1. May 2024
    1. Addgene_85968

      DOI: 10.1038/s41467-024-47423-0

      Resource: RRID:Addgene_85968

      Curator: @scibot

      SciCrunch record: RRID:Addgene_85968


      What is this?

    2. Addgene_33094

      DOI: 10.1038/s41467-024-47423-0

      Resource: RRID:Addgene_33094

      Curator: @scibot

      SciCrunch record: RRID:Addgene_33094


      What is this?

    3. Addgene_33091

      DOI: 10.1038/s41467-024-47423-0

      Resource: RRID:Addgene_33091

      Curator: @scibot

      SciCrunch record: RRID:Addgene_33091


      What is this?

    1. Addgene_112093

      DOI: 10.1016/j.omtn.2024.102183

      Resource: RRID:Addgene_112093

      Curator: @scibot

      SciCrunch record: RRID:Addgene_112093


      What is this?

    2. Addgene_140002

      DOI: 10.1016/j.omtn.2024.102183

      Resource: RRID:Addgene_140002

      Curator: @scibot

      SciCrunch record: RRID:Addgene_140002


      What is this?

    1. Addgene_25999

      DOI: 10.1038/s41388-024-03000-9

      Resource: RRID:Addgene_25999

      Curator: @scibot

      SciCrunch record: RRID:Addgene_25999


      What is this?

    2. Addgene_8454

      DOI: 10.1038/s41388-024-03000-9

      Resource: RRID:Addgene_8454

      Curator: @scibot

      SciCrunch record: RRID:Addgene_8454


      What is this?

    3. Addgene_52961

      DOI: 10.1038/s41388-024-03000-9

      Resource: RRID:Addgene_52961

      Curator: @scibot

      SciCrunch record: RRID:Addgene_52961


      What is this?

    1. plasmid_136470

      DOI: 10.1016/j.redox.2024.103170

      Resource: RRID:Addgene_136470

      Curator: @scibot

      SciCrunch record: RRID:Addgene_136470


      What is this?

    2. plasmid_136467

      DOI: 10.1016/j.redox.2024.103170

      Resource: RRID:Addgene_136467

      Curator: @scibot

      SciCrunch record: RRID:Addgene_136467


      What is this?

    3. plasmid_98290

      DOI: 10.1016/j.redox.2024.103170

      Resource: RRID:Addgene_98290

      Curator: @scibot

      SciCrunch record: RRID:Addgene_98290


      What is this?

    4. plasmid_99154

      DOI: 10.1016/j.redox.2024.103170

      Resource: RRID:Addgene_99154

      Curator: @scibot

      SciCrunch record: RRID:Addgene_99154


      What is this?

    1. RRID:SCR_010035

      DOI: 10.1101/2023.06.25.546449

      Resource: Pennsylvania University Perelman School of Medicine Stem Cell and Xenograft Core Facility (RRID:SCR_010035)

      Curator: @scibot

      SciCrunch record: RRID:SCR_010035


      What is this?

    1. plasmid_192805

      DOI: 10.1038/s41467-024-48151-1

      Resource: RRID:Addgene_192805

      Curator: @scibot

      SciCrunch record: RRID:Addgene_192805


      What is this?

    2. plasmid_192804

      DOI: 10.1038/s41467-024-48151-1

      Resource: RRID:Addgene_192804

      Curator: @scibot

      SciCrunch record: RRID:Addgene_192804


      What is this?

    3. plasmid_192802

      DOI: 10.1038/s41467-024-48151-1

      Resource: RRID:Addgene_192802

      Curator: @scibot

      SciCrunch record: RRID:Addgene_192802


      What is this?

    1. Addgene_138150

      DOI: 10.1038/s41467-024-47140-8

      Resource: RRID:Addgene_138150

      Curator: @scibot

      SciCrunch record: RRID:Addgene_138150


      What is this?

    2. Addgene_109053

      DOI: 10.1038/s41467-024-47140-8

      Resource: RRID:Addgene_109053

      Curator: @scibot

      SciCrunch record: RRID:Addgene_109053


      What is this?

    3. Addgene_109050

      DOI: 10.1038/s41467-024-47140-8

      Resource: RRID:Addgene_109050

      Curator: @scibot

      SciCrunch record: RRID:Addgene_109050


      What is this?

    1. plasmid_48138

      DOI: 10.26508/lsa.202201686

      Resource: RRID:Addgene_48138

      Curator: @scibot

      SciCrunch record: RRID:Addgene_48138


      What is this?

    2. plasmid_45457

      DOI: 10.26508/lsa.202201686

      Resource: RRID:Addgene_45457

      Curator: @scibot

      SciCrunch record: RRID:Addgene_45457


      What is this?

    3. plasmid_40928

      DOI: 10.26508/lsa.202201686

      Resource: RRID:Addgene_40928

      Curator: @scibot

      SciCrunch record: RRID:Addgene_40928


      What is this?

    1. plasmid_12260

      DOI: 10.1371/journal.ppat.1011939

      Resource: RRID:Addgene_12260

      Curator: @scibot

      SciCrunch record: RRID:Addgene_12260


      What is this?

    2. plasmid_8454

      DOI: 10.1371/journal.ppat.1011939

      Resource: RRID:Addgene_8454

      Curator: @scibot

      SciCrunch record: RRID:Addgene_8454


      What is this?

    3. plasmid_160091

      DOI: 10.1371/journal.ppat.1011939

      Resource: RRID:Addgene_160091

      Curator: @scibot

      SciCrunch record: RRID:Addgene_160091


      What is this?

    4. plasmid_62205

      DOI: 10.1371/journal.ppat.1011939

      Resource: RRID:Addgene_62205

      Curator: @scibot

      SciCrunch record: RRID:Addgene_62205


      What is this?

    5. plasmid_52963

      DOI: 10.1371/journal.ppat.1011939

      Resource: RRID:Addgene_52963

      Curator: @scibot

      SciCrunch record: RRID:Addgene_52963


      What is this?

    1. Addgene_38207

      DOI: 10.1093/nar/gkae227

      Resource: RRID:Addgene_38207

      Curator: @scibot

      SciCrunch record: RRID:Addgene_38207


      What is this?

    2. Addgene_106250

      DOI: 10.1093/nar/gkae227

      Resource: RRID:Addgene_106250

      Curator: @scibot

      SciCrunch record: RRID:Addgene_106250


      What is this?

    3. Addgene_167516

      DOI: 10.1093/nar/gkae227

      Resource: Addgene_167516

      Curator: @scibot

      SciCrunch record: RRID:Addgene_167516


      What is this?

    4. Addgene_109301

      DOI: 10.1093/nar/gkae227

      Resource: Addgene_109301

      Curator: @scibot

      SciCrunch record: RRID:Addgene_109301


      What is this?

    5. Addgene_108320

      DOI: 10.1093/nar/gkae227

      Resource: Addgene_108320

      Curator: @scibot

      SciCrunch record: RRID:Addgene_108320


      What is this?

    6. Addgene_138474

      DOI: 10.1093/nar/gkae227

      Resource: RRID:Addgene_138474

      Curator: @scibot

      SciCrunch record: RRID:Addgene_138474


      What is this?

    1. Addgene_12253

      DOI: 10.1128/mbio.03429-23

      Resource: RRID:Addgene_12253

      Curator: @scibot

      SciCrunch record: RRID:Addgene_12253


      What is this?

    2. Addgene_75975

      DOI: 10.1128/mbio.03429-23

      Resource: RRID:Addgene_75975

      Curator: @scibot

      SciCrunch record: RRID:Addgene_75975


      What is this?

    3. Addgene_52962

      DOI: 10.1128/mbio.03429-23

      Resource: RRID:Addgene_52962

      Curator: @scibot

      SciCrunch record: RRID:Addgene_52962


      What is this?

    1. plasmid_74042

      DOI: 10.1038/s41598-024-61167-3

      Resource: RRID:Addgene_74042

      Curator: @scibot

      SciCrunch record: RRID:Addgene_74042


      What is this?

    2. plasmid_44099

      DOI: 10.1038/s41598-024-61167-3

      Resource: RRID:Addgene_44099

      Curator: @scibot

      SciCrunch record: RRID:Addgene_44099


      What is this?

    3. plasmid_50716

      DOI: 10.1038/s41598-024-61167-3

      Resource: RRID:Addgene_50716

      Curator: @scibot

      SciCrunch record: RRID:Addgene_50716


      What is this?

    4. plasmid_62988

      DOI: 10.1038/s41598-024-61167-3

      Resource: RRID:Addgene_62988

      Curator: @scibot

      SciCrunch record: RRID:Addgene_62988


      What is this?

    1. plasmid_29721

      DOI: 10.1126/sciadv.adj5185

      Resource: RRID:Addgene_29721

      Curator: @scibot

      SciCrunch record: RRID:Addgene_29721


      What is this?

    2. Addgene_69929

      DOI: 10.1126/sciadv.adj5185

      Resource: RRID:Addgene_69929

      Curator: @scibot

      SciCrunch record: RRID:Addgene_69929


      What is this?

    1. Plasmid_24130

      DOI: 10.1371/journal.pone.0301099

      Resource: RRID:Addgene_24130

      Curator: @scibot

      SciCrunch record: RRID:Addgene_24130


      What is this?

    2. Plasmid_70183

      DOI: 10.1371/journal.pone.0301099

      Resource: RRID:Addgene_70183

      Curator: @scibot

      SciCrunch record: RRID:Addgene_70183


      What is this?

    3. Plasmid_12260

      DOI: 10.1371/journal.pone.0301099

      Resource: RRID:Addgene_12260

      Curator: @scibot

      SciCrunch record: RRID:Addgene_12260


      What is this?

    1. plasmid_48139

      DOI: 10.1128/spectrum.02006-23

      Resource: RRID:Addgene_48139

      Curator: @scibot

      SciCrunch record: RRID:Addgene_48139


      What is this?

    2. plasmid_10878

      DOI: 10.1128/spectrum.02006-23

      Resource: RRID:Addgene_10878

      Curator: @scibot

      SciCrunch record: RRID:Addgene_10878


      What is this?

    3. plasmid_41008

      DOI: 10.1128/spectrum.02006-23

      Resource: Addgene_41008

      Curator: @scibot

      SciCrunch record: RRID:Addgene_41008


      What is this?

    1. RRID:SCR_002798

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: GraphPad Prism (RRID:SCR_002798)

      Curator: @scibot

      SciCrunch record: RRID:SCR_002798


      What is this?

    2. RRID:SCR_007370

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: Imaris (RRID:SCR_007370)

      Curator: @scibot

      SciCrunch record: RRID:SCR_007370


      What is this?

    3. RRID:SCR_020317

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: Nikon A1R Confocal Laser Scanning Microscope (RRID:SCR_020317)

      Curator: @scibot

      SciCrunch record: RRID:SCR_020317


      What is this?

    4. RRID:AB_2336789

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (Vector Laboratories Cat# H-1000, RRID:AB_2336789)

      Curator: @scibot

      SciCrunch record: RRID:AB_2336789


      What is this?

    5. RRID:AB_2340854

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (Jackson ImmunoResearch Labs Cat# 715-585-150, RRID:AB_2340854)

      Curator: @scibot

      SciCrunch record: RRID:AB_2340854


      What is this?

    6. RRID:AB_2340846

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (Jackson ImmunoResearch Labs Cat# 715-545-150, RRID:AB_2340846)

      Curator: @scibot

      SciCrunch record: RRID:AB_2340846


      What is this?

    7. RRID:AB_2201528

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (Millipore Cat# MAB318, RRID:AB_2201528)

      Curator: @scibot

      SciCrunch record: RRID:AB_2201528


      What is this?

    8. RRID:SCR_016495

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: Vibratome VT1000S Leica Microsystems (RRID:SCR_016495)

      Curator: @scibot

      SciCrunch record: RRID:SCR_016495


      What is this?

    9. RRID:SCR_011323

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: pClamp (RRID:SCR_011323)

      Curator: @scibot

      SciCrunch record: RRID:SCR_011323


      What is this?

    10. RRID:SCR_021042

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: Sutter P-1000 Next Generation Micropipette Puller (RRID:SCR_021042)

      Curator: @scibot

      SciCrunch record: RRID:SCR_021042


      What is this?

    11. RRID:Addgene_50465

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: RRID:Addgene_50465

      Curator: @scibot

      SciCrunch record: RRID:Addgene_50465


      What is this?

    12. RRID:IMSR_JAX:024109

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (IMSR Cat# JAX_024109,RRID:IMSR_JAX:024109)

      Curator: @scibot

      SciCrunch record: RRID:IMSR_JAX:024109


      What is this?

    13. RRID:IMSR_JAX:007914

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (IMSR Cat# JAX_007914,RRID:IMSR_JAX:007914)

      Curator: @scibot

      SciCrunch record: RRID:IMSR_JAX:007914


      What is this?

    14. RRID:IMSR_JAX:017320

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (IMSR Cat# JAX_017320,RRID:IMSR_JAX:017320)

      Curator: @scibot

      SciCrunch record: RRID:IMSR_JAX:017320


      What is this?

    15. RRID:IMSR_JAX:000664

      DOI: 10.1523/ENEURO.0010-24.2024

      Resource: (IMSR Cat# JAX_000664,RRID:IMSR_JAX:000664)

      Curator: @scibot

      SciCrunch record: RRID:IMSR_JAX:000664


      What is this?

    1. plasmid_12260

      DOI: 10.14336/AD.2023.0812

      Resource: RRID:Addgene_12260

      Curator: @scibot

      SciCrunch record: RRID:Addgene_12260


      What is this?

    2. plasmid_158451

      DOI: 10.14336/AD.2023.0812

      Resource: RRID:Addgene_158451

      Curator: @scibot

      SciCrunch record: RRID:Addgene_158451


      What is this?

    3. plasmid_8454

      DOI: 10.14336/AD.2023.0812

      Resource: RRID:Addgene_8454

      Curator: @scibot

      SciCrunch record: RRID:Addgene_8454


      What is this?

    1. RRID:SCR_017694

      DOI: 10.1091/mbc.E24-01-0031-T

      Resource: Rockefeller University Flow Cytometry Resource Center Core Facility (RRID:SCR_017694)

      Curator: @scibot

      SciCrunch record: RRID:SCR_017694


      What is this?

    2. RRID:Addgene_179116

      DOI: 10.1091/mbc.E24-01-0031-T

      Resource: RRID:Addgene_179116

      Curator: @scibot

      SciCrunch record: RRID:Addgene_179116


      What is this?

    3. RRID:Addgene_179105

      DOI: 10.1091/mbc.E24-01-0031-T

      Resource: Addgene_179105

      Curator: @scibot

      SciCrunch record: RRID:Addgene_179105


      What is this?

    4. RRID:Addgene_87421

      DOI: 10.1091/mbc.E24-01-0031-T

      Resource: RRID:Addgene_87421

      Curator: @scibot

      SciCrunch record: RRID:Addgene_87421


      What is this?

    5. RRID:Addgene_58766

      DOI: 10.1091/mbc.E24-01-0031-T

      Resource: RRID:Addgene_58766

      Curator: @scibot

      SciCrunch record: RRID:Addgene_58766


      What is this?

    6. RRID:Addgene_101850

      DOI: 10.1091/mbc.E24-01-0031-T

      Resource: RRID:Addgene_101850

      Curator: @scibot

      SciCrunch record: RRID:Addgene_101850


      What is this?

    1. Plasmid_12259

      DOI: 10.3390/ijms25094953

      Resource: RRID:Addgene_12259

      Curator: @scibot

      SciCrunch record: RRID:Addgene_12259


      What is this?

    2. Plasmid_12260

      DOI: 10.3390/ijms25094953

      Resource: RRID:Addgene_12260

      Curator: @scibot

      SciCrunch record: RRID:Addgene_12260


      What is this?

    3. Plasmid_17448

      DOI: 10.3390/ijms25094953

      Resource: RRID:Addgene_17448

      Curator: @scibot

      SciCrunch record: RRID:Addgene_17448


      What is this?

    4. Plasmid_8453

      DOI: 10.3390/ijms25094953

      Resource: RRID:Addgene_8453

      Curator: @scibot

      SciCrunch record: RRID:Addgene_8453


      What is this?

    1. SymPyで生成した数式も糊付けできます。 Listing 64 では、SymPyで生成したオブジェクトを glue 関数で糊付けしています。

      SymPyのコードと文章を分離できるのは素晴らしいと思うのでその点をもっと強調しても良いと思います。

    2. 図を埋め込む場所に、 {glue:figure} ディレクティブ( Listing 63 )を記述することで、 Listing 62 で生成した図が埋め込めます。

      図を出力する際にコードが邪魔ということはよくあるのでこの有用さに共感できます。そのような、ユースケースの説明があるとより伝わりやすいと思います。

    3. ロールを使うと、文章中に糊付けされた変数を埋め込めます。

      なるほど便利ですね。何に使用するかを最初に書いていただけると読んでいて混乱しないです。

    4. 変数の糊付け

      この表現は一般的ではないと考えます。

    1. O Direito de NĂŁo Falar do Que se Leu

      Para o autor, a leitura Ê uma jornada individual e íntima, uma presença que constrói uma conexão entre a vida e o leitor.

    2. O Direito de Ler em Voz Alta

      A pråtica de ler em voz alta Ê retratada como uma ação que anima as palavras e permite uma melhor compreensão.

    3. O Direito de Saltar de Livro em Livro

      No capítulo 8, enfatiza-se a relevância de reservarmos pequenos intervalos para a leitura em qualquer obra de nossa coleção, reconhecendo a liberdade de escolha e a chance de imergir em diversos mundos literårios.

    4. O Direito de Ler nĂŁo Importa Onde

      Os leitores tĂŞm o privilĂŠgio de ler em qualquer lugar. Cada indivĂ­duo possui o direito de escolher onde ler desde que se sinta confortĂĄvel para o fazer.

    5. O Direito de Amar os “Heróis” dos Romances

      Este capĂ­tulo oferece uma reflexĂŁo sobre reconhecer e honrar os momentos em que os leitores se identificam profundamente com os protagonistas das histĂłrias. Isso ĂŠ visto como uma parte essencial do desenvolvimento tanto literĂĄrio quanto pessoal.

    6. O Direito de Ler nĂŁo Importa o QuĂŞ

      O quinto capítulo enfatiza a diferença entre livros considerados "de qualidade" e aqueles tidos como menos satisfatórios. Nesta parte, o autor salienta que Ê importante os indivíduos lerem o que realmente gostam sem terem medo de críticas ou julgamentos.

    7. O Direito de Reler

      O quarto capĂ­tulo comemora a liberdade e a felicidade de reler obras que foram anteriormente descartadas.

    8. O Direito de NĂŁo Acabar um Livro

      O texto enfatiza a relevância da independência relativamente à leitura, encorajando os leitores a confiarem nas suas preferências e vivências pessoais. Isso pode incluir a decisão de abandonar a leitura de certos livros.

    9. O Direito de Saltar PĂĄginas

      Neste segundo capítulo, o autor defende que os leitores têm o direito de escolher o que desejam ler e de que maneira desejam fazê-lo, incluindo a liberdade de saltar partes menos cativantes. O autor fala sobre a importância crucial da autonomia individual na abordagem à leitura.

    10. O Direito de NĂŁo Ler

      Neste capítulo, investiga-se a interligação entre a leitura e a autonomia pessoal. O autor reconhece os benefícios inegáveis da leitura, porém adverte contra a imposição dela como uma norma moral. Ele salienta a necessidade de respeitar a decisão de não ler, destacando que essa escolha não deprecia o indivíduo. É uma reflexão acerca da liberdade de escolha e da importância de evitar julgamentos sobre os hábitos literários dos indivíduos.

    11. O Direito de NĂŁo Falar do Que se Leu

      O leitor tem o direto de falar ou não sobre o que leu. Às vezes o livro significou tanto para o leitor a nível pessoal que prefere manter apenas para si mesmo. "Ínfimas e secretas conivências que falam da paradoxal alegria de viver, mesmo quando referem o trágico absurdo da vida. "

    1. コードセルの出力を非表示にするには、コードセルに hide-output タグを追加します。

      コードセルの出力を非表示にするとどのような場合に便利か説明があると親切です。

    1. GitHubやReadTheDoscなどにデプロイする場合、

      「ブックの公開」のセクションへのリンクがあると便利です。

    2. {nb-exec-table} ディレクティブから、Notebookの実行結果の統計を確認できます。

      便利ですね!これはドキュメントのどこに書いても全てのNotebookの実行結果が出力されるのでしょうか?

    1. Although design alone can’t ensure physical and psychological safety, there are plenty of opportunities to advocate for people who will use a space and design to support them, according to multiple LGBTQIA+ designers at HKS. “Design can give people — no matter how they self-identify — the ability to be comfortable showing up as they are,”

      I chose this section because I have a lot of friends that are a part of the LGBTQIA+ community and I really care about them and I think that inclusivity is very important. This quote stood out to me because I never thought about how much people can be affected by design before reading this. I think it is very important no matter what field you are going into to be inclusive and keep in mind that you want to come across as friendly and welcoming to everyone. One experience I had that relates to inclusivity in design is the difference I felt going to Children's Hospital versus going to Northwest Hospital. It felt so much more welcoming at the hospital meant for children than the hospital meant for adults. I can't help but wonder why? Adults want to feel welcomed and comfortable too.

    2. For each of these LGBTQIA+ designers and advocates, creating space that truly includes members of their community and those representing other minority groups — whether it’s space for conversation or a building like a hospital, elementary school or commercial office — has more to do with people than elaborate plans or drawings.

      I think this section of the article highlights the importance of not only having a place to open up to others, but also having people in that space that will support you no matter what. I know that in my experience, feeling accepted, welcomed, and comfortable are all very important in a community. Inclusion is about making people feel seen and valued for who the are, and making people feel a sense of belonging.

    3. Reflecting on their lives and identities, LGBTQIA+ designers bring perspective that can lead to more welcoming, comfortable spaces for people with similar backgrounds and lived experiences as them, as well as a broader range of people who encounter the places they design.

      I find it very important for spaces to be welcoming and exclusive to all people. I know what it is like to not fit in because of cultural barriers and find it to be crucial for places to include everyone no matter what background they have. I chose this part of the text because I was unaware how much a places design could affect how people feel but as I read more of the text I see how this is important. Having a space that welcomes all people helps people from all backgrounds interact with each other and create a more accepting and loving space.

      Yadira Cebreros

    4. it’s important for designers to think about how they can provide opportunities to reduce stress, especially in hospitals.

      I chose this quote because it really made me think about how design work, that goes on for anything, is a very complex process behind the scenes. I never really thought about how, if you were designing a space where people are feeling sensitive, such as a hospital, you should design it in a way that a large variety of people will feel safe in it. It didn't occur to me that when making and designing spaces a lot of thought goes into making it a space that will accommodate the diversity of the people who will use it. I think this is a really important concept because it is something that needs to happen in most fields. As someone going into computer science, any program or app or website that I design and create should be designed with the people using it in mind. Things like adding image descriptions which will be read by text-to-speech algorithms so people with limited sight can also engage with a website in the same way that others do is just one example of how the design process can be driven by the people using your product. It also makes me think about spaces I've disliked being in and who those spaces may be catering to instead.

    1. Patreon. URL: https://www.patreon.com/ (visited on 2023-12-08).

      I have seen Patreon before linked in creator's bios but never checked out their website. The UI looks really nice and its clear that its made for creators. The website states that "Patreon provides a space for artists to sustain themselves by connecting them directly to their own communities." which also found interesting because its a direct call to action in a way.

    2. atreon

      This is the first time I looked at the Patreon home page and I was surprised by the user interface. It was extremely interactive, and it illustrates the creativity it wants to embody for its audience. Under features, there's a "build real community feature", with the sections on how to interact and grow with your audience which I thought I was really compelling.

    1. 本章では、Notebook形式のコンテンツにおいて、Notebookの実行やブックに出力される内容を制御する方法を解説します。 { requestKernel: true, binderOptions: { repo: "binder-examples/jupyter-stacks-datascience", ref: "master", }, codeMirrorConfig: { theme: "abcdef", mode: "python" }, kernelOptions: { name: "python3", path: "./notebook" }, predefinedOutput: true } kernelName = 'python3'

      他の見出し1でも共通ですが、この下にサブセクションの目次があると便利だと思います。

    1. 入力したコードを非表示にできます。

      入力したコードを非表示にすると何が便利なのか説明があると読んでいてイメージがしやすいです。

    1. Jupyter Bookでは、Notebook形式でサポートされているすべてのMarkdown構文をサポートしています。

      こちらも参照できるドキュメントのリンクがあれば親切です。

    1. a small group of power users who do the majority of the contributions, and a very large group of lurkers who contribute little to nothing.

      I found this very interesting because I see it all the time on different social media platforms. For example, if you take a look at any page, the account might have high followings with a few people that often interact with the post and the other portion of the followers sees it but does nothing.

    2. ery large group of lurkers who contribute little to nothing.

      This is something that is very true among social media platforms. There are posts that are seen on Instagram, but there are barely and comments. However, there can be a lot of shares. A prime example of this case happening however is on Reddit. There can be niche questions, and users can click on the website or scroll and not interact because they are satisfied with finding an answer.

    1. The term "Type-Out" was coined by Tom at Cambridge Typewriter in MA to refer to the practice of having a Type-In outside in the sunshine. The first such Type-Out was held in front of Cambridge Typewriter on Oct 22, 2011.
    1. dune build --watch

      To build and run it requires inotify plugin

      opam install inotify

      Add run rule to dune file ... (rule (alias run) (action (run ./path/to/your/executable)))

      and then run the command

      dune build --watch @run

      This will automatically build and run the program/

    1. Want to run a typewriter shop? by [[Richard Polt]]

    2. If you've been dreaming of plunging into this profession, consider the success of Paul Lundy, who took over Bremerton Office Machine Company from nonagenarian Bob Montgomery; or Antony Valoppi, creator of Portland's Type Space, which combines a traditional typewriter shop with a cultural center; or Trevor Brumfield, a young man in his late twenties who has quickly built Dayton's TB Writers Plus into a busy enterprise.
    1. And … it works. I‘m not personally a fan of vertical tabs to begin with, but I could adapt to this. In this configuration, Arc‘s default behavior of closing other tabs starts to make sense to my organization-craving ADHD brain. I also like that each space can have its own color theme.And … it works. I‘m not personally a fan of vertical tabs to begin with, but I could adapt to this. In this configuration, Arc’s default behavior of closing other tabs starts to make sense to my organization-craving ADHD brain. I also like that each space can have its own color theme.
    1. Se refiere a la modificaciĂłn que se realiza al curriculum donde los docentes pueden dar opiniones para poder formar parte en la mejora del mismo para asĂ­ poder llegar al aprendizaje de los estudiantes para asĂ­ formar lideres justos solidarios e innovadores.

    1. The DID document does not express revoked keys using a verification relationship. If a referenced verification method is not in the latest DID Document used to dereference it, then that verification method is considered invalid or revoked. Each DID method specification is expected to detail how revocation is performed and tracked.

      This would be where a PKI Public Key Infrastructure comes in

    1. Szczególną uwagę w tym modelu należy zwrócić na połączenie węzłów ADHD z wrażliwością na nagrodę i przedsionkowym przetwarzaniem czuciowym. Jeśli chodzi o to ostatnie, połączenie węzła ADHD-A z przetwarzaniem przedsionkowym nie jest zaskakujące, ponieważ układy przedsionkowe odgrywają dużą rolę w zwracaniu uwagi, skupieniu i czujności (Bigelow i Agrawal, 2015). Układy przedsionkowe są również zaangażowane w równoważenie motoryki dużej i tonusu oraz są stymulowane przez aktywność fizyczną, co dodatkowo wpływa na uwagę (Wiener-Vacher i in., 2013). Sugeruje to, że ADHD-H ma pośredni związek z przetwarzaniem przedsionkowym poprzez ADHDA. Jeśli chodzi o wrażliwość na nagrodę, wiąże się ona ujemnie z ADHD-H, co jest przeciwieństwem ich relacji w populacjach klinicznych (Tripp i Aslop, 2001), można uznać, że ADHD i nagroda mają inny związek u dorosłych nieklinicznych, jednak potrzebne są dalsze badania.

      Przetwarzanie sensoryczne jest związane z uwagą, równoważeniem motoryki dużej i tonusem mięśni. Są stymulowane przez aktywność fizyczną

    2. Z drugiej strony, przetwarzanie sensoryczne pozostawało względnie niezależne w społeczności 3, co potwierdzają nasze statystyki bootstrappingu, i łączyło się z innymi społecznościami tylko poprzez lęk paniki (najsilniejszy) i mniej uwagę. W rzeczywistości nasz model sugerował, że lęk paniki ma wielowymiarową naturę i działa jako czynnik modulujący w interakcji między ADHD / ASD, schizotypią i przetwarzaniem sensorycznym. Zostało to dodatkowo potwierdzone przez statystyki ładowania krzyżowego i replikacji w analizie bootstrap. W literaturze można znaleźć kilka linii poparcia dla tego zjawiska. Po pierwsze, doniesiono, że lęk napadowy/somatyczny wiąże się z nieprawidłowym przetwarzaniem sensorycznym, zwłaszcza w integracji bodźców sensorycznych (Engel-Yeger i Dunn, 2011), co okazało się nienormalne w ADHD/ASD, ponieważ powoduje uczucie zalania sensorycznego i wywołuje panikę/lęk somatyczny (Panagiotidi i in., 2017a, b). Po drugie, uważa się, że lęk paniki powoduje dezorganizację myślenia i zachowania, ale jest również wynikiem nieefektywnego wykorzystania zasobów uwagi w schizotypie (Pallanti i Salerno, 2015; Eley i in., 2007). Ma również silny związek z lękiem społecznym (Potter i in., 2014), a stamtąd z naszą społecznością 1.Modulacyjny charakter lęku panicznego, jaki zaobserwowano w naszym modelu, może wynikać z selektywnego przetwarzania informacji o potencjalnym zagrożeniu – uprzedzenia w treści poznania, takie jak zniekształcone interpretacje, takie jak niezwykła percepcja i pomysły odniesienia, lub błędy w procesach poznawczych, takie jak wykorzystanie zasobów uwagi do postrzeganego zagrożenia. Ponieważ nasz model jest siecią nieukierunkowaną, co oznacza, że krawędź między dwoma węzłami jest pod wpływem obu, wnioskujemy, że lęk nie jest produktem ADHD, schizotypii lub przetwarzania sensorycznego, ale raczej pomostem, na który w równym stopniu wpływa czynnik wpływający.

      Związek przetwarzania sensrycznego i lęku oraz, nieuwagi (głównie, deficytów w percepcji). - Deficyty w percepcji (oraz dysregulacja emocjonalna, jako coś dodadanego, albo skutek), deficyty w pamięci i koncentracji tworzą podstawy do rozwoju i nasilania się lęku, oraz lęku panicznego

    3. Jeśli chodzi o to ostatnie, połączenie węzła ADHD-A z przetwarzaniem przedsionkowym nie jest zaskakujące, ponieważ układy przedsionkowe odgrywają dużą rolę w zwracaniu uwagi, skupieniu i czujności (Bigelow i Agrawal, 2015)

      Przedsionkowe przetwarzanie i integracja sensoryczna/wraĹźenia sensoryczne

    4. Doniesiono, że lęk napadowy/somatyczny wiąże się z nieprawidłowym przetwarzaniem sensorycznym, zwłaszcza w integracji bodźców sensorycznych (Engel-Yeger i Dunn, 2011), co okazało się nienormalne w ADHD/ASD, ponieważ powoduje uczucie zalania sensorycznego i wywołuje panikę/lęk somatyczny (Panagiotidi i in., 2017a, b)

      Zaburzenia integracji sensorycznej nasilają lęk

    1. Today’s federal court system was not an overnight creation; it has been changing and transitioning formore than two hundred years through various acts of Congress. Since district courts are not called for inArticle III of the Constitution, Congress established them and narrowly defined their jurisdiction, at firstlimiting them to handling only cases that arose within the district.

      In the past few decades, the federal courts system has changed and transitioned. Congress has passed various laws over two hundred years. Since district courts aren't required They were established by the Constitution, Article III, and were given narrow jurisdiction at first keeping them to district specific cases.

    1. Feeling pressure to appear neurotypical, neurodivergent students often try to overcompensate in work and in social settings. For example, students with ADHD often exhibit perfectionist tendencies, spending a lot of time on their work so that they don’t appear to be “less than” their peers.

      Most of my closest friends are neurodivergent in some way, and I have been able to understand through being friends with them how it affects their attitude in social settings. While I myself as far as I know am neurotypical I have been able to understand and recognize these perfectionist tendencies seen in people with ADHD. I think that teaching educators of how to be mindful of this perfectionist nature could be incredibly beneficial as to help these students not become overwhelmed with the need to be perfect. Anthony Craig

    2. Neurodivergent students see their neurotypical peers as the “ideal” students, which can lead to negative self-judgment—telling oneself, for example, “I don’t do things the way I’m expected to, so there’s something wrong with me,”

      I chose this section because I did not realize I had ADHD till I was an adult. Though my brother got diagnosed as a child, my symptoms were less obvious but are easy to point out in hindsight: I always had missing assignments, I couldn't bring myself to do homework but knew enough to get by, I hyperfocused on books, I was disorganized, and much more. Today, I have a lot of skills and coping strategies to manage my ADHD. This is important because as I go into the workforce, I will need to continue to work in a way that is most effective instead of "right". -Arya

    1. Improving the Nation’s Cybersecurity

      all objectives: 1.3 | Removing Barriers to Sharing Threat Information. The Federal Government contracts with IT and OT service providers to conduct an array of day-to-day functions on Federal Information Systems. These service providers, including cloud service providers, have unique access to and insight into cyber threat and incident information on Federal Information Systems. At the same time, current contract terms or restrictions may limit the sharing of such threat or incident information with executive departments and agencies (agencies) that are responsible for investigating or remediating cyber incidents, such as the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and other elements of the Intelligence Community (IC). Removing these contractual barriers and increasing the sharing of information about such threats, incidents, and risks are necessary steps to accelerating incident deterrence, prevention, and response efforts and to enabling more effective defense of agencies’ systems and of information collected, processed, and maintained by or for the Federal Government. 1.1 | Modernizing Federal Government Cybersecurity. To keep pace with today’s dynamic and increasingly sophisticated cyber threat environment, the Federal Government must take decisive steps to modernize its approach to cybersecurity, including by increasing the Federal Government’s visibility into threats, while protecting privacy and civil liberties. 1.2 | Enhancing Software Supply Chain Security. The security of software used by the Federal Government is vital to the Federal Government’s ability to perform its critical functions. The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors. There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended. The security and integrity of ‘‘critical software’’—software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources)—is a particular concern. Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software. 1.4 | Standardizing the Federal Government’s Playbook for Responding to Cybersecurity Vulnerabilities and Incidents. (a) The cybersecurity vulnerability and incident response procedures currently used to identify, remediate, and recover from vulnerabilities and incidents affecting their systems vary across agencies, hindering the ability of lead agencies to analyze vulnerabilities and incidents more comprehensively across agencies. Standardized response processes ensure a more coordinated and centralized cataloging of incidents and tracking of agencies’ progress toward successful responses. 1.4 | Improving Detection of Cybersecurity Vulnerabilities and Incidents on Federal Government Networks. The Federal Government shall employ all appropriate resources and authorities to maximize the early detection of cybersecurity vulnerabilities and incidents on its networks. This approach shall include increasing the Federal Government’s visibility into and detection of cybersecurity vulnerabilities and threats to agency networks in order to bolster the Federal Government’s cybersecurity efforts. 1.4 | Improving the Federal Government’s Investigative and Remediation Capabilities. Information from network and system logs on Federal Information Systems (for both on-premises systems and connections hosted by third parties, such as CSPs) is invaluable for both investigation and remediation purposes. It is essential that agencies and their IT service providers collect and maintain such data and, when necessary to address a cyber incident on FCEB Information Systems, provide them upon request to the Secretary of Homeland Security through the Director of CISA and to the FBI, consistent with applicable law.

    2. (c) Within 90 days of receiving the recommendations described in sub-section (b) of this section, the Director of OMB, in consultation with theSecretary of Commerce and the Secretary of Homeland Security, shall formu-late policies for agencies to establish requirements for logging, log retention,and log management, which shall ensure centralized access and visibilityfor the highest level security operations center of each agency

      authority

    3. (b) Within 14 days of the date of this order, the Secretary of HomelandSecurity, in consultation with the Attorney General and the Administratorof the Office of Electronic Government within OMB, shall provide to theDirector of OMB recommendations on requirements for logging events andretaining other relevant data within an agency’s systems and networks. Suchrecommendations shall include the types of logs to be maintained, thetime periods to retain the logs and other relevant data, the time periodsfor agencies to enable recommended logging and security requirements, andhow to protect logs. Logs shall be protected by cryptographic methods toensure integrity once collected and periodically verified against the hashesthroughout their retention. Data shall be retained in a manner consistentwith all applicable privacy laws and regulations. Such recommendationsshall also be considered by the FAR Council when promulgating rules pursu-ant to section 2 of this order

      authority or capacity?

    4. (j) To ensure alignment between Department of Defense Information Net-work (DODIN) directives and FCEB Information Systems directives, the Sec-retary of Defense and the Secretary of Homeland Security, in consultationwith the Director of OMB, shall

      capacity

    5. (i) Within 90 days of the date of this order, the Director of CISA shallprovide to the Director of OMB and the APNSA a report describing howauthorities granted under section 1705 of Public Law 116–283, to conductthreat-hunting activities on FCEB networks without prior authorization fromagencies, are being implemented. This report shall also recommend proce-dures to ensure that mission-critical systems are not disrupted, proceduresfor notifying system owners of vulnerable government systems, and therange of techniques that can be used during testing of FCEB InformationSystems. The Director of CISA shall provide quarterly reports to the APNSAand the Director of OMB regarding actions taken under section 1705 ofPublic Law 116–283

      learning?

    6. (h) Within 90 days of the date of this order, the Secretary of Defense,the Director of National Intelligence, and the CNSS shall review the rec-ommendations submitted under subsection (g) of this section and, as appro-priate, establish policies that effectuate those recommendations, consistentwith applicable law

      learning or capacity?

    7. Within 45 days of the date of this order, the Director of the NSAas the National Manager for National Security Systems (National Manager)shall recommend to the Secretary of Defense, the Director of National Intel-ligence, and the Committee on National Security Systems (CNSS) appropriateactions for improving detection of cyber incidents affecting National SecuritySystems, to the extent permitted by applicable law, including recommenda-tions concerning EDR approaches and whether such measures should beoperated by agencies or through a centralized service of common concernprovided by the National Manager

      authority?

    8. ithin 75 days of the dateof this order, agencies shall establish or update Memoranda of Agreement(MOA) with CISA for the Continuous Diagnostics and Mitigation Programto ensure object level data, as defined in the MOA, are available and acces-sible to CISA, consistent with applicable law

      capacity

    1. layananPlatform Digital Penyiaran

      Sistem layanan platform digital penyiaran?

    2. Jasa Penyiaran

      Tidak ada penjelasan terkait istilah "Jasa Penyiaran"

    3. memenuhi kebutuhan masyarakat akan informasi,pengetahuan, hiburan, dan meningkatkan kemampuanliterasi bermedia

      Problem

      Tanpa kejelasan skema, tujuan-tujuan mulia ini selamanya hanya akan jadi utopia belaka. 🖖 Perlu ada terobosan atau afirmasi kebijakan terkait partisipasi yang bermakna dari Lembaga Pendidikan dan atau Lembaga Penelitian.

      Argumen

      • Jumlah dan Sebaran Program Studi terkaitt Penyiaran (Ilmu Komunikasi, Broadcasting, Film, Televisi, Periklanan dll) meningkat pesat sejak 20 tahun terakhir.
      • Peminat prodi komunikasi selalu menempati urutan tinggi dibanding prodi lainnya. Sayangnya, Prodi ini mulai dikeluhkan karena Kuliahnya Nggak Gampang, Cari Kerjanya Susah
      • Problem klasik Link & Match antara lain disebabkan minimnya sarana laboratorium siaran/multimedia yang dikelola penyelenggara Prodi dan tidak tumbuhnya ekosistem industri penyiaran di daerah.
      • Dibutuhkan setidaknya 8 tahun untuk proses inkubasi TV Pendidikan yang dikelola oleh Perguruan Tinggi (Sula, dkk 2015)

      Usulan

    4. PERAN SERTA MASYARAKAT

      Problem

      • Ruang lingkup peran serta masyarakat masih sangat umum.
      • Belum mencerminkan partisipasi bermakna.
      • Terbatas pada aspek pemantauan konten media.

      Argumen

      • Teknologi digital telah menggeser audiens media tidak hanya sebagai konsumen tapi sekaligus produsen konten (prosumer)
      • ...

      Usulan

    1. BuildingonStar’smotivationtoexploretheinfrastructures’operations – decodingthemaster narratives and exclusion mechanisms – our motivation is also deeply com-mitted to justice and inclusion.
    2. According to Star (2015: 480), “many information sys-tems employ what literary theorists would call amasternarrativeor asinglevoicethatdoes not problematize diversity. ȃis voice speaks unconsciously from the centerof things” (Star 2015: 476, our emphasis). ȃis voice includes and excludes, createsinsiders and outsiders. In this sense, infrastructure is a “fundamentally relationalconcept, becoming real infrastructure in relation to organized practices” (idem).Actually, it is the invisibility that makes the embodied infrastructure moreencompassing. Whereas the physical infrastructure can be permanently up-dated – new buildings, new computers, new collections – the embodied infras-tructure can remain inert throughout these visible changes.Moments of crises – like the present times – make this inertia more visible
    3. Although less visible, this second meaning of infrastructure points to some-thing that is, nonetheless, as real as buildings, rooms, storage shelves, and collec-tions.
    4. (e.g., Star 2015). It is learned as part of membership in a given community of prac-tice.It manifests itself as a set of embodied standards usually perceived as‘natural’by that community’s members.
    5. As a relational concept, infrastructure is a fundamental part of human or-ganization, embedded in other structures, social arrangements, and technologies