10,000 Matching Annotations
  1. Nov 2024
    1. In th in king abo u t a perform ance it i s e a s y to a s s u m e th a tthe c o n te n t of t h e p r e s e n ta tio n i s merely an e x p r e s s i v e exte n sio n of th e c h a r a c t e r of th e perform er and to s e e th e functionof th e p erfo rm an ce in t h e s e p e rso n a l term s

      can't think of presentation as just an extension of the performer

    2. h e s e in h ib i tio n s o f thea u d i e n c e allow th e perform er som e elbow-room in buildingup an im p r e s s ip n o f h i s own c h o i c e and allow him to function,for h i s own good or the a u d i e n c e ’ s, a s a pro tec tio n or a threatth a t c l o s e i n s p e c t io n would d es tro

      the sphere allows space for performer to do what they need to do to maintain the performance, even if their concealed behavior would break down the performance altogether if witnessed by the audience

    3. A s p h e re of t h i s s o r t i s p l a c e d aroundman by h i s ' h o n o r . 1 L a n g u a g e very po ig n an tly d e s i g n a t e s an i n s u l tto o n e s honor a s 'c o m i n g too c l o s e : ’ the r a d i u s of t h i s s p h e r e m arks,a s it w er e, t h e d i s t a n c e w h o s e t r e s p a s s i n g by an o th e r p e r s o n i n s u l t so n e ' s honor.

      idea of "honor" and personal integrity protect the individual in their concealment wrong to break through this sphere

    4. If we s e e p e r c e p tio n a s a form of c o n t a c t and communion,»c con tro l o v e r what i s p e rc eiv e d i s con tro l over c o n ta c tth a t i s mr.J-

      control over perceptions i control over contact made!!

    5. B e c a u s eof th e s e s h a re d dram atic c o n t in g e n c ie s , we ca n profitablystu d y p erfo rm an ce s th a t a re quite f a ls e in order to learn abouto n e s that a re q u ite h o n e s

      because even the liars and honest want to be presumes as honest, looking at how the nonhonest perform and work to legitimate their authority shows us how the already legitimate do it?

    6. With s u c hs t r a t e g i c a l l y lo c a te d p o i n t s of r e ti c e n c e , it i s p o s s i b l e tom aintain a d e s ir a b le status quo in the r e la tio n s h ip w ithouth a v in g to ca rry out rigidly th e im p l ic a tio n s of t h i s ag re e m e n tin all a r e a s of life

      One can maintain a status quo without rigid adherence to all demands of performance in the relationship

    7. h e la rg e r t h e number of m a tte rs an d th e la rg e rth e number o f a c tin g p a r ts which fall within th e domain of thero le or r e la tio n s h i p , the more lik e lih o o d , it would seem , forp o in ts o f s e c r e c y to e x i s t.

      larger number of matters and parts of relationship = more points of secrecy

    8. Although p a r ti c u la r p erfo rm an ce s,a n d even p a r t i c u l a r p a r t s or r o u tin e s , may p l a c e a perform erin a p o sitio n of h aving nothing to h id e , so m ew here in thefull round of h is a c t i v i t i e s th e re will b e so m e th in g h e c a n n o tt r e a t o p e n ly

      almost always there are things someone cannot openly address within performance

    9. We find th at c h a r la ta n p ro fe s s io n a l a c tiv ityo f o n e d e c a d e b ec o m e s an a c c e p t a b l e le g itim a te o c c u p a tio nin th e next. 3 We find th a t a c t i v i t i e s which a r e thought tobe l e g itim a te by so m e a u d i e n c e s in our s o c ie ty are thoughtby o th e r a u d i e n c e s to be r a c k e ts

      what is a lie and what is legitimate all highly flexible, temporally and culturally informed

    10. F u rth e r, in e v e ry d ay li f e it i s u s u a l l y p o s s i b l e forthe perform er to c r e a te in te n tio n a lly a lm o st any kind o f f a l s eim p re ssio n without pu ttin g h im s e lf tn th e in d e f e n s ib le p o sitio no f having told a c l e a r - c u t lie . Com m unication t e c h n iq u e ssuch a s innuendo, s t r a t e g i c am bigu ity, an d crucial o m is s io n sa llow th e m isinform er to profit from l i e s w ithout, te c h n ic a l ly ,te llin g any

      A lot of ways to lie without directly lying, yet, "bare-faced" lies are the ones with all the consequences

    11. t i s f e lt to be all right for im m ig ran ts toim p e r s o n a te n a t iv e A m eric an s in d r e s s and in p a t t e r n s ofdecorum but £a«L it is s t i l l a doubtful m atter to A m eric an iz eo n e ’s n a m e 2 or o n e ’s n o s e

      iffy definitions of what is a valid personification of something othered or something you're not. Not all of them considered bad but the categorization of what is okay and not okay is highly flexible

    12. la im s tob e a law g r a d u a te ca n b e e s t a b l i s h e d a s valid or invalid, butc laim s to be a friend, a true b e lie v e r, or a m usic lo v e r can beconfirmed or d isc onfirm ed only m o re-o r-le ss.

      line is more blurred where claims to be something have less tangible means of legitimating

    13. we may h a v e some sym pathy for th o s ewho hav e but o n e fata l flaw an d who attem pt to c o n c e a l thefac t th a t they are, for exam ple, e x - c o n v ic ts , deflow ered,e p i le p t ic or r a c ia ll y impure, i n s t e a d of adm itting th e ir faultand making an ho n o u rab le attem pt to liv e it down

      have empathy for those with one hidden thing vs those who conceal everything

    14. Mythology and our popularm a g a z in e s , in fa c t, are full o f rom antic s t o r i e s in w hich th ev illa in and the hero both make fraud ulent c l a i m s that ared is c r e d ite d in th e l a s t ch a p te r, the v illa in p roving not to hav ea high s t a t u s , th e hero proving not to h a v e a low one

      not usually offended when someone is acting down- acting as a lower status than they actually are

    15. a u th o riz a tio n to play a part and th e c a p a c ity to play it

      we get offended by these performers who aren't who they say they are because they weaken our belief in a connection between authority to perform apart and the capability to play the part - one can act and not have the credentials, what does that mean for everyone else?

    16. hen we d i s c o v e r th a t som e on e with whom we h a v ed e a l i n g s i s a n im p o s to r and out-and-out fraud, we are d i s c o v e rin g th a t he did not hav e th e right to play th e part he p la y e d ,th a t he w a s n o t an a c c r e d i te d incum bent o f the r e le v a n t s t a t u s

      When we find out someone is a fraud, what we discover is that they did not have authority to play the part they played- they don't have the means of status by the right materials or legitimating factors

    17. We often feel that it i s ju s t t h e s e te rrib le ev e n tu a l i t i e s , which a r i s e from being c a u g h t out, flagrante delicto,in a p a t e n t a c t o f m is re p re s e n t a ti o n , th a t an h o n e s t perform eri s a b l e t o avo id . T h i s c o m m o n -se n se view h a s lim ite d a na l y t i c a l u tility .

      in our heads- a true or honest performer- would not mess up. Assumption that there IS an honest performer or someone who embodies something without a need for front. This view isn't analytically very applicable

    18. s mem bers o f t h e a u d i e n c e i t i s natural for u s to feelth a t th e im p re ssio n th e perform er s e e k s to g iv e may be trueo r f a l s e , g en u in e or s p u rio u s, v alid or ' p h o n y .

      as members, we assess validity or phoniness of performance

    19. s h e s t r i v e s ro identify h e r s e l f with t h i s figure an dt h u s to se em t o h e r s e l f to be s t a b i l i z e d , j u s t i f i e d in her sple n do r

      identification with a figure- not with oneself

    20. A c e r ta in b u re a u c ra tiz a tio n of thes p i r i t i s e x p e c t e d s o that we can be relied upon to give ap e rfe c tly h o m o g e n e o u s perform ance at every ap p o in te d time.A s S a n ta y a n a s u g g e s t s , t h e s o c i a l i z a t i o n p r o c e s s not onlytr a n s f ig u r e s , it f i x e s

      we do not let or are expected not to allow momentary emotions to impact performance- should be homogenous

    21. In oth e r w ords, .we must be p repared to s e e th a t the im p re ssio nof r e a lity f o s te r e d by a perform ance i s a d e l ic a te , fra gile th in gt h a t can be s h a t t e r e d by very minor m is h a p s

      our presentations are fragile and easily destroyed by minor mishaps

    22. nglo-Am erican s o c ie t y must often p a s s a s tr ic tt e s t of a p t n e s s , f i t n e s s , propriety, .and decorum

      we usually designate strict social expectations of presentation to other cultures but exist well within our own.

    23. It h a s b e e n s u g g e s te d th a t th e perform er c a n rely uponh is a u d ie n c e to a c c e p t minor c u e s a s a sign of som ethingim portant about h i s perform ance. T h i s c o n v e n ie n t fa c t h a s anin c o n v e n ie n t im plica tio n . By v irtu e of th e same sig n -ac ce p cin gten d en c y , th e a u d ie n c e may m is u n d e r s ta n d th e m eaning th a t ac u e w a s d e s ig n e d to con vey, or may r e a d an e m b a rra ssin gm eaning into g e s t u r e s or e v e n t s that were a c c i d e n t a l , ina d v e r te n t, in c id e n t a l or not meant by the perform er co carryany m eaning w h ats o ev e r

      takes very little to signal this meaning- susceptible to misinterpretation

    24. In our com m ercial lif e t h i s c h a r a c t e r i s t i co f p e rfo rm a n c e s h a s b een e x p lo ite d a n d maligned u nder th erubric ' p e r s o n a l i z e d s e r v i c e ; ’ in o th e r a r e a s of life we makej o k e s about ' t h e b e d - s id e m a n n e r ’ o r ' t h e g la d h a n d .

      often beneficial for actor to downplay routinization of actions- act like that interact is special, personal, meaningful, etc.

    25. h e a u d i e n c e ca n s e e a g r e a t s a v in g of tim e and em otionalenergy in th e righ t to tr e a t th e performer a t o c c u p a tio n a lfa e e - v a lu e , a s if t h e perform er w ere all a n d on ly what h i suniform c la im e d him to be.

      Not always a demand for "authenticity" - audience benefits from seeing front appropriate for the context of THEIR relation to the individual

    26. S im ilarly, m edical s c h o o l s in Am erica te n d torec ru it th eir s t u d e n t s partly on the b a s i s o f e t h n i c orig in s,an d c e r ta in ly p a t ie n t s , c o n s id e r t h i s fac to r in c h o o s in g th e ird o c t o r s ; but in t h e a c tu a l in te r a c t io n betw e en d o c to r andp a tie n t the im p re ssio n i s a l lo w e d to d e v e lo p that th e d o ctori s . a d octor b e c a u s e o f s p e c i a l a p t i t u d e s a s well a s s p e c ia ltraining .

      both med schools and patients act like they choose doctors on aptitude and training as opposed to ethnic origins

    27. clergym en g iv e th e im p re ssio n th a t they e n te r e d th e churchb e c a u s e o f a c a ll o f fe lt v o c a tio n , in America te nding toc o n c e a l th e ir i n t e r e s t in moving up s o c i a l l y , in B rita in te ndingto c o n c e a l th e ir i n t e r e s t in not moving to o far down

      conceal motives that break idea of what a "good" clergymen should do

      Can you be a good clergymen and still wish to progress socailly?

    28. Reinforcing t h e s e id e a l i m p r e s si o n s we find a kin d of ' r h e t o r i c of tr a in in g ,' w hereby labourunions, u n i v e r s i t i e s , tr a d e a s s o c i a t i o n s , and o th e r l i c e n s in gb o d ie s re q u ire p r a c t i t i o n e r s to a b s o rb a m y s t ic a l rang e andp e rio d of train in g , in p a rt to maintain a monopoly, but inpart to f o s te r th e im p r e s s io n th a t th e l i c e n c e d p r a c titio n e ri s som eone s e t a p a r t from o th e r me

      training extensive to five image that they are set apart

    29. d e a l m o tiv e s for a c q u irin g the role in whichth e y are perform ing, th a t th e y have id e a l q u a l if ic a tio n s fort h e role, an d th a t it w a s not n e c e s s a r y for them to su ffe ran y in d ig n i tie s , in s u l t s , an d h u m ilia tio n s, or make an y ta c it ly -u n d e rsto o d ' d e a l s , ' in o rd er to a c q u ire th e role.

      fulfill idealized ideas of routines and roled

    30. It h a s beens u g g e s t e d t h a t th e sa m e so rt of beh aviour, which we may referto a s ‘ s e c r e t c o n s u m p t i o n ’, ca n be found am ong the H indus.

      many people consume things in secret to keep up an image

    31. In a s e n s e su c h i m p r e s s i o n s a re i d e a li z e d , too, for if th eperform er i s to b e s u c c e s s f u l h e m u st offer th e kin d of s c e n eth a t r e a l i z e s t h e o b s e r v e r s ’ extrem e s t e r e o t y p e s o f h a p l e s spov erty

      never a performance about bettering or reflecting what is really there, people embody identities for a certain result

    32. I h a v e been told by S h e tla n d e r s th a t theic g ra n d f a th e rsu s e d to refrain from improving t h e a p p e a r a n c e of th e c o t ta g ele sc th e la ir d ta k e suc h im p rov em ents a s a sig n th a t in c r e a s e dr e n t s could be e x t r a c te d from them

      while reasons for hiding lack of material wealth and making it seem like one has more, other instances requires or rewards the downplaying of material wealth. A. Serving a lot of food when guests are over even if you live off very little. B. Letting your house look bad so landlords don't think they can charge extra

    33. m erica w h o se m em bers h a v e felt th a tsome a s p e c t o f every p erfo rm an ce o u g h t to play down thee x p r e s s io n o f s h e e r w ealth in o rd er to f o ste r th e im p re ssio nth a t s ta n d a r d s reg a rd in g birth, c u ltu r e , or moral e a r n e s t n e s sa r e t h e o n e s th a t p r e v a i

      even in America is material wealth is downplayed as if other moral standards are stronger forces for prosperity

    34. not in d iv id u a ls , but a l s o a so n e in w hich p e rf o rm a n c e s te n d to e s t a b l i s h favourable c l a i m sre g a rd in g n o n-m aterial v a l u e s

      Indian caste system allows for social movement in non-material gains (by adopting certain belief systems and practices) which re-centers the lower classes around the practices that allow for them to be upwardly mobile

    35. h e p ro p e r s ig n -eq u ip m en t h a s bee n o b ta in e d and fam iliarityg a in e d in t h e m an ag e m en t of it, then t h i s equipm ent c a n beu s e d to e m b e llis h and illu m in e o n e ’s daily p e rfo rm a n c e s w itha fa v o u r a b le s o c ia l s ty le

      minimal separation between the status and the front- Here, Goffman doesn't distinguish something like yearly income attaining status than the means to attain the front of a certain status

    36. Commonly we find that upward mobility in v o lv e s th e p r e s e n tatio n of proper p erform ances and that effo rts to move upwardand e ffo rts to keep from moving downward a re e x p r e s s e d inte rm s of s a c r i f i c e s made for the m a in te n a n c e of front.

      upward mobility frequently requires presenting a proper performance and the efforts to move up are expressed in maintaining the front that someone is of a higher class

    37. iis p erform ance will te n d to in c o rp o rate and exemplify th eo ffic ia lly a c c r e d i te d v a l u e s ot th e s o c ie t y , more so , in fact,limn d o e s h i s behavio ur a s a whole.

      performance is more focused on living up to standard societal expectations than an individuals actual behabior

    38. T h e a r i s t o c r a t i c h ab it, •ith a s b een s a id , i s one th a t m o b il iz e s all t h e minor a c t i v i t i e s ofl i f e w hich fall o u t s i d e th e s e r io u s s p e c i a l i t i e s of o th e r c l a s s e sa n d i n j e c t s in to t h e s e a c t i v i t i e s an e x p r e s s io n of c h a r a c t e r ,pow er, and high rank

      some say aristocracy is injecting expressions of character into minor activities

    39. he w ill be c o n c e r n e d not so much with th e full roundof t h e d if fe r e n t r o u t i n e s he perform s but only w ith th e o n efrom which h i s o c c u p a t io n a l r e p u ta tio n d e r iv e s .

      not about doing his best in ALL routines- focus on the one his identity most invested in?

    40. When we e x a m in e a group or c l a s s , we find th a t them em bers o f it tend to in v e s t th e ir e g o s primarily in c e r ta inr o u tin e s , g ivin g l e s s s t r e s s to th e o th e r o n e s w hich th e y p e rform.

      people often choose a certain routine to invest own ego into

    41. T h o s e who hav e th e time and ta len t to performa t a s k well may not, b e c a u s e of th is , h av e the tim e or ta le n tto make it apparenc that they are perform ing well.

      Performing a task well takes time away from the effort required to LOOK like you're performing a task well

    42. T h u s to furnish a h o u s e so that it will e x p r e s s sim ple, qu ietdignity, th e h o u s e h o ld e r may h a v e to r a c e to a u c tio n s a l e s ,h a g g l e with a n tiq u e d e a le rs , an d doggedly c a n v a s s a ll th elo c al s h o p s for proper w allp ap e r an d cu rta in m a te ria ls

      Creates an irony "It takes a lot of work to make this look easy" One embodies the characteristics not present in the role itself for the appearance of the role. Sometimes this characteristics contradict the role.

    43. M erchan ts, too, often findth a t they must cha rge hig h p r i c e s for th in g s that look intrins i c a l l y e x p e n s iv e in order to c o m p e n s a te the e s ta b l is h m e n tfor e x p e n s iv e t h in g s lik e in s u r a n c e , s la c k p erio d s, e tc ., thatnever a p p e a r before th e c u s to m e rs ’ e y

      merchants overcharge for things that look expensive (are in which to role of money is dramatically fulfilled) so that they can pay for what costs but is not dramatic

    44. he n u r s e s a r e “ w a s t i n g r i m e 0 u n l e s s they a r e d a r t i n g ab ou td oin g so m e v i s i b l e t h i n g s u c h a s a d m i n i s t e r i n g h y p o d e r m i

      issue- exists a nonbelief in other people that are doing fulfilling their role unless they see a dramatized representation of the task

    45. h e must give an i n s t a n t a n e o u sd e c i s i o n so th a t th e a u d i e n c e will b e s u r e th a t h e i s s u r e o fh i s jud g e m en

      example- umpire must act sure of call for the sake of their own authority

    46. An i n t e r e s t i n g i l l u s t r a t i o n of th e dilem m a of s e l e c t i n g ana p p r o p r ia te front from s e v e r a l not q uite f ittin g o i'e s may befound to d a y in A m erican m e d ic a l o r g a n i z a t i o n s with r e s p e c t toth e t a s k o f a d m in is t e r in g a n e s t h e s i a

      often the front or selection of t- or title- isn't suitable for all the tasks at hand

    47. As a com prom ise, th e full ran g e of d iv e rs ity is cutat a few crucial p o in ts , and all t h o s e w ithin a given brac ketare allo w ed or o b lig e d to m a in ta in the sam e s o c ia l front ince r ta in s it u a t i o n

      diversification of society too vast- break up into distinct categories and provide based on those- allowing or forcing people to maintain social front

    48. will be perform ed in what h a s becom e a s ta n d a r d iz e d , c l i n i c a l ,c o n f id e n tia l manner.

      appearances provide a expectations for manner and behavior someone should expect- varying thing such as actions become standardized, ease the stress of someone like a client.

    49. r o v id e s u s w ith a m e a n s of s timu la tin g our i n t e r e s t in and a t te n t io n to e x c e p t i o n s

      our ideal type is when the manner and appearance of presentation match

    50. A p p e a r a n c e ’ may be ta k e n to refer tot h o s e stim uli which function at th e tim e to tell u s of th eperform er’s s o c ia l s t a t u s e s . T h e s e stimuli also te ll u s o fth e i n d i v i d u a l 's tem porary ritu a l s t a t e , th a t i s , w hether he i se n g a g in g in formal s o c ia l a c tiv i ty , work, or informal re c re a tio n ,w h eth e r or not he is c e le b r a tin g a new p h a s e in the s e a s o nc y c le or in h is lif e -c y c le . ' M a n n e r ' may be ta k e n to refer toth o s e stim uli w hich fu n ction at the tim e to warn u s of th e intera c tio n ro le th e performer will e x p e c t to play in th e on-comings it u a ti o n .

      appearance are status and other identifications (can show things like what you do for work) Manner tells us of oncoming action within a persons role (what the person expects to happen or how others are to respond)

    51. p e r s o n a l f r o n t ’ torefer to the oth e r ite m s of e x p r e s s i v e e q u ip m en t, th e ite m s th a twe most in tim a te ly id e n tify with th e perform er him s elf and th atwe n a t u r a lly e x p e c t will follow t h e perform er w herever he g o e s .As part of p e r s o n a l front we may i n c l u d e : in s ig n ia of o ffic e orr a n k ; c l o t h i n g ; s e x , age, and r a c ia l c h a r a c t e r i s t i c s ; s i z e andl o o k s ; p o s t u r e ; s p e e c h p a t t e r n s ; f a c ia l e x p r e s s i o n s ; bodil

      apart of the "front" is expressive equipment, what is used to express oneself

    52. ro n t, th e n , i s th e e x p r e s s i v e e quipm ent of as ta n d a r d kind i n t e n t io n a lly or unw ittin g ly em ployed by theind iv id u al during h is perform ance. F or p relim in ary p u r p o s e s , itv.ill be c o n v e n ie n t to d i s t i n g u i s h and la b e l what s e e m to be thesta n d aril p a r t s of fron

      Labeling- The "front" of the stage

    53. Another il l u s t r a t i o n maybe found in th e raw re c ru it who in it ia l ly fo llo w s army e t iq u e t tein o rd e r to a v oid p h y s ic a l punish m en t and who e v e n tu a lly co m esto follow th e r u l e s s o th a t h is o r g a n iz a tio n will not be sh a m e dand h i s o f f i c e r s a n d f e ll o w - s o ld i e r s will r e s p e c t him

      so little distinction between performing and becoming

    54. t h e s e a r e c y n i c a l perform ers w hosea u d i e n c e s will not a llow them to be s in c e r e . Similarly, we findth a t s y m p a th e tic p a t i e n t s in m ental w ards will s o m e tim e s feignb iz a r re sym ptom s so th a t s tu d e n t n u r s e s will not be s u b je c t e dto a d is a p p o in ti n g ly s a n e perform ance. 1 So a ls o , when inferi o r s e x ten d th e ir most la v is h r e c e p tio n for v i s i tin g s u p e rio r s ,th e s e l f i s h d e s i r e to win favour may not be the c h i e f m o tiv e;the inferio r may be ta c tf u lly attem p tin g to put the su p e rio r ate a s e by s im u la tin g the kind of world the s u p e r io r i s thought tota k e for gran ted

      there is often a demand to be insincere that the cynical performers, in their hyperawareness of the gap between reality and the performers, more willingly offer up this insincerity.

    55. A c y n i c a l in d ividual mayd elu d e h i s a u d i e n c e for what he c o n s i d e r s to be th e ir own good,or for the good o f the com munity, e t c .

      not every cynical performer evil- some work to do good with such performance

    56. It shou ld be u n d e rsto o d th a t th e c y n ic , witha ll h i s p r o f e s s io n a l d isin v o lv e m e n t, may o b ta in u n p r o fe s s io n a lp l e a s u r e s from his m a sq u e ra d e , e x p e r ie n c in g a kind of gleefuls p ir itu a l a g g r e s s io n from th e fac t that h e c a n toy a t will withsom ething h i s a u d i e n c e m ust ta k e s e r i o u s l y

      MMEEEE

    57. C o u p led with th i s , th e perform er may be moved to .guide theco n v ic tio n of h i s a u d i e n c e only a s a m e a n s to o th e r e n d s ,ha v in g no u ltim ate co n c ern in th e c o n c e p t io n th a t th e y hav e ofhim o r of th e s it u a ti o n

      other extreme- individual isn't at all convinced of own performance, may not actually care if its real me asf

    58. i s th a t th e i l l u s t r a t i o n s to g e th er fit into a co h e ren t framework that t i e s to g e th e r b i t s of e x p e r ie n c e the r e a d e r h a s a lre a d yhad and p r o v id e s th e stu d e n t with a guide worth t e s t i n g in c a s e -s t u d i e s ’of i n s t itu ti o n a l s o c ia l life

      ethnography vibes- iffy methodology but good theories?

    59. In re a l life,th e t h r e e p a r t i e s are c o m p re s s e d into t w o ; th e p a rt o n e in d iv id u a l p l a y s i s ta ilo r e d to th e p a r ts p la y e d by th e o t h e r s pres e n t , and yet t h e s e o th e rs a l s o c o n s t i t u t e t h e a u d i e n c e .

      except this time, the audience is the performers

    60. e s t a g e p r e s e n t s t h i n g s th a t are m a k e - b e lie v e ; p resumab ly life p r e s e n t s th i n g s th a t are rea l a n d s o m e tim e s not wellr e h e a r s e d .

      use the metaphor of the theater- presentation of oneself in response to presentation of others for an audience- world of make-believe

    Annotators

    1. Daniela Pajtašová z Ústavu hematologie a krevní transfuze:

      [P]o užití marihuany je třeba dodržet minimálně týden odstup, než půjdete darovat krev. Užití musí být výjimečné, pravidelné užívání se s dárcovstvím neslučuje.

      [Užívání marihuany] více jak 1x za půl roku [je považováno za pravidelné].

      [Krev od lidí, kteří užívají marihuanu pravidelně, není žádoucí] především [proto, že] je to známka dalšího možného rizikového chování.

      Darovat krev tedy mohu, pokud jsem v posledním půlroce užil marihuanu maximálně jednou a od tohoto užití uplynul nejméně týden. Častější užívání marihuany je považováno za rizikové, protože značí další možné rizikové chování.

    1. Mohu darovat krev, když občas užívám marihuanu?

      Daniela Pajtašová z Ústavu hematologie a krevní transfuze:

      [P]o užití marihuany je třeba dodržet minimálně týden odstup, než půjdete darovat krev. Užití musí být výjimečné, pravidelné užívání se s dárcovstvím neslučuje.

      [Užívání marihuany] více jak 1x za půl roku [je považováno za pravidelné].

      [Krev od lidí, kteří užívají marihuanu pravidelně, není žádoucí] především [proto, že] je to známka dalšího možného rizikového chování.

      Darovat krev tedy mohu, pokud jsem v posledním půlroce užil marihuanu maximálně jednou a od tohoto užití uplynul nejméně týden. Častější užívání marihuany je považováno za rizikové, protože značí další možné rizikové chování.

    1. Reviewer #3 (Public review):

      The aim of the study was to map, a) whether different tissues exhibit different metabolic profiles (this is known already), what differences are found between female and male mice and how the profiles changes with age. In particular, the study recorded the activity of respirasomes, i.e. the concerted activity of mitochondrial respiratory complex chains consisting of CI+CIII2+CIV, CII+CIII2+CIV or CIV alone.

      The strength is certainly the atlas of oxidative metabolism in the whole mouse body, the inclusion of the two different sexes and the comparison between young and old mice. The measurement was performed on frozen tissue, which is possible as already shown (Acin-Perez et al, EMBO J, 2020).

      Weakness: The assay reveals the maximum capacity of enzyme activity, which is an artificial situation and may differ from in vivo respiration, as the authors themselves discuss. The material used was a very crude preparation of cells containing mitochondria and other cytosolic compounds and organelles. Thus, the conditions are not well defined and the respiratory chain activity was certainly uncoupled from ATP synthesis. Preparation of more pure mitochondria and testing for coupling would allow evaluation of additional parameters: P/O ratios, feedback mechanism, basal respiration, and ATP-coupled respiration, which reflect in vivo conditions much better. The discussion is rather descriptive and cautious and could lead to some speculations about what could cause the differences in respiration and also what consequences these could have, or what certain changes imply.<br /> Nevertheless, this study is an important step towards this kind of analysis.

      Comments on the second revision:

      I believe this is an important and interesting area of study, although I recognise that the assay which measures maximal enzyme activity under unphysiological conditions has its limitations. Nevertheless, it does seem possible to get a first glance of the respiratory situation in the respective tissue. There is a typo in the source data (Fig. xC) for skeletal muscle.

    1. The synthetic melody mingles with the lapping of waves against the littered shore, a reminder of humanity’s careless overconsumption. This is where our journey begins, on a beach that time and nature have forgotten, replaced by the detritus of modern life. As Damon Albarn’s voice floats over the waves, you might find yourself tapping your foot to the catchy synths. Don’t be fooled—this isn’t your typical beach vacation. The sand crunches unnaturally beneath your feet, each step a reminder of the world we’ve created. The horizon, once a clear line between sea and sky, now wavers uncertainly, distorted by a haze o

      I think how you incorporate small details that preview the topics you address in this essay are really creative. This paragraph really sets the scene of your listening guide which I think mine would benefit from.

    1. . W ciągu dnia dynamika neuronalna potrzebna do wspierania naszych zróżnicowanych zachowań jest znaczna: przełączamy się tam i z powrotem między różnymi ogniskami uwagi, angażujemy się w różne zadania i czasami nudzimy się przed zakończeniem konkretnej aktywności. Pojawiają się teoretyczne i empiryczne wsparcia dla tej koncepcji: niedawny model masy neuronalnej (Ramka 2) sugeruje, że rozproszone projekcje LC są w stanie wspierać wiele unikalnych trybów przetwarzania w mózgu [24], a złożoność sygnałów neuronalnych po stymulacji mózgu jest maksymalna w pośrednich stanach pobudzenia [72]. Oczywiście ma to sens z punktu widzenia zwierzęcia, ponieważ zdolność do eksploracji i uczenia się o nowym środowisku (np. poszukiwanie zasobów) jest napędzana przez kilka systemów korowych i podkorowych mózgu [22,73], a systemy, które mogą ułatwiać ich wyrafinowaną interakcję, niewątpliwie wzmacniają adaptacyjne zachowanie, a zatem działają jako kluczowe substraty dla selekcji naturalnej.

      Charakterystyka procesu przełączanie się między różnymi rodzajami uwagi/trybami przetwarzanie.

    2. Poprzez nadawanie stosunkowo niskowymiarowego sygnału do reszty mózgu, który zwiększa receptywność i pobudliwość regionów docelowych, wzorce aktywności w LC mogą (nieco wbrew intuicji) promować formowanie się quasi-krytycznego reżimu [24]. Efekt jest pozornie prosty: poprzez globalne wzmocnienie wzorców aktywności, te regiony o średnim poziomie aktywności mogą teraz przekroczyć nieliniową barierę, która drastycznie zwiększa ich częstość wyładowań (znaną jako "bifurkacja" w teorii systemów dynamicznych [43]). Innymi słowy, neurony, które są już częściowo aktywne (tj. przetwarzają sygnały glutaminergiczne), mogą teraz "wyróżnić się" z tła aktywności [44] i w ten sposób wpłynąć na ewoluujący stan przestrzenno-czasowy mózgu, który kontroluje różnorodny zestaw stanów mózgu, w tym funkcje poznawcze [45,46], kodowanie pamięci [47,48], uczenie się percepcyjne [49,50], wydajność motoryczną [51] i świadomość percepcyjną [38,52,53]. Obecnie istnieją empiryczne dowody wspierające ten stosunkowo globalny efekt LC na dynamikę całego mózgu zarówno u gryzoni [10], jak i u ludzi [18,19,38,54–57]. Jednak dalsze badania, które mogą mierzyć (lub stymulować) LC podczas jednoczesnego śledzenia lokalnego uwalniania i wpływu NA [26,58] w więcej niż jednym regionie (szczególnie w różnych kontekstach behawioralnych) są potrzebne, aby potwierdzić biologiczny mechanizm indukowanych przez NA zmian w topologii sieci na dużą skalę.

      Makroskopowe działanie LC NE

    3. LC jest także jądrem przedmotorycznym układu autonomicznego, regulującym aktywność układu współczulnego poprzez projekcje do jądra pośrednio-bocznego w rdzeniu przedłużonym, między innymi [14]. To poprzez te projekcje LC ma wpływ na rozszerzenie źrenicy [27–31], co jest miarą często używaną do pośredniego wnioskowania o wyładowaniach LC (Ramka 1).

      Związek LC z autonomicznym układem nerwowym

    4. 8. Analiza dominacji LC lub BNM w sygnale:Ponadto, aby zbadać dominację LC lub BNM w tym sygnale, zminimalizowaliśmy relację LC + BNM = αLC + βBNM (warunkując, że α i β są dodatnimi stałymi) i stwierdziliśmy, że α = 0,16 i β = 0,84 dawały najlepsze dopasowanie do krajobrazu energetycznego LC + BNM.Minimalizacja relacji polega na znalezieniu wartości α i β, które najlepiej opisują wpływ LC i BNM na łączny krajobraz energetyczny.Warunek, że α i β są dodatnimi stałymi, zapewnia, że wpływ każdego układu jest dodatni.Wynik α = 0,16 i β = 0,84 sugeruje, że BNM ma znacznie większy wpływ (84%) na łączny krajobraz energetyczny niż LC (16%).9. Wniosek o dominacji dynamiki BNM i jej implikacje:Oznacza to, że dynamika BNM dominuje w jednoczesnym krajobrazie energetycznym LC + BNM, co jest zgodne z jednokierunkowymi projekcjami synaptycznymi z LC, które synapsują na BNM w drodze do kory¹², i sugeruje, że fazowe wybuchy LC + BNM mogą być inicjowane przez LC w celu wywołania kaskady aktywności BNM.Dominacja BNM w krajobrazie energetycznym wskazuje, że BNM odgrywa główną rolę w kształtowaniu aktywności mózgu podczas jednoczesnej aktywacji.Jednokierunkowe projekcje synaptyczne z LC do BNM oznaczają, że neurony z LC wysyłają sygnały do BNM, ale nie odwrotnie.Sugeruje to, że LC może inicjować aktywność w BNM, czyli fazowe wybuchy w LC mogą wywoływać kaskadę aktywności w BNM.Implikacje dla funkcjonowania mózgu:LC może działać jako wyzwalacz dla aktywacji BNM.BNM następnie dominuje w modulacji krajobrazu energetycznego, wpływając na stany poznawcze takie jak uwaga i czujność.Ta interakcja może być kluczowa dla elastycznego przetwarzania informacji i dostosowywania się mózgu do zmieniających się warunków.

      Wyjaśnienie jednokierunkowych projekcji z LC do nbM - mała aktywność w LC a duża w nbM (LC, wpływa na nbM i go aktywnuje)

    5. LC jest także jądrem przedmotorycznym układu autonomicznego, regulującym aktywność układu współczulnego poprzez projekcje do jądra pośrednio-bocznego w rdzeniu przedłużonym, między innymi [14]. To poprzez te projekcje LC ma wpływ na rozszerzenie źrenicy [27–31], co jest miarą często używaną do pośredniego wnioskowania o wyładowaniach LC (Ramka 1).

      LC reguluje również układ autonomiczny (jądroprzedmotoryczne)

      poprzez projekcje do jądra pośrednio-bocznego w rdzeniu przedłużonym, między innymi [14]. To poprzez te projekcje LC ma wpływ na rozszerzenie źrenicy [27–31]

    1. Art. 16.

      Jurisprudência em teses nº 234 (26/04/2024)


      • A necessidade da demonstração de urgência para o deferimento da medida cautelar de indisponibilidade de bens em ação de improbidade administrativa reveste-se de caráter processual, de modo que a alteração legislativa do art. 16 da Lei n. 8.429/1992, dada pela Lei n.14.230/2021, tem aplicação imediata ao processo em curso.

      • A partir da vigência da Lei n. 14.230/2021, exige-se a demonstração do requisito da urgência, além da plausibilidade do direito invocado, para o deferimento da indisponibilidade de bens em ação de improbidade administrativa.

    2. Art. 11.

      Jurisprudência em teses nº 234 (26/04/2024)


      • A contratação de servidores públicos temporários sem concurso público, mas baseada em legislação local, por si só, não configura ato de improbidade administrativa previsto no art. 11 da Lei n. 8.429/1992, por estar ausente o elemento subjetivo (dolo) necessário para a configuração do ato de improbidade violador dos princípios da administração pública.

      • A nova redação do art. 11 da LIA, dada pela Lei n. 14.230/2021, que tipificou de forma taxativa os atos de improbidade administrativa por ofensa aos princípios da administração pública, obsta a condenação genérica com base nos revogados incisos I e II do mesmo artigo para atos praticados na vigência do texto anterior da lei e sem condenação transitada em julgado.

      • Não se extingue a ação de improbidade administrativa se a exclusão da conduta anteriormente disposta no art. 11 da LIA - violação genérica aos princípios administrativos - aboliu a tipicidade, mas a nova previsão legal especifica em seus incisos a conduta descrita, em razão do princípio da continuidade típico-normativa.

      • Não caracteriza ato de improbidade administrativa praticado por prefeito a ausência de prestação ou de repasse de informações solicitadas pelo Poder Legislativo ou por municípes, quando inexistente o intuito malicioso, desonesto ou corrupto.

    3. Art. 10.

      REsp 1.929.685-TO , Rel. Ministro Gurgel de Faria, Primeira Turma, por unanimidade, julgado em 27/8/2024. (Informativo 823)

      Destaque

      A exigência do efetivo prejuízo, em relação ao ato de improbidade administrativa que causa lesão ao erário, prevista no art. 10, caput , da Lei n. 8.429/92 (com redação dada pela Lei 14.320/2021) se aplica aos processos ainda em curso.

      Informações do Inteiro Teor

      Após alterações operadas pela Lei n. 14.230/21, a norma do art. 10, caput , da Lei de Improbidade passou a prever expressamente que "constitui ato de improbidade administrativa que causa lesão ao erário qualquer ação ou omissão dolosa, que enseje, efetiva e comprovadamente, perda patrimonial, desvio, apropriação, malbaratamento ou dilapidação dos bens ou haveres das entidades referidas no art. 1º desta Lei, e notadamente (...)".

      Em razão disso, o dano presumido, para qualquer figura típica do art. 10 da LIA (inclusive os incisos VIII e XI do caso) não pode mais dar suporte à condenação pela prática de ato ímprobo.

      Diante desse novo cenário, os casos anteriores à alteração legal, ainda em trâmite, e que apresentem a supracitada controvérsia devem ser solucionados com a posição externada na nova lei, que reclama dano efetivo. Sem este (o dano efetivo), não há como reconhecer o ato ímprobo.

      Não se trata exatamente de discussão sobre a aplicação retroativa de alteração normativa benéfica, já que, anteriormente, não havia norma expressa prevendo a possibilidade do dano presumido. Na realidade, o dano presumido só foi admitido após construção pretoriana, a partir da jurisprudência que se consolidara no Superior Tribunal de Justiça até então, e que vinha sendo prolongadamente aplicada.

      Ocorre que esse entendimento (fruto de construção jurisprudencial, e não decorrente de texto legal) não pode continuar balizando as decisões do STJ, se o próprio legislador deixou expresso não ser cabível a condenação por ato ímprobo mediante a presunção da ocorrência de um dano. Assim, cabe ao Judiciário prestar a devida deferência à opção que foi a escolhida pelo legislador ordinário para dirimir a questão.

    4. § 4º

      Agint no REsp 1.991.470-MG , Rel. Ministro Herman Benjamin, Segunda Turma, por unanimidade, julgado em 11/6/2024. (Informativo 816)

      Destaque

      • A absolvição criminal com fundamento na atipicidade da conduta não faz coisa julgada no juízo cível, considerando a independência das instâncias.

      Informações do Inteiro Teor

      Conforme entendimento sufragado no Superior Tribunal de Justiça, a absolvição operada no Juízo criminal somente se comunica com a esfera administrativa quando negada a existência do fato ou da autoria (AREsp n. 1.358.883/RS, relator Ministro Francisco Falcão, Segunda Turma, julgado em 3/9/2019).

      A absolvição criminal com fundamento na atipicidade da conduta, não faz coisa julgada no cível, considerando a independência das instâncias que, ademais, consta do próprio art. 37, § 4º, da CF: "Os atos de improbidade administrativa importarão a suspensão dos direitos políticos, a perda da função pública, a indisponibilidade dos bens e o ressarcimento ao erário, na forma e gradação previstas em lei, sem prejuízo da ação penal cabível".

      Nesse mesmo sentido da independência das instâncias, diversos são os precedentes do STJ: RMS n. 32.319/GO, Rel. Min. Napoleão Nunes Maia Filho, Rel. para acórdão Min. Sérgio Kukina, Primeira Turma, DJe de 22/9/2016 e REsp n. 1.364.075/DF, Rel. Min. Mauro Campbell Marques, Segunda Turma, DJe de 2/12/2015.

      O referido entendimento jurisprudencial encontra-se em consonância com o disposto no art. 21, § 3º, da Lei n. 8.249/1992 (na redação da Lei n. 14.230/2021), no sentido de que as "sentenças civis e penais produzirão efeitos em relação à ação de improbidade quando concluírem pela inexistência da conduta ou pela negativa da autoria".

      Apesar de o disposto no art. 21, § 4º, da Lei n. 8.429/1992, na redação da Lei n. 14.230/2021, apontar que a "absolvição criminal em ação que discuta os mesmos fatos, confirmada por decisão colegiada, impede o trâmite da ação da qual trata esta Lei, havendo comunicação com todos os fundamentos de absolvição previstos no art. 386 do Decreto-Lei 3.689/1941 (Código de Processo Penal)", tal disposição está suspensa por liminar deferida na ADI/STF 7.236.

      Ademais, nem sempre há correspondência exata entre o dolo que autoriza a improcedência da ação penal por atipicidade da conduta com o dolo exigido no crime de apropriação.

    5. XI

      Súmula Vinculante 13 do STF: A nomeação de cônjuge, companheiro ou parente em linha reta, colateral ou por afinidade, até o terceiro grau, inclusive, da autoridade nomeante ou de servidor da mesma pessoa jurídica investido em cargo de direção, chefia ou assessoramento, para o exercício de cargo em comissão ou de confiança ou, ainda, de função gratificada na administração pública direta e indireta em qualquer dos Poderes da União, dos Estados, do Distrito Federal e dos Municípios, compreendido o ajuste mediante designações recíprocas, viola a Constituição Federal.

    6. § 9º-A

      O §21 do mesmo artigo fala a mesma coisa:

      Art. 17 § 21. Das decisões interlocutórias caberá agravo de instrumento, inclusive da decisão que rejeitar questões preliminares suscitadas pelo réu em sua contestação.

    7. reexame obrigatório

      O art. 17-C também fala que não haverá remessa necessária:

      Art. 17-C. § 3º Não haverá remessa necessária nas sentenças de que trata esta Lei.

    1. lizeth Duarte ID 684503

      Según el análisis e identificación de la autora ella no considera suficiente mente completa la explicación de los fenómenos sociales que no tienen en cuenta la perspectiva subjetiva de los actores. Esta Hipótesis se enmarca en la tradición fenomenológica y sociológica que plantea que las ciencias sociales deben diferenciarse de las ciencias naturales al estudiar y analizar al ser humano, que no solo actúa si o que también interpreta y da sentido a sus acciones. La autora presenta y resalta diferentes argumentos como la experiencia subjetiva en el que el punto de partida de acción social , ya que los individuos actúan basándose en su percepción y significados de la realidad el análisis sociológico debe incorporar el contexto de interpretación individual para captar las motivaciones detrás de las acciones. La suposición planteada parece adecuada en la medida en que reconoce la diferencia entre ciencias sociales y ciencias naturales. La subjetividad es en efecto un componente esencial en el análisis de los fenómenos sociales. No obstante, se debe reflexionar sobre la necesidad de un equilibrio: mientras que la inclusión de la subjetividad es valiosa, la investigación también debe buscar cierta objetividad y consistencia para generar teorías aplicables en diferentes contextos.

    2. En su mayoría, las falacias en las ciencias sociales puedenser reducidas a la fusión de los puntos de vista subjetivoy objetivo, la cual no es percibida por los científicos. Perouna teoría de la acción social debe conservar el punto devista subjetivo en su grado máximo si pretende no perdersus fundamentos básicos, principalmente su referencia almundo social de la experiencia y la vida cotidiana. Res-guardar el punto de vista subjetivo es garantía suficien-te de que la realidad social no será reemplazada por unmundo ficticio inexistente construido por el observadorcientífico. La principal razón por la cual las ciencias so-ciales deben aceptar el punto de vista subjetivo es queeste punto de vista es un principio fundamental de la ex-periencia de sentido común de la vida cotidiana. Desarro-llaremos brevemente este principio fundamental.A través de la actitud natural, el individuo presupone elmundo de la vida cotidiana como su realidad, el mundode la vida cotidiana es el mundo intersubjetivo en cuyointerior y sobre el cual actúa el hombre alerta como unhombre entre sus semejantes. Ese mundo existía antesde nacer nosotros, y era experimentado e interpretadopor otros, nuestros predecesores, como un mundo orga-nizado. Ahora es ofrecido a nuestra experiencia e inter-pretación. Toda interpretación de este mundo se basaen el acervo de experiencias previas sobre él, nuestras otransmitidas por los padres o los maestros; estas expe-riencias funcionan como un esquema de referencia enforma de conocimiento a mano. A este acervo de conoci-miento a mano pertenece nuestro conocimiento de queel mundo en que vivimos es un mundo de objetos más omenos determinados, con cualidades más o menos defi-nidas, entre los cuales nos movemos, que se nos resisteny sobre los cuales podemos actuar.

      Bryan Segura - ID 977365

      El sentido de las experiencias cotidianas son mucho mejor comprendidas en este fragmento del texto.

      La autora puntualiza que las experiencias cotidianas son las que construyen la realidad social de los individuos. Su actitud se adapta al entorno social y es el factor fundamental para entender su actuar en el mundo. La subjetividad no sólo es relevante, sino que es base importante en la construcción social.

    3. Según Schutz, Parsons apunta a restringir el concepto devalores normativos al punto de vista subjetivo. El valormoral es, por un lado, aún el patrón de acción que el actortiene en mente como deseable de ser realizado por su fu-tura acción. En este sentido, es un elemento teleológicopara el actor. Por otro lado, Parsons define la norma comouna descripción verbal de un curso de acción. Pero el ac-tor se encuentra, según Schutz, en un dilema teleológico,pues aun dentro de la esfera de la libre elección, cadafin a ser realizado y cada uno de los medios a ser aplica-dos tienen consecuencias deseables e indeseables, y elactor está siempre enfrentado con la opción de realizar oabandonar su proyecto o de aceptar, con la realización ono de su meta, todas las consecuencias secundarias queinterfieren y lo acompañan. En otras palabras, si el con-cepto de valor normativo es interpretado desde un pun-to de vista estrictamente subjetivo, ninguna razón pue-de descubrirse acerca de por qué la elección entre fines(metas) y medios, regida por valores normativos, debería

      Según Schutz, la crítica que hace a Parsons es que al ver los valores morales solo desde un punto de vista subjetivo, se está perdiendo el actor que siempre enfrenta un dilema cuando toma decisiones. Por un lado, tiene una meta o fin que quiere lograr, pero, por otro lado, tiene que elegir los medios o formas de llegar a esa meta, y cada elección viene con consecuencias que pueden ser buenas o malas.

    1. What this implies is that these kinds of principles cannot serve as the foundations of public equality in asociety. The implementation of these principles cannot be seen as realizations of equality from theegalitarian standpoint. It may be legitimate for people to oer these principles for the regulation of societyonce the public realization of equality is already in place.

      Argumenterar han för någon slags subjektiv rättviseteori? Har för mig att han sa att den inte var subjektiv - men på vilket sätt är den objektiv förrutom att det är viktigt att allt sker offentligt?

    Annotators

    1. Welcome back, this is part two of this lesson.

      We're going to continue immediately from the end of part one, so let's get started.

      Okay, so all three of these mount targets are now in an available state and that means we can connect into this EFS file system from any of the availability zones within the Animals for Life VPC.

      So what we need to do is test out this process and we're going to interact with this file system from our EC2 instances.

      So move back to the tab where we have the EC2 console open.

      And at this point I want you to either, and this depends on your browser, I'll either want you to right click and duplicate this tab to open another identical copy.

      If you can't do this in your browser then just open a new tab and copy and paste this URL into that tab.

      You'll end up with two separate tabs open to the same EC2 screen.

      So on the first tab we're going to connect to A4L-EFS instance A.

      So right click and then select connect.

      We're going to use instance connect.

      So make sure the username is EC2-user and then click on connect.

      Now right now this instance is not connected to this EFS file system and we can verify that by running a DF space-k and press enter.

      You'll see that nowhere here is listed this EFS file system.

      These are all volumes directly attached to the EC2 instance and of course the boot volume is provided by EBS.

      Now within Linux all devices or all file systems are mounted into a folder.

      So the first thing that we need to do to interact with EFS is to create a folder for the EFS file system to be mounted into.

      And we can do that using this command so shudu space mkdir space-p space/efs/wp-content.

      Now the hyphen p option just means that everything in this path will be created if it's not already.

      So this will create forward/EFS if it doesn't already exist.

      So press enter to create that folder.

      So I'm going to clear the screen to keep this easy to see.

      And the next thing I need to do is to install a package of tools which allows this instance or specifically the operating system to interact with the EFS product.

      Now the command I'm going to use to install these tools is shudu to give us admin permissions and then DNF which is the package manager for this operating system.

      And then a space hyphen y to automatically acknowledge any prompts and then a space and then install because I want to install a package and then a space.

      And then the name of the tools that I want to install is amazon hyphen EFS hyphen utils.

      So this is a set of tools which allows this operating system to interact with EFS.

      So go ahead and press enter and that will install these tools and then we can configure the interaction between this operating system and EFS.

      Again I'm going to clear the screen to keep this easy to see and I want to mount this EFS file system in that folder that we've just created.

      But specifically I want it to mount every time the instance is restarted.

      So of course that means we need to add it to the FSTAB file.

      Now if you remember this file from elsewhere in the course it's contained within the forward/ETC folder.

      So we need to move into that folder cd///ETC and then the file is called FSTAB.

      So we need to run shudu to give us admin permissions and then nano which is a text editor and then the name of the file which is FSTAB.

      So press enter and the file will likely have only one or two lines which is the root and/or boot volume of this instance.

      So let's just move to the end because we're going to add a new line and this is contained within the lesson commands document but we're going to paste in this line.

      So this line tells us that we want to mount this file system ID so file system ID colon forward/.

      We want to mount that into this folder so forward/efs forward/wp-content.

      We tell it that the file system type is EFS.

      Remember EFS is actually based on NFS which is the network file system but this is one provided by AWS as a service and so we use a specific AWS file system which is EFS.

      And the support for this has been installed by that tools package which we just installed.

      Now the exact functionality of this is beyond the scope of this course but if you do want to research further then go ahead and investigate exactly what these options do.

      What we need to do though is to point it at our specific EFS file system.

      So this is this component of the line all the way from the start here to this forward/.

      So to get the file system ID we need to go back to the EFS console and we need to copy down this full file system ID and yours will be different so make sure you copy your own file system ID into the clipboard.

      Then go back here and select the colon and then delete all the way through to the start of this line.

      And once you've done that paste in your file system ID what it should look like is the file system ID then a colon and then a forward/.

      So at this point we need to save this file so control O to save and then enter and control X to exit.

      Again I'm going to clear the screen to make it easier to see.

      Then I'll run a DF space -K and this is what the file systems currently attached to this instance look like.

      Then we're going to mount the EFS file system into the folder that we've created and the way that we do this is with this command.

      So shudu mount and then we specify the name of the folder that we want to mount.

      Now the way that this works is that this uses what we've just defined in the FSTAB file.

      So we're going to mount into this folder whatever file system is defined in that file.

      So that's the EFS file system and if we press enter after a few moments it should return back to the prompt and that's mounted that file system.

      There we go we back at the prompt and if we do a DF space -K again we'll see that now we've got this extra line at the bottom.

      So this is the EFS file system mounted into this folder.

      Now to show you that this is in fact a network file system let's go ahead and move into that folder using this command.

      And now that we're in that folder we're going to create a file.

      So we're going to use shudu so that you have admin privileges and then we're going to use the command touch which if you remember from earlier in the course just creates an empty file.

      And we're going to call this file amazing test file dot txt.

      Go ahead and press enter and then do an LS space -LA and you'll see that we now have this file created within this folder.

      And while we're creating it on this EC2 instance it's actually put this file on a network file system.

      Now to verify that let's move back to the other tab that we have open to the EC2 console the one that's still on this running instances screen.

      And now let's go ahead and connect to instance B.

      So right click on instance B select connect again instance connect verify the username is as it should be and click on connect.

      So now we're on instance B.

      Let's do a DF space -K to verify that we don't currently have any EFS file system mounted.

      Next we need to install the EFS tools package so that we can mount this file system.

      So let's go ahead and install that package clear the screen to make it easier to see then we need to create the folder that we're going to be mounting this file system into.

      We'll use the same command as on instance A.

      Then we need to edit the FSTAB file to add this file system configuration.

      So we'll do that using this command so shudu space nano space forward slash ETC forward slash FSTAB press enter.

      Remember this is instance B so it won't have the line that we added on instance A.

      So we need to go down to the bottom paste in this placeholder and then we need to replace the file system ID at the start with the actual file system ID.

      So delete this leaving the colon and forward slash go back to the EFS console copy the file system ID into your clipboard.

      Move back to this instance paste that in everything looks good.

      Save that file with control O press enter exit with control X then we back at the prompt clear the screen.

      We'll use the shudu mount forward slash EFS forward slash WP hyphen content command again to mount the EFS file system onto this instance and again it's using the configuration that we've just defined in the FSTAB file press enter.

      After a few moments you'll be placed back at the prompt we can verify whether this is mounted with DF space hyphen K.

      It has mounted by the looks of things it's at the bottom.

      So now if we move into that folder so CD forward slash EFS forward slash WP hyphen content forward slash and press enter.

      We now in that folder and if we do a listing so LS space hyphen LA what we'll see is the amazing test file dot txt which was created on instance A.

      So this proves that this is a shared network file system where any files added on one instance are visible to all other instances.

      So EFS is a multi user network based file system that can be mounted on both EC2 Linux instances as well as on premises physical or virtual servers running Linux.

      Now this is a simple example of how to use EFS for now we've done everything that we need to do in this demo lesson so we just need to clean up all of the infrastructure that we've used to do that.

      Go back to the EFS console we're going to go ahead and delete this file system so we should already have it selected just select delete you'll need to confirm that process by pasting in the file system ID.

      So go ahead and put your file system ID and then select confirm.

      Now that can take some time to delete and you'll need to wait for this process to complete.

      Once it has completed we're going to go ahead and move across to the cloud formation console.

      You should still have this open in a tab if you don't just type cloud formation in the search box at the top and then move to the cloud formation console.

      You should still have the stack name of implementing EFS which is the stack you created at the start with the one click deployment.

      Go ahead and select this stack then click on delete and confirm that deletion and once that finishes deleting that's all of the infrastructure gone that we've created in this demo lesson.

      So I hope this has been a fun and enjoyable demo lesson where you've gained some practical experience of working with EFS at this point though that is everything that you need to do in this demo lesson.

      So go ahead and complete the video and when you're ready I'll look forward to you joining me in the next.

    1. Welcome back and in this demo lesson I want to give you some abstract practical experience of using the Elastic File System or EFS.

      Now we're going to need some infrastructure.

      Before we apply that as always make sure that you're logged into the general AWS account, so the management account of the organization and you'll need the Northern Virginia region selected.

      Now attached to this lesson is a one-click deployment link so go ahead and click that.

      This is going to provision some infrastructure.

      It's going to take you to the quick create stack screen and everything should be pre-populated.

      You'll just need to scroll to the bottom, check the box beneath capabilities and then click on create stack.

      You're also going to be typing some commands within this demo lesson so also attached to this lesson is a lesson commands document.

      Go ahead and open that in a new tab.

      So this is just a list of the commands that we're going to be using during the demo lesson and there are some placeholders such as file system ID that you'll need to replace as we go but make sure you've got this open for reference.

      Now we're going to need this stack to be in a create complete state before we continue with the demo lesson so go ahead pause the video and resume it once your stack moves into a create complete state.

      Okay so the stacks now moved into a create complete status and what this has actually done is create the animals for life base VPC as well as a number of EC2 instances.

      So if we go to the EC2 console and click on instances running you'll note that we've created a for L - EFS instance A and a for L - EFS instance B and we're going to be creating an EFS file system and mount points and then mounting that on both of these instances and interacting with the data stored on that file system.

      We're going to get you the experience of working with a network shared file system so let's go ahead and do that.

      So to get started we need to move to the EFS console so in the search box at the top just type EFS and then open that in a brand new tab.

      We're going to leave this tab open to the instances part of the EC2 console because we're going to come back to this very shortly.

      So let's move across to the EFS console that we have open in a separate tab and the first step is to create a file system so a file system is the base entity of the elastic file system product and that's what we're going to create.

      Now you've got two options for setting up an EFS file system you can use this simple dialogue or you can click on customize to customize it further.

      So if we're using the simple dialogue we'd start by naming the file system so let's say we use A4L - EFS and then you'd need to pick a VPC for this file system to be provisioned into and of course we'd want to select the animals for life VPC.

      Now we want to customize this further we don't want to just accept these high-level defaults so we need to click on customize.

      This is going to move us to this user interface which has many more options so we've still got the A4L - EFS name for this file system.

      Now for the storage class we're going to pick standard which means the data is replicated across multiple availability zones.

      If you're doing this in a test or development environment or you're storing data which is not important then you can choose to use one zone which stores data redundantly but only within a single AZ.

      Now again in this demonstration we are going to be using multiple availability zones so make sure that you pick standard for storage class.

      You're able to configure automatic backups of this file system using AWS backup and if you're taking an appropriate certification course this is something which I'll be covering in much more detail.

      You can either enable this or disable it obviously for a production usage you'd want to enable it but for this demonstration we're going to disable it.

      Now EFS as I mentioned in the theory lesson comes with different classes of storage and you can configure lifecycle management to move files between those different storage classes so if you want to configure lifecycle management to move any files not accessed for 30 days you can move those into the infrequent access storage class and you can also transition out of infrequent access when anything is accessed so go ahead and select on first access for transition out of IA.

      So in many ways this is like S3 with the different classes of storage for different use cases.

      When you're creating a file system you're able to set different performance and throughput modes.

      For throughput mode you can choose between bursting and enhanced.

      If you pick enhanced you're able to select between elastic and provisioned.

      I've talked more about these in the theory lesson.

      We're going to pick bursting.

      Now for performance you can choose between general purpose and max I/O.

      General purpose is the default and rightfully so and you should use this for almost all situations.

      Only use max I/O if you want to scale to really high levels of aggregate throughput and input output operations per second so only select it if you absolutely know that you need this option.

      You've also got the ability to encrypt the data on the file system and if you do encrypt it it uses KMS and you need to pick a KMS key to use.

      Of course this means that in order to interact with objects on this file system permissions are needed both on the EFS service itself as well as the KMS key that's used for the encryption operation.

      Now this is something that you will absolutely need to use for production usage but for this demonstration we're going to switch it off.

      We won't be setting any tags for this file system so let's go ahead and click on next.

      You need to configure the network settings for this file system so specifically the mount targets that will be created to access this file system.

      Now best practice is that any availability zones within a VPC where you're consuming the services provided by EFS you should be creating a mount target so in our case that's US - East - 1A, 1B and 1C.

      So we're going to go through and configure this so first let's delete all of these default security group assignments.

      Every mount target that you create will have an associated security group so we'll be setting these specifically.

      For now though we need to choose the application subnet in each of these availability zones so in the top drop-down which is US - East - 1A I'm looking for app A so go ahead and do the same.

      In US - East - 1B I want to select the app B subnet and then in US - East - 1C logically I'll be selecting the app C subnet so that's app A, app B and app C.

      Now for security groups the CloudFormation 1 click deployment has provisioned this instance security group and by default this security group allows all connections from any entities which have this attached so this is a really easy way that we can allow our instances to connect to these mount targets so for each of these lines go ahead and select the instance security group you'll need to do that for each of the mount targets so we'll do the second one and then we'll do the third one and that's all of the network configuration options that we need to worry about so click on next it's here where you can define any policies on the file system so you can prevent root access by default you can enforce read only access by default you can prevent anonymous access or you can enforce encryption in transit for all clients connected to this EFS file system so any clients that connect to the mount targets to access the file system you can ensure that that uses encryption in transit and if you're using this in production you might want to select at least this last option to improve security for this demo lesson we're not going to use any of these policy options nor are we going to define a custom policy in the policy editor instead we'll just click on next at this point we just need to review everything's to our satisfaction everything looks good so we're going to scroll down to the bottom and just click on create now in order to continue with this demo lesson we're going to need both the file system and all of its mount targets so go into the file system click on network and you'll see three mount targets being created all three of these need to be ready before we can continue the demo lesson so this seems like a great time to end part one of this demo lesson go ahead and finish this video and then when all of these mount targets are ready to go you can start part two.

  2. www.planalto.gov.br www.planalto.gov.br
    1. arbitragem será sempre de direito

      A arbitragem pode ser de direito ou de equidade.

      Arbitragem de direito

      • Os árbitro seguem as regras do ordenamento jurídico para solucionar os litígios.

      Arbitragem por equidade

      • Os árbitros se afastam das regras de direito para buscar uma solução que considerem mais justa.

      Fonte: Entenda o conceito de arbitragem

    2. III
        1. O edital da licitação deve deixar explícito se o critério de aceitabilidade previsto no art. 59, inciso III, da Lei 14.133/2021 aplica-se somente ao preço global da proposta ou se, também, ao preço unitário dos itens. (Acórdão 2190/2024 Plenário, Representação, Relator Ministro Augusto Nardes.)
    1. Me~bers o[ school communities may believe that sexuality is not anappropriate topic for young people.

      I think this is the problem of believing that in schools they should not be learning certain things. It is a 50/50 situations where certain parents don't want them to learn things because of how they're taught to believe theres only two genders. I feel like now it is something that should be more open and taught because the new generation of school kids will encounter and is a norm for parents to be part of the LGBTQ.

    1. ng may have possible o

      Keep an eye out for places in your writing where you can consider cutting redundant words to improve concision and clarity - here, for example, "may" and "possible" are serving more or less the same purpose

    1. prosthetic leg um you have a very difficult time walking because obviously you're not getting any smata Sensation from the leg so we just just put in pressure and angle sensors o sorry we put in pressure and angle sensors and then the person can feel uh what the leg is doing and um an

      for - BEing journey - The Buzz - sensory substitution - for detecting somatic pressure and angle from artificial leg - Neosensory - David Eagleman

    1. minucioso relatório

      Não confundir com o relatório sintético, que é feito após a conclusão dos trabalhos de revisão.

      Art. 122. Concluídos os trabalhos de revisão, o juiz ou a juíza juntará aos autos relatório sintético das operações de RAE realizadas...

    1. Author response:

      eLife Assessment

      This valuable study uses consensus-independent component analysis to highlight transcriptional components (TC) in high-grade serous ovarian cancers (HGSOC). The study presents a convincing preliminary finding by identifying a TC linked to synaptic signaling that is associated with shorter overall survival in HGSOC patients, highlighting the potential role of neuronal interactions in the tumor microenvironment. This finding is corroborated by comparing spatially resolved transcriptomics in a small-scale study; a weakness is in being descriptive, non-mechanistic, and requiring experimental validation.

      We sincerely thank the editors for the valuable and constructive feedback. We appreciate the recognition of our findings and the significance of identifying transcriptional components in high-grade serous ovarian cancers. We acknowledge the insightful point on our study's descriptive nature and limited mechanistic depth. While further experimental validation would indeed enhance our conclusions, such work extends beyond the current scope of this manuscript. However, we would like to highlight that mechanistic studies demonstrating the impact of tumor-infiltrating nerves on disease progression are emerging (Zahalka et al., 2017; Allen et al., 2018; Balood et al., 2022; Jin et al., 2022; Globig et al., 2023; Restaino et al., 2023; Darragh et al., 2024). Importantly, members of our group have contributed to these findings. These studies, including in vitro and in vivo work in head and neck squamous cell carcinoma as well as high-grade serous ovarian carcinoma, demonstrate that substance P released from tumor-infiltrating nociceptors potentiates MAP kinase signaling in cancer cells, thereby influencing disease progression. This effect can be mitigated in vivo by blocking the substance P receptor (Restaino et al., 2023). Our present work identifies a transcriptional component that aligns with the presence of functional nerves within malignancies. These published mechanistic studies support our findings and suggest that this transcriptional component could serve as a potential screening tool to identify innervated tumors. Such information is clinically relevant, as patients with innervated tumors may benefit from more aggressive therapy.

      Reviewer #1 (Public review):

      This manuscript explores the transcriptional landscape of high-grade serous ovarian cancer (HGSOC) using consensus-independent component analysis (c-ICA) to identify transcriptional components (TCs) associated with patient outcomes. The study analyzes 678 HGSOC transcriptomes, supplemented with 447 transcriptomes from other ovarian cancer types and noncancerous tissues. By identifying 374 TCs, the authors aim to uncover subtle transcriptional patterns that could serve as novel drug targets. Notably, a transcriptional component linked to synaptic signaling was associated with shorter overall survival (OS) in patients, suggesting a potential role for neuronal interactions in the tumor microenvironment. Given notable weaknesses like lack of validation cohort or validation using another platform (other than the 11 samples with ST), the data is considered highly descriptive and preliminary.

      Strengths:

      (1) Innovative Methodology:

      The use of c-ICA to dissect bulk transcriptomes into independent components is a novel approach that allows for the identification of subtle transcriptional patterns that may be overshadowed in traditional analyses.

      We sincerely thank the reviewer for recognizing the strengths and novelty of our study. We appreciate the positive feedback on our use of consensus-independent component analysis (c-ICA) to decompose bulk transcriptomes, which we believe allowed us to detect subtle transcriptional signals often overlooked in traditional analyses.

      (2) Comprehensive Data Integration:

      The study integrates a large dataset from multiple public repositories, enhancing the robustness of the findings. The inclusion of spatially resolved transcriptomes adds a valuable dimension to the analysis.

      Thank you for recognizing the robustness of our study through comprehensive data integration. We appreciate the acknowledgment of our efforts to leverage a large, multi-source dataset, as well as the additional insights gained from spatially resolved transcriptomes. We believe this integrative approach enhances the depth of our analysis and contributes to a more nuanced understanding of the tumor microenvironment.

      (3) Clinical Relevance:

      The identification of a synaptic signaling-related TC associated with poor prognosis highlights a potential new avenue for therapeutic intervention, emphasizing the role of the tumor microenvironment in cancer progression.

      We appreciate the reviewer’s recognition of the clinical implications of our findings. The identification of a synaptic signaling-related transcriptional component associated with poor prognosis underscores the potential for novel therapeutic targets within the tumor microenvironment. We agree that this insight could open new avenues for intervention and further highlights the role of neuronal interactions in cancer progression.

      Weaknesses:

      (1) Mechanistic Insights:

      While the study identifies TCs associated with survival, it provides limited mechanistic insights into how these components influence cancer progression. Further experimental validation is necessary to elucidate the underlying biological processes.

      We appreciate the reviewer’s point regarding the limited mechanistic insights provided in our study. We agree that further experimental validation would enhance our understanding of how the biology captured by these transcriptional components influence cancer progression. However, we respectfully note that such validation is beyond the current scope of this article.   Our current analyses are done on publicly available expression array and spatial transcriptomic array datasets. For future studies, we therefore intend to combine spatial transcriptomic data with immunohistochemical analysis of the same tumors for validation purposes. We have started with setting up in vitro cocultures of neurons and ovarian cancer cells to obtain mechanistic insight in how genes with a large weight in TC121 regulate synaptic signaling and how that affects ovarian cancer cells.

      (2) Generalizability:

      The findings are primarily based on transcriptomic data from HGSOC. It remains unclear how these results apply to other subtypes of ovarian cancer or different cancer types.

      In Figure 5, we present the activity of TC121 across various cancer types, demonstrating broader applicability. However, due to limited treatment response data, we were unable to assess associations between TC activity scores and patient response. Additionally, transcriptomic and survival data specific to other ovarian cancer subtypes beyond HGSOC are currently not available, limiting our ability to generalize these findings to those groups. We intend to leverage survival data from TCGA to explore associations between TC activity scores and overall survival of patients with other cancer types. Nonetheless, we recognize limitations with TCGA survival data, as outlined in this article: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8726696/.

      (3) Innovative Methodology:

      Requires more validation using different platforms (IHC) to validate the performance of this bulk-derived data. Also, the lack of control over data quality is a concern.

      We acknowledge the reviewer’s suggestion to validate our results with alternative platforms, such as IHC; however, we regret that such validation is beyond the scope of this article. Regarding data quality control, we implemented a series of checks:

      • Bulk Transcriptional Profiles: We applied principal component analysis (PCA) on the sample Pearson product-moment correlation matrix, focusing on the first principal component (PCqc), which accounted for approximately 80-90% of the variance, primarily reflecting technical rather than biological variability  (Bhattacharya et al., 2020). Samples with a correlation below 0.8 with PCqc were removed as outliers. Additionally, we generated unique MD5 hashes for each CEL file to identify and exclude duplicate samples. Per gene, expression values were standardized to a mean of zero and a variance of one across the GEO, CCLE, GDSC, and TCGA datasets to minimize probeset- or gene-specific variability.

      • Spatial Transcriptional Profiles: We used PCA for quality control here as well, retained samples only if their loading factors for the first principal component showed consistent signs across all profiles (i.e., all profiles had either positive or negative loading factors for the first PC) from that individual spatial transcriptomic sample. Samples that did not meet this criterion were excluded from analyses.

      (4) Clinical Application:

      Although the study suggests potential drug targets, the translation of these findings into clinical practice is not addressed. Probably given the lack of some QA/QC procedures it'll be hard to translate these results. Future studies should focus on validating these targets in clinical settings.

      While this study is exploratory in nature, we agree that future studies should focus on validating these potential drug targets in clinical settings. As suggested, QA/QC procedures were integral to our analyses. We applied rigorous quality control, including PCA-based checks and duplicate removal across datasets, to ensure data integrity (detailed in our previous response).

      In terms of clinical application, which we partially discussed in the manuscript, we will discuss additional strategies to prevent synaptic signaling and neurotransmitter release in the tumor microenvironment (TME). Drugs such as ifenprodil and lamotrigine are used in treating neuronal disorders to block glutamate release responsible for subsequent synaptic signaling, whereas the vesicular monoamine transporter (VMAT) inhibitor reserpine can block the formation of synaptic vesicles (Reid et al., 2013; Williams et al., 2001). Previous in vitro studies with HGSOC cell lines showed a significant effect of ifenprodil alone on cancer cell proliferation, whereas reserpine seemed to trigger apoptosis in cancer cells (North et al., 2015; Ramamoorthy et al., 2019). Such strategies could potentially be used to inhibit synaptic neurotransmission in the TME.

      Reviewer #2 (Public review):

      Summary:

      Consensus-independent component analysis and closely related methods have previously been used to reveal components of transcriptomic data that are not captured by principal component or gene-gene coexpression analyses.

      Here, the authors asked whether applying consensus-independent component analysis (c-ICA) to published high-grade serous ovarian cancer (HGSOC) microarray-based transcriptomes would reveal subtle transcriptional patterns that are not captured by existing molecular omics classifications of HGSOC.

      Statistical associations of these (hitherto masked) transcriptional components with prognostic outcomes in HGSOC could lead to additional insights into underlying mechanisms and, coupled with corroborating evidence from spatial transcriptomics, are proposed for further investigation.

      This approach is complementary to existing transcriptomics classifications of HGSOC.

      The authors have previously applied the same approach in colorectal carcinoma (Knapen et al. (2024) Commun. Med).

      Strengths:

      (1) Overall, this study describes a solid data-driven description of c-ICA-derived transcriptional components that the authors identified in HGSOC microarray transcriptomics data, supported by detailed methods and supplementary documentation.

      We thank the reviewer for acknowledging the strength of our data-driven approach and the use of consensus-independent component analysis (c-ICA) to identify transcriptional components within HGSOC microarray data. We aimed to provide comprehensive methodological detail and supplementary documentation to support the reproducibility and robustness of our findings. We believe this approach allows for the identification of subtle transcriptional signals that might be overlooked by traditional analysis methods.

      (2) The biological interpretation of transcriptional components is convincing based on (data-driven) permutation analysis and a suite of analyses of association with copy-number, gene sets, and prognostic outcomes.

      We appreciate the reviewer’s positive feedback on the biological interpretation of our transcriptional components. We are pleased that our approach, which includes data-driven permutation testing and analyses of associations with copy-number alterations, gene sets, and prognostic outcomes, was found convincing. These analyses were integral to enhancing the robustness and biological relevance of our findings.

      (3) The resulting annotated transcriptional components have been made available in a searchable online format.

      Thank you for acknowledging the availability of our annotated transcriptional components in a searchable online format.

      (4) For the highlighted transcriptional component which has been annotated as related to synaptic signalling, the detection of the transcriptional component among 11 published spatial transcriptomics samples from ovarian cancers appears to support this preliminary finding and requires further mechanistic follow-up.

      Thank you for acknowledging the accessibility of our annotated transcriptional components. We prioritized making these data available in a searchable online format to facilitate further research and enable the community to explore and validate our findings.

      Weaknesses:

      (1) This study has not explicitly compared the c-ICA transcriptional components to the existing reported transcriptional landscape and classifications for ovarian cancers (e.g. Smith et al Nat Comms 2023; TCGA Nature 2011; Engqvist et al Sci Rep 2020) which would enable a further assessment of the additional contribution of c-ICA - whether the c-ICA approach captured entirely complementary components, or whether some components are correlated with the existing reported ovarian transcriptomic classifications.

      We appreciate the reviewer’s insightful suggestion to compare our c-ICA-derived transcriptional components with previously reported ovarian cancer classifications, such as those from Smith et al. (2023), TCGA (2011), and Engqvist et al. (2020). To address this, we will incorporate analyses comparing the activity scores of our transcriptional components with these published landscapes and classifications, particularly focusing on any associations with overall survival. Additionally, we plan to evaluate correlations between gene signatures from these studies and our identified TCs, enhancing our understanding of the unique contributions of the c-ICA approach.

      (2) Here, the authors primarily interpret the c-ICA transcriptional components as a deconvolution of bulk transcriptomics due to the presence of cells from tumour cells and the tumour microenvironment. However, c-ICA is not explicitly a deconvolution method with respect to cell types: the transcriptional components do not necessarily correspond to distinct cell types, and may reflect differential dysregulation within a cell type. This application of c-ICA for the purpose of data-driven deconvolution of cell populations is distinct from other deconvolution methods that explicitly use a prior cell signature matrix.

      Thank you for highlighting this nuanced aspect of c-ICA interpretation. We acknowledge that c-ICA, unlike traditional deconvolution methods, is not specifically designed for cell-type deconvolution and does not rely on a predefined cell signature matrix. While we explored the transcriptional components in the context of tumor and microenvironmental interactions, we agree that these components may not correspond directly to distinct cell types but rather reflect complex patterns of dysregulation, potentially within individual cell populations.

      Our goal with c-ICA was to uncover hidden transcriptional patterns possibly influenced by cellular heterogeneity. However, we recognize these patterns may also arise from regulatory processes within a single cell type. To investigate further, we plan to use single-cell transcriptional data (~60,000 cell-types annotated profiles from GSE158722) and project our transcriptional components onto these profiles to obtain activity scores, allowing us to assess each TC’s behavior across diverse cellular contexts after removing the first principal component to minimize background effects.

      References

      Allen JK, Armaiz-Pena GN, Nagaraja AS, Sadaoui NC, Ortiz T, Dood R, Ozcan M, Herder DM, Haemerrle M, Gharpure KM, Rupaimoole R, Previs R, Wu SY, Pradeep S, Xu X, Han HD, Zand B, Dalton HJ, Taylor M, Hu W, Bottsford-Miller J, Moreno-Smith M, Kang Y, Mangala LS, Rodriguez-Aguayo C, Sehgal V, Spaeth EL, Ram PT, Wong ST, Marini FC, Lopez-Berestein G, Cole SW, Lutgendorf SK, diBiasi M, Sood AK. 2018. Sustained adrenergic signaling promotes intratumoral innervation through BDNF induction. Cancer Res 78:canres.1701.2016.

      Balood M, Ahmadi M, Eichwald T, Ahmadi A, Majdoubi A, Roversi Karine, Roversi Katiane, Lucido CT, Restaino AC, Huang S, Ji L, Huang K-C, Semerena E, Thomas SC, Trevino AE, Merrison H, Parrin A, Doyle B, Vermeer DW, Spanos WC, Williamson CS, Seehus CR, Foster SL, Dai H, Shu CJ, Rangachari M, Thibodeau J, Rincon SVD, Drapkin R, Rafei M, Ghasemlou N, Vermeer PD, Woolf CJ, Talbot S. 2022. Nociceptor neurons affect cancer immunosurveillance. Nature 611:405–412.

      Bhattacharya A, Bense RD, Urzúa-Traslaviña CG, Vries EGE de, Vugt MATM van, Fehrmann RSN. 2020. Transcriptional effects of copy number alterations in a large set of human cancers. Nat Commun 11:715.

      Darragh LB, Nguyen A, Pham TT, Idlett-Ali S, Knitz MW, Gadwa J, Bukkapatnam S, Corbo S, Olimpo NA, Nguyen D, Court BV, Neupert B, Yu J, Ross RB, Corbisiero M, Abdelazeem KNM, Maroney SP, Galindo DC, Mukdad L, Saviola A, Joshi M, White R, Alhiyari Y, Samedi V, Bokhoven AV, John MSt, Karam SD. 2024. Sensory nerve release of CGRP increases tumor growth in HNSCC by suppressing TILs. Med 5:254-270.e8.

      Globig A-M, Zhao S, Roginsky J, Maltez VI, Guiza J, Avina-Ochoa N, Heeg M, Hoffmann FA, Chaudhary O, Wang J, Senturk G, Chen D, O’Connor C, Pfaff S, Germain RN, Schalper KA, Emu B, Kaech SM. 2023. The β1-adrenergic receptor links sympathetic nerves to T cell exhaustion. Nature 622:383–392.

      Jin M, Wang Y, Zhou T, Li W, Wen Q. 2022. Norepinephrine/β2-adrenergic receptor pathway promotes the cell proliferation and nerve growth factor production in triple-negative breast cancer. J Breast Cancer 26:268–285.

    1. "Denial can-and I believe shou ld -beunderst ood as t estament to o ur hu m an capacity fo r empathy, compassion, and anunderlying sen se of moral imperati ve to respo nd , even as we fail to do so."

      denial as a tool to understand our moral imperative

    2. Paradoxicall y, this may also give us a better understandin g of o ur personalclimate inaction, allowing many of us t o view past (and present) failures withcompassion, rather than angry judgment.

      !!!

    3. what is overwhelming about the climate challenge is that it requiresbreaking so many rules at o nce

      climate challenge requires full deconstruction and reinvention of our current worldviews and societal rules

    4. a real end to the fossil fuel age offers n o equivalentconsolation pr izes to the major players in the oil, gas, and coal indu stries.

      no reward for big companies to combat the climate crisis --> even less motivation to act

    5. n o nviolent tactics like boycottsand protests played major roles, but slavery in t he Cari bbean was only outlawedafter numerou s slave rebellions were brutally suppressed, and, of course, abolitionin t he United States came only after t he carnage of t he Civil War.

      successful movements were not made possible by just nonviolent approaches, but also a combination of violent tactics

    6. o n a scale comparable to what the climate cr isis calls fo rtoday.

      compares demands of the New Deal following the Great Depression to the demands of the current climate crisis

    1. Lo más crítico es que le permite a Brasil acomodar a familias sin una dirección formal y permanente, que los sistemas de asistencia social en otros países tienden a excluir. En lugar de una dirección oficial, se pregunta a las familias qué tipo de espacio público viven cerca, con opciones como una avenida o río cercano, y qué tipo de vivienda habitan, como un lote o cabaña abandonada.

      Esta es una idea muy buena porque muchos otros programas sociales de otros países excluyen las personas sin residencias en el proceso del programa. Entonces, me parece este enfoque es muy interesante e impactante

    1. If two boxes are prepared, the probabilityof the breakdown of the lingual wall isrelativelly high.

      Bu metinde, diş restorasyonlarıyla ilgili önemli bir durumdan bahsedilmektedir. Kutular (box form) genellikle dişin iç kısmındaki çürükleri veya hasarları onarmak için açılır. Ancak, iki kutu açıldığında, dişin yapısal bütünlüğü tehlikeye girebilir. Şu şekilde açıklanabilir:

      İki kutu hazırlanırsa: Dişin mesial ve distal (ön ve arka) yüzeylerinde iki ayrı kutu şekli oluşturulursa, dişin o bölgedeki yapısal sağlamlığı azalabilir.

      Lingual duvarın bozulma olasılığı yüksektir: Dişin lingual yüzeyi, yani dil tarafındaki duvar, bu durumda zayıflayabilir ve bozulma riski artar. Dişin iç kısmındaki kutular, lingual duvarın dayanıklılığını azaltabilir çünkü bu alan daha ince kalır ve basınca daha duyarlı hale gelir.

    Annotators

    1. If, on the other hand, you experience intense fear or anxiety in new situations, this could be a sign of a mental health issue that needs separate attention.2Kampman O, Viikki M, Leinonen E. Anxiety disorders and temperament-an update review. Curr Psychiatry Rep. 2017;19(5):27. doi:10.1007/s11920-017-0779-5 If your fear is intense, persistent, and interferes with your ability to function normally, talk to your doctor.

      I don't think this applies to me, so I can feel free to busy myself more

    1. o how does a love song about “Hamptons [and] Bugatti Veyron[s]” (Lana Del Rey 2012 “National Anthem”) end up including these challenging and thought-provoking themes?

      I love using a question at the beginning of the paragraph. It might be interesting to carry it through the rest of the introduction.

    1. Welcome back.

      This is part two of this lesson.

      We're going to continue immediately from the end of part one.

      So let's get started.

      Now the next thing that I want to demonstrate is how we can restore RDS if we have data corruption.

      The way that we're going to simulate this is to go back to our WordPress blog and we're going to corrupt part of this data.

      So we're going to change the title of this blog post from the best cats ever to not the best cats ever, which is clearly untrue.

      But we're going to change this and this is going to be our simulation of data corruption of this application.

      So go ahead and click on update to update the blog post with this new obviously incorrect data.

      Now let's assume that we need to restore this database from an earlier snapshot.

      Now let's ignore the automatic backup feature of RDS and just look at manual snapshots.

      Well, let's move back to the RDS console and click on snapshots and we'll be able to see the snapshot that we created at the start of this demo lesson.

      Remember, this does have the blog post contained within it in its original correct form.

      Now to do a restore, we need to select this snapshot, click on actions and then restore snapshot.

      Now I mentioned this in the theory lesson about backups and restores within RDS.

      Restoring a snapshot actually creates a brand new database instance.

      It doesn't restore to the existing one using normal RDS.

      So we have to restore a snapshot.

      Obviously the engine set to MySQL community and we're provided with an entry box for a brand new database identifier.

      And we're going to use a4lwordpress-restore.

      So this allows us to more easily distinguish between this and the original database instance.

      We also need to decide on the deployment option.

      So go ahead and select single DB instance.

      This is only a demo, so we don't need to select multi-AZ DB instance.

      We need to pick the type of instance that we're going to restore to.

      And again, because this is a new instance, we're not limited to the previous free tier restrictions.

      So we're able to select from any of the available instance types.

      So go ahead and select burstable classes and then pick either t2 or t3.micro.

      We'll leave storage as default.

      We'll need to provide the VPC to provision this new database instance into.

      So we'll make sure that a4l-vpc1 is selected and we'll use the same subnet group that was created by the one-click deployment, which you used at the start of this demo.

      You're allowed to choose between public access yes or no.

      We'll choose no.

      You'll have to pick a VPC security group to use for this RDS instance.

      Now the one-click deployment did create one, so click in the drop-down and select the RDS multi-AZ snap RDS security group.

      So not the instance security group, but the RDS security group.

      Once you've selected that, then delete default, scroll down.

      You can specify database authentication and encryption settings.

      And again, if applicable in the course that you're studying, I'll be covering these in a separate lesson.

      We'll leave all of that as default and click on restore DB instance.

      Now this is going to begin the process of restoring a brand new database instance from that snapshot.

      Now the important thing that you need to understand is this is a brand new instance.

      We're not restoring the snapshot to the same database instance.

      Instead, it's creating a brand new one.

      Now when this finishes restoring, when it's available for use, if we want our application to make use of it, and the restored non-corrupted data, then we're going to need to change the application to point at this newly restored database.

      So at this point, go ahead and pause the video because for the next step, which is to adjust the WordPress configuration, we need this database to be in an available state.

      So pause the video, wait for the status to change from creating all the way through to available, and then we're good to continue.

      Okay, so the snapshot restore is now completed and we have a brand new database instance, A4LWordPress-Restore.

      And in my case, it took about 10 minutes to perform that restoration.

      Now just to reiterate this concept, because it's really important, it features all the time in the exams, and you'll need this if you operate in the real world using AWS.

      If we go into the original RDS instance, just pay attention to this endpoint DNS name.

      So we have a standard part, which is the region, and then .rds, and then .amazonaws.com.

      Before this, though, we have this random part.

      Now this represents the name of the database instance as well as some random.

      If we go back to the databases list and then go into the restored version, now we can see that we have A4LWordPress-Restore.

      And this is different than that original database endpoint name for the original database.

      So the really important, the critical thing to understand is that a restore with a normal RDS will create a brand new database instance.

      It will have a brand new database endpoint DNS name, the CNAME, and you will need to update any application configuration to use this brand new database.

      So go ahead and just leave this open in this tab because we'll be needing it very shortly.

      Click on Services, find EC2, and open that in a new tab.

      So as a reminder, if we go back to the WordPress tab and just hit Refresh, we can see that we still have the corrupt data.

      Now what we want to do is point WordPress at the restored correct database.

      So to do that, go to the EC2 tab that you just opened, right click on the A4LWordPress instance, select Connect.

      We're going to use Instance Connect, so choose that to make sure the username is EC2-user and then connect to the instance.

      This process should be familiar by now because we're going to edit the WordPress configuration file.

      So cd/var/www/html, then we'll do a listing ls-la, and we want to edit the configuration file which is wp-config.php, so shudu, space, nano which is the text editor, space, wp-config.php.

      Once we're in this file, just scroll down and again we're looking for the dbhost configuration which is here.

      Now this DNS name you'll recognize is pointing at the existing database with the corrupt data.

      So we need to delete all of this just to leave the two single quotes.

      Make sure your cursor's over the second quote.

      Go back to the RDS console and we need to locate the DNS name for the A4LWordPress-Restore instance.

      Remember this is the one with the correct data.

      So copy that into your clipboard, go back to EC2 and paste that in, and then Ctrl+O and Enter to save, and Ctrl+X to exit.

      That's all of the configuration changes that we need.

      If we go back to the WordPress application and hit refresh, we'll see that it's now showing the correct post, the best cats ever, because we're now pointing at this restored database instance.

      So the key part about this demo lesson really is to understand that when you're restoring a normal RDS snapshot, you're restoring it to a brand new database instance, its own instance with its own data and its own DNS endpoint name.

      So you have to update your application configuration to point at this new database instance.

      With normal RDS, it's not possible to restore in place.

      You have to restore to a brand new database instance.

      Now this is different with a feature of Aurora which I'll be covering later in this section, but for normal RDS, you have to restore to a brand new instance.

      So those are the features which I wanted to demonstrate in this demo lesson.

      I wanted to give you a practical understanding of the types of recovery options and resilience options that you have available using the normal RDS version, so MySQL.

      Now different versions of RDS such as Microsoft SQL, PostgreSQL, Oracle, and even AWS specific versions such as Aurora and Aurora Serverless, they all have their own collections of features.

      For the exam and for most production usage, you just need to be familiar with a small subset of those.

      Generally, you'll either be using Oracle, MSSQL, or one of the open source or community versions, so you'll only have to know the feature set of a small subset of the wider RDS product.

      So I do recommend experimenting with all of the different features and depending on the course that you're taking, I will be going into much more depth on those specific features elsewhere in this section.

      For now though, that is everything that I wanted to talk about, so all that remains is for us to tidy up the infrastructure that we've used in this demo lesson.

      So go to databases.

      I want you to select the A4L WordPress -Restore instance because we're going to delete this fully.

      We're not going to be using this anymore in this section of the course, so select it, click on the Actions drop down, and then select Delete.

      Don't create a final snapshot.

      We don't need that.

      Don't retain automated backups and because we don't choose either of these, we need to acknowledge our understanding of this and type Delete Me into this box.

      So do that and then click on Delete.

      Now that's going to delete that instance as well as any snapshots created as part of that instance.

      So if we go to Snapshots, we only have the one manual snapshot.

      If we go to System Snapshots, we can see that we have one snapshot for this Restore database, and if you're deleting a database instance, then any system created snapshots for that database instance will also be deleted either immediately or after the retention period expires.

      So those will be automatically cleared up as part of this deletion process.

      We're not going to delete the manual snapshot that we created at the very start of this lesson with the catpost in because we're going to be using this elsewhere in the course.

      So leave this in place.

      Click on Databases again.

      We're going to need to wait for this Restored Database instance to finish deleting before we can continue.

      So go ahead and pause the video, wait for this to disappear from the list, and then we can continue.

      Okay, so that Restored Database instance has completed deleting.

      So now all that remains is to move back to the CloudFormation console.

      You should still have a tab open.

      Select the stack deployed as part of the one-click deployment.

      It should be called RDS Multi-AZ Snap.

      Select Delete and then confirm that deletion, and that will clear up all of the infrastructure that we've used in this demo lesson.

      It will return the account into the same state as it was at the start of this demo with one exception.

      And that one exception is the snapshot that we created of the RDS instance as part of this deployment.

      So that's everything you need to do in this demo lesson.

      I hope you've enjoyed it.

      I know it's been a fairly long one where you've been waiting a lot of the time in the demo for things to happen, but it's important for the exam and real-world usage that you get the practical experience of working with all of these different features.

      So you should leave this demo lesson with some good experience of the resilience and recovery features available as part of the normal RDS product.

      Now at this point, that's everything you need to do, so go ahead and complete this video, and when you're ready, I look forward to you joining me in the next.

    1. Welcome back.

      This is part two of this lesson.

      We're going to continue immediately from the end of part one.

      So let's get started.

      Okay, so the instance is now in an available state.

      Let's just close down this informational dialogue at the top.

      And let's just minimize this menu on the left.

      Let's maximize the amount of screen space that we have for this specific purpose.

      So I just want us to go inside this database instance and explore together the information that we have available.

      So I talked in the theory lesson how every RDS instance is given an endpoint name and an endpoint port.

      So this is the information that we'll use to connect to this RDS instance.

      Networking wise, this instance has been provisioned in US-EAST-1A.

      It's in the Animals for Life VPC and it's used our A4L subnet group that we created at the start of this demo.

      And that means that it's currently utilizing all three database subnets in the Animals for Life VPC.

      But it's chosen because we only deployed one instance to use US-EAST-1A.

      Now this is the VPC security group that we're going to need to configure.

      So right click on this and open it in a new tab and move to that tab.

      This is the security group which controls access to this RDS instance.

      So let's expand this at the bottom.

      So currently it has my IP address being the only source allowed to connect into this RDS instance.

      So the only inbound rule on the security group protecting this RDS instance is allowing my IP address.

      So we're going to click on Edit and then click on Add Rule.

      And we're going to add a rule which allows our other instances to connect to this RDS instance.

      So first in the type drop down click and then type mySQL to get the same option as the line above and then click to select.

      Next go ahead and type instance into the source box and then select the migrate to RDS-instance security group.

      Now this is the security group that's used by any instances deployed by our one click deployment.

      And this allows those instances to connect to our RDS instance and that's what we want.

      So go ahead and select that and then click on Save Rules.

      And this means now that our WordPress instance can communicate with RDS.

      So now let's move back to the RDS tab and then make sure we're inside the A4L WordPress database instance.

      So that's the connectivity and the security tab.

      We also have the monitoring tab and it's here where you can see various CloudWatch provided metrics about the database instance.

      You also have logs and events related to this instance.

      So if we go and have a look at recent events we can see all of the events such as when the database instance was created, when its first backup was created.

      And you can explore those because they might be different in your environment.

      You can click on the Configuration tab and see the current configuration of the RDS instance.

      The Maintenance and Backups tab is where you can configure the maintenance and backup processes and then of course you can tag the RDS instance.

      Now in other lessons in this section of the course and depending on what course you're taking I will be talking about many of these options, what you can modify and which actions you can perform on RDS instances.

      But for now we're just going to move on with this demo.

      So the next step is that we need to migrate our existing data into this RDS instance.

      So what we're going to do is to click on the Connectivity and Security tab and we're going to leave this open.

      We're going to need this endpoint name and port very shortly.

      You should still have a tab open to the EC2 console.

      If you don't you can reach that by going on Services and then opening EC2 in a new tab.

      But I want you to select the A4L-WordPress instance and then right click and connect to it using Instance Connect.

      So go ahead and do that.

      Once you've done that we're going to start referring to the lesson commands document.

      So make sure you've got that open.

      We're going to use this command to take a backup of the existing MariaDB database.

      So we need to replace a placeholder.

      What we need to do is delete this and replace it with the private IP address of the MariaDB EC2 instance.

      So go back to the EC2 console, select the DB-WordPress instance and copy the private IP version 4 address into your clipboard.

      And then let's move back to the WordPress instance and paste that in.

      Go ahead and press Enter and it will prompt you for the password.

      And the password is the same Animals for Life strong password that we've been using everywhere.

      Copy that into your clipboard.

      So this is the password for the A4L WordPress user on the MariaDB EC2 instance.

      So paste that in and press Enter and then LS-LA to confirm that we now have this A4L WordPress.SQL database backup file.

      And we do, so that's good.

      So as we did in the previous demo lesson, we're going to take this backup file and we're going to import it into the new destination database, which is going to be the RDS instance.

      To do that, we'll use this command, but we're going to need to replace the placeholder hostname with the CNAME of the RDS instance.

      So go ahead and delete this placeholder, then go back to the RDS console and I'll want you to copy the endpoint name into your clipboard.

      So select it, right click and then copy.

      We won't need the port number because this is the standard MySQL port and if you don't specify it, most applications will assume this default.

      So just make sure that you have the endpoint DNS name or endpoint CNAME in your clipboard.

      And then back on the WordPress EC2 instance, go ahead and paste this database name into this command and press Enter.

      And again, you'll be asked for the password and that's the same Animals for Life strong password.

      So copy that into your clipboard, paste that in and press Enter.

      And that's imported this A4LWordPress.SQL file into the RDS instance.

      So now we need to follow the same process and change WordPress so that it points at the RDS instance.

      And we do that by moving to where the WordPress configuration file is.

      So cd space forward slash var forward slash ww w forward slash html and press Enter.

      And then shudu.

      So we have admin privileges, nano, which is a text editor and then wp-config.php and press Enter.

      Then we need to scroll down and we're looking for where it says DB host and currently it has a host name here.

      Now if you go back to the EC2 console and you look at the A4L-DB-WordPress instance, you'll see that its private IP version for DNS name is what's listed inside this configuration item.

      So it's currently pointing at this dedicated database instance.

      What we need to do is replace that and we're going to replace it with the RDS database DNS name or the CNAME of this RDS instance.

      So copy that into your clipboard and then go ahead and delete this private DNS name for the MariaDB EC2 instance and then paste in the RDS endpoint name, also known as the RDS CNAME.

      Once you've done that, control O and Enter to save and control X to exit.

      And now our WordPress instance is pointing at the RDS instance for its database.

      Now we can verify that by checking WordPress, move back to instances, select the WordPress instance, copy the public IP version for addressing to your clipboard.

      Don't use this open address link.

      Open that in a new tab.

      Go ahead and just click on the best cats ever to verify the functionality and it does look as though it's working.

      And to verify that, if we go back to the EC2 console, select the A4L-DB-WordPress instance and right click and then stop that instance.

      Now the original database that was providing database services to WordPress is going to move into a stopped state.

      And if our WordPress blog continues functioning, we know that it's using the RDS instance.

      So let's keep refreshing and wait for this to change into a stopped state.

      There we go.

      It's stopped.

      And if we go back to our WordPress page and refresh, it still loads.

      And so we know that it's now using RDS for its database services.

      So at this point, that's everything that I wanted you to do in this demo lesson.

      You've stepped through the process of provisioning an RDS instance.

      So you've created a subnet group, provisioned the instance itself, explored the functionality of the instance, including how to provide access to it by selecting a security group.

      And then editing that security group to allow access.

      You've performed a database migration and you've explored how the RDS instance is presented in the console.

      So that's everything that you need to do within this demo lesson.

      And don't worry, we're going to be exploring much more of the advanced functionality of RDS as we move through this section of the course.

      For now, though, I want us to clear up the infrastructure that we've created as part of this demo lesson.

      Now, because we've provisioned RDS manually outside of CloudFormation, unfortunately, there is a little bit more manual work involved in the cleanup.

      So I want you to go to the RDS console, move to databases, select this database, click on actions, and then select delete.

      Now it will prompt you to create a final snapshot and we're not going to do that.

      We're not going to retain automated backups and so you'll need to acknowledge that upon instance deletion, automated backups including any system snapshots and pointing time recoveries will no longer be available.

      And don't worry, I'll be talking about backups and recovery in another lesson in this section of the course.

      For now, just acknowledge that and then type delete me into this box and confirm the deletion.

      Now this deletion is going to take a few minutes.

      It's not an immediate process.

      It will start in a deleting state and we need to wait for this process to be completed before we continue the cleanup.

      So go ahead and pause this video and wait for this instance to fully delete before continuing.

      Now that the instance has been deleted, it vanishes from this list.

      Next, we need to delete the subnet group that we created earlier.

      So click on subnet groups, select the subnet group and then delete it.

      You'll need to confirm that deletion.

      Once done, it too should vanish from that list.

      Next, go to the tab you've got open to the VPC console, scroll down and select security groups.

      Now look through this list and locate the security group that you created as part of provisioning the RDS instance.

      It should be called a4LVPC-RDS-SG.

      Select that, click on actions and then delete security group and you'll need to confirm that process as well.

      Once that's deleted, the final step is to go to the cloud formation console and then you'll need to delete the cloud formation stack that was created using the one-click deployment at the start of the demo.

      It should be called migrate to RDS.

      Select it, click on delete and confirm that deletion.

      And once deleted, the account will be returned into the same state as it was at the start of the demo lesson.

      So all of the infrastructure that we've used will be removed from the account and the account will be in the same state as at the start of the demo.

      Now I hope you've enjoyed this demo and that we're repeating the same WordPress installation and then the creation of the blog post over and over again.

      But I want you to get used to different parts of this process over and over again.

      You need to know why not to use a database on EC2.

      You need to know why not to perform a lot of these processes manually.

      From this point onward in the course, we're going to be using RDS to evolve our WordPress design into something that is truly elastic.

      And so all of these processes, the things I'm having you repeat are really useful to aid in your understanding of all of these different components.

      So from this point onward, we're going to be automating the creation of RDS and focusing on the specific pieces of functionality that you need to understand.

      But at this point, that's everything that you need to do in this demo.

      So go ahead, complete the video and when you're ready, I look forward to you joining me in the next.

    1. Welcome to this demo lesson where you're going to migrate from the monolithic architecture on the left of your screen towards a tiered architecture on the right.

      Essentially you're going to split the WordPress application architecture, you're going to move the database from being on the same server as the application to being on a different server and this will form step one of moving this architecture from being a monolith through to being a fully elastic architecture.

      Now this is the first stage of many but it is a necessary one.

      Now in order to perform this demonstration you're going to need some infrastructure.

      Before we apply the infrastructure just make sure that you're logged in to the general AWS account, so the management account of the organization and as always you need to have the Northern Virginia region selected.

      Now once you've got both of those set there's a one-click deployment link attached to this lesson so go ahead and click on that link.

      What this is going to do is deploy the Animals for Life base infrastructure, it's going to deploy the monolithic WordPress application instance and it's also going to deploy a separate MariaDB database instance that you're going to use as part of the migration.

      Now everything set, the stack name should be set to a suitable default, all you need to do is to scroll all the way down to the bottom, check this capabilities box and click on create stack.

      Now also attached to this lesson is a lesson commands document which contains all the commands you'll be using throughout this demo.

      So go ahead and open that in a new tab, you'll be referencing it constantly as you're making the adjustments to the WordPress architecture.

      Now we're going to need this CloudFormation stack to be fully complete before we can continue so go ahead and pause the video and resume once the CloudFormation stack moves into a create complete state.

      So now the stacks moved into a create complete state, we're good to continue.

      Now this has created the base Animals for Life infrastructure which includes a number of EC2 instances so let's take a look at those, let's click on services and then locate and open EC2 in a brand new tab.

      Once you're at the EC2 console if you do see any dialogues around user interface updates then just go ahead and close those down and then click on instances running.

      Once you're here you'll see two EC2 instances, one will be called A4L-WordPress and this is the monolith so this is the EC2 instance which contains the WordPress application and the built-in database.

      So this is the WordPress installation that we're going to migrate from and then this instance A4L-DB-WordPress this contains a standalone MariaDB installation so we're going to migrate the database for WordPress from this instance onto the DB instance and this will create a tiered application architecture rather than the monolith which we currently have.

      So step number one is to perform the WordPress installation so to do that I want you to go ahead and copy the public IP version for address of the WordPress EC2 instance into your clipboard and then open it in a new tab.

      Now be careful not to use the open address link that will use HTTPS which we're not currently using so copy the IP address into your clipboard and open that in a new tab.

      Now when you do that you'll see a familiar WordPress installation dialog we're going to create a simple blog for site title go ahead and call it the best cats for username pick admin and then for the password instead of using the randomly selected one go ahead and use this same complex password that we've used for the CloudFormation template so this is animals for life but with number substitution.

      So if you go back to your CloudFormation tab and go to the parameters tab this is the same password that we use for the DB password and the DB root password.

      Now of course in production this is incredibly bad practice we're just doing it in this demo to keep things simple and avoid any mistakes.

      So back to the WordPress installation screen site title the best cats username admin this for the password and then just go ahead and type a fake email so I don't want to use my real email for this I'm going to type test at test.com you can do the same and then go ahead and click on install WordPress so this is installed the WordPress application and it's using the Maria DB server that's on the same EC2 instance so part of the same monolith.

      So we're going to log in we'll need to type admin and then use the animals for life strong password and click on login and once we logged in we're going to create a simple blog post so click on posts we're going to select the existing hello world post select trash this time then click on add new then we're going to add a new post we can close down this introduction dialogue and for title go ahead and type the best cats ever and then some exclamation points next click on this plus sign and we're going to add a gallery now at this point you're going to need some images to upload to this blog post I've attached an images link to this lesson so if you go ahead and click that link it will download a zip file if you extract that zip file it's going to contain four image files all four of my cats so at this point once you've downloaded and extracted that file go ahead and click on upload locate those images there should be four select them all and click on open that will add these images to this blog post and once you've added them all you can go ahead and click on publish and then publish again and this will publish this blog post so it will add data to the database that's running on the monolithic application instance as well as store these images on the local instance file system now making a point of mentioning that these images are stored on the file system because as you'll see later in the course this is one of the things that we need to migrate when we're moving to a fully elastic architecture we can't have images stored on the instances themselves we need to move that to a shared file system for now though we're focusing on the database so at this point we have the working blog the images for this blog are stored on the local file system of a4l-wordpress and the data for that blog post is stored on the MariaDB database that's also running on this EC2 instance so the next step of this demo lesson is that you're going to migrate the data from a4l-wordpress onto a4l-db-wordpress and this is an isolated MariaDB instance this is dedicated for the database so to do this migration select a4l-wordpress right click we're going to connect to this instance we'll be using EC2 instance connect so just make sure that the username is set to EC2-user and then click on connect now this is where you're going to be using the commands that are stored within the lesson commands document so you need to make sure that you have this ready to reference because it's far easier to copy and paste these commands and then adjust any placeholders rather than type them out manually because that's prone to errors the first step is to get the data from the database that's running on this monolithic application instance and store it in a file on disk so that's the first thing we need to do we need to do a backup of the database into a .sql file now to do that we use this command so it's a utility called my sql-dump it uses the -u to specify the user that we're going to be using to connect to the database then we use -p to specify that we want to provide a password and we could either provide the password on the command line or we could have it prompt us now if we supply the password with no spaces next to this -p then it will accept it as input on this command if we don't specify anything so there's a space here then it's going to ask us for the password the next thing we specify is the database name that we want to do the dump of in this case it's a4l WordPress which is the database for the animals for life WordPress instance now if we just run this command on its own it would output the dump so all of the data in the database to standard output which in this case is our screen we don't want it to do that we want it to store the results in a file called a4l WordPress dot sql and so we use this symbol which means that it's going to take the output of this component of the command and it's going to redirect it into this file so let's go ahead and run this command and it's going to prompt us for the password for this database now to get that go back to cloud for information make sure parameters are selected and it's this password that we need which is the DB password so copy that into your clipboard go back to the instance paste that in press enter and that will output all the data in the database to this file now you won't see any indication of success or failure but if you do an LS space -la and press enter one of the files that you'll see is a4l WordPress dot sql so now we have a copy of the WordPress database containing our blog post the next thing that we need to do is to take this file this backup of the database and inject it into the new database that we want to use so the dedicated Maria DB EC2 instance and to do that we're going to use this command so this command has two components the first component is this which connects to the Maria DB database instance the second component is this which takes the backup that we've just made and it feeds it into this command so this backup contains all the necessary definitions to create a new database and inject the data required this component of the command just allows us to connect to this new dedicated Maria DB instance now there are some place holders that we need to change the database name that we're going to use is the same so a4l WordPress we're still going to want to be prompted for a password so -p is what we use this time though we're going to connect using a user called a4l WordPress so we're not using the root user we're going to connect to this separate Maria DB database instance using a user a4l WordPress the only thing that we need to change is that we need to connect to a non-local host so when we used the mysql dump command we didn't specify a host to connect to and this defaulted to local host so the current machine in the case of this command we're operating with a separate server this dedicated EC2 instance which is running the Maria DB database server so a4l -db -wordpress we need to connect to this so what we'll need to connect to this is the private IP version for address of this separate database instance so select it look for private IP version for addresses and then click on the icon next to this to copy the private IP version for address of this separate database server into your clipboard then return to the application instance and we need to replace the placeholder here with that value so make sure that you're one space after the end of this placeholder and just delete this leave a space between -h and where the cursor is and then paste in that IP address so this is going to connect to this separate EC2 instance using its private IP it's going to use the a4l WordPress user it will prompt us for a password it will perform the operation on the a4l WordPress database and it's going to use the contents of this backup file to perform those tasks so go ahead and press enter and you'll be prompted for a password now again it's the same password this has all been set up as part of the cloud formation one-click deployment this lesson is about the migration process not setting up a database server so I've automated this component of the infrastructure so copy the DB password into your clipboard go back to the instance paste it in and press enter so now we've uploaded our WordPress application database into this separate MariaDB database server the next step is to configure WordPress to point at this new database server so to do that cd space forward slash var forward slash www forward slash html and press enter and then we're going to run a shudu space nano which is a text editor space wp-config.php and this is the WordPress configuration file so press enter now what we're looking for if we scroll down is we're looking for the line which says define and then a space and then DB host so this is the database host that WordPress attempts to connect to and currently it's set to local host which means it will use the database on the same EC2 instance as the application we're going to delete this local host so delete until we have two single quotes and then make sure that you still have the private IP version for address of this separate database instance in your clipboard if you don't just go ahead and copy it again from the EC2 console and then paste that in place of local host so now you should see DB underscore host and this now represents this private IP address and now the private IP address that you should use here will be different you need to use your private IP address of your a4l - DB - WordPress EC2 instance so now that you've updated this configuration file press control o and enter to save and then control x to exit out of editing this file now this now means that the WordPress instance is going to be communicating with the separate MariaDB database instance let's verify that let's go back to the tab that we have to our WordPress application and let's just go ahead and do a refresh if everything's working as expected we should see that the blog reloads successfully now this means that this blog is now pointing at this separate MariaDB database instance to be doubly sure of this though let's go back to the WordPress instance and let's shut down the MariaDB database server and we do that using this command so shudu space service space MariaDB space and then stop so type or copy and paste that command in and press enter and that's going to stop the MariaDB database service which is running on a4l WordPress so now the only MariaDB database that we have running is on the a4l - DB - WordPress EC2 instance now we can go back to the WordPress tab and hit refresh and assuming it loads in as it does in my case this now confirms that WordPress is communicating with this dedicated MariaDB EC2 instance now the reason why I wanted to step you through all these tasks in this demo lesson is the time a firm believer that in order to understand best practice architecture you need to understand bad architecture and as I mentioned in the theory lesson there is almost no justification for running your own self-managed database server on an EC2 instance in almost all situations it's preferable to use the RDS service but I need you to understand exactly how the architecture works when you're self managing a database and how to migrate from a monolithic all-in-one architecture through to having a separate self managed database in the demo lesson that's coming up next in the course you're going to migrate from this through to an RDS instance so that's step two but at this point you've done everything that I wanted you to do in this demo lesson you've implemented the architecture that's on screen now on the right all we need to do is to tidy up all of the infrastructure that we've used within this lesson so to do that it's nice and easy just go back to the cloud formation console make sure that you have the monolith to EC2 DB stack selected click on the delete button and then confirm that deletion and that stack deleting will clean up all of the infrastructure that we've used throughout this demo lesson and it will return the account into the same state as it was at the start of the lesson at this point you've completed all of the tasks that I want you to do so I hope you've enjoyed this demo lesson go ahead and complete this video and when you're ready I'll look forward to you joining me in the next.

    1. Mookie'smotivation as a character is equally problematic: at the very least, hisaction seems subject to multiple private determinations-anger at Sal,frustration at his dead-end job, rage at Radio Raheem's murder-thathave no political or "public" content. At the most intimate level, Mook-ie's act hints at the anxieties about sexual violence that we have seenencoded in other public monuments. Sal has, in Mookie's view,attempted to seduce his beloved sister (whom we have seen in a nearlyincestuous relation to Mookie in an opening scene), and Mookie haswarned his sister never to enter the pizzeria again (this dialogue stagedin front of the pizzeria's brick wall, spray-painted with the graffitomessage, "Tawana told the Truth," an evocation of another indecipher-able case of highly publicized sexual violence). Mookie's privateanxieties about his manhood ("Be a man, Mookie!" is his girlfriendTina's hectoring refrain) are deeply inscribed in his public act ofviolence against the public symbol of white domin

      Mookie's whole character is so well written and the way that the characters are describes as "Statues" earlier in the essay which is a piece of public art allow Mookie to be interpreted in many different ways

    2. Violence as a way of achieving racialjustice is both impractical and immoral. Itis impractical because it is a descendingspiral ending in destruction for all. Theold law of an eye for an eye leaves every-body blind. It is immoral because it seeksto humiliate the opponent rather than winhis understanding; it seeks to annihilaterather than to convert. Violence is im-moral because it thrives on hatred ratherthan love. It destroys community andmakes brotherhood impossible. It leavessociety in monologue rather than dia-logue. Violence ends by defeating itself. Itcreates bitterness in the survivors andbrutality in the destroyers. [Martin LutherKing, Jr., "Where Do We Go from Here?"Stride toward Freedom: The Montgomery Story(New York, 1958), p. 213]I think there are plenty of good people inAmerica, but there are also plenty of badpeople in America and the bad ones arethe ones who seem to have all the powerand be in these positions to block thingsthat you and I need. Because this is thesituation, you and I have to preserve theright to do what is necessary to bring anend to that situation, and it doesn't meanthat I advocate violence, but at the sametime I am not against using violence inself-defense. I don't even call it violencewhen it's self-defense, I call it intelligence.[Malcolm X, "Communication and Real-ity," Malcolm X. The Man and His Times, ed.John Henrik Clarke (New York, 1969), p.313]This content downloaded from167.224.111.68 on Tue, 22 Oct 2024 13:36:09 UTCAll use subject to https://about.jstor.org/terms

      This is what I believe makes Do the right thing so well regarded as a piece of public art as it makes you think whether Mookie's actions by the end of the movie were justified and right and I believe that the comparison of MLK and Malcom fits perfectly with it as you can make an argument that Mookie's action was or wasn't justified using their beliefs

    3. ty. The Wall is important to Sal not just because itdisplays famous Italians but because they are famous Americans (FrankSinatra, Joe DiMaggio, Liza Minelli, Mario Cuomo) who have made itpossible for Italians to think of themselves as Americans, full-fledgedmembers of the general public sphere. The Wall is important toBuggin' Out because it signifies exclusion from the public sphere. Thismay seem odd, since the neighborhood is filled with public representa-tions of African-American heroes on every side: a huge billboard ofMike Tyson looms over Sal's pizzeria; children's art ornaments thesidewalks and graffiti streaks subversive messages like "Tawana told theTruth" on the walls; Magic Johnson T-shirts, Air Jordan sneakers, anda variety of jewelry and exotic hairdos make the characters like walkingbillboards for "black pride"; and the sound-world of the film is suffusedwith a musical "Wall of Fame," a veritable anthology of great jazz,blues, and popular music emanating from Mister Sefior Love Daddy'sstorefront radio station, just two doors away from Sal's.Why aren't these tokens of black self-respect enough for Buggin'Out? The answer, I think, is that they are only tokens of self-respect, ofblack pride, and what Buggin' Out wants is the respect of whites, theacknowledgment that African-Americans are hyphenated Americans,too, just like Italians.

      The use of public art in the film "Do The right thing" is amazing and the public art being Sal's wall and how it origin point of all of the violence in the movie which helps with what Mitchell asks earlier in the paper which is "Is public art inherently violent".

    4. o. Sal is assaultedby another form of "public art" when Radio Raheem enters the pizzeriawith his boom-box blasting out Public Enemy's rap song, "Fight thePowe

      This I believe is what Mitchell was talking about in the first half which was how art (in this case music) can cause violence or inherently has violence in it as the song talks about fighting against the "system" which would be the government and all of the racial discrimination they face.

    5. pular phennot only as atrade lingo), bple ethnic pubthese partial pspecific im

      Do the right thing talks about many of the different spheres in the public that were talked about in film or at least not in the way Do the right thing did

    6. world. Public sculpture that is too franexplicit about this monumentalizing of violence, whether the Assypalace reliefs of the ninth century B.c., or Morris's bomb sculpproposal of 1981, is likely to offend the sensibilities of a public comted to the repression of its own complicity

      Public art cant outright monumentalize violence as it goes against the public sphere

    7. raphs. Theopenness of contemporary art to publicity and public destruction hasbeen interpreted by some commentators as a kind of artistic aggressionand scandalmongering. A more accurate reading would recognize it asa deliberate vulnerability to violence, a strategy for dramatizing newrelations between the traditionally "timeless" work of art and the tran-sient generations, the "publics," that are addresse

      Artists are creating Art for the purpose to get a reaction of the public whether it be violent or slander the piece of work

    8. Oppositional movements such as surrealism, expressionism,and cubism have been recuperated for entertainment and advertising,and the boldest gestures of high modernism become the ornaments ofcorporate public spaces. If traditional public art identified certain clas-sical styles as appropriate to the embodiment of public images,contemporary public art has turned to the monumental abstraction asits acceptable icon. What Kate Linker calls the "corporate bauble" inthe shopping mall or bank plaza need have no iconic or symbolic rela-tion to the public it serves, the space it occupies, or the figures itreveres.7 It is enough that it remain an emblem of aesthetic surplus, atoken of "art" imported into and adding value to a public space.

      Most of the public Art we see is being created just for the sake of aesthetically pleasing and have no real meaning or symbolism behind them

    9. The association of public art with violence is nothing new. Theof every Chinese dynasty since antiquity has been accompanied bydestruction of its public monuments, and the long histo

      The use of Violence and the symbolism of it has been used for as long as we can remember.

    10. relation of images, violence, and the public sphere.2 "Even in theUnited States" political and legal control is exerted, not only over theerection of public statues and monuments but over the display of a widerange of images, artistic or otherwise, to actual or potential publics.Even in the United States the "publicness" of public images goes wellbeyond their specific sites or sponsorship: "publicity" has, in a very realsense, made all art into public art. And even in the United States, artthat enters the public sphere is liable to be received as a provocation toor an act of violence.Our own historical moment seems especially rich in examples ofsuch public acts and provocations. Recent art has carried the

      Even if something is labeled as public art there is always some form of legal and political control over it thus never making it truly public art and most art that enters the public can cause some sort of violence to happen.

    11. In May 1988, I took what may well be the last photograph of the sof Mao Tse-tung on the campus of Beijing University. The thirty-fhigh monolith was enveloped in bamboo scaffolding "to keep ofharsh desert winds," my hosts told me with knowing smiles. That nworkers with sledgehammers reduced the statue to a pile of rubble,rumors spread throughout Beijing that the same thing was happento statues of Mao on university campuses all over China. One year lamost of the world's newspaper readers scanned the photos of Chinstudents erecting a thirty-foot-high styrofoam and plaster "GoddeLiberty" directly facing the disfigured portrait of Mao in TiananmSquare despite the warnings from government loudspeakers: "Tstatue is illegal. It is not approved by the government. Even inUnited States statues need permission before they can be put upfew days later the newspaper accounts told us of army tanks mowdown this statue along with thousands of protesters, reassertinrule of what was called law over a public

      Violence is something that has been embedded in the history of public arts and the use of violence is to fight back against the something, in this case its Chinese government vs. The students of China.

    1. Před čtyřiceti lety zmizela Harriet Vangerová z rodinného setkání konaného na ostrově, který vlastnil a obýval mocný klan Vangerů. Přestože nebylo Harrietino tělo nikdy nalezeno, je její strýc přesvědčen, že šlo o vraždu, jejímž pachatelem je někdo z jeho rodiny. Rodiny, jejíž členové jsou mezi sebou sice spjati pevnými pouty, ale která je jinak zcela nefunkční. K vyšetření tohoto případu si proto najme investigativního novináře Mikaela Blomkvista (Michael Nyqvist), kterému pomáhá drsná potetovaná počítačová hackerka Lisbeth Salanderová (Noomi Rapace). Lisbeth Salanderová je mladá žena jako vystřižená z Tarantinových filmů, s tajemnou minulostí, za kterou se mstí a která z ní učinila skutečného outsidera. Je hackerkou světového formátu - s naprostou samozřejmostí se pohybuje ve virtuálním světe, kde je schopná získat jakoukoliv informaci, kterou chce. Kromě toho je neobyčejně inteligentní a má skvělou fotografickou paměť. Jakmile Blomkvist a Salanderová zasadí Harrietino zmizení do rámce četných podivných vražd, které se staly téměř před čtyřiceti lety, začíná se rozplétat temná a děsivá rodinná historie… (oficiální text distributora)
    1. Grace žije se dvěma dětmi ve velkém domě a čeká na manželův návrat z války. Její sluhové musí dodržovat zvláštní pravidla - žádné dveře v domě nesmí otevřít dřív, než zavřou předchozí, protože děti trpí alergií na denní světlo. Starší Anne začne mluvit o jednom hrozném dni v minulosti a jakémsi chlapci, který s nimi bydlí v jejich ložnici. I Grace si pak všimne zvláštních zvuků a hlasů v domě a chce požádat o pomoc kněze. Pak se ale setká s manželem a všechno se dramaticky změní. Grace bude muset uvěřit neuvěřitelnému a postavit se strašlivé pravdě... (Hollywood Classic Entertainment (H.C.E.))
    1. Někdo by si mohl myslet, že Donnie Darko je typický puberťák. Jenže Donnie je zklamaný kluk, trpící vizemi o obrovském králíkovi, který se ho snaží dostat pod svůj zničující vliv. Aby tomu zabránil, dopustí se činů, které ho přivedou až na psychoterapii. Přežije nesnáze středoškolského života i lásky a unikne bizarní smrti, která mu hrozí při pádu motoru z letadla. Donnie bojuje se svými démony, v přeneseném i skutečném slova smyslu, a prožívá příběhy, související s putováním v čase, s fundamentalistickými guru, osudem i machinacemi s vesmírem. (oficiální text distributora)
    1. Slavná legenda o hrstce odvážných, kteří se postavili na stranu bezbranných. Nejslavnější japonský film všech dob, předchůdce filmu Sedm statečných. Těžko by se asi hledal někdo, kdo by neznal legendární americký western o hrstce statečných, kteří se v počtu chabých sedmi postaví přesile banditů, aby ochránili bezbrannou vesnici na odlehlém venkově proti rabování. Western Johna Sturgese patří již téměř půl století k nesmrtelným filmovým evergreenům. Ale jen málokdo ví, že by vůbec nevznikl, nebýt jednoho fenomenálního režiséra, jehož originální umění přesáhlo daleko za hranice rodného Japonska. Že dobrodružný příběh sedmi potulných pistolníků byl přímo inspirován samurajským filmem Akiry Kurosawy, jenž se odehrává ve feudálním Japonsku 16. století. A že to zdaleka není jediný případ amerického hitu inspirovaného dílem tohoto japonského klasika. (oficiální text distributora)
    1. Uvěříte neuvěřitelnému! Představte si, že vaše realita je jen iluzí a vaše nejtemnější noční můry jsou ve skutečnosti pravdivé. Představte si, že vaše současnost je vlastně minulostí a to budoucí se děje právě teď. Když si to dokážete představit, potom se budete cítit jako hrdina snímku Matrix Thomas Anderson (Keanu Reeves). A věřte, že to nebude příjemný pocit. Anderson je normální mladý muž, který se jen snaží přežít v každodenním shonu moderního velkoměsta. A má všechny předpoklady aby se mu to povedlo: dobré přátele, milující rodinu a perspektivní práci v multinárodní počítačové společnosti Meta Cortech. Jednoho dne, nebo lépe řečeno noci, se však do jeho spokojeného mozku zakousne strašlivá noční můra. Zdá se mu, že byl proti své vůli vložen v podobě dat do počítače a všechno to, co až dosud považoval za svůj osud, je jen vírem dat okolo několika tištěných spojů. Má pocit, že mu byla jeho mysl ukradena a uvězněna v obřím Matrix počítače budoucnosti. Začíná vážně pochybovat o své každodenní skutečnosti. Byl skutečně vhozen do stroje? Kdo je za to zodpovědný? Je tam s ním zavřeno i těch několik stovek lidí, které zná? Nebo jsou to jen projekce, které mají udržet zdání reality? A pak je tu otázka nejdůležitější: pokud je to všechno pravda, co se stane, až jeho věznitelé přijdou na to, že ji zná? (Warner Bros. CZ)
    1. Děj filmu legendárního režiséra Stevena Spielberga je zasazen do roku 2045, kdy se svět ocitá na pokraji chaosu a kolapsu. Lidé však nalezli spásu v OASIS, rozsáhlém světě virtuální reality, který vytvořil geniální a excentrický James Halliday (Mark Rylance). Když Halliday zemře, odkáže své nesmírné bohatství prvnímu člověku, který najde Velikonoční vajíčko ukryté někde v OASIS. Odstartuje tak zběsilý závod, který pohltí celý svět. Když se k závodu o nalezení Velikonočního vajíčka rozhodne přidat nenápadný mladý hrdina Wade Watts (Tye Sheridan), je vržen do šílené, realitě na hony vzdálené honby za pokladem ve fantaskním světě mystérií, nečekaných objevů a nebezpečí. (Vertical Entertainment)
    1. V nedaleké budoucnosti ve Washingtonu D. C. byl spuštěn program PreCrime, který byl založen na tom, že tři tak zvaní tušitelé předpovídali vraždy, které se měly stát v nejbližších dnech. Policie pak vrahy zatkla dříve, než mohli vraždu uskutečnit. Tušitelé byli sourozenci. Děvče se jmenovalo Agáta a dvojčata Artur a Dash. Vědci přišli na to, že vidí vraždy v okruhu 160 kilometrů několik dní před tím, než se mají stát. Po dobu programu byli naloženi v mléčné lázni a za tuto dobu si nic nepamatují. Po skončení programu byli tušitelé přesunuti na ostrov, kde měli v klidu žít. Dash se ale nesmířil s tím, že by nemohl díky svým vizím pomáhat, a tak se vrátil do Washingtonu D. C. a snaží se zabránit vraždám. Sám má ale jen malé útržky. Agáta toho viděla o mnoho více a Artur zase předvídá jména. Říkalo se, že Dash byl z nich nejslabší, viděl jen detaily vraždy. Dash se nyní snaží zabránit vraždě, vidí, že je nějaká žena vyhozena z okna. Podle nápisu na budově zjistí, kde to je, a jede tam, ale už je pozdě. Žena právě vypadává z budovy. Na místo přijíždí policistka jménem Vega. Ta rekonstruuje čin a přitom najde pod kuchyňskou linkou schovanou dceru zavražděné. Dash chce pomoct s vraždou a vyhledá Vegu. V uličce jí předá identikit pachatele, který nakreslil, a nato zmizí. Vega se poté baví se svým šéfem Blakem. Moc s ním nechce spolupracovat, protože byl povýšen na její úkor. Blake jí řekne, že oběť byla sestra v zařízení pro bývalé vězně PreCrimu. Ti mají často poškozený mozek a jsou ve speciálním zařízení. Počítač najde Dashův identikit. Vrah je Sam Adrangi. Pracuje v ocelárně a detektivové ho jdou zatknout. Když to zjistí, zabije se dřív, než z něj něco dostanou. Dash mluví po telefonu s Agátou a ta mu jeho aktivity vytýká. Vegová a Blake neví, jak dál. Vegová si najde podle fotky z budovy Dashe a vyhledá, kde se nyní pohybuje. Když ho najde, chce vědět víc. Dash se přizná, že je tušitel, pak vidí další vraždu. Podle obrázku pozná, že obětí je žena kandidáta na starostu Petera Van Eycka. Van Eyck byl zástupce šéfa PreCrimu a má nepřátele mezi bývalými vězni. Vegová a Dash pak mluví s Van Eyckem. Ten jim řekne, že chystá nový systém předcházení zločinů založený na predikci počítačů, který se jmenuje Hawkeye. Vedle Adrangiho postele leží jiný muž jménem Rutledge, který na střeše ovládá holuby pomocí mozkových implantátů. Za Rutledgem dochází jeho dcera Liz, ta vezme Dashe a Vegu na střechu. Vega na něj zatlačí a Rutledge uteče. Dash pak jde na návštěvu k Veze. Dash a Vega potřebují pomoc, a proto jdou za Wallym, který se staral o tušitele, když byli v PreCrimu. Wally má zařízení, pomocí kterého přehraje Dashovu vizi do počítače. Ale ani to nepomůže. Dash jde proto za bratrem Arturem... (TV Prima)
    1. „V blízké budoucnosti se korporátní sítě dostávají až ke hvězdám, elektrony a světlo proudí vesmírem. Pokrok v komputerizaci však ještě nevyhubil národy a etnické skupiny…“ V roce 2029 jsou počítačové implantáty v kyborgicky upravených tělech samozřejmostí a Japonsko se stalo jedním velkým městem, které je zasíťováno tokem informací. Vyšetřovatelka Motoko, napůl člověk, napůl stroj, řeší případ zločinné umělé inteligence, která vznikla v počítačové síti zvláštní obdobou evolučních procesů. Následuje nejen mocenský boj nadnárodních organizací, ale také boj o hranice těla, ducha a soustrojí… Mimo Akiry (1988) je Ghost in the Shell bezesporu nejslavnější filmová adaptace na základě komiksové předlohy vůbec. Dle anime z konce 80. let autora a ilustrátora Masamune Širóa ji natočil režisér Mamoru Ošii, který se rovněž postaral o povedené pokračování snímku, zvané Ghost in the Shell 2.0 (2008). Původní dílo z roku 1995 na jednu stranu vydatně čerpalo z tzv. kyberpunku, literárního směru, který ustanovili spisovatelé jako Bruce Sterling, William Gibson či Philip K. Dick. Na stranu druhou ale Ghost in the Shell zásadním způsobem ovlivnilo další, podobně laděná díla, jako Matrix, A.I. Umělá inteligence, Dredd, Avatar či Ex Machina. Ošii se scenáristou Kazunori Itóem s detailní bravurou vykreslili realistický svět až znepokojivě blízké budoucnosti, v níž se odvíjí hypnoticky pojatý příběh o samé podstatě lidskosti, při němž si nelze nevzpomenout na dědictví uměleckých sci-fi jako Solaris či 2001: Vesmírná odysea. Na svébytném výrazu existenciálního filmu se zásadním způsobem podepsal rovněž hudební skladatel Kendži Kawai, jehož skladby, v čele s "Making of a Cyborg", jsou neopakovatelnou ukázkou směšování tradice a moderny. To platí i pro výtvarné ztvárnění Ghost in the Shell, dobově pokrokové, snoubící kreslenou animaci s digitálními efekty. O kultovním postavení snímku svědčí fakt, že roku 2017 vznikl v mezinárodní koprodukci hraný remake stejného jména, stejně jako existence bobtnající franšízy, která zahrnuje filmy, televizní minisérie, komiksy či počítačové hry. (Česká televize)
    1. Komik Jim Carrey spolu s Laurou Linney a Edem Harrisem (oba mnohonásobně nominovaní na Oscara) hrají v Truman Show, temné komedii o světoznámé hvězdě televizní reality show, která si myslí, že je jen pojišťovacím agentem. Když tento údajně obyčejný muž zjistí, že celý svůj život strávil před kamerou obklopen placenými herci a komparzem, místo rodiny a přátel, rozhodne se najít svou původní podstatu... a na své cestě zažívá bouřlivá dobrodružství. (Magic Box)
    1. Jen ten, kdo je předurčen, dokáže vládnout magickým mečem. Jen ten se může stát králem. Britský film na motivy dávné legendy o králi Artuši a rytířích kulatého stolu. Temný věk. Země je rozdělena a zmítána válkami. Má však naději na mír, neboť Uther Pendragon, jemuž kouzelník Merlin slíbil za jeho sjednání magický meč Excalibur, uzavře se svým sokem vévodou z Cornwallu příměří. Vášeň je však silnější než vůle. A vášni, která Uthera posedne při spatření krásné Cornwallovy manželky, je tento muž ochoten obětovat vše. I těžce vydobytý mír... Tak začíná jedno ze zpracování dávné legendy o králi Artuši a jeho rytířích kulatého stolu. (Z těch starších připomeňme např. hollywoodskou muzikálovou verzi Král Artuš a jeho družina z roku 1967 a filmy Lancelot od jezera z roku 1974 či Percival Galský z roku 1978.) Režisér Boorman se myšlenkou, natočit Artušovy příběhy, zabýval řadu let. Vyšel z klasického středověkého románu Thomase Maloryho Artušova smrt a pokusil se zrekonstruovat starobylou legendu z pohledu člověka XX. století. Nadpřirozeno a zázračno se v jeho podání stává přirozenou součástí realisticky nazíraného příběhu. Natáčení se odehrávalo v irských exteriérech, v tajuplné, až mysticky působící přírodě, jež si uchovává mnohé z půvabu a kouzla dávno minulých dob... K nezanedbatelným kladům filmu patří výtvarná stránka (kameraman Thomson byl nominován na Oscara), i hudba, používající motivů z děl Carla Orffa (Carmina burana) a Richarda Wagnera. Excalibur byl uveden v soutěži 34. MFF v Cannes v roce 1981, kde získal Cenu za umělecký přínos. (Česká televize)
    1. V překladu "Vlčí děti Ame a Yuki". Film je o rodičovské lásce a celkem pokrývá děj třinácti let. Příběh začíná u devatenáctileté Hany, která na vysoké škole potká a zamiluje se do "vlčího muže". Jejich láska je vzájemná a vede až ke svatbě, po které se jim postupně narodí dvě děti, holčička Yuki a chlapeček Ame. Všechno je v pořádku a nikdo nemá o existenci "vlčích dětí" ani ponětí. Když ale Hanin manžel nečekaně zemře, rozhodne se Hana přestěhovat se na venkov, daleko od města, a tam vychovávat své děti. (Moiraine)
    1. Główne korowo-projekcyjne węzły tych systemów – noradrenergiczne miejsce sinawe (LC) (Carter et al., 2010) i cholinergiczne jądro podstawne Meynerta (nbM) (Lee & Dan, 2012) – są zdolne do zmiany aktywności oscylacyjnej w całym mózgu: zazwyczaj poprzez zmniejszenie synchronicznej aktywności mózgu o niskiej częstotliwości, jednocześnie zwiększając aktywność mózgu o wysokiej częstotliwości (Castro-Alamancos & Gulati, 2014; Lin et al., 2015; Mena-Segovia et al., 2008). Może to ostatecznie zmienić skalę czasową wpływów neuronalnych na sieć mózgu (Shine, 2019). Co ciekawe, pomimo podobnych mechanizmów działania, noradrenergiczny i cholinergiczny system są związane z odrębnymi sygnaturami poznawczymi: system cholinergiczny został powiązany z selekcją uwagi, wzmocnionym wykrywaniem sygnałów, kodowaniem pamięci i specyficznością poznawczą (Hasselmo & Sarter, 2011; Noudoost & Moore, 2011), podczas gdy system noradrenergiczny jest zaangażowany w koordynację pobudzenia (Samuels & Szabadi, 2008), optymalizację równowagi między wydajnością zadania (Aston-Jones & Cohen, 2005), wykrywaniem istotności (Sara & Bouret, 2012) i zachowaniami eksploracyjnymi (Sara & Bouret, 2012).

      Mechanizm działania neuromodulacyjnego cholinergiczny i adenergiczny

    1. Oscarový režisér Francis Ford Coppola natočil remake klasického děsivého příběhu o neuvěřitelně svůdném transylvánském princi (Gary Oldman), který se vydává z východní Evropy do Londýna 19. století, aby zde hledal lidskou lásku. Po staletích strávených o samotě v chátrajícím zámku je Drákula posedlý spalující touhou, která jej přiměje vystoupit z ústraní. Když charismatický Drákula potká mladou ženu Mínu (Winona Ryderová), která je odrazem jeho dávno ztracené lásky, oba se vrhnou do víru romantické vášně a hrůzy. Díky “iluzorním” speciálním efektům a mimořádnému hereckému obsazení se Coppolovi podařilo vytvořit svěží a provokativní pojetí upírského příběhu, v němž se až nezvykle věrně drží Stokerovy předlohy. (Cinemax)
    1. Vítejte do světa Animatrixu, vizionářské fúze počítačové animace a japonské školy animace, od světově nejuznávanějších tvůrců animovanch filmů. Vychutnejte si snímek, který vznikl před filmem Matrix a dozvíte se o posledních městech lidské rasy, válce mezi stroji a lidmi a o závěrečném úpadku lidstva. Staňte se svědky posledního letu Osirise, který připravil půdu pro film Matrix Reloaded a videohru Enter The Matrix. Doplňte si své povědomí o Matrixu a získejte informace, které jinde nenajdete. Je čas zapojit se... (oficiální text distributora)
    1. o více než 2 p.b. a řadí se tak spíše ke státům s nižší mírou deprivace v oblasti bydlení.

      tady už se pracuje s procenty a ne body zmiňovanými výše, tak možná vysvětlit, co přesně ta procenta říkají

    2. V datech za ČR v rozdělení na všechny nebo pouze obydlené byty, v mezinárodním srovnání se jedná o všechny byty.

      tomu nerozumím

    1. o confirm the final shade, a small increment of selected composite is placed adjacent to thearea to be restored and then light cured for matching.

      Son rengi onaylamak için, seçilen kompozitten küçük bir miktar restorasyon yapılacak bölgenin yanına yerleştirilir ve ardından uyum sağlamak için ışıkla kürlenir.

    2. For posterior composite restorations, shade selection is not as critical as for anteriorrestorations.

      Posterior kompozit restorasyonlar için, renk seçimi anterior restorasyonlara göre o kadar kritik değildir.

    Annotators

    1. Deve-se lembrar quao pouca apreciag4o ha na literatura sobreas relacGes internacionais para o fato de que, como qualquer outra insti-tuigaéo social, a guerra é socialmente construida e em consequénciadepende parcialmente para persistir de idéias coletivas sobre ainevitabilidade da guerra e de se € desejavel para a conquista de ganhospoliticos, riqueza e gléria. Os construtivistas devem ser capazes de tes-tar a teoria de John Mueller da “obsolescéncia da grande guerra”(Mueller, 1989), mostrando se, como pratica, a guerra esta sendo coleti-vamente reificada como insuficiente, indesejavel e normativamente ina-ceitavel. Os construtivistas podem tentar mostrar se e como as mudangasna tecnologia nuclear (Jervis, 1988) e valores da guerra (Mueller, 1989)estaéo auxiliando na constituigéo de identidades anti-guerra que pro-movem o desenvolvimento de interesses e estratégias nacionais de pre-vencao de guerra (Adler, 1991b).Finalmente, embora a nogao de que a construg4o social de uminimigo (“‘o outro”) seja parte do desenvolvimento de identidades do “eu”tenha sido validada pela teoria da identidade social (Mercer, 1995) e ana-lisada por estudiosos pés-modernos (Campbell, 1996), os construtivistasdevem ainda desenvolver projetos de pesquisa que possam mostrar comoos inimogos e as ameagas militares s4o construidos socialmente por fatorestanto material quanto ideacional.

      Sobre a Guerra

    2. Em outraspalavras, os interesses nacionais sao fatos cuja “objetividade” esta no acor-do humano e na atribuigao coletiva de significado e fungao a objetos fisi-cos. “A construgao social de identidades é necessariamente anterior a algu-mas concep¢des mais Sbvias de interesses: um ‘nds’ deve ser estabelecidoantes que seus interesses possam ser articulados” (Hall, 1993: 51). O cons-trutivismo conduz portanto ao estudo empirico das condigGes que fazemuma concepc¢4o intersubjetiva particular de interesse prevalecer sobreoutras. Em resumo, o construtivismo est4 equipado para mostrar como osinteresses nacionais nascem, como eles adquirem seu status de entendi-.mentos polfticos gerais, e como esses entendimentos s4o politicamenteselecionados pelo e através do processo politico*!

      Sobre o Interesse Nacional

    Annotators

    1. work with one version of the static website files, and those files would include scripts that run on the client side to populate the page with data and send commands/requests to an external "server" as needed.

      staati website o=populate the page

    Annotators

    1. The configuration factor (C-factor) is the ratio of bonded surface ofthe restoration to the unbonded surfaces. The higher the value of ‘C’-factor, the greateris the polymerization shrinkage
      1. The configuration factor (C-factor) is the ratio of bonded surface of the restoration to the unbonded surfaces. Konfigürasyon faktörü (C-faktörü), restorasyonun bağlı yüzeyinin bağlı olmayan yüzeylere oranıdır.

      2. The higher the value of ‘C’-factor, the greater is the polymerization shrinkage. C-faktör değeri ne kadar yüksekse, polimerizasyon büzülmesi o kadar fazla olur.

    Annotators

  3. accessmedicina-mhmedical-com.ugto.idm.oclc.org accessmedicina-mhmedical-com.ugto.idm.oclc.org
    1. La entrada de una célula a fase M depende entonces, del factor promotor de maduración, el cual tiene 2 subunidades: 1. cinasa: transfiere grupos P del ATP a residuos de serina y treonina 2. ciclina: su concentración activa o inhibe a la cinasa. A mayor concentración de esta, mayor actividad de la cinasa. Las bajas concentraciones de ciclina provocan la inhibición de las cinasas, provocando que la célula NO entre a fase M

    1. In the decoding phase, we employ a greedy spansection (Zaratiana et al., 2022) that selects en-tity spans based on matching scores, to ensuretask/dataset specific constraints. This strategy is ap-plied independently to each sentence. Only, spans(i, j) with matching scores φ(i, j, c) > 0.5 are con-sidered for selection.Flat NER: The algorithm chooses the highest-scoring non-overlapping span and continues thisprocess until all spans are evaluated.Nested NER: Similar to Flat NER, but the algo-rithm allows selection of fully nested spans withinother entities while still avoiding partial overlaps.Algorithm Efficiency: The decoding is imple-mented using a priority queue for spans, ensuringan O(n log n) complexity, with n being the numberof candidate spans.

      giải thuật decode: sử dụng thuật toán tham lam theo đoạn, sẽ chọn các đoạn phù hợp dựa trên các điểm. Các đoạn có điểm > 0.5 sẽ được coi là đúng. Có 3 giải thuật decode:

      • Flat NER: giải thuật này chọn đoạn không chồng chéo có điểm cao nhất và tiếp tục như vaatyj đến khi nào tất cả các đoạn đều được chọn.
      • Nested NER: tương tự NestNER, nhưng cho phép chọn các đoạn được đóng gói toàn bộ trong các thực thể khác mà vẫn tránh được bị chồng chéo 1 phần.
      • Hiệu quả thuật toán: Chiến lược decode được cài đặt sử dụng hàng đợi ưu tiên cho các đoạn, đảm bảo độ phức tạp là O(n log n) với n là số lượng đoạn ứng viên.
    2. our objective is to optimize modelparameters to enhance the matching score for cor-rect span-type pairs (positive pairs) and reduce itfor incorrect pairs (negative pairs). A span (i, j)paired with an entity type t forms a positive pair(s ∈ P) if the span is labeled with type t in the train-ing data. Otherwise, it is a negative pair (s ∈ N ).The training loss for an individual example, com-prising spans S and entity types T , is defined as:LBCE = − ∑s∈S×TIs∈P log φ(s)+Is∈N log (1 − φ(s))(3)The variable s represents a pair of span/entitytype and I is an indicator function, which returns1 when the specified condition is true and 0 oth-erwise. This loss function corresponds to binarycross-entropy

      Mục tiêu của quá trình huấn luyện là cải thiện điểm phù hợp của các cặp đoạn-nhãn đúng và giảm thiểu điểm của các cặp sai. Hàm mất mát được sử dụng ở mỗi mẫu dữ liệu, bao gồm 1 các đoạn S và các nhãn T, được định nghĩa như sau:....

      biến s tượng trưng cho cặp đoạn-nhãn

    3. Our model has threemain components: i) a pre-trained textual encoder(a BiLM such as BERT), ii) a span representationmodule which computes span embeddings from to-ken embeddings, iii) an entity representation mod-

      Mô hình gồm 3 thành phần chính: - Một bộ encode văn bản (BiLM như BERT) - một module thể hiện đoạn văn bản, có chức năng tính toán các embedding văn bản từ embedding của các token. - Một module thể hiện thực thể, có chức nằng tính các embedding của thực thể mà mô hình cần trích xuất ra.

      Mục tiêu là có được thể hiện thực thể va thể hiện văn bản ở trong cùng 1 không gian ẩn để đạt được tính phù hợp trong việc bắt cặp.

    4. powerfulLLMs typically consist of billions of parametersand thus require substantial computing resources.Although it is possible to access some LLMs viaAPIs (OpenAI, 2023), using them at scale can incurhigh cost

      các mô hình llm mạnh yêu cầu tài nguyên tính toán lớn. Mặc dù có thể truy cập vào các LLM này thông qua API, ví dụ như openAI, việc sử dụng chúng ở một quy mô nhất định sẽ dấn đến phát sinh chi phí lớn.

    1. Sobre la mesa aún quedaban dos puntos fundamentales, además del presupuesto: la creación de un nuevo fondo específico para la biodiversidad, cobijado por la COP, y la definición de un marco para monitorear el avance de los países para frenar la pérdida de biodiversidad. Eran temas que se consideraban centrales desde el inicio de las negociaciones, pero que, con menos del 50 % de delegaciones en el recinto, no podían ser definidos, por lo que la reunión fue suspendida y las decisiones aplazadas.

      ¿Como sería la solución tecnológica o innovación tecnológica que para cuantificar y valorar las relaciones de la biodiversidad con el negocio o la empresa?

    1. Author response:

      The following is the authors’ response to the original reviews.

      Public Reviews:  

      Reviewer #1 (Public Review): 

      Summary: 

      The fungal cell wall is a very important structure for the physiology of a fungus but also for the interaction of pathogenic fungi with the host. Although a lot of knowledge on the fungal cell wall has been gained, there is a lack of understanding of the meaning of ß-1,6-glucan in the cell wall. In the current manuscript, the authors studied in particular this carbohydrate in the important humanpathogenic fungus Candida albicans. The authors provide a comprehensive characterization of cell wall constituents under different environmental and physiological conditions, in particular of ß-1,6glucan. Also, β-1,6-glucan biosynthesis was found to be likely a compensatory reaction when mannan elongation was defective. The absence of β-1,6-glucan resulted in a significantly sick growth phenotype and complete cell wall reorganization. The manuscript contains a detailed analysis of the genetic and biochemical basis of ß-1,6-glucan biosynthesis which is apparently in many aspects similar to yeast. Finally, the authors provide some initial studies on the immune modulatory effects of ß-1,6-glucan. 

      Strengths: 

      The findings are very well documented, and the data are clear and obtained by sophisticated biochemical methods. It is impressive that the authors successfully optimized methods for the analyses and quantification of ß-1-6-glucan under different environmental conditions and in different mutant strains. 

      Weaknesses: 

      However, although already very interesting, at this stage there are some loose ends that need to be combined to strengthen the manuscript. For example, the immunological studies are rather preliminary and need at least some substantiation. Also, at this stage, the manuscript in some places remains a bit too descriptive and needs the elucidation of potential causalities.

      Reviewer #2 (Public Review): 

      Summary: 

      The authors provide the first (to my knowledge) detailed characterization of cell wall b-1,6 glucan in the pathogen Candida albicans. The approaches range from biochemistry to genetics to immunology. The study provides fundamental information and will be a resource of exceptional value to the field going forward. Highlights include the construction of a mutant that lacks all b-1,6 glucan and the characterization of its cell wall composition and structure. Figure 5a is a feast for the eyes, showing that b-1,6 glucan is vital for the outer fibrillar layer of the cell wall. Also much appreciated was the summary figure, Figure 7, which presents the main findings in digestible form.

      Strengths: 

      The work is highly significant for the fungal pathogen field especially, and more broadly for anyone studying fungi, antifungal drugs, or antifungal immune responses.

      The manuscript is very readable, which is important because most readers will be cell wall nonspecialists.

      The authors construct a key quadruple mutant, which is not trivial even with CRISPR methods, and validate it with a complemented strain. This aspect of the study sets the bar high. The authors develop new and transferable methods for b-1,6 glucan analysis. 

      Weaknesses: 

      The one "famous" cell type that would have been interesting to include is the opaque cell. This could be included in a future paper.

      Reviewer #3 (Public Review): 

      Summary: 

      The cell wall of human fungal pathogens, such as Candida albicans, is crucial for structural support and modulating the host immune response. Although extensively studied in yeasts and molds, the structural composition has largely focused on the structural glucan b,1,3-glucan and the surface exposed mannans, while the fibrillar component β-1,6-glucan, a significant component of the well wall, has been largely overlooked. This comprehensive biochemical and immunological study by a highly experienced cell wall group provides a strong case for the importance of β-1,6-glucan contributing critically to cell wall integrity, filamentous growth, and cell wall stability resulting from defects in mannan elongation. Additionally, β-1,6-glucan responds to environmental stimuli and stresses, playing a key role in wall remodeling and immune response modulation, making it a potential critical factor for host-pathogen interactions.

      Strengths: 

      Overall, this study is well-designed and executed. It provides the first comprehensive assessment of β-1,6-glucan as a dynamic, albeit underappreciated, molecule. The role of β-1,6-glucan genetics and biochemistry has been explored in molds like Aspergillus fumigatus, but this work shines an important light on its role in Candida albicans. This is important work that is of value to Medical Mycology, since β-1,6-glucan plays more than just a structural role in the wall. It may serve as a PAMP and a potential modulator of host-pathogen interactions. In keeping with this important role, the manuscript rigor would benefit from a more physiological evaluation ex vivo and preferably in vivo, assessment on stimulating the immune system within in the cell wall and not just as a purified component. This is a critical outcome measure for this study and gets squarely at its importance for host-pathogen interactions, especially in response to environmental stimuli and drug exposure.

      Response to reviewers (Public reviews):

      We thank all the three reviewers for their opinion on our work on Candida albicans β-1,6-glucan, which highlights the importance of this cell wall component in the biology of fungi. Here are our responses to their comments for public reviews:

      (1) Indeed, the data presented for immunological studies is preliminary. It has been acknowledged by the reviewers that our analysis providing insights into the biosynthetic pathways involved in comprehensive in dealing with organization and dynamics of the β-1,6-glucan polymer in relation with other cell wall components and environmental conditions (temperature, stress, nutrient availability, etc.). However, we anticipated that there would be immediate curiosity as to what the immunological contribution of β-1,6 glucan and we therefore felt we needed to initiative these studies and include them. We therefore performed immunological studies to assess whether β-1,6-glucans act as a pathogen-associated molecular pattern (PAMP), and if so, what its immunostimulatory potential is. Our data clearly suggest that β-1,6-glucan is a PAMP, and consequently lead to several questions: (a) what are the host immune receptors involved in the recognition of this polysaccharide, and thereby the downstream signaling pathways, (b) how is β-1,6-glucan differentially recognized by the host when C. albicans switches from a commensal to an opportunistic pathogen, and (c) how does the host environment impact the exposure of this polysaccharide on the fungal surface. We believe addressing these questions is beyond the scope of the present manuscript and aim to present new data in future manuscript. Nonetheless, in the revised manuscript, suggest approaches that we can take to identify the receptor that could be involved in the recognition of β-1,6-glucan. Moreover, we have modified the discussion presenting it based on the data rather than being descriptive.  

      (2) It will be interesting to assess the organization of β-1,6-glucan and other cell wall components in the opaque cells. It is documented that the opaque cells are induced at acidic pH and in the presence of N-acetylglucosamine and CO2. Our data shows that pH has an impact on β-1,6-glucan, which suggests that there will be differential organization of this polysaccharide in the cell wall of opaque cells. As suggested by the reviewer, we will include analysis of opaque cells (and other C. albicans cell types) in future studies. 

      With the exception of these major new avenues for this research, our revision can address each of the comments provided by the reviewers.

      Recommendations for the authors

      Reviewer #1 (Recommendations For The Authors):

      Although the study is very interesting, there are some loose ends that need to be combined to strengthen the manuscript. For example, the immunological studies are rather preliminary and need at least some substantiation. Also, at this stage, the manuscript in some places remains a bit too descriptive and needs the elucidation of potential causalities.

      Specifically: 

      (1) As you showed, defects in chitin content led to a decrease in the cross-linking of β-glucans in the inner wall that corresponded to the effect of nikkomycin-treated C. albicans phenotype; conversely, an increase in chitin content led to more cross-linking of β-glucans as observed in the FKS1 mutant or in the presence of caspofungin. What is the mechanistic reason for these observations? 

      On one hand, yeast cell wall chitin occurs in three forms: free and covalently linked to β-1,3-glucan or β-1,6-glucan; crosslinked β-glucan-chitin forms core fibrillar structure resistant to alkali. A decrease in the chitin content, therefore, affect β-glucan-chitin crosslinking thereby making β-glucan alkali-soluble. On the other hand, a decrease in the β-glucan content, as in FKS1 mutant or upon caspofungin treatment, results in increased cell wall chitin and β-glucan-chitin contents. A decrease in the β-1,3-glucan biosynthesis is associated with upregulation of CRH1 involved in the β-glucan-chitin crosslinking, which explains an increased β-glucan-chitin content in the FKS1 mutant or upon caspofungin treatment. We have included in this discussion in the revised manuscript (p14, lines 2-10).     

      (2) The β-1,6-glucan biosynthesis is stimulated via a compensatory pathway when there is a defect in O- and N-linked cell wall mannan biosynthesis. Why? causality? Hypothesis?  

      Two phenomena were observed related to β-1,6-glucan and mannan biosynthesis: 1) a defect in the elongation of N-mannan led to an increase in the β-1,6-glucan content; 2) a defect of O-mannan elongation resulted in the reduce size of β-1,6-glucan chains, however, increased their branching. These observations of our study suggest a global rescue program of the cell wall damage that could occur due to defect in one of the cell wall contents. We have discussed this in the revised manuscript (p14, last paragraph, p15 first paragraph). Moreover, β-1,3-glucan and chitin are synthesized by respective membrane bound synthases, and a defect in of their synthesis is compensated by the other. In line, although need to be validated for β-1,6-glucan, biosynthesis of mannan and β-1,6-glucan seem to initiate intracellularly. Therefore, possibility is that the defective mannan biosynthesis could be compensated by β-1,6-glucan biosynthesis, but need to be further validated experimentally. 

      (3) You showed that the removal of β-1,6-glucan by periodate oxidation (AI-OxP) led to a significant decrease in the IL-8, IL-6, IL-1β, TNF-α, C5a, and IL-10 released, suggesting that their stimulation was in part β-1,6-glucan dependent. What is the consequence of the stimulation, e.g. better phagocytosis, etc.? This needs some more experiments, otherwise the data is purely descriptive, as the conclusion. Also, what do you want to show with the activation of the complement system? Is ß1,6-glucan detected by complement receptors? I think this is really a loose end. I think it is necessary to provide more data on this observation, which I think lacks control with serum lacking complement, this should then be moved to the main manuscript. 

      In this study, our aim was to assess whether β-1,6-glucan acts as a pathogen-associated molecular pattern (PAMP) of C. albicans, and if yes, what is its immunostimulatory capacity/potential. Our data confirms that, indeed, β-1,6-glucan acts as a PAMP, and its removal significantly reduces the immunostimulatory capacity of the fibrillar core structure of the C. albicans cell wall. On the other hand, data provided in the revised manuscript (see updated Figure S14, discussion p13 lines 16-21) indicate that the human serum factors significantly enhance the immunostimulatory capacity of β1,6-glucan and that β-1,6-glucan interacts with the complement component C3b. However, addressing the role of β-1,6-glucan in phagocytosis using β-1,6-glucan deletion mutant will not be possible as the cell wall of this mutant is modified, and β-1,6-glucan is not the only cell wall component interacting with C3b. Alternate is to coat β-1,6-glucan on beads and use to study phagocytosis and identify immune receptors; however, these are beyond the scope of our present study/focus.      

      (4) Also, you suggested that β-1,6-glucan and β-1,3-glucan stimulate innate immune cells in distinct ways. Please provide more data on this interesting suggestion. You can block the dectin-1 receptor for example or use dectin-1 deficient macrophages from mice. The part on the immune stimulation needs to be optimized. 

      Stimulation of immune cells by pustulan (insoluble linear β-1,6-glucan) via a dectin-1independent pathway has been described previously (PMIDs: 18005717, 16371356) as discussed in the manuscript. Our preliminary data indicate that dectin-1 blocking on immune cells (using antidectin-1 antibodies) has no effect on the immunostimulatory potential of β-1,6-glucan, unlike AI and AI-OxP that showed significantly reduced cytokine secretion by the immune cells upon dectin-1 blocking. Deciphering the β-1,6-glucan recognition and its immunomodulatory pathways are underway, and will be the subject of our future study/manuscript.   

      (5) β-1,6-glucan and mannan productions are coupled. What is the hypothesis? Is it due to the necessity of mannan residues in ß-1,6-glucan biosynthesis enzymes from the ER? Can that be experimentally proven? 

      β-1,6-glucan and mannan synthesis should be coupled in two ways. First, as mentioned above (Response 2), defects in mannan elongation led to an alteration of β-1,6-glucan production. Second, early steps of N-glycosylation led to a strong reduction of β-1,6-glucan size and its cell wall content. However, we do not believe that the synthesis of N-glycan is required for the synthesis of an acceptor essential to β-1,6-glucan synthesis. Defect in N-mannan elongation led to a global cell wall remodeling as described above. Kre5, Rot2 and Cwh41 are part of the calnexin cycle involved in the control of N-glycoprotein folding in the ER, suggesting that some protein directly involved in the β-1,6-glucan synthesis required a folding quality control to be active. We modified our discussion, accordingly, highlighting these points (p14, last paragraph, p15 second paragraph).

      (6) As PHR1 and PHR2 genes are strongly regulated by external pH, the compensatory differences described may be explained by pH-dependent regulation of β-1,6-glucan synthesis.' Please check. Also, could the pH regulation form the basis of e.g. differences you found for ß-1,6-glucan under different environmental conditions, i.e., growth on different carbon sources leads to different external pH values, as shown for many fungi?  

      We agree that environmental pH is dependent on carbon source and pH varies during growth curve. To test the effect of pH we buffered the medium with 100 mM MOPS or MES. Clearly, Fig. 2 and S1 show that the pH has an effect on the cell wall composition and polymer exposure as previously described (PMID: 28542528). Here, we show that pH has an impact on the β-1,6-glucan size as well as its branching. However, in buffered medium, addition of organic acid (such as acetate, propionate, butyrate or lactate) had an impact on cell wall composition, showing that not only pH has an effect on cell wall composition. About _phr1_Δ/Δ and _phr2_Δ/Δ mutants, we believe that the difference in the cell wall composition observed between mutants is mainly due to the pH-dependent regulation, which we indicated in the discussion (p14, end of first paragraph).

      Minor: 

      (1) In Figure 7B: dynamism should be replaced by dynamic and in term is rather in terms.  

      Modified as suggested.

      (2) Replace molecular size with molecular mass when you give daltons. 

      Molecular size has been replaced by molecular weight, when presented as daltons.

      (3) Page 7: for explanation, please add that nikkomycin is a chitin biosynthesis inhibitor.   

      As suggested, explained that nikkomycin is a chitin biosynthesis inhibitor.

      Reviewer #2 (Recommendations For The Authors):

      (1) I wondered if the increased chitin content of hyphae might reflect growth on the precursor GlcNAc. Have you tested hyphae that are induced in other ways? (2) Related to point 1, did you look at the relative abundance of yeast vs hyphae in the preparation? I wonder if yeast contamination might have reduced the extent of the composition changes observed. 

      We used GlcNAc as hyphae inducer as: 1) in presence of GlcNAc, hyphae are produced without any yeast contamination; in this condition, we observed an increase in the chitin content, as described, in hyphae (PMID: 16423067); 2) we excluded using of serum, another condition inducing hyphal formation, as we could not control serum factors that may impact cell wall composition. We now indicate in the methods section that hyphae induced by GlcNAc were not contaminated by yeast (p17, line 3). 

      (3) I recommend rephrasing the first sentence of the Figure 2 legend: "Cells were grown in liquid SD medium at 37oC at exponential phase under different growth conditions." The conditions varied extensively - stationary is not exponential; biofilm is probably not exponential. Also, the "D" in "SD" stands for dextrose, and the carbon source varied a good deal. Perhaps you could say: "Cells were grown in liquid synthetic medium at 37oC under different growth conditions, as specified in Methods." 

      Sentences have been rephrased.  

      (4) Figure 7b has a typo: "dependant" for "dependent".

      Typo-error has been corrected.

      Reviewer #3 (Recommendations For The Authors):

      To explore the biochemical composition of the cell wall, the authors fractionated the wall component into three categories based on polymer properties and reticulations: sodium-dodecyl-sulphate-βmercaptoethanol (SDS-β-ME) extract, alkali-insoluble (AI), and alkali-soluble (AS) fractions, and they developed several independent methods to distinguish between β-1,3-glucans and β-1,6-glucans. The composition and surface exposure of fungal cell wall polymers is known to depend on environmental growth conditions. It was shown that the cell wall of C. albicans hyphae increased chitin content (10% vs. 3%) and decreased β-1,6-glucan (18% vs. 23%) and mannan (13% vs. 20%) compared to the yeast form, and the reduced β-1,6-glucan content was associated with a smaller β1,6-glucan size (43 vs. 58 kDa), suggesting that both the content and structure of β-1,6-glucan are regulated during growth and cellular morphogenesis. Similar behavior was observed when exposing cells to acid and neutral medium pH. The most significant cell wall alteration occurred in a lactatecontaining medium, which led to a sharp reduction in structural core polysaccharides: chitin (-43%), β-1,3-glucan (-48%), and β-1,6-glucan (-72%). This reduction aligns with the previously observed decreases in inner cell wall layer thickness. As expected, the authors found that modulating chitin content genetically (chs3Δ/Δ knockout mutant) led to an increase of both β-1,3-glucan and β-1,6glucan. An increase in chitin content following genetic alteration of FKS genes impacting glucan synthase or after exposure to the echinocandin caspofungin led to enhanced cross-linking of βglucans. A slight increase in the β-1,3-glucan branching was also observed in the mnt1/mnt2Δ/Δ double mutant, suggesting that β-1,6-glucan and mannan synthesis may be coupled.

      - This effect is not that pronounced, and the relationship appears somewhat overstated and may reflect an indirect interaction. The authors should address accordingly. 

      We agree that this sentence was overstated. To make it clearer and less pronounced, we divided this sentence into to two with less pronounced statements (p8, line 34).

      The genetics of β-1,6-glucan biosynthesis appear complex and a figure describing putative roles for specific genes would be beneficial. For example, KRE6 is a glucosyl hydrolase required for beta1,6-glucan biosynthesis.

      - It would be valuable to better understand the overall biosynthetic process. Please elaborate more in a figure. 

      Although proteins/enzymatic activities directly involved in the β-1,6-glucan biosynthesis have not yet been identified, as suggested by this reviewer, we included a schematic representation of this process based on our hypothesis (Figure S15, and p15 lines 17-22 in revised manuscript), indicating the possible involvement of Kre6p.  

      The deletion of KRE6 homologs, essential for β-1,6-glucan biosynthesis, resulted in the absence of β-1,6-glucan production, and significant structural alterations of the cell wall. This result nicely confirms the important role of β-1,6-glucan in regulating cell wall homeostasis. The absence of β1,6-glucan was associated with increased (mutant v. WT) chitin content (9.5% vs. 2.5%) and highly branched β- β-1,6-glucan 1,3-glucan (48% vs. 20%). TEM ultrastructure studies nicely showed the change in cell wall overall architecture. From a drug discovery perspective, since the blockade of β1,6-glucan did not block growth, it may have more value as a potential virulence target. This would be valuable but needs to be assessed in animal model challenge competition experiments.

      - The authors may want to elaborate more. 

      We agree and modified “antifungal target” as “potential virulence target”.

      It is well known that β-1,3-glucan, mannan, and chitin function serve as PAMPs, which induce immune responses. The role of β-1,6-glucan as a PAMP is not well understood, and the authors provide evidence that different cell wall extracted fractions with enriched constituents induce immune responses invoking cytokines, chemokines, and acute phase proteins, as well as the complement system. While this data clearly shows that β-1,6-glucan is immunologically active and potentially important for host-pathogen interactions, the analysis is preliminary and falls short of making this case. 

      - This is a critical point in getting at the potential host signaling of β-1,6-glucan contained in the cell wall or shed by the cell (is this known?)

      - This analysis would be bolstered significantly by examining stimulation relative to other cell wall components, and most importantly, whole cell modulation of β-1,6-glucan exposure for immune presentation, and not just unnatural concentrated extracts. This can be readily accomplished with the various mutants in hand, as well as after exposure to various antifungal agents echinocandins and nikkomycins) (see Hohl et al. 2008 JID). Additional validation would benefit from animal model studies to examine in vivo immune modulation.

      We agree with the reviewer. However, the main focus of our present work was to study the organization and dynamics of C. albicans cell wall β-1,6-glucan, and to explore its possible role as pathogen-associated molecular pattern (PAMP). Our study indicates that, indeed, β-1,6-glucan acts as a PAMP with immunostimulatory potential. As pointed by this reviewer, and similar to β-1,3glucans, the exposure of β-1,6-glucan is probably a key point in immune response. However, this investigation beyond the scope of this study, underway and will be presented in our future work.

      - The Discussion would also benefit from an analysis of how β-1,6-glucan in Aspergillus fumigatus, which was largely elucidated by the same primary authors. 

      To our knowledge, β-1,6-glucan has never been identified, either by chemical analysis (PMID: 10869365; PMID: 36836270) or solid-state NMR (PMID: 34732740), in the cell wall of A. fumigatus, although a homolog of KRE6 is present in A. fumigatus but with unknown function.

    1. diminishing

      o reduce or be reduced in size or importance 減少,減小,降低

      • I don't want to diminish her achievements, but she did have a lot of help. 我不想貶低她的成就,但她確實得到了很多幫助。
    1. o foster that agency, New Hampshire kindergarten teacher Jessica Arrow(/article/how-use-play-learning)

      Narrative citation with the inclusion of a URL in parenthesis that links to the source article.

    Annotators

    1. Author response:

      The following is the authors’ response to the original reviews.

      Public Reviews:

      Reviewer #1 (Public Review):

      Summary:

      This work sets out to elucidate mechanistic intricacies in inflammatory responses in pneumonia in the context of the aging process (Terc deficiency - telomerase functionality).

      Strengths:

      Very interesting, conceptually speaking, approach that is by all means worth pursuing. An overall proper approach to the posited aim.

      We want to thank the reviewer for taking the time to review our manuscript and for providing positive feedback regarding our research question.  

      Weaknesses:

      The work is heavily underpowered and may have statistical deficits. This precludes it in its current state from drawing unequivocal conclusions.

      Thank you for this essential and valuable comment. We fully accept that the small sample size of the Tercko/ko mice is a major limitation of our study and transparently discuss this in our manuscript.  However, due to Animal Welfare regulations, only a reduced number of mice were approved because of the strong burden of disease. Consequently, only three non-infected and five infected mice were available to us. This reduced number of mice presents a clear limitation to our study. However, due to ethical considerations related to animal welfare and sustainability, as well as compliance with German animal welfare regulations, it is not possible to obtain additional Tercko/ko mice to increase the dataset.

      The animal studies are an important aspect of our study; however, our hypothesis was also investigated at multiple levels, including in an in vitro co-culture model (Figure 5), to ensure comprehensive analysis. Thus, we clearly demonstrated that S. aureus pneumonia in Tercko/ko mice leads to a more severe phenotype, orchestrated by the dysregulation of both innate and adaptive immune response.

      Reviewer #2 (Public Review):

      Summary:

      The authors demonstrate heightened susceptibility of Terc-KO mice to S. aureus-induced pneumonia, perform gene expression analysis from the infected lungs, find an elevated inflammatory (NLRP3) signature in some Terc-KO but not control mice, and some reduction in T cell signatures. Based on that, They conclude that disregulated inflammation and T-cell dysfunction play a major role in these phenomena.

      Strengths:

      The strengths of the work include a problem not previously addressed (the role of the Terc component of the telomerase complex) in certain aspects of resistance to bacterial infection and innate (and maybe adaptive) immune function.

      We would like to thank the reviewer for the positive feedback regarding our aim to investigate the impact of Terc deletion on the pulmonary immune response to S. aureus.  

      Weaknesses:

      The weaknesses outweigh the strengths, dominantly because conclusions are plagued by flaws in experimental design, by lack of rigorous controls, and by incomplete and inadequate approaches to testing immune function. These weaknesses are as follows

      (1) Terc-KO mice are a genomic knockout model, and therefore the authors need to carefully consider the impact of this KO on a wide range of tissues. This, however, is not the case. There are no attempts to perform cell transfers or use irradiation chimera or crosses that would be informative.

      We thank the reviewer for bringing up this important point. The aim of our study, however; was to investigate the impact of Terc deletion in the lung and on the response to bacterial pneumonia, rather than to provide a comprehensive characterization of the Tercko/ko model itself. This characterization of different tissues and cell types has already been conducted by previous studies. For instance, studies that characterize the general phenotype of the model (Herrera et al., 1999; Lee et al., 1998; Rudolph et al., 1999) but also investigations that shed light on the impact of Terc deletion on specific cell types such as microglia (Khan et al., 2015) or T cells (Matthe et al., 2022). The impact of Terc deletion on T cells is also discussed in our manuscript in lines 89 to 105. Furthermore, a section about the general phenotype of the Terc deletion model is included in the introduction in lines 126 to 138. Thus we discussed the relevant literature regarding Tercko/ko mice in our manuscript and attempted to provide a more in-depth characterization of the lung by investigating the inflammatory response to infection as well as changes in the gene expression (Figure 2-4).  

      (2) Throughout the manuscript the authors invoke the role of telomere shortening in aging, and according to them, their Terc-KO mice should be one potential model for aging. Yet the authors consistently describe major differences between young Terc-KO and naturally aging old mice, with no discussion of the implications. This further confuses the biological significance of this work as presented.

      Thank you for mentioning this relevant point. We want to apologize for the confusion regarding this matter. While Tercko/ko mice are a well-established model for premature aging, these effects become more apparent with increasing generations (G) and thus, G5 and 6 mice are the most affected by Terc deletion (Lee et al., 1998; Wong et al., 2008).

      Thus, while Tercko/ko mice are a common model for premature aging, this accelerated aging phenotype is predominantly apparent in later-generation Tercko/ko (G5 and 6) or aged Tercko/ko mice (Lee et al., 1998; Wong et al., 2008). Since the aim of this study was to analyze the impact of Terc deletion on the lung and its immune response to bacterial infections instead of the impact of telomere shortening and telomerase dysfunction, young G3 Tercko/ko mice (8 weeks) were used in this study. This is also mentioned in the lines 131-134. In this study, Tercko/ko mice were used not as a model of aging, but rather as a model specifically for Terc deletion. The old WT mice function as a control cohort to observe possible common but also deviating effects between aging and Terc deletion. In our sequencing data, we observe that uninfected young WT mice are very similar to uninfected Tercko/ko mice. Other studies have also reported this lack of major differences between uninfected WT and Tercko/ko mice in the G3 knockout mice (Kang et al., 2018). Conversely, uninfected young WT and Tercko/ko mice exhibited great differences, for instance, regarding the numbers of differentially expressed genes (Supplemental Figure 1H). Thus, differences between naturally aged mice and young G3 Tercko/ko mice are not surprising. To clarify this aspect we reconstructed the paragraph discussing the Tercko/ko mice (lines 126-134). Additionally we added a paragraph explaining the purpose of the naturally aged mice to the lines 134 to 138:

      “As control cohort age-matched young WT mice were utilized. To investigate whether Terc deletion, beyond critical telomere shortening, impacts the pulmonary immune response, we used young Tercko/ko mice. Additionally, naturally aged mice (2 years old) were infected to explore the potential link to a fully developed aging phenotype.”

      (3) Related to #2, group design for comparisons lacks a clear rationale. The authors stipulate that TercKO will mimic natural aging, but in fact, the only significant differences seen between groups in susceptibility to S. aureus are, contrary to the authors' expectation, between young Terc-KO and naturally old mice (Figures 1A and B, no difference between young Terc-KO and young wt); or there are no significant differences at all between groups (Figures 1, C, D,).

      We thank the reviewer for this essential comment. As mentioned above the Tercko/ko mice in this study are not selected to model natural aging. To model telomerase dysfunction and accelerated aging selection of later generation or aged Tercko/ko mice would have been more suitable. 

      The lack of statistical significance in some figures is likely due to the heterogeneity of disease phenotype of S. aureus infection in mice, which is a limitation of our study that we discuss in our discussion section in lines 576-582. The phenotype of S. aureus infection can vary greatly within a mouse population, highlighting the limitations of mice as a model for S. aureus infections. To account for this heterogeneity we divided the infected Tercko/ko mice cohort into different degrees of severity based on the clinical score and the presence of bacteria in organs other than the lung (mice with systemic infection). 

      Despite the heterogeneity especially within the Tercko/ko mice cohort the differences between the knockout and young as well as old WT mice were striking. Including the fatal infections, 80% of the Tercko/ko mice had a severe course of disease, while none of the WT mice displayed a severe course (Figure 1A, B and Supplemental Figure 1A, B). This hints towards a clear role of Terc in the response to S. aureus infection in mice. Thus while in some figures the differences are not significant, strong trends towards a more severe phenotype of S. aureus infection in the Tercko/ko mice regarding bacterial load, score and inflammatory response could be observed in our study. 

      Another example of inadequate group design is when the authors begin dividing their Terc-KO groups by clinical score into animals with or without "systemic infection" (the condition where a bacterium spreads uncontrollably across the many organs and via blood, which should be properly called sepsis), and then compare this sepsis group to other groups (Supplementary Figures 1G; Figure 2; lines 374-376 and 389391). This gives them significant differences in several figures, but because they did not clearly indicate where they applied this stratification in the figure legends, the data are somewhat confusing. Most importantly, methodologically it is highly inappropriate to compare one mouse with sepsis to another one without. If Terc-KO mice with sepsis are a comparator group, then their controls have to be wild-type mice with sepsis, who are dealing with the same high bacterial load across the body and are presumably forced to deploy the same set of immune defenses.

      We sincerely appreciate the significant time and effort you have invested in reviewing our manuscript. However, with all due respect, we must point out that the definition of sepsis you have referenced is considered outdated. According to the Third International Consensus Definitions for Sepsis and Septic Shock (Sepsis-3), sepsis is defined as "a life-threatening organ dysfunction caused by a dysregulated host response to infection" (Marvin Singer, 2016, JAMA). Given this fundamental misunderstanding of our findings, we find the comment regarding the inadequacy of our groups to be both dismissive and lacking in scientific merit. We would like to emphasize that the group size used in our study is consistent with accepted standards in infