1. Oct 2024
    1. Researchers in entrepreneurial studies are increasingly interested in the psychological well-beingof entrepreneurs.

      ok - we are familiar with this rhetorical contextextualizing... (it's the last half of our whole course)

    2. e “dark side”of prosocial moti-vation, which may be good for society, but bad for the well-being of the entrepreneur. Im

      oof

    3. orking from a holistic conception of human flourishing that includes social aswell as economic benefits, they distilled three overarching virtues of the excellent/virtuous entrepreneur. These include creativity,beneficence, and integrity.

      !

    4. he well-being literature, new findingslinking subjectively reported hedonia and eudaimonia to objectively measured biomarkers (Bo

      huh

    5. A first observation is that well-being in extant studies is studied primarily as anoutcome (consequent) of the business venture,

      curious - given the next statement...

    6. Entrepreneurial activity, by definition, is self-initiated and hence is fundamentally tied to ideas of autonomy and independence.

      makes sense - entrepreneurs value independent thinking...

    7. Fig. 1. Key dimensions of well-being and underlying theo

      a fabulously evocative image.

    8. at it means to be mentally healthy,psychosocially developed, purposefully engaged, self-actualized, fully functioning, and mature. No

      background...

    9. e vicious entrepreneur is also considered. B

      love it -- one can't ignore self-interest!

    10. ey distinction is made between ofautonomy postulated as a core need or motive i

      interesting...

    11. key aspects of eudaimonic well-being (e.g., realization of personal potential, purposeful life en-gagement, effective management of complex environments) have received little attention eventhough they may be particularly relevant to entrepreneurial pursuits.

      narrowing the focus...

    12. The third venue focuses the unfolding of the entrepreneurial process in time –how it progresses from early stages to longer-term enterprises, at least for some.

      ok

    13. e fourth venue calls for greater research on thehealth, broadly defined, of entrepreneurs via their experiences of well-being.

      !

    14. tuous entrepreneurship. H

      aha - morality again (but distinct from that of social entrepreneurs) ...

    15. The central objective of this essay is to examine the relevance ofeudaimonic well-being for understanding entrepreneurial experience. T

      let's take the road less travelled!

    1. probability

      in certain contexts we can expect behavior but can never count on it in all instances

    2. a variety of causal chains

      follow many different "causal chains" to reach conclusions as opposed to one single cause and affect

    3. his recognition of the extreme difficulties in making entirely ex-haustive causal imputations.

      probability of human behavior doesn't come from notions of free will as much as it comes from the variety of situations and possibilities that can't always be accounted for in strict categories

    4. Weber argued, for example, that human action was truly unpredict-able only in the case of the insane,

      maybe Durkheim would differ

    5. We shall then be in a position to determine empiricallywhether the concrete conduct of Protestants in, say, seventeenth-century Eng-land did in fact approximate the type and in what specific aspects it failedto do so

      Did the actions of Protestants via 17th-England correlate with the ideal type of Protestant?

    6. An ideal type never corresponds to concretereality but always moves at least one step away from it. It is constructed outof certain elements of reality and forms a logically

      ideal type- the social construction of what something should be??

    7. Thenotion of the ideal type was meant to provide escape from this dilemma

      believes in necessity of generalizations and concepts but wary of over encompassing categories that try to explain literally everything. Additionally, wary of too narrow a focus of a case or a situation.

    1. Drátěnou košili v pračce nevypereš, aneb současná doba si nedokáže vážit statečných rytířů.Stačilo se jen omylem napít lektvaru namíchaného nepřátelským kouzelníkem a rázem se rytíř Godefroy a jeho sluha Jacquouille (již podle tohoto jména poznají Francouzi, že se jedná o zcela neurozeného člověka) ocitli ve 20. století. Samozřejmě, jak už to ve Francii bývá, našli své potomky, i když zrovna ne na takové úrovni, jakou by si představovali. Šlechta, potomci statečných rytířů, zchudla a v jejím zámku se naopak usídlil potomek vykutálených sluhů, který si jen změnil jméno z posměšného Jacquouille na důstojnějšího Jacquarta. Samozřejmě, že se pán i jeho sluha nejdříve ocitnou v blázinci, ale šlechtická krev se nezapře a Beatrice, jako přímý potomek rytíře Godefroy de Montmirail, se o svého předka postará... Režiséra Jean-Marie Poirého známe především díky jeho vynikající komedii Operace Corned Beef, kde se také objevila trojice komiků, kteří ve Francii patří ke špičce v tomto žánru: Jean Reno, Christian Clavier a herečka s neobyčejným komediálním talentem Valérie Lemercier. V Návštěvnících si je navíc užijeme v dvojrolích předků a potomků.
    1. Tenhle oceněný animovaný film vypráví o dobrodružství, mladé lásce a vzpomínkách z dětství. Paříží se zatím pohybuje ruka oddělená od těla a hledá svého majitele.
    1. 16letý Yuuta je zatížen monstrózním prokletím. Jeho situace přitahuje pozornost kouzelníka Goja Satoru. Ten v Yuutovi vidí obrovský potenciál a doufá, že mu pomůže přeměnit jeho smrtící břemeno v prospěšnou sílu. Ovšem Yuuta upoutal i pozornost kouzelníka Geta Suguru, jenž v jeho síle vidí možnost genocidy.
    1. Báje o princezně Kaguje představuje jednu z nejzásadnějších literárních klasik japonské kultury. Pojednává o nebeské princezně, kterou v podobě maličké holčičky najde starý sběrač bambusu uvnitř zářícího stonku. Spolu se svou ženou ji vychová jako vlastní dceru. Rychle rostoucí dívka dospěje do krásy, ale z bezstarostných radostí dětství ji vytrhne otcova ambice zajistit jí dokonalý život a udělat z ní dvorní dámu. Její srdce, spoutané povinnostmi a snahou dostát očekáváním, ale touží po něčem zcela jiném. Spoluzakladatel studia Ghibli Isao Takahata vytvořil srdcebolnou oslavu nádhery i stesku života.
    1. Film sleduje cestu hlavní postavy Bilbo Pytlíka, který se ocitne na dobrodružné výpravě. Cílem cesty je si znovu nárokovat ztracené trpasličí království Erebor. Bilba nečekaně osloví čaroděj Gandalf Šedý, díky kterému se ocitne ve společnosti třinácti trpaslíků v čele s legendárním bojovníkem Thorinem. Cesta do divočiny vede přes tajemné země, kde se to hemží zlobry, skřety a kouzelníky. Ačkoliv cíl jejich výpravy - Osamělá hora, leží na Východě, musí projít nejdříve jeskynním systémem, kde Bilbo potká někoho, kdo mu navždy změní život…Gluma. Skromný Bilbo Pytlík pak sám s Glumem na břehu podzemního jezera objeví nejen hloubku lstivosti a odvahy, která překvapí i jeho samotného, ale také získá do svého vlastnictví Glumův prsten „miláška“, který má nečekané a užitečné možnosti... Jednoduchý zlatý prsten je spojen s osudem celé Středozemě takovým způsobem, jaký Bilbo nemůže zatím ani tušit. (oficiální text distributora)
    1. Již od pradávných časů si lidé vypráví legendy o strašlivých démonech, kteří se ukrývají v lesích a v noci napadají lidská obydlí, zabíjejí jejich obyvatele a živí se jejich krví a masem. Démoni běžné lidi děsí, protože běžné rány se démonovi hned zacelí a jsou schopni nechat si v mžiku narůst třeba i useknutou končetinu. V těchto legendách se však objevují i zabijáci démonů - zkušení válečníci, kteří znají způsoby, jak démony efektivně zabít. Pro mladého chlapce jménem Tanjirou se tyto legendy velice brzy stanou trpkou skutečností...Již od smrti svého otce se mladý Tanjirou zaměřil vší silou na pomoc své početné rodině. Přestože jejich životy byly poznamenány touto tragédií, společně dokázali najít Tanjirou a jeho rodina trochu toho štěstí. Tento klidný domov je však roztříštěn jednoho dne, když Tanjirou najde většinu své rodiny povražděnou a jediná, kdo přežila, jeho sestra Nezuko, je proměněná v démona. Je však s podivem, že Nezuko i přes svůj stav stále projevuje známky příčetnosti a lidských emocí...Díky těmto událostem a jednomu nečekanému setkání si Tanjiro stanovil velmi těžký cíl - stát se zabijákem démonů a zjistit od nich, jak přeměnit svoji sestru zpět na člověka.

      .

    1. meaning was not just about satisfy-ing human appetites, but about doing virtuous things such that we “achieve thebest that is within us”

      certainly linked to Csikszentmihalyi's view on happiness!

    2. Stretching entrepreneurs’skills and abilities through flow experiences enhance their resilience andtenacity

      ooh! I really like this link to the previous week on perseverance and grit...

    3. In addition to creat-ing a life in which they are happy and feel successful, it appears that it isimportant for them to find work that is also meaningful and purposeful whichfulfills their inner life.

      meaningful and purposeful work can also help constitute a happy and successful life (!)

    4. rincipal axis factors(PAF) analysis

      unless you're into stats and quantitative measurement, you can skip over these details ... but the social significance rather than the statistical significance of their findings is still trenchant!

    5. Entrepreneurs need internal psycho-logical resources such as intrinsic definition of success and a spiritual practiceto weather the myriad of external storms

      like the lingo!

    6. rom this eudaimonicperspective, people are looking for what makes life fulfilling and meaningful.

      all right -- leading us into the next article!

    7. The fact that the business provides a source of flow experiences isimportant for entrepreneurs’well-being. Flow is a central construct withinpositive psychology that entrepreneurs can borrow and use to their advantage.

      generally accepted as entrepreneurs are assumed to get more meaning and purpose from their work than folk who work for someone/thing else other than themselves...

    8. ubjective well-being was significantlyand positively linked to intrinsic definitions of success while the more extrin-sic/material-driven definitions of success were significantly but negativelylinked to subjective well-being.

      yep

    9. intrinsic and extrinsic definitions of success such as: money,social recognition, financial security, power, buying power, engagement, doingwhat they love to do, meaning in my life, and purpose in my life

      9 factors to measure what matters ...

    10. entrepreneurs who based their definition ofsuccess on intrinsic factors did experience more well-being than entrepreneurswho based their definition of success on extrinsic-driven factors. In fact, theirwell-being was reduced or declined as their extrinsically driven factorsincreased.

      double yep

    11. hepopular media can often portray entrepreneurs to be motivated by more extrin-sic factors such as money or power. However, recent research has found thatentrepreneurs who find meaning in their work are often intrinsically motivated

      interesting

    12. Entrepreneurs who work in productive organizations,who get intrinsic spiritual fulfillment from having a job that gives meaning andpurpose to their life, and those who experience flow have a greater sense ofwell-being. Entrepreneurs who have these same factors but define their measureof success in terms of extrinsic factors such as making money and achievingsocial recognition for their achievements exhibited less well-being

      operationalizing flow, or success, or productivity is difficult enough -- but operationalizing subjective well-being ... sheesh! I think, for our purposes, it's best to interrogate all of these things and not pinpoint them or measure them but assess how they function within a mix of variables to try and reflect on our own intersection with these concepts. We're not trying to "hack" happiness here, but a bit more accurately map its coordinates so that we can find ourselves there when our internal GPS might be going a little funky...

    13. Subjective well-being questions were asked using the Satisfaction with LifeScale
      • check it out in the quiz section this week...
    14. he original nineflow factors: challenge-skill balance, action-awareness merging, clear goals,unambiguous feedback, concentration, sense of control, loss of self-conscious-ness, time transformation, and autotelic experience

      ok! -- there are a number of different tests to capture your capacity for "flow" states...

    15. “In my business everyone gives his/her best efforts”; “In my business workquality is a high priority for all workers”; “I am able to apply my full capabil-ity in my business”, and “My business is very efficient in getting maximumoutput from the resources we have available (e.g. money, people, equipment,etc.)”

      wow! When listed in this way, it seems as though most workplaces or types of work might not encourage group productivity. How many of these apply to your work?

    16. The ability for finding meaning at work has been found to be a dominantfactor in the conceptualization and measure of intrinsic success and spiritualityresearch

      *

    17. ntrepreneurshipmotivation appears to link to the basis of rewards, which are either driven byextrinsic measures of success (money, social recognition, financial security,power, or buying power) or on intrinsic measures (such as personal fulfillment,doing something I love, finding meaning and purpose in their lives).

      **

    18. Entrepreneurs who have an elevated intrinsic definition of success will havegreater subjective well-being than those with elevated extrinsic definition ofsuccess

      so, meaning matters more than money when it comes to motivation...

    19. ersonal causesand callings are examples of intrinsic or meaningful objectives. The respon-dents’definition of success included making a difference, creating lastingimpact, and being engaged in a life of personal fulfillment

      making a difference (for others...) or making a difference for oneself (being personally fulfilled)...

      summing up perceptions of success

    20. “spiritual goals that energize

      ooh - a link to next week...

    21. ntrepreneurs whoare doing work they love and who see their work as giving meaning and pur-pose to their lives, and helping others, were more likely to experience personalgrowth and joy

      makes sense!

    22. The job of leadership today is not just to make money, it’s to make meaning

      not as far as the marketplace is concerned...

    23. “entrepreneurs who practice religious andspiritual values regularly see a significant influence on their happiness, health,joy, productivity, and coping skills”

      meaning matters, wherever you find it...

    24. r when they have sufficientresources in their work such as support from colleagues and adequate funds ormaterial

      ok...

    25. employees have been found to experience flow when job demands match theirskills

      ok

    26. wealth, fame, and power were notthe goals or accomplishments that respondents felt were important for success.Money and recognition were only byproducts of work; they are incidental“outcomes of passionately working often on an entirely different objective thatis often a personal cause or calling”

      profits and power are important, but are byproducts of passion (!)

    27. An individual’s well-being is considered a potential source of productivity.On the other hand, an individual’s personal life can be a source of reducedfunctioning.

      hmmm

    28. Flow is interesting in a work context because findings indicate that themore individuals experience flow, the more they report control and greatersense of enjoyment in the activity

      *

    29. Since uncertainty is central to the entrepreneurialenvironment, it is unclear if the well-being and flow linkage found in otherwork situations extends to entrepreneurial environments.

      the testable proposition...

    30. orkers experienced moreflow at work than in leisure.

      yowza!

    31. Descriptions of flow commonly include three elements: absorption orimmersion in an activity, enjoyment, and intrinsic motivation

      ok!

    32. nce flow isachieved, the attributes are (1) intense focus on the activity at hand and (2)time is perceived to move differently, either more slowly or quickly. The per-son experiences (3) a sense of control and (4) a loss of self-consciousness.There is (5) a merging of action and awareness, that is, the next move is evi-dent. Flow is experienced when (6) challenges and skills are balanced and theperceived challenges of the activity are at or very slightly above the person’sskill level. Usually (7) the experience is rewarding

      can you relate this to your own experiences?

      remember what I said in my note about happiness and flow in the seminar prompt in week 7 (creative/cultural entrepreneurs)

    33. real happiness lay in the prospect of finding work thatprovided close social relationships, meaning and purpose, pursuit of personalgoals, and being involved in flow activities

      sounds sensible enough (even if slightly utopian, moreso than ever in situations of precocity and neoliberal capitalist accumulation)

    34. none of theseare assured in an entrepreneurial environment.

      leading to the key insight...

    35. the processof creating art consumed his research subjects and compelled them to losetrack of time, forget to eat, and focus completely on the work. Artistsdescribed being consumed in the process as in the “flow”of it.

      !!

    36. These same factors are related to the intrinsic motivators oftenemployed in entrepreneurial perspectives

      ooh! a key answer for one of the questions I asked as a seminar prompt in week 7 (about the propensity for people to feel intrinsically motivated to act/achieve goals....)

    37. Since work is a major factor inpeople’s lives –it takes up as much as a half of an adult’s waking life –whatgoes on at work is a major factor in understanding what gives individuals asense of meaning and fulfillment

      sad but true (and one of the reasons why entrepreneurial ventures are filled with such hope (because of all those times that one's mundane work life isn't...)

    38. happiness is associated with behaviors that create success, and thathappiness also precedes successful outcomes.

      doesn't seem that controversial ... miserable people might be successful, but one doesn't expect it to be sustainable in the face of success (the misery...)

      on the other hand, if you're happy (or satisfied), do you strive to achieve greater success?

    39. happiness precedes successful outcomes by creating positive affect, the charac-teristics of which include confidence, optimism, and self-efficacy; likability andpositive construals of others; sociability, activity, and energy; prosocial behavior;immunity, and physical well-being; effective coping with challenge and stress;and originality and flexibility. Positive affect, in turn, encourages activeinvolvement with the environment, and with the pursuit of goals

      this is quite the list -- kind of like success breeds more success, the happier you are, the more spillover there is likely to be in other related fields of achievement.

    40. When focusing on psychological well-being, there are generally two perspec-tives: the hedonic/subjective well-being perspective and the eudaimonic/mean-ing perspective.

      and we're going to focus on the latter... or at least the other reading does!

    41. Thereare three types of well-being: (1) physical well-being; (2) psychological well-being; and (3) relationship/social well-being

      while entrepreneurial activities certainly relate to the well-being of one's physical body and one's relationships, we're going to focus on the psychological...

      Feel free to ruminate on the others, though...

    42. the termeudaimonia, or a state of meaningfulness and fulfillment,

      eudaemonia is quite distinct!

    43. ristotlebelieved that meaning was not about satisfying human appetites, but aboutdoing virtuous things such that we “achieve the best that is within us

      so, eudaemonia relates to self-improvement and self-actualization...

    44. Entrepreneurs who suffer a decline inwell-being may burn out and close their businesses.

      D'uh

    45. Extrinsic fac-tors can include financial and social rewards, while intrinsic personal successis often researched using meaning, happiness, and spirituality within the workcontext.

      this should resonate with one of the questions I asked you to answer before the first class...

    46. what makes life pleasant and unpleasant (Ryan and Deci2001). Research in this area looks at life satisfaction, positive affect, and nega-tive affect

      hedonism is focused on the pursuit of pleasure. What feels good...

    47. Productivity, the second factor examined, can lead to well-being from anextrinsic perspective, since greater productivity would most likely lead togreater success of the organization

      whereas flow connects with a sense of intrinsic well-being, productivity relates to extrinsic forces too

    48. Although many factors could lead to increased entrepre-neurial well-being, the present study examines how flow, productivity, andentrepreneurs’own definition of personal success (intrinsic vs. extrinsic)impacts the entrepreneur’s subjective well-being

      focal points...

      because there's a difference between being entrepreneurial and happy and being entrepreneurial to be happy (down the road...)

    49. Continued engagement is a predictorof entrepreneurial business

      we're more likely to continue acting entrepreneurially if it satisfies us (if it gives us a sense of pleasure, or well-being) as a result of pursuing the dream, seeking and creating new opportunities... being bold and innovative and creative... (even though there are risks and great costs associated with these too)

    50. The third factor examined in this study is how an entrepreneur’s de finitionof personal success impacts their subjective well-being.

      *

    51. The first factor considered in this study was flow, which describes a state ofcomplete attentional energy focused on the task at hand

      already introduced 4 weeks ago...

    52. Yet the directionality is not clear. Are happy workers more productive, orare more productive workers happier?

      where do you stand?

    53. Of interest in this paper are the psychological factors that contribute toentrepreneurs’well-being

      focusing on one's sense of subjective well-being (otherwise known as happiness).

    54. an entrepreneur must attend to their own individual psy-chological factors of development, such as maintaining a strong sense of confi-dence, optimism, and self-efficacy to cope with uncertainty

      link to week 8 (and Baron's article...)

    55. flow has been found to increase work engage-ment (Larson and von Eye 2006, Salanova et al. 2006), to lead to excellencein performance (Demerouti 2006, Bakker 2008), and to make life more inter-esting

      adding to (all-around) well-being

    56. Entrepreneurs, like leaders in other organizations, seek organizational produc-tivity for their businesses to prosper.

