collaborators; (d) the sense that they are effective in managing their surrounding environments; (e) the degree towhich they show knowledge and acceptance of their own strengths and weaknesses; and, of course, (f) the degree to which they viewthemselves as self-determined and independent. T

      5 key concerns...

    50. eudaimonic well-being of different types of entrepreneurs, focused on the distinction between necessity versus opportunity entrepreneurs. Th

      2nd theme

    51. how and where eudaimonia might matter at different points in the entrepreneurial process, from initial pursuits to longer-term endeavors.

      3rd theme

    52. he first examines the link between entrepreneurship and autonomy, w

      Autonomy = BOTHJ motive and an aspect of well-being. Interesting!

    53. eudaimonic well-being is modifiable can be promoted

      like EQ ... and a growth mindset...

    54. eudaimonic well-being and health.

      if you're happier, and functioning well, you're likely to be healthier too...

    55. amily roles and experiences to well-being

      ...

    56. n interesting and unexplored question is whether entrepreneurial activities inmid- and later-life might help offset these declines –that is, contribute to maintenance of purposeful engagement and continuingpersonal growth in later adulthood.

      food for thought...

    57. ull understanding of the well-beingof entrepreneurs demands knowledge of their family lives.

      ...

    58. he big five model of traits have been linked to the abovedimensions with numerous findings (openness is linked with personal growth, agreeableness with positive relations with others, andextraversion, conscientiousness, and neuroticism with environmental mastery, purpose in life, and self-acceptance) (Sc

      wow - awesome link to previous weeks' material...

    59. se who are married have a well-beingadvantage compared to the divorced, widowed, or never married, but single women score higher on autonomy and personal growthcompared to married women. Parenting seems to enhance well-being, particularly when children are flourishing

      ok...

    60. Self-acceptance brings a potentially neglected aspect of entrepreneurial well-being. It encompasses having positive attitudestoward oneself, but drawing on the Jungian idea of the shadow, also includes the capacity to see one's bad qualities. Thi

      self-acceptance!

    61. How eudaimonic well-being changes with age

      ??

    62. work life and eudaimonic well-being

      ...

    63. capacityto find meaning in the face of adversity,

      So many good Frankl quotes!

    64. plied to the entrepreneurial context, self-acceptance may be a critical asset, such that effective problem-solving and negotiating through unfolding challenges would seem todemand honest reckoning with one's self. A

      honesty is the best policy (especially with oneself!) As it can prevent you from getting in over your head...

    65. without goals, purposes, and meaning, including during periods ofchallenge and difficulty, it is difficult to fathom an entrepreneur who is experiencing genuine well-being. In

      (this is related to the question I asked at the end of our last class -- do you envy people who lead an easy life? Where do they find meaning?)

    66. Purpose in life is the existential core of eudaimonic well-being, with its emphasis on viewing one's life has having meaning,direction, and goals. These qualities comprise a kind of intentionality that involves having aims and objectives for living. Life

      Purpose in life!

    67. Positive relations with others is the most universally endorsed aspect of what it means to be well. This dimension encompasseshaving warm, trusting ties to others, being concerned about the welfare of others, understanding the give and take of social re-lationships, and having the capacity for empathy and affection.

      positive relations!

    68. Personal growth is concerned with self-realization and achievement of personal potential and thus is closest in content toAristotle's ideas about eudaimonia.

      Personal growth!

    69. Autonomy, emphasizes thatone is self-determining and independent as well as able to evaluate oneself by personal standards, and if need be, to resist socialpressures to think or act in certain ways. T

      AUTONOMY

    70. What relevance, if any, do these eudaimonic components of well-being have for studies of entrepreneurship? Pr

      a most useful question...

    71. an fulfillment

      human fulfillment doesn't mean one is a fully functioning human...

      (Makes me think of teleology and acorns...)

    72. Environmental mastery emphasizes the sense that one can manage the surrounding environment, including making effective useof available opportunities, while also creating contexts suitable to one's personal needs and values. Th

      Environmental mastery (tied to social settings and social skills in emotional intelligence...)

    73. igning views of subjective well-being at the time that revolved around assessmentsof happiness, life satisfaction, and positive and negative affect

      (mostly) the focus of the other article this week...

    74. The answer for him was eudaimonia, which he described as activity of the soul in accord with virtue. The key task in lifeis to know and live in truth with one's daimon, a kind of spirit given to all persons at birth. Eu

      getting very philosophical here (but context is good)

    75. two great imperatives of self-truth (knowthyself) and striving toward excellence consistent with one's given potentialities (become what you are). These ideas deepened thephilosophical significance of eudaimonic well-being

      which one is more important? Can you say this? Can one become what one is and live up to one's true potential without knowing oneself? Hmmmmm......

    76. of personalexcellence built on striving to realize one's true and best nature. It

      I love how this definition is prefaced with "kind of"

    77. The second venue addresses varieties of entrepreneurship, with a focus on the distinction between opportunity and ne-cessity entrepreneurs.

      all righty then...

    78. The first section thus examines the conceptual and philo-sophical foundations of a widely-used model of eudaimonic well-being built on the integration of perspectives from clinical, de-velopmental, existential and humanistic psychology, along with distant observations from Aristotle. These differing views convergedin their emphasis on six distinct aspects of what it means to be fully functioning and well.

      telling us what is to follow...

    79. he fifth topic attends to how entrepreneurs impact theeudaimonic well-being of others (employees, families, communities). T

      !!

    80. Eudaimonicformulations, in contrast, emphasize multiple facets of well-being such as purposeful engagement, realization of personal potential,autonomy, mastery, quality ties to others, and self-acceptance.

      Completely different focus! Well, not "completely" distinct, but shifting focus away from happiness that comes from achieving things to happiness from achieving purpose ...

    81. Hedonic formulations emphasizepositive life evaluations, such as life satisfaction and positive feeling states, such as happiness and positive affect

      hedonism - often associated with the pursuit of pleasure.

      This article doesn't focus on it a lot (since it emphasizes the other main aspect of well-being), but I'd like to just highlight the connection between hedonism and happiness a little bit here by emphasizing the concept of the "hedonic treadmill".

      The hedonic treadmill is a metaphor for the human tendency to pursue one pleasure after another. That's because the surge of happiness that's felt after a positive event is likely to return to a steady personal baseline over time.

      So, it looks like this:

      This is why I was so interested in the discussion we had at the end of the last class (which we'll continue this week) about money and happiness. Mo money, mo problems. We desire more riches, but we're never satisfied ...

      Which is one of the reasons we need to look beyond hedonic well-being and explore eudaimonic well-being!

    82. ive key venues for theentrepreneurial field are then considered: (1) entrepreneurship and autonomy, viewed both as amotive (self-determination theory) and as an aspect of well-being (eudaimonic well-beingtheory); (2) varieties of entrepreneurship (opportunity versus necessity) and eudaimonic well-being; (3) eudaimonia in the entrepreneurial journey (beginning, middle, end); (4) en-trepreneurship, well-being and health; and (5) entrepreneurs and the eudaimonia of others –contrasting virtuous and vicious types.

      so, this is going to cover a lot of ground!

    83. urposeful striving and personal growth are demanding, if not stressfulapproaches to living that may not always be conducive to feelings of happiness and contentment.

      as we know, trying to find our purpose or constantly "develop"/optimize/life-hack/actualize/etc, isn't always a recipe for happiness (or even "success")

    84. Approaches to well-being tend to be partitioned into hedonic and eudaimonicformulations.

      ok - we were already introduced to this distinction in the last article - we're going to get into it more here!

    85. Most entrepreneurial studies have focused on hedonic indicators (life satisfaction,happiness, positive affect).

      ok - so we're not going to do that here...

    86. Researchers in entrepreneurial studies are increasingly interested in the psychological well-beingof entrepreneurs.

      ok - we are familiar with this rhetorical contextextualizing... (it's the last half of our whole course)

    87. e “dark side”of prosocial moti-vation, which may be good for society, but bad for the well-being of the entrepreneur. Im

      oof

    88. orking from a holistic conception of human flourishing that includes social aswell as economic benefits, they distilled three overarching virtues of the excellent/virtuous entrepreneur. These include creativity,beneficence, and integrity.

      !

    89. he well-being literature, new findingslinking subjectively reported hedonia and eudaimonia to objectively measured biomarkers (Bo

      huh

    90. A first observation is that well-being in extant studies is studied primarily as anoutcome (consequent) of the business venture,

      curious - given the next statement...

    91. Entrepreneurial activity, by definition, is self-initiated and hence is fundamentally tied to ideas of autonomy and independence.

      makes sense - entrepreneurs value independent thinking...

    92. Fig. 1. Key dimensions of well-being and underlying theo

      a fabulously evocative image.

    93. at it means to be mentally healthy,psychosocially developed, purposefully engaged, self-actualized, fully functioning, and mature. No

      background...

    94. e vicious entrepreneur is also considered. B

      love it -- one can't ignore self-interest!

    95. ey distinction is made between ofautonomy postulated as a core need or motive i

      interesting...

    96. key aspects of eudaimonic well-being (e.g., realization of personal potential, purposeful life en-gagement, effective management of complex environments) have received little attention eventhough they may be particularly relevant to entrepreneurial pursuits.

      narrowing the focus...

    97. The third venue focuses the unfolding of the entrepreneurial process in time –how it progresses from early stages to longer-term enterprises, at least for some.

      ok

    98. e fourth venue calls for greater research on thehealth, broadly defined, of entrepreneurs via their experiences of well-being.

      !

    99. tuous entrepreneurship. H

      aha - morality again (but distinct from that of social entrepreneurs) ...

    100. The central objective of this essay is to examine the relevance ofeudaimonic well-being for understanding entrepreneurial experience. T

      let's take the road less travelled!

    1. Drátěnou košili v pračce nevypereš, aneb současná doba si nedokáže vážit statečných rytířů.Stačilo se jen omylem napít lektvaru namíchaného nepřátelským kouzelníkem a rázem se rytíř Godefroy a jeho sluha Jacquouille (již podle tohoto jména poznají Francouzi, že se jedná o zcela neurozeného člověka) ocitli ve 20. století. Samozřejmě, jak už to ve Francii bývá, našli své potomky, i když zrovna ne na takové úrovni, jakou by si představovali. Šlechta, potomci statečných rytířů, zchudla a v jejím zámku se naopak usídlil potomek vykutálených sluhů, který si jen změnil jméno z posměšného Jacquouille na důstojnějšího Jacquarta. Samozřejmě, že se pán i jeho sluha nejdříve ocitnou v blázinci, ale šlechtická krev se nezapře a Beatrice, jako přímý potomek rytíře Godefroy de Montmirail, se o svého předka postará... Režiséra Jean-Marie Poirého známe především díky jeho vynikající komedii Operace Corned Beef, kde se také objevila trojice komiků, kteří ve Francii patří ke špičce v tomto žánru: Jean Reno, Christian Clavier a herečka s neobyčejným komediálním talentem Valérie Lemercier. V Návštěvnících si je navíc užijeme v dvojrolích předků a potomků.
    1. Tenhle oceněný animovaný film vypráví o dobrodružství, mladé lásce a vzpomínkách z dětství. Paříží se zatím pohybuje ruka oddělená od těla a hledá svého majitele.
    1. 16letý Yuuta je zatížen monstrózním prokletím. Jeho situace přitahuje pozornost kouzelníka Goja Satoru. Ten v Yuutovi vidí obrovský potenciál a doufá, že mu pomůže přeměnit jeho smrtící břemeno v prospěšnou sílu. Ovšem Yuuta upoutal i pozornost kouzelníka Geta Suguru, jenž v jeho síle vidí možnost genocidy.
    1. Báje o princezně Kaguje představuje jednu z nejzásadnějších literárních klasik japonské kultury. Pojednává o nebeské princezně, kterou v podobě maličké holčičky najde starý sběrač bambusu uvnitř zářícího stonku. Spolu se svou ženou ji vychová jako vlastní dceru. Rychle rostoucí dívka dospěje do krásy, ale z bezstarostných radostí dětství ji vytrhne otcova ambice zajistit jí dokonalý život a udělat z ní dvorní dámu. Její srdce, spoutané povinnostmi a snahou dostát očekáváním, ale touží po něčem zcela jiném. Spoluzakladatel studia Ghibli Isao Takahata vytvořil srdcebolnou oslavu nádhery i stesku života.
    1. Film sleduje cestu hlavní postavy Bilbo Pytlíka, který se ocitne na dobrodružné výpravě. Cílem cesty je si znovu nárokovat ztracené trpasličí království Erebor. Bilba nečekaně osloví čaroděj Gandalf Šedý, díky kterému se ocitne ve společnosti třinácti trpaslíků v čele s legendárním bojovníkem Thorinem. Cesta do divočiny vede přes tajemné země, kde se to hemží zlobry, skřety a kouzelníky. Ačkoliv cíl jejich výpravy - Osamělá hora, leží na Východě, musí projít nejdříve jeskynním systémem, kde Bilbo potká někoho, kdo mu navždy změní život…Gluma. Skromný Bilbo Pytlík pak sám s Glumem na břehu podzemního jezera objeví nejen hloubku lstivosti a odvahy, která překvapí i jeho samotného, ale také získá do svého vlastnictví Glumův prsten „miláška“, který má nečekané a užitečné možnosti... Jednoduchý zlatý prsten je spojen s osudem celé Středozemě takovým způsobem, jaký Bilbo nemůže zatím ani tušit. (oficiální text distributora)
    1. Již od pradávných časů si lidé vypráví legendy o strašlivých démonech, kteří se ukrývají v lesích a v noci napadají lidská obydlí, zabíjejí jejich obyvatele a živí se jejich krví a masem. Démoni běžné lidi děsí, protože běžné rány se démonovi hned zacelí a jsou schopni nechat si v mžiku narůst třeba i useknutou končetinu. V těchto legendách se však objevují i zabijáci démonů - zkušení válečníci, kteří znají způsoby, jak démony efektivně zabít. Pro mladého chlapce jménem Tanjirou se tyto legendy velice brzy stanou trpkou skutečností...Již od smrti svého otce se mladý Tanjirou zaměřil vší silou na pomoc své početné rodině. Přestože jejich životy byly poznamenány touto tragédií, společně dokázali najít Tanjirou a jeho rodina trochu toho štěstí. Tento klidný domov je však roztříštěn jednoho dne, když Tanjirou najde většinu své rodiny povražděnou a jediná, kdo přežila, jeho sestra Nezuko, je proměněná v démona. Je však s podivem, že Nezuko i přes svůj stav stále projevuje známky příčetnosti a lidských emocí...Díky těmto událostem a jednomu nečekanému setkání si Tanjiro stanovil velmi těžký cíl - stát se zabijákem démonů a zjistit od nich, jak přeměnit svoji sestru zpět na člověka.

      .

    1. meaning was not just about satisfy-ing human appetites, but about doing virtuous things such that we “achieve thebest that is within us”

      certainly linked to Csikszentmihalyi's view on happiness!

    2. Stretching entrepreneurs’skills and abilities through flow experiences enhance their resilience andtenacity

      ooh! I really like this link to the previous week on perseverance and grit...

    3. In addition to creat-ing a life in which they are happy and feel successful, it appears that it isimportant for them to find work that is also meaningful and purposeful whichfulfills their inner life.

      meaningful and purposeful work can also help constitute a happy and successful life (!)

    4. rincipal axis factors(PAF) analysis

      unless you're into stats and quantitative measurement, you can skip over these details ... but the social significance rather than the statistical significance of their findings is still trenchant!

    5. Entrepreneurs need internal psycho-logical resources such as intrinsic definition of success and a spiritual practiceto weather the myriad of external storms

      like the lingo!

    6. rom this eudaimonicperspective, people are looking for what makes life fulfilling and meaningful.

      all right -- leading us into the next article!

    7. The fact that the business provides a source of flow experiences isimportant for entrepreneurs’well-being. Flow is a central construct withinpositive psychology that entrepreneurs can borrow and use to their advantage.

      generally accepted as entrepreneurs are assumed to get more meaning and purpose from their work than folk who work for someone/thing else other than themselves...

    8. ubjective well-being was significantlyand positively linked to intrinsic definitions of success while the more extrin-sic/material-driven definitions of success were significantly but negativelylinked to subjective well-being.

      yep

    9. intrinsic and extrinsic definitions of success such as: money,social recognition, financial security, power, buying power, engagement, doingwhat they love to do, meaning in my life, and purpose in my life

      9 factors to measure what matters ...

    10. entrepreneurs who based their definition ofsuccess on intrinsic factors did experience more well-being than entrepreneurswho based their definition of success on extrinsic-driven factors. In fact, theirwell-being was reduced or declined as their extrinsically driven factorsincreased.

      double yep

    11. hepopular media can often portray entrepreneurs to be motivated by more extrin-sic factors such as money or power. However, recent research has found thatentrepreneurs who find meaning in their work are often intrinsically motivated

      interesting

    12. Entrepreneurs who work in productive organizations,who get intrinsic spiritual fulfillment from having a job that gives meaning andpurpose to their life, and those who experience flow have a greater sense ofwell-being. Entrepreneurs who have these same factors but define their measureof success in terms of extrinsic factors such as making money and achievingsocial recognition for their achievements exhibited less well-being

      operationalizing flow, or success, or productivity is difficult enough -- but operationalizing subjective well-being ... sheesh! I think, for our purposes, it's best to interrogate all of these things and not pinpoint them or measure them but assess how they function within a mix of variables to try and reflect on our own intersection with these concepts. We're not trying to "hack" happiness here, but a bit more accurately map its coordinates so that we can find ourselves there when our internal GPS might be going a little funky...

    13. Subjective well-being questions were asked using the Satisfaction with LifeScale
      • check it out in the quiz section this week...
    14. he original nineflow factors: challenge-skill balance, action-awareness merging, clear goals,unambiguous feedback, concentration, sense of control, loss of self-conscious-ness, time transformation, and autotelic experience

      ok! -- there are a number of different tests to capture your capacity for "flow" states...

    15. “In my business everyone gives his/her best efforts”; “In my business workquality is a high priority for all workers”; “I am able to apply my full capabil-ity in my business”, and “My business is very efficient in getting maximumoutput from the resources we have available (e.g. money, people, equipment,etc.)”

      wow! When listed in this way, it seems as though most workplaces or types of work might not encourage group productivity. How many of these apply to your work?

    16. The ability for finding meaning at work has been found to be a dominantfactor in the conceptualization and measure of intrinsic success and spiritualityresearch

      *

    17. ntrepreneurshipmotivation appears to link to the basis of rewards, which are either driven byextrinsic measures of success (money, social recognition, financial security,power, or buying power) or on intrinsic measures (such as personal fulfillment,doing something I love, finding meaning and purpose in their lives).

      **

    18. Entrepreneurs who have an elevated intrinsic definition of success will havegreater subjective well-being than those with elevated extrinsic definition ofsuccess

      so, meaning matters more than money when it comes to motivation...

    19. ersonal causesand callings are examples of intrinsic or meaningful objectives. The respon-dents’definition of success included making a difference, creating lastingimpact, and being engaged in a life of personal fulfillment

      making a difference (for others...) or making a difference for oneself (being personally fulfilled)...

      summing up perceptions of success

    20. “spiritual goals that energize

      ooh - a link to next week...

    21. ntrepreneurs whoare doing work they love and who see their work as giving meaning and pur-pose to their lives, and helping others, were more likely to experience personalgrowth and joy

      makes sense!

    22. The job of leadership today is not just to make money, it’s to make meaning

      not as far as the marketplace is concerned...

    23. “entrepreneurs who practice religious andspiritual values regularly see a significant influence on their happiness, health,joy, productivity, and coping skills”

      meaning matters, wherever you find it...

    24. r when they have sufficientresources in their work such as support from colleagues and adequate funds ormaterial

      ok...

    25. employees have been found to experience flow when job demands match theirskills

      ok

    26. wealth, fame, and power were notthe goals or accomplishments that respondents felt were important for success.Money and recognition were only byproducts of work; they are incidental“outcomes of passionately working often on an entirely different objective thatis often a personal cause or calling”

      profits and power are important, but are byproducts of passion (!)

    27. An individual’s well-being is considered a potential source of productivity.On the other hand, an individual’s personal life can be a source of reducedfunctioning.

      hmmm

    28. Flow is interesting in a work context because findings indicate that themore individuals experience flow, the more they report control and greatersense of enjoyment in the activity

      *

    29. Since uncertainty is central to the entrepreneurialenvironment, it is unclear if the well-being and flow linkage found in otherwork situations extends to entrepreneurial environments.

      the testable proposition...

    30. orkers experienced moreflow at work than in leisure.

      yowza!

    31. Descriptions of flow commonly include three elements: absorption orimmersion in an activity, enjoyment, and intrinsic motivation

      ok!

    32. nce flow isachieved, the attributes are (1) intense focus on the activity at hand and (2)time is perceived to move differently, either more slowly or quickly. The per-son experiences (3) a sense of control and (4) a loss of self-consciousness.There is (5) a merging of action and awareness, that is, the next move is evi-dent. Flow is experienced when (6) challenges and skills are balanced and theperceived challenges of the activity are at or very slightly above the person’sskill level. Usually (7) the experience is rewarding

      can you relate this to your own experiences?

      remember what I said in my note about happiness and flow in the seminar prompt in week 7 (creative/cultural entrepreneurs)