      *

    1. Narodený z obesenej ženy sa sirota Guts dostáva do výchovy žoldniera. Napriek neľahkému detstvu vyrastie z tohto dieťaťa silný mladík a veľmi schopný bojovník. Jeho sila mu dovoľuje používať aj masívny meč, ktorý presahuje dĺžku dospelého človeka.Pri jednom z mnohých vojnových ťažení spoznáva Cascu a charizmatického Griffitha, vodcu žoldnierskej Skupiny Jastraba a držiteľa záhadného prívesku - Behelit. Guts mu očividne padne do oka a stane sa jedným z nich. Medzi členmi družiny nájde skutočných priateľov a postupom času získa pozíciu ako Griffithova pravá ruka.Toto je iba jedna kapitola príbehu z rozsiahlej manga ságy od autora menom Kentaro Miura. Veľmi temný fantasy príbeh láka stále nových fanúšikov, pretože dej nie je ani po vyše dvadsiatich rokoch od jeho uvedenia v roku 1990 stále uzavretý. V roku 1997 sa Berserk dočkal aj svojho 25 dielneho anime prevedenia, ktoré slávilo tiež veľký úspech. Po približne ďalších pätnástich rokoch sa dostávame opäť k anime, ktoré bude ale na rozdiel od svojho seriálového predchodcu rozdelené do niekoľkých dlhších filmov. Prvý z radu filmov, ktoré majú pokryť dej celej manga predlohy, bude uvedený v roku 2012. Nesie názov Berserk Golden Age Arc I: Egg of the Supreme Ruler a ako jeden z troch filmov nám zachytí časť príbehu „zlatého obdobia“.
    1. Malá dívenka Hotaru se ztratí v lese, o němž se vypráví, že se v něm vyskytují zvláštní bytosti. Jedna taková bytost se před ní objeví a z lesa ji vyvede. Laskavý zachránce se jmenuje Gin a kromě masky na něm nic zvláštního není. Nebo vlastně je: dotkne-li se ho nějaký člověk, tak nadobro zmizí. I přes tento nedostatek se mezi Hotaru a Ginem vytvoří pouto, které časem sílí i bez fyzického kontaktu.
    1. Třpytivé vody Karibiku jsou pro mazaného kapitána Jacka Sparrowa nevyčerpatelným zdrojem tajemných a vzrušujících dobrodružství. Jeho idylický život se razantně změní ve chvíli, kdy se lstivý kapitán Barbossa zmocní jeho lodi Černá perla a napadne město Port Royal. Nelítostná bitva má jediný cíl: únos guvernérovy krásné dcery Elizabeth. Na její záchranu se vydává přítel z dětství Will Turner, ale sám na to nestačí. Proto se spojí s Jackem, který touží získat zpět svou loď. Nikdo z nich netuší, že prokletý poklad změnil jejich největší rivaly, lstivého kapitána Barbarossu a jeho posádku, v nesmrtelná stvoření. Kletbu může zlomit pouze vrácení pokladu na jeho původní místo a vše musí být zpečetěno Elizabethinou krví. Myslí si totiž, že je dcerou Willa Turnera - otce mladého Willa.
    1. Benjamin Button se narodil v New Orleans té noci, kdy skončila první světová válka. Rodiče místo radosti čeká šok. Zjistí, že jejich syn vypadá jako stařec. Matka umírá krátce po porodu a vystrašený otec ho položí na schodech starobince v černošské čtvrti, kde ho najde černá kuchařka Queenie a rozhodne se jej přijmout za svého. Lékaři mu nedávají moc dlouhé šance na život - jeho tělo je opotřebované, jako by opravdu žilo už osmdesát let. Zatímco všichni očekávají, že chlapec zemře, on celý život mládne. Časem se vydává do světa, aby zjistil, že nejlépe mu bylo doma. Po svém návratu se setkává se svou přítelkyní z dětství, z které je nádherná žena. Vznikne mezi nimi silné pouto podporované vzájemnými sympatiemi, které postupně přerůstá v hlubší cit. Jak ale jejich vztah vydrží, když Daisy je předurčeno stárnout a Benjaminovi mládnout?
    1. Edward Bloom (Albert Finney) byl odjakživa vášnivým vypravěčem neuvěřitelných historek ze svého mládí (Ewan McGregor), kdy jej jeho záliba v cestování zavedla na úžasnou výpravu okolo světa. V jeho mýtických dobrodružstvích nechybí obři, vlkodlaci, zpívající siamská dvojčata ani čarodějnice se skleněným okem, která dokáže nahlédnout do budoucnosti. Se svými fantastickými historkami se Bloomovi daří okouzlit každého kromě jeho syna Willa (Billy Crudup). Když pak Edward onemocní, jeho žena Sandra (Jessica Lange) se pokusí Willa přimět, aby ke svému otci znovu našel cestu. Will se musí pokusit oddělit pravdu od fikce a naučit se s heroickými činy i velkými prohrami svého otce žít. (oficiální text distributora)
    1. The Animatrix

      Vítejte do světa Animatrixu, vizionářské fúze počítačové animace a japonské školy animace, od světově nejuznávanějších tvůrců animovanch filmů. Vychutnejte si snímek, který vznikl před filmem Matrix a dozvíte se o posledních městech lidské rasy, válce mezi stroji a lidmi a o závěrečném úpadku lidstva. Staňte se svědky posledního letu Osirise, který připravil půdu pro film Matrix Reloaded a videohru Enter The Matrix. Doplňte si své povědomí o Matrixu a získejte informace, které jinde nenajdete. Je čas zapojit se... (oficiální text distributora)

    1. Ask nothing of men

      Ask only of yourself

    2. So use all that is called Fortune. Most men gamble with her, and gain all, and lose all

      Is this because gambling is frowned upon from a religious perspective or is this because you can't rely on luck. (because it's not yourself lmao)

    3. As our Religion, our Education, our Art look abroad, so does our spirit of society. All men plume themselves on the improvement of society, and no man improves.

      It's almost like he's telling you to spend so much time "looking within" that you forget to look around and you become closed off to the world. He's advocating exceptionalism if you think about it.

    4. And so the reliance on Property, including the reliance on governments which protect it, is the want of self-reliance.

      According to Emerson The secret to a fulfilled life is to just do everything yourself no matter how daunting.

    5. He is supported on crutches, but lacks so much support of muscle.

      "look within", "do not seek outside yourself"

    6. Let a man then know his worth,

      contradicts the message of keep to your self, do what you want, don't care about what others think

    7. I suppose no man can violate his nature.

      Why does he think people have no control over their "nature" and cannot change?

    8. Their virtues are penances

      you will suffer for what you believe in

    9. you will always find those who think they know what is your duty better than you know it.

      those people are more commonly referred to as: pretentious douchebags

    10. What I must do is all that concerns me, not what the people think.

      Getting a strong individualism vibe.

    11. For nonconformity the world whips you with its displeasure.

      unpopular opinions cause estrangement.

    1. successful entrepreneurship is not really just a story about intelligence inthe traditional sense but more fully a story about successful intelligence—the strategic mergerof analytical, creative, and practical intelligence. All three kinds of intelligence can bedeveloped and are developed through good use of experience.

      **

    2. When entrepreneurs and others shape the environment, they are basically applyingsuccessful intelligence to idea generating

      !!

    3. A major barrier is convincing people

      rhetoric!

    4. In sum, successful entrepreneurship requires one to not only to come up with product andservice ideas but also to know what kind of product or service one has.

      underwhelming...

    5. They may end up on used-carlots

      that's quite the burn, for an academic article!

    6. People who are high in creative intelligence but not in the otherkinds may be good at coming up with ideas but often are not good either at knowingwhether their ideas are good ones (analytical intelligence) or at selling their ideas toothers (practical intelligence

      *

    7. the tests of practical intelligence I mentioned above measure adaptive skills

      ok

    8. Successful intelligence is applied in order to balance adapting to, selecting, and shapingenvironments. When one adapts to the environment, one changes oneself in order to fit intothe environment.

      how do you demonstrate this?

    9. When oneselects an environment, one decides that adaptation is not worth it.

      hmm...

    10. People who are high in analytical intelligence but not the other kinds often aregood memorizers and analyzers, but they need other people’s ideas to remember andanalyze. They make poor entrepreneurs, because entrepreneurs simply must be ideagenerators to succeed

      interesting!

    11. This is the option in which entrepreneurs mustspecialize.

      this gets into persuasion & rhetoric. In essence, also "selling" but not selling things, but ideas, selling people on your version of reality...

    12. people who are high in practical intelligencebut not in analytical or creative intelligence may be effective salespeople, but they willsell anything.

      ouch!

    13. The third option is shaping

      !

    14. The most important kind of intelligence for an entrepreneur, or really anyone else, issuccessful intelligence, which involves a balance of analytical (IQ-based), creative, andpractical intelligence

      connecting the 3 types of intelligence...

    15. One needs the creative intelligence to come upwith new ideas, the analytical intelligence to evaluate whether the ideas are good ones,and the practical intelligence to figure out a way to sell these ideas to people who maynot want to hear about them

      synergy! For success ...

    16. Significant correlations with job-related criteria

      hmm

    17. What matters is not the amountof experience one has but how much one has learned from that experience

      you probably have experience with this ...

    18. In sum, tests of practical intelligence are useful predictors of job-related skills, independ-ently of IQ-based tests.

      underwhelming. This really drives home the fact that this article is good mostly as a shell -- kind-of boring and potentially difficult to see (at least in an immediate fashion) how it can relate in a real sense to students' lives (beyond the idea of multiple intelligences). Still, the lens is really useful for helping us focus on social competence and tacit knowledge (practical intelligence) for moving us forward... and considering what might be necessary in order to achieve success in a given field...

    19. one starts by interviewing successful people in agiven job and asking them for how they performed in the critical incidents that distinguishthose who are highly successful in a field from those who are not. We then try to extract thetacit knowledge underlying the successful actions.

      the method...

    20. Route planning

      * (who has an internal GPS? Who is lost without a smart phone?)

    21. Tacit knowledge for the workplace. Test-takers are presented with situations typical ofthose encountered in low-level jobs in workplace

      classic job interview question...

    22. Trivial correlations with measures of personality and cognitive styles as well. Tests ofpractical intelligence also do not correlate with measures of personal attributes

      *

    23. Trivial correlations with IQ-based measures.

      *

    24. Tacit knowledge for sales

      *

    25. Movies. Individuals are presented with brief fragments of movies showing people their ageconfronting everyday problem

      *

    26. ome entrepreneurs leave conventional businesssettings because they are not interested in playing the game of figuring out what the tacitknowledge of the organizational environment is. They would rather play by their own rulesthan learn other people’s.

      link to independent spirit and counterfactual knowledge...

    27. Practical mathematics

      *

    28. Tacit knowledge for managers

      *

    29. Practical everyday inference

      *

    30. tacit knowledge is the knowledge that often is most important for success in theworkplace, but it is the knowledge that people must pick up on their own

      yowza! School can't teach tacit knowledge!

    31. Of course, people who are high in practical intelligence may also be high in academicintelligence. The two are not necessarily negatively related

      hah

    32. Tacit knowledge for school

      so tacit knowledge isn't completely absent from school - it's just not testable in school ...

    33. there is actually a negative relation between academic and practical intelligence

      interesting

    34. What matters for growth of practical intelligence is not experience but ratherlearning from experience.

      (link to the growth mindset)

    35. Modifiability of practical intelligence. Practical intelligence can be developed. Indeed, itmust be developed. People are not born with the kinds of common sense they show in theireveryday lives

      crucial insight

    36. tacit knowledge is what one needs to know in order to negotiate an environmenteffectively that typically is not directly taught and that often is not even verbalized

      (link to cultural capital) (but also just sensitivity to one's environment and a contextual awareness...)

    37. IQ-based tests, like practical-intelligence tests, predict job success.Both kinds of tests seem to measure intellectual skills necessary for job success

      analytical intelligence IS important to fulfill certain job criteria...

    38. The entrepreneurial children, like theentrepreneur in the forest, seemed to have a kind of intelligence not well measuredby conventional tests

      Their "street math" was not replicated in the classroom... They exhibited "street smarts" (not book smarts)

      Have you ever been in a situation where your book smarts failed you in the "real" world? Contrarily, how often has "street" knowledge helped you in school?

    39. intelligence is not asingle entity.

      crucial insight - we have access to multiple intelligences!

      Please note - this is definitely related to the "theory of multiple intelligences" (which was the basis for the reality TV series "Canada's Smartest Person"):

      https://en.wikipedia.org/wiki/Theory_of_multiple_intelligences

    40. Clearly, more is involved in entrepreneurial success than just the academic side ofintelligence

      Think about how often your ability to act in a "socially competent" manner came off as intelligent (a way of adapting to, shaping, and sometimes selecting your environment).

      Knowing the right thing to say or how to act (cultural capital) comes off as "smart"

    41. There is obviously more to intelligence than what conventional tests of intelligence

      the moral of the story

    42. Successful entrepreneurs appearto be higher in social competence than are unsuccessful ones. In particular, four factors seemto underlie this social competence: social perception (which involves accuracy in perceivingothers), (b) impression management (which involves techniques for inducing positivereactions in others), (c) persuasiveness (which involves the ability to change others’ viewsor behavior in desired directions), and (d) social adaptability (which involves feelingcomfortable in a wide range of situations). These variables, especially social perception,seem to be key to entrepreneurial success.

      ** remember these 4 factors of social competence! (they will be very helpful next week!)

    43. Successful entrepreneurship requires a blend of analytical, creative, and practical aspects ofintelligence, which, in combination, constitute successful intelligence.

      ok - getting right to the heart of it. Introduces the key concepts and emphasizes its 3 parts.

    44. success is defined in terms of personal goals. People succeed byidentifying their strengths and capitalizing on them and by identifying their weaknesses andeither correcting or compensating for them. They do so by adapting to, shaping, and selectingenvironments.

      clarifying "success"

    45. Perhaps you know the story of the college professor and the entrepreneur who arewalking in a forest.

      funny story - the punchline is at the end of the next paragraph!

    46. sometimes they change themselves to fit the environment; other times,they change the environment to fit them; still other times, they find a different environment

      what I was talking about at the end of last Thursday's class...

    47. Successful intelligenceis the ability to succeed in life, according to one’s own conception of success, within one’senvironmental context.

      key concept, defined

    48. Creative intelligence is needed in order to think flexiblyand to be ahead of the pack rather than merely with it.

      link to divergent thinking...

    49. here are eight basic kinds of new ideas, entrepreneurial orotherwise

      **

    50. reative thinkers defy the crowd,seeing alternative ways of defining and solving problems that others often do not see

      link to opportunity discovery/creation

    51. Creative intelligence is used to generate ideas that are novel, high in quality, andappropriate to the task one faces.

      ok - definition by contextualization (and very similar to last week's material...)

    52. Tobe effective on the job, however, requires a third kind of skill beyond the analytical (IQ-based) and the practical.

      completing the picture...

    53. People (such as my own son!)who wish to be entrepreneurs and form their own business may find school a distraction fromwhat interests and matters most to them.

      ...

    54. Practicalskills are necessary to apply these analytical tools correctly to the problems really facing oneon the job

      but practical intelligence guides the application of intellectual intelligence...

    55. there is some kind of construct of practical intelligencethat is distinct from the kind of academic intelligence

      yep

    56. successful intelligence, not just a subset ofits components (analytical, practical, and creative abilities), is needed for entrepreneurialsuccess

      ok!

    1. rustworthy. I

      VISUAL ANNOTATIONS

      1. (3:55) Code Carbon helps to provide a visual for the emissions produced in a certain time period. Much like the nutrition information on the outside of a cereal box, though it is helpful to know how many calories or grams of sugar are contained in one serving, that information would be useless without knowing what a serving size is. Even more so if we are unaware of how many calories we should consume in a given time frame. This information allows us to make informed decisions about what we should consume.

      2. (5:04) This visual of the photos that are generated when she inputs her own information provides a bit of shock factor to the audience. Not only are most of those images of someone who is not her, but they are quite illicit photos of someone who is not her. Taken out of context and unknown to be AI generated, photos such as these could be detrimental to someone's career or personal life.

    2. rustworthy. I

      REACTION ANOTAION:

      I never paused to consider that AI models are not contained within the digital world and exist boldly in our physical world. I figured that, since AI is so easily available on a cell phone, it couldn't possibly require so much to sustain it.

    3. rustworthy. I

      RESTATEMENT ANNOTAIONS

      1. (0:37) Though at times AI can be extremely helpful, as we often hear in the media, there is also a dark side to these functions. For instance, one chatbot suggested that the solution to one man's problems was to file for divorce. Another suggested a sure-to-please recipe for a large gathering, that contained chlorine gas among its list of ingredients.

      2. (1:19) AI does not exist in solitude. Its affects have left the digital world and have begun to affect our physical world. AI models have been noted to contribute to climate change, use artist and authors work without their consent, and discriminate against entire groups of people.

      3. (1:56) In regard to sustainability, the figurative cloud we imagine AI resides upon is not something only contained within the digital world. We often fail to acknowledge the large quantity of materials needed to build these models as well as the sizeable amount of energy required to sustain them.

    1. This is a story we need to know. Industrial transformation turned out tobe a bubble of promise followed by lost livelihoods and damaged landscapes.And yet: such documents are not enough. If we end the story with decay, weabandon all hope—or turn our attention to other sites of promise and ruin,promise and ruin.

      Important concept: details the cycle of extracting natural (and finite) resources.

      Style elements: speaks directly to the reader, repeats important phrases.

    2. This is a story we know. It is the story of pioneers, progress, and the trans-formation of “empty” spaces into industrial resource felds.

      "Empty" land becomes a place to extract resources for profit.

    Annotators

    1. La grande hétérogénéité des preuves empiriques est apparente lorsque l'on observe les analyses plus récentes au niveau de l'entreprise, qui ne confirment pas que l'automatisation a un effet négatif sur l'emploi et les salaires globaux lorsque l'on tient compte d'une période d'adaptation (Lane et Saint-Martin, 2021). Toutefois, une grande partie de la recherche empirique reste axée sur la robotisation et l'automatisation, de sorte qu'il est encore nécessaire de procéder à une analyse plus spécifique de l'impact de l'IA générative sur les résultats en matière d'emploi.

      Il est ici question des biais liés aux données collectées, aux biais des statistiques et du manque de neutralité de certaines études

    2. a réduction initiale de la demande de main-d'œuvre dans les domaines hautement automatisés pourrait potentiellement conduire à une résurgence des normes traditionnelles en matière de genre,

      Référence à notre réflexion plus haut concernant les biais préexistants, avant l'IA et Nouvelles Technologies

    3. L'IA a également le potentiel d'accroître les barrières à l'entrée pour les nouvelles générations de main-d'œuvre en raison de l'inégalité d'accès à l'éducation

      Un souci primordial à expliciter lorsqu'on parle de l'IA sur le marché du travail est celui de l'accéssiblité numérique, une accessiblité qui n'est pas encore étendue au monde entier et donc le sujet de l'IA dans le monde du travail ne concerne pour l'instant que les pays et les sociétés dit.e.s "développés" (pour la plupart en Occident) et donc opérer un shift majeur en faveur de technologies inacessibles pour beaucoup ne fera qu'alourdir le gap entre eux

    4. C'est là que réside la possibilité d'une répartition inégale de la charge du déplacement d'emplois entre les hommes et les femmes, la recherche n'ayant pas encore apporté de réponse claire.

      Cela n'est pas inhérent à l'automatisation numérique en elle-même, il s'agit là d'un souci plus systémique -> l'IA et les Nouvelles Technologies ne font que refléter en prolongeant les problèmes qui existent déjà, ce ne sont que des outils

    5. Les premiers verraient ainsi la productivité de leur travail augmenter, tandis que les seconds verraient probablement la plupart de leurs tâches remplacées par l'IA et seraient donc confrontés à un risque beaucoup plus élevé de perte d'emploi.

      Même risque exposé que celui de l'article précédent.

    1. Welcome back and by now you should understand the difference between stateless and stateful security protection.

      In this lesson I want to talk about one security feature of AWS VPCs and a little bit more depth and that's network access control lists known as knuckles.

      Now we do have a lot to cover so let's jump in and get started.

      A network access control list we thought of as a traditional firewall available within AWS VPCs so let's look at a visual example.

      A subnet within an AWS VPC which has two EC2 instances A and B.

      The first thing to understand and this is core to how knuckles work within AWS is that they are associated with subnets.

      Every subnet has an associated network ACL and this filters data as it crosses the boundary of that subnet.

      In practice this means any data coming into the subnet is affected and data leaving the subnet is affected.

      But and this is super important to remember connections between things within that subnet such as between instance A and instance B in this example are not affected by network ACLs.

      Each network ACL contains a number of rules, two sets of rules to be precise.

      We have inbound rules and outbound rules.

      Now inbound rules only affect data entering the subnet and outbound rules affect data leaving the subnet.

      Remember from the previous lesson this isn't always matching directly to request and response.

      A request can be either inbound or outbound as can a response.

      These inbound and outbound rules are focused only on the direction of traffic not whether it's request or response.

      In fact and I'll cover this very soon knuckles are stateless which means they don't know if traffic is request or response.

      It's all about direction.

      Now rules match the destination IP or IP range, destination port or port range together with the protocol and they can explicitly allow or explicitly deny traffic.

      Remember this one network ACLs offer both explicit allows and explicit denies.

      Now rules are processed in order.

      First a network ACL determines if the inbound or outbound rules apply.

      Then it starts from the lowest rule number.

      It evaluates traffic against each individual rule until it finds a match.

      Then that traffic is either allowed or denied based on that rule and then processing stops.

      Now this is critical to understand because it means that if you have a deny rule and an allow rule which match the same traffic but if the deny rule comes first then the allow rule might never be processed.

      Lastly there's a catch all showed by the asterisk in the rule number and this is an implicit deny.

      If nothing else matches then traffic will be denied.

      So those are the basics.

      Next let's move on to some more complex elements of network ACLs.

      Now I just mentioned that network ACLs are stateless and this means that rules are required for both the request and the response part of every communication.

      You need individual rules for those so one inbound and one outbound.

      Take this example a multi-tiered application running in a VPC.

      We've got a web server in the middle and an application server on the left.

      On the right we have a user Bob using a laptop and he's accessing the website.

      So he makes a connection using HTTPS which is TCP port 443 and this is the request as you know by now and this is also going to mean that a response is required using the ephemeral port range.

      This ephemeral port is chosen at random from the available range decided by the operating system on Bob's laptop.

      Now to allow for this initial communication if we're using network ACLs then we'll need to have one associated with the web subnet and it will need rules in the inbound and outbound sections of that network ACL.

      Notice how on the inbound rule set we have rule number 110 which allows connections from anywhere and this is signified by 0.0.0.0 through this network ACL and this is allowed as long as it's using TCP port 443.

      So this is what allows the request from Bob into the web server.

      We also have on the outbound rule set rule number 120 and this allows outbound traffic to anywhere again 0.0.0.0 as long as the protocol is TCP using the port range of 1.0.2.4 to 65.5.3.5 and this is the ephemeral port range which I mentioned in the previous lesson.

      Now this is not amazingly secure but with stateless firewalls this is the only way.

      Now we also have the implicit denies and this is denoted by the rules with the star in the rule number and this means that anything which doesn't match rule 110 or 120 is denied.

      Now it's also worth mentioning while I do have rule 110 and 120 number differently the rule numbers are unique on inbound and outbound so we could have the single rule number 110 on both rule sets and that would be okay.

      It's just easier to illustrate this if I use unique rule numbers for each of the different rule sets.

      Now let's move on and increase the complexity little.

      So we have the same architecture we have Bob on the right, the web subnet in the middle and the application subnet on the left.

      You know now that because network ACLs are stateless each communication requires one request rule and one response rule.

      This becomes more complex when you have a multi-tiered architecture which operates across multiple subnets and let's step through this to illustrate why.

      Let's say the pop initiates a connection to the web server we know about this already because I just covered it.

      If we have a network ACL around the web subnet we'll need an inbound rule on the web network ACL.

      There's also going to be response traffic so this is going to use the ephemeral port range and this is going to need an outbound rule on that same web network ACL so this should make sense so far.

      But also the web server might need to communicate with the app server using some application TCP port.

      Now this is actually crossing two subnet boundaries the web at subnet boundary and the application subnet boundary so it's going to need an outbound rule on the web at subnet knuckle and also an inbound rule on the application subnet knuckle.

      Then we have the response for that as well from the app server through to the web server and this is going to be using ephemeral ports but this also crosses two subnet boundaries it leaves the application subnet which will need an outbound rule on that knuckle and it enters the web subnet which will also need an inbound rule on that network ACL and what if each of those servers need software updates it will get even more complex really quickly.

      You always have to be aware of these rule pairs the application port request and the ephemeral response for every single communication in some cases you're going to have multi-tier architecture and this might mean the communications go through different subnets.

      If you need software updates this will need more if you use network address translation or NAT you might need more rules still.

      You'll need to worry about this if you use network ACLs within a vpc for traffic to a vpc or traffic from a vpc or traffic between subnets inside that vpc.

      When a vpc is created it's created with a default network ACL and this contains inbound and outbound rule sets which have the default implicit deny but also a capsule allow and this means that the net effect is that all traffic is allowed so the default within a vpc is that knuckles have no effect they aren't used this is designed [Music] I need to be beginner friendly and reduce admin overhead.

      AWS prefer using security groups which I'll be covering soon.

      If you create your own custom network ACLs though that's a different story.

      Custom knuckles are created for a specific vpc and initially they're associated with no subnets.

      They only have one rule on both the inbound and outbound rule sets which is the default deny and the result is that if you associate this custom network ACL with any subnets all traffic will be denied so be careful with this it's radically different behavior than the default network ACL created with a vpc.

      Now this point I just want to cover some finishing key points which you need to be aware of for any real-world usage and when you're answering exam questions.

      So network access controlists remember they're known as knuckles they are stateless so they view request and response as different things so you need to add rules both for the request and for the response.

      A knuckle only affects data which is crossing the subnet boundary so communications between instances in the same subnet is not affected by a network ACL on that subnet.

      Now this can mean that if you do have data crossing between subnets then you need to make sure that each knuckle on both of those subnets has the appropriate inbound and outbound rules so you end up with a situation where one connection can in theory need two rules on each knuckle if that connection is crossing two different subnet boundaries.

      Now knuckles are able to explicitly allow traffic and explicitly deny and the deny is important because as you'll see when I talk about security groups this is a capability that you need to network ACLs.

      So network ACLs allow you to block specific IPs or specific IP ranges which are associated with bad actors so they're a really good security feature when you need to block any traffic attempting to exploit your systems.

      Now network ACLs are not aware of any logical resources they only allow you to use IPs and cyber ranges ports and protocols you cannot reference logical resources within AWS and knuckles can also not be assigned two logical resources they're only assigned to subnets within VPCs within AWS.

      Now knuckles are very often used together with security groups such as mentioned to add the capability to explicitly deny bad IPs or bad networks so generally you would use security groups to allow traffic and you use knuckles to deny traffic and I'll talk about exactly how this works in the next lesson.

      Now each subnet within a VPC has one knuckle associated with it it's either going to be the default network ACL for that VPC or a custom one which you create and associate.

      A single knuckle though can be associated with many different subnets so while a subnet can only have one network ACL one network ACL can be associated with many different subnets.

      Now this point that is everything that I wanted to cover about network ACLs for this lesson so go ahead complete the video and when you're ready I'll look forward to you joining me in the next lesson.

    1. nd optimization step extracts the point’s feature embed-ding. Memory networks also share some connections with our work, in particular, if we interpretthe neighborhood of a node as the memory, which is

      此处提出了一个新方法

    1. eLife Assessment

      This important study provides proof of principle that C. elegans models can be used to accelerate the discovery of candidate treatments for human Mendelian diseases by detailed high-throughput phenotyping of strains harboring mutations in orthologs of human disease genes. The data are compelling and support an approach that enables the potential rapid repurposing of FDA-approved drugs to treat rare diseases for which there are currently no effective treatments. The authors should provide a clearer explanation of how the statistical analyses were performed, as well as a link to a GitHub repository to clarify how figures and tables in the manuscript were generated from the phenotypic data.

    2. Reviewer #1 (Public review):

      Summary:

      As the scientific community identifies increasing numbers of genes and genetic variants that cause rare human diseases, a challenge in the field quickly identify pharmacological interventions to address known deficits. The authors point out that defining phenotypic outcomes required for drug screen assays is often a bottleneck, and emphasize how invertebrate models can be used for quick ID of compounds that may address genetic deficits. A major contribution of this work is to establish a framework for potential intervention drug screening based on quantitative imaging of morphology and mobility behavior, using methods that the authors show can define subtle phenotypes in a high proportion of disease gene knockout mutants. Overall, the work constitutes an elegant combination of previously developed high-volume imaging with highly detailed quantitative phenotyping (and some paring down to specific phenotypes) to establish proof of principle on how the combined applications can contribute to screens for compounds that may address specific genetic deficits, which can, in turn, suggest both mechanism and therapy.

      In brief, the authors selected 25 genes for which loss of function is implicated in human neuro-muscular disease and engineered deletions in the corresponding C. elegans homologs. The authors then imaged morphological features and behaviors prior to, during, and after blue light stimuli, quantitating features, and clustering outcomes as they elegantly developed previously (PMID 35322206; 30171234; 30201839). In doing so, phenotypes in 23/25 tested mutants could be separated enough to distinguish WT from mutant and half of those with adequate robustness to permit high-throughput screens, an outcome that supports the utility of related general efforts to ID phenotypes in C. elegans disease orthologs. A detailed discussion of 4 ciliopathy gene defects, and NACLN-related channelopathy mutants reveals both expected and novel phenotypes, validating the basic approach to modeling vetted targets and underscoring that quantitative imaging approaches reiterate known biology.

      The authors then screened a library of nearly 750 FDA-approved drugs for the capacity to shift the unc-80 NACLN channel-disrupted phenotype closer to the wild type. Top "mover" compounds shift outcome in the experimental outcome space; and also reveal how "side effects" can be evaluated to prioritize compounds that confer the fewest changes of other parameters away from the center.

      Strengths:

      Although the imaging and data analysis approaches have been reported and the screen is restricted in scope and intervention exposure, it is impressive, encouraging and important that the authors strongly combine tools to demonstrate how quantitative imaging phenotypes can be integrated with C. elegans genetics to accelerate the identification of potential modulators of disease (easily extendable to other goals). Generation of deletion alleles and documentation of their associated phenotypes (available in supplemental data) provide potentially useful reagents/data to the field. The capacity to identify "over-shooting" of compound applications with suggestions for scale back and to sort efficacious interventions to minimize other changes to behavioral and physical profiles is a strong contribution.

      Weaknesses:

      The work does not have major weaknesses, and in revision, the authors have expanded the discussion to potential utility and application in the field.

      The authors have also taken into account minor modifications in writing.

    3. Reviewer #2 (Public review):

      Summary and strengths:

      O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to make genotype-phenotype connections using C. elegans. Given the rate that rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.

      Weaknesses:

      (1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10 point font. Similarly, Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.

      (2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.

      (3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.

      (4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.

      (5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than "worsening" of 1000 correlated features.Reviewer #2 (Public review):

      Summary and strengths:

      O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to make genotype-phenotype connections using C. elegans. Given the rate that rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.

      Weaknesses:

      (1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10 point font. Similarly, Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.

      (2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.

      (3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.

      (4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.

      (5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than "worsening" of 1000 correlated features.

    4. Reviewer #3 (Public review):

      In this study, O'Brien et al. address the need for scalable and cost-effective approaches to finding lead compounds for the treatment of the growing number of Mendelian diseases. They used state-of-the-art phenotypic screening based on an established high-dimensional phenotypic analysis pipeline in the nematode C. elegans.

      First, a panel of 25 C. elegans models was created by generating CRISPR/Cas9 knock-out lines for conserved human disease genes. These mutant strains underwent behavioral analysis using the group's published methodology. Clustering analysis revealed common features for genes likely operating in similar genetic pathways or biological functions. The study also presents results from a more focused examination of ciliopathy disease models.

      Subsequently, the study focuses on the NALCN channel gene family, comparing the phenotypes of mutants of nca-1, unc-77, and unc-80. This initial characterization identifies three behavioral parameters that exhibit significant differences from the wild type and could serve as indicators for pharmacological modulation.

      As a proof-of-concept, O'Brien et al. present a drug repurposing screen using an FDA-approved compound library, identifying two compounds capable of rescuing the behavioral phenotype in a model with UNC80 deficiency. The relatively short time and low cost associated with creating and phenotyping these strains suggest that high-throughput worm tracking could serve as a scalable approach for drug repurposing, addressing the multitude of Mendelian diseases. Interestingly, by measuring a wide range of behavioural parameters, this strategy also simultaneously reveals deleterious side effects of tested drugs that may confound the analysis.

      Considering the wealth of data generated in this study regarding important human disease genes, it is regrettable that the data is not made accessible to researchers less versed in data analysis methods. This diminishes the study's utility. It would have a far greater impact if an accessible and user-friendly online interface were established to facilitate data querying and feature extraction for specific mutants. This would empower researchers to compare their findings with the extensive dataset created here.

      Another technical limitation of the study is the use of single alleles. Large deletion alleles were generated by CRISPR/Cas9 gene editing. At first glance, this seems like a good idea because it limits the risk that background mutations, present in chemically-generated alleles, will affect behavioral parameters. However, these large deletions can also remove non-coding RNAs or other regulatory genetic elements, as found, for example, in introns. Therefore, it would be prudent to validate the behavioral effects by testing additional loss-of-function alleles produced through early stop codons or targeted deletion of key functional domains.

    5. Author response:

      The following is the authors’ response to the original reviews.

      Public Reviews:

      Reviewer #1 (Public Review): 

      Summary: 

      As the scientific community identifies increasing numbers of genetic variants that cause rare human diseases, a challenge is how the field can most quickly identify pharmacological interventions to address known deficits. The authors point out that defining phenotypic outcomes required for drug screen assays is often challenging, and emphasize how invertebrate models can be used for quick ID of compounds that may address genetic deficits. A major contribution of this work is to establish a framework for potential intervention drug screening based on quantitative imaging of morphology and mobility behavior, using methods that the authors show can define subtle phenotypes in a high proportion of disease gene knockout mutants. 

      Overall, the work constitutes an elegant combination of previously developed high-volume imaging with highly detailed quantitative phenotyping (and some paring down to specific phenotypes) to establish proof of principle on how the combined applications can contribute to screens for compounds that may address specific genetic deficits, which can suggest both mechanism and therapy. 

      In brief, the authors selected 25 genes for which loss of function is implicated in human neuro-muscular disease and engineered deletions in the corresponding C. elegans homologs. The authors then imaged morphological features and behaviors prior to, during, and after blue light stimuli, quantitating features, and clustering outcomes as they elegantly developed previously (PMID 35322206; 30171234; 30201839). In doing so, phenotypes in 23/25 tested mutants could be separated enough to distinguish WT from mutant and half of those with adequate robustness to permit high-throughput screens, an outcome that supports the utility of general efforts to ID phenotypes in C. elegans disease orthologs using this approach. A detailed discussion of 4 ciliopathy gene defects, and NACLN-related channelopathy mutants reveals both expected and novel phenotypes, validating the basic approach to modeling vetted targets and underscoring that quantitative imaging approaches reiterate known biology. The authors then screened a library of nearly 750 FDA-approved drugs for the capacity to shift the unc-80 NACLN channel-disrupted phenotype closer to the wild type. Top "mover" compound move outcome in the experimental outcome space; and also reveal how "side effects" can be evaluated to prioritize compounds that confer the fewest changes of other parameters away from the center. 

      Strengths: 

      Although the imaging and data analysis approaches have been reported and the screen is limited in scope and intervention exposure, it is important that the authors strongly combine individual approach elements to demonstrate how quantitative imaging phenotypes can be integrated with C. elegans genetics to accelerate the identification of potential modulators of disease (easily extendable to other goals). Generation of deletion alleles and documentation of their associated phenotypes (available in supplemental data) provide potentially useful reagents/data to the field. The capacity to identify "over-shooting" of compound applications with suggestions for scale back and to sort efficacious interventions to minimize other changes to behavioral and physical profiles is a strong contribution. 

      Weaknesses: 

      The work does not have major weaknesses, although it may be possible to expand the discussion to increase utility in the field: 

      (1) Increased discussion of the challenges and limitations of the approach may enhance successful adaptation application in the field. 

      It is quite possible that morphological and behavioral phenotypes have nothing to do with disease mechanisms and rather reflect secondary outcomes, such that positive hits will address "off-target" consequences. 

      This is possible and can only be determined with human data. We now discuss the possibility in the discussion.

      The deletion approach is adequately justified in the text, but the authors may make the point somewhere that screening target outcomes might be enhanced by the inclusion of engineered alleles that match the human disease condition. Their work on sod-1 alleles (PMID 35322206) might be noted in this discussion. 

      We agree and now mention this work in the discussion. We are currently working on a collection of strains with patient-specific mutations.

      Drug testing here involved a strikingly brief exposure to a compound, which holds implications for how a given drug might engage in adult animals. The authors might comment more extensively on extended treatments that include earlier life or more extended targeting. The assumption is that administering different exposure periods and durations, but if the authors are aware as to whether there are challenges associated with more prolonged applications, larger scale etc. it would be useful to note them. 

      More prolonged applications are definitely possible. We chose short treatments for this screen to model the potential for changing neural phenotypes once developmental effects of the mutation have already occurred. We now briefly discuss this choice and the potential of longer treatments in the discussion.

      (2) More justification of the shift to only a few target parameters for judging compound effectiveness. 

      - In the screen in Figure 4D and text around 313, 3 selected core features of the unc-80 mutant (fraction that blue-light pause, speed, and curvature) were used to avoid the high replicate requirements to identify subtle phenotypes. Although this strategy was successful as reported in Figure 5, the pared-down approach seems a bit at odds with the emphasis on the range of features that can be compared mutant/wt with the author's powerful image analysis. Adding details about the reduced statistical power upon multiple comparisons, with a concrete example calculated, might help interested scientists better assess how to apply this tool in experimental design. 

      To empirically test the effect of including more features on the subsequent screen, we have repeated the analysis using increasing numbers of features. In a new supplementary figure we find increasing the number of features reduces our power to detect rescue. At 256 features, we would not be able to detect any compounds that rescued the disease model phenotype.

      (3) More development of the side-effect concept. The side effects analysis is interesting and potentially powerful. Prioritization of an intervention because of minimal perturbation of other phenotypes might be better documented and discussed a bit further; how reliably does the metric of low side effects correlate with drug effectiveness? 

      Ultimately this can only be determined with clinical trial data on multiple drugs, but there are currently no therapeutic options for UNC80 deficiency in humans. We have included some extra discussion of the side effect concept.

      Reviewer #2 (Public Review): 

      Summary and strengths: 

      O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at the movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to making genotype-phenotype connections using C. elegans. Given the rate at which rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits. 

      Weaknesses: 

      (1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10-point font. Similarly, the Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention. 

      We have updated all figures with larger labels and, where necessary, split figures to allow for better readability. We’ve also corrected italicisation.

      (2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text. 

      We have removed references to causation. We were thinking of cases where a known variant is found in a patient where causality has already been established rather than cases of new variant discovery.

      (3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made. 

      We now explain the extra keyword filtering step. For the final filtering step, we simply examined the list and chose 25. There is therefore little justification to provide and we acknowledge these cannot be seen as representative of the larger set according to well-defined rules. The choice was based on which genes we thought would be interesting using their descriptions or our prior knowledge (“subjective interestingness” in the main text).

      (4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps. 

      In this case, we included all features because they were all tested for differences between mutants and controls. By consistently using all features for each fingerprint we can be sure that the features that are different that we want to highlight in box plots can be referred to in the fingerprint.

      (5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than the "worsening" of 1000 correlated features. 

      This is a good point. We’ve redone the analysis using the Tierpsy 256 feature set and included this as a supplementary figure. We find that the same trend exists when looking at this reduced feature set.

      Reviewer #3 (Public Review): 

      In this study, O'Brien et al. address the need for scalable and cost-effective approaches to finding lead compounds for the treatment of the growing number of Mendelian diseases. They used state-of-the-art phenotypic screening based on an established high-dimensional phenotypic analysis pipeline in the nematode C. elegans. 

      First, a panel of 25 C. elegans models was created by generating CRISPR/Cas9 knock-out lines for conserved human disease genes. These mutant strains underwent behavioral analysis using the group's published methodology. Clustering analysis revealed common features for genes likely operating in similar genetic pathways or biological functions. The study also presents results from a more focused examination of ciliopathy disease models. 

      Subsequently, the study focuses on the NALCN channel gene family, comparing the phenotypes of mutants of nca-1, unc-77, and unc-80. This initial characterization identifies three behavioral parameters that exhibit significant differences from the wild type and could serve as indicators for pharmacological modulation. 

      As a proof-of-concept, O'Brien et al. present a drug repurposing screen using an FDA-approved compound library, identifying two compounds capable of rescuing the behavioral phenotype in a model with UNC80 deficiency. The relatively short time and low cost associated with creating and phenotyping these strains suggest that high-throughput worm tracking could serve as a scalable approach for drug repurposing, addressing the multitude of Mendelian diseases. Interestingly, by measuring a wide range of behavioural parameters, this strategy also simultaneously reveals deleterious side effects of tested drugs that may confound the analysis. 

      Considering the wealth of data generated in this study regarding important human disease genes, it is regrettable that the data is not actually made accessible. This diminishes the study's utility. It would have a far greater impact if an accessible and user-friendly online interface were established to facilitate data querying and feature extraction for specific mutants. This would empower researchers to compare their findings with the extensive dataset created here. Otherwise, one is left with a very limited set of exploitable data. 

      We have now made the feature data available on Zenodo (https://doi.org/10.5281/zenodo.12684118) as a matrix of feature summaries and individual skeleton timeseries data (the feature matrix makes it more straightforward to extract the data from particular mutants for reanalysis). We have also created a static html version of the heatmap in Figure 2 containing the entire behavioural feature set extracted by Tierpsy. This can be opened in a browser and zoomed for detailed inspection. Mousing over the heatmap shows the names of features at each position making it easier to arrive at intuitive conclusions like ‘strain A is slow’ or ‘strain B is more curved’.

      Another technical limitation of the study is the use of single alleles. Large deletion alleles were generated by CRISPR/Cas9 gene editing. At first glance, this seems like a good idea because it limits the risk that background mutations, present in chemically-generated alleles, will affect behavioral parameters. However, these large deletions can also remove non-coding RNAs or other regulatory genetic elements, as found, for example, in introns. Therefore, it would be prudent to validate the behavioral effects by testing additional loss-of-function alleles produced through early stop codons or targeted deletion of key functional domains. 

      We have added a note in the main text on limitations of deletion alleles. We like the idea of making multiple alleles in future studies, especially in cases where a project is focussed on just one or a few genes.

      Recommendations for the authors

      Reviewer #1 (Recommendations For The Authors): 

      Note that none of the above suggestions or the one immediately below are considered mandatory. 

      One additional minor point: The dual implication of mevalonate perturbations for NACLM deficiencies is striking. At the same time, the mevalonate pathway is critical for embryo viability among other things, which prompts questions about how reproductive physiology is integrated in this screen approach. It appears that sterilization protocols are not used to prepare screen target animals, but it would be useful to know if there were a signature associated with drug-induced sterility that might help identify one potential common non-interesting outcome of compound treatments in general. In this work, the screen treatment is only 4 hours, which is probably too short to compromise reproduction, but as noted above, it is likely users would intend to expose test subjects for much longer than 4-hour periods. 

      This is an interesting point. In its current form our screen doesn’t assess reproductive physiology. This is something that we will consider in ongoing projects.

      Figures 

      Figure 1D might be omitted or moved to supplement. 

      We have removed 1D and moved figure 1E as a standalone table (Table 1) to improve readability.

      Figure 2D "key" is hard to make out size differences for prestim, bluelight, and poststim -more distinctive symbols should be used. 

      We have increased the size of the symbols so that the key is easier to read.

      Line 412 unc-25 should be in italics 

      Corrected

      Reviewer #2 (Recommendations For The Authors): 

      Specific edits: 

      All of the errors below have been corrected.

      Line 47, "loss of function" should be hyphenated because it is a compound adjective that modifies mutations. 

      Line 50, "genetically-tractable" should not be hyphenated because it is not a compound adjective. It is an adverb-adjective pair. Line 102 has the same grammatical issue. 

      Line 85, "rare genetic diseases" do not "affect nervous system function". The disease might have deficits in this function, but the disease does not do anything to function. 

      Line 86, it should be mutations not mutants. Mutations are changes to DNA. Mutants are individuals with mutations. 

      Throughout, wild-type should be hyphenated when it is used as a compound adjective. 

      Figure 4, asterisks is spelled incorrectly. 

      Reviewer #3 (Recommendations For The Authors): 

      - As stated in the public review, the utility of the study is limited by the lack of access to the complete dataset. The wealth of data produced by the study is one of its major outputs. 

      We have made the data publicly available on Zenodo. We appreciate the request.

      - Describe the exact break-points of the different alleles, because it was not readily feasible to derive them from the gene fact sheets provided in the supplementary materials. 

      We have now provided the start position and total length of deletion for each gene in the gene fact sheets.

      - Figure 1C: what does "Genetic homology"/"sequence identity" refer to? How were these values calculated? 

      UNC-49 is clearly not 95% identical to vertebrate GABAR subunits at the protein level. 

      We have changed the axis label to “BLAST % Sequence Identity” to clarify that these values are calculated from BLAST sequence alignments on WormBase and the Alliance Genom Resources webpages.

      - Figure 1E : The data presented in Figure 1E appears somewhat unreliable. For example, a cursory check showed: 

      (1) Wrong human ortholog: unc-49 is a Gaba receptor, not a Glycine receptor as indicated in the second column. 

      (2) Wrong disease association: dys-1 is not associated with Bardet-Biedl syndrome; overall the data indicated in the table does not seem to fully match the HPO database. 

      (3) Inconsistent disease association: why don't the avr-14 and glc-2 (and even unc-49) profiles overlap/coincide given that they present overlapping sets of human orthologs. 

      Thank you for catching this! We have corrected gene names which were mistakenly pasted. We have also made this a standalone table (Table 1) for improved readability.

      - Error in legend to figure 4I : "with ciliopathies and N2" > ciliopathies should be "NALCN disease". 

      - Error at line 301: "Figures 2E-H" should be "Figures 4E-H". 

      Corrected.

    1. Although the auxiliary view clarifies the geometry of the inclined face, it actually distorts everything else.

      Important to realize that if referring to a model with auxiliary view, focus on the top and front views to get accurate dimensions. Auxiliary is not true to its sizing

    1. Cela a commencé - pour évoquer un des outils qui est venu jusqu’à nous du passé - par le biface en silex. Et depuis nous n’avons cessé de pratiquer l’extension de soi via des outils : l’automobile, la doudoune, Google Maps, les skis, le couteau Suisse, le micro-onde, le piano à queue, l’avion… Notre dernière invention notable, notre dernière façon d’étendre nos capacités cognitives, est la création de l’IA. En ce sens on peut considérer l’IA comme une expression de continuité pour l’espèce humaine.

      Nous sommes donc face à une nouveauté sociale, politique et professionnelle. Il n'y a pas encore de cadre, de réglementations de lois -> il faut être vigilants.

    2. suppression de certains emplois

      La question qui se posera ensuite est essentielle: que faire des personnes qui exercent des métiers dits "à risque" -> une transition reponsable est progressive sera impérative, notamment pour les différentes reconversions à venir

    3. diminution de certaines activités au sein d’un métier

      Ce qui interfère immédiatement avec la politique de production continue et ininterrompue demandée aux employé.es -> enjeu éthique

    4. économies de productivité attendue, rôles des managers, rapport au travail, modalités de collaboration et de production de valeur collective, redéfinition de la « valeur travail » entre l’humain et la machine, façons d’apprendre, transformation des métiers et des compétences.

      Une révolution qui risque de changer la nature de certains métiers

    1. Welcome back and in this video I want to cover the differences between stateful and stateless firewalls.

      And to do that I need to refresh your knowledge of how TCP and IP function.

      So let's just jump in and get started.

      In the networking fundamentals videos I talk about how TCP and IP worked together.

      You might already know this if you have networking experience in the real world, but when you make a connection using TCP, what's actually happening is that each side is sending IP packets to each other.

      These IP packets have a source and destination IP and are carried across local networks and the public internet.

      Now TCP is a layer 4 protocol which runs on top of IP.

      It adds error correction together with the idea of ports, so HTTP runs on TCP port 80 and HTTPS runs on TCP port 443 and so on.

      So keep that in mind as we continue talking about the state of connections.

      So let's say that we have a user here on the left Bob and he's connecting to the Categoram application running on a server on the right.

      What most people imagine in this scenario is a single connection between Bob's laptop and the server.

      So Bob's connecting to TCP port 443 on the server and in doing so he gets information back, in this case many different categories.

      Now you know that below the surface at layer 3 this single connection is handled by exchanging packets between the source and the destination.

      Conceptually though you can imagine that each connection, in this case it's an outgoing connection from Bob's laptop to the server.

      Each one of these is actually made up of two different parts.

      First we've got the request part where the client requests some information from a server, in this case from Categors, and then we have the response part where that data is returned to the client.

      Now these are both parts of the same interaction between the client and server, but strictly speaking you can think of these as two different components.

      What actually happens as part of this connection setup is this.

      First the client picks a temporary port and this is known as an ephemeral port.

      Now typically this port has a value between 1024 and 65535, but this range is dependent on the operating system which Bob's laptop is using.

      Then once this ephemeral port is chosen the client initiates a connection to the server using a well-known port number.

      Now a well-known port number is a port number which is typically associated with one specific popular application or protocol.

      In this case TCP port 443 is HTTPS.

      So this is the request part of the connection, it's a stream of data to the server.

      You're asking for something, some cat pictures or a web page.

      Next the server responds back with the actual data.

      The server connects back to the source IP of the request part, in this case Bob's laptop, and it connects to the source port of the request part, which is the ephemeral port which Bob's laptop has chosen.

      This part is known as the response.

      So the request is from Bob's laptop using an ephemeral port to a server using a well-known port.

      The response is from the server on that well-known port to Bob's laptop on the ephemeral port.

      Now it's these values which uniquely identify a single connection.

      So that's a source port and source IP.

      And a destination IP and a destination port.

      Now hope that this makes sense so far, if not then you need to repeat this first part of the video again because this is really important to understand.

      If it does make sense then let's carry on.

      Now let's look at this example in a little bit more detail.

      This is the same connection that we looked at on the previous screen.

      We have Bob's laptop on the left and the Catering Server on the right.

      Obviously the left is the client and the right is the server.

      I also introduced the correct terms on the previous screen so request and response.

      So the first part is the client talking to the server asking for something and that's the request.

      And the second part is the server responding and that's the response.

      But what I want to get you used to is that the directionality depends on your perspective and let me explain what I mean.

      So in this case the client initiates the request and I've added the IP addresses on here for both the client and the server.

      So what this means is the packets will be sent from the client to the server and these will be flowing from left to right.

      These packets are going to have a source IP address of 119.18.36.73, which is the IP address of the client.

      So Bob's laptop and they will have a destination IP of 1.3.3.7, which is the IP address of the server.

      Now the source port will be a temporary or ephemeral port chosen by the client and the destination port will be a well-known port.

      In this case we're using HTTPS so TCP port 443.

      Now if I challenge you to take a quick guess, would you say that this request is outbound or inbound?

      If you had to pick, if you had to define a firewall rule right now, would you pick inbound or outbound?

      Well this is actually a trick question because it's both.

      From the client perspective this request is an outbound connection.

      So if you're adding a firewall rule on the client you would be looking to allow or deny an outbound connection.

      From the server perspective though it's an inbound connection so you have to think about perspective when you're working with firewalls.

      But then we have the response part from the server through to the client.

      This will also be a collection of packets moving from right to left.

      This time the source IP on those packets will be 1.3.3.7, which is the IP address of the server.

      The destination IP will be 119.18.36.73, which is the IP address of the client.

      So Bob's laptop.

      The source port will be TCP port 443, which is the well-known port of HTTPS and the destination port will be the ephemeral port chosen originally by the client.

      Now again I want you to think about the directionality of this component of the communication.

      Is it outbound or inbound?

      Well again it depends on perspective.

      The server sees it as an outbound connection from the server to the client and the client sees it as an inbound connection from the server to itself.

      Now this is really important because there are two things to think about when dealing with firewall rules.

      The first is that each connection between a client and a server has two components, the request and the response.

      So the request is from a client to a server and the response is from a server to a client.

      The response is always the inverse direction to the request.

      But the direction of the request isn't always outbound and isn't always inbound.

      It depends on what that data is together with your perspective.

      And that's what I want to talk about a bit more on the next screen.

      Let's look at this more complex example.

      We still have Bob and his laptop on the CaterGram server, but now we have a software update server on the bottom left.

      Now the CaterGram server is inside a subnet which is protected by a firewall.

      And specifically this is a stateless firewall.

      A stateless firewall means that it doesn't understand the state of connections.

      What this means is that it sees the request connection from Bob's laptop to CaterGram and the response of from CaterGram to Bob's laptop as two individual parts.

      You need to think about allowing or denying them as two parts.

      You need two rules.

      In this case one inbound rule which is the request and one outbound rule for the response.

      This is obviously more management overhead.

      Two rules needed for each thing.

      Each thing which you as a human see as one connection.

      But it gets slightly more confusing than that.

      For connections to the CaterGram server, so for example when Bob's laptop is making a request, then that request is inbound to the CaterGram server.

      The response logically enough is outbound, sending data back to Bob's laptop, which is possible to have the inverse.

      Consider the situation where the CaterGram server is performing software updates.

      Well in this situation the request will be from the CaterGram server to the software update server, so outbound, and the response will be from the software update server to the CaterGram server, so this is inbound.

      So when you're thinking about this, start with the request.

      Is the request coming to you or going to somewhere else?

      The response will always be in the reverse direction.

      So this situation also requires two firewall rules.

      One outbound for the request and one inbound for the response.

      Now there are two really important points I want to make about stateless firewalls.

      First, for any servers where they accept connections and where they initiate connections, and this is common with web servers which need to accept connections from clients, but where they also need to do software updates.

      In this situation you'll have to deal with two rules for each of these, and they will need to be the inverse of each other.

      So get used to thinking that outbound rules can be both the request and the response, and inbound rules can also be the request and the response.

      It's initially confusing, but just remember, start by determining the direction of the request, and then always keep in mind that with stateless firewalls you're going to need an inverse rule for the response.

      Now the second important thing is that the request component is always going to be to a well-known port.

      If you're managing the firewall for the category application, you'll need to allow connections to TCP port 443.

      The response though is always from the server to a client, but this always uses a random ephemeral port, because the firewall is stateless, it has no way of knowing which specific port is used for the response, so you'll often have to allow the full range of ephemeral ports to any destination.

      This makes security engineers uneasy, which is why stateless firewalls which I'll be talking about next are much better.

      Just focus on these two key elements, that every connection has a request and a response, and together with those keep in mind the fact that they can both be in either direction, so a request can be inbound or outbound, and a response will always be the inverse to the directionality of the request.

      Also you'll keep in mind that any rules that you create for the response will need to often allow the full range of ephemeral ports.

      That's not a problem with stateless firewalls which I want to cover next.

      So we're going to use the same architecture, we've got Bob's laptop on the top left, the category server on the middle right, and the software update server on the bottom left.

      A stateless firewall is intelligent enough to identify the response for a given request, since the ports and IPs are the same, it can link one to the other, and this means that for a specific request to category from Bob's laptop to the server, the firewall automatically knows which data is the response, and the same is true for software updates, for a given connection to a software update server, the request, the firewall is smart enough to be able to see the response or the return data from the software update server back to the category server, and this means that with a stateful firewall, you'll generally only have to allow the request or not, and the response will be allowed or not automatically.

      This significantly reduces the admin overhead and the chance for mistakes, because you just have to think in terms of the directionality and the IPs and ports of the request, and it handles everything else.

      In addition, you don't need to allow the full ephemeral port range, because the firewall can identify which port is being used, and implicitly allow it based on it being the response to a request that you allow.

      Okay, so that's how stateless and stateful firewalls work, and now it's been a little bit abstract, but this has been intentional, because I want you to understand how they work, and sexually, before I go into more detail with regards to how AWS implements both of these different security firewall standards.

      Now at this point, I've finished with the abstract description, so go ahead and finish this video, and when you're ready, I'll look forward to you joining me in the next.

    1. Butler’s Parable of the Sower and Mutu’s A Fantastic Journey both bespeak “the denial and desiring” of their respective homelands (in ways that are legible and reducible to the language of citizenship, cultural particularity, and national governance) but often do so to signal the necessary transformation of these geographies.

      I thought this was interesting because in Octavia Butler's Parable of the Sower there was this sense of "denial and desiring." I interpreted this in a way that Lauren desired to fit in with the world around her but also despised that she had to change herself to fit in. This was very distinct to me in Lauren's world because when she had to leave her homeland, one of the first things she did was cut her hair to make herself resemble a man. The reason for this is that she knows in society she will be more feared if she presents herself as a man. We see throughout the novel how she suffers with her own femininity because of it. Where she finds being a woman sad a disadvantage. It's interesting to me how Frazier was able to point out this complex idea that both Butler and Mutu portray in their works.

    1. Methods

      Would you be willing to provide the code you used for this project as a GitHub repo or a gist?

    2. colabfold_envdb_202108

      Where is this available?

    3. The taxid for each BFVD sequence was retrieved from UniProt and its full lineage - from NCBI (31). The Sankey plot based on this information (Fig. 1a) was generated with Pavian (32). For each taxonomic rank, only the ten most abundant taxa were included in the plot.

      It would be interesting to see a side-by-side comparison to PDB and ViralZone. Where does BFDV have more coverage? Where does ViralZone or PDB have more depth (more sequences per represented sequence in BFDV)

    4. To that end, the 3,002 sequences longer than this threshold were split, resulting in 6,730 sequence fragments

      As commented above, it would be interesting to know more details on how you did this splitting

    1. Far from being an ideal career choice, possessing and capitalizing on a creative ability may be the most obvious means of facilitating life choices.

      not sure what to make of this statement...

    2. Contemporary economic ideologies result in attributing the creative industries with particular characteristics from the outside, not always recognized by creative individuals themselves, forming tensions between the individuals operating within the creative sectors and those support structures nominally established to aid their evolution.

      *

    3. Their opportunity is not responding to what is “out there” but concretizing what is “in here” in their creative hearts and minds.

      interesting turn of phrase!

    4. Pursuing entrepreneurial activity, far from being a response to an external encouragement provided by government, is more likely to represent a mark of self-determination and self-expression. Discourses elevating the importance and the identity of “the entrepreneur” are seen as irrelevant at bes

      hmmm

    5. Market logics are understood and incorporated into solutions and, in fact, are seen to be part of the creative process

      marketization is subsumed into a creative solution (another aspect of problem-solving!)

    6. Creative industry entrepreneurs mediate the relationship between being creative and being an entrepreneur: in their narrative, the creative is often elevated above the business emphasis, but in their behaviors they demonstrate enactment of entrepreneurial actions (planning, strategy, etc.).

      for creative entrepreneurs, the creative tends to come first!

    7. there is a scale of creativity

      hmm - a hierarchy - a young child's finger paining is "creative" but not as much as ...

    8. Idealization of the entrepreneur by powerful external stakeholders contrasts with the intimate experience of the people concerned

      yep

    9. Lisa’s lived experience of creativity is a “feeling of...the satisfaction of knowing that you’re going about the job the right way...” and she is critical of the image of the agonized artist, “I’m very skeptical about these ‘creative impulses’.” For Lisa, creativity is not “a solitary activity”, something that she separates herself from the world to pursue, and is in some way at the mercy of being struck by. Rather, it is a reaction to a problem, “...a conversation...as much as anything.”

      very interesting How do you relate to this?

    10. I find that with creatives, they’re very afraid to take chances...they’re willing to keep it in a box somewhere, not willing to push it, they lack in confidence.”

      well that is certainly one point of view...

    11. hings can be labelled and named without being truly understood

      truth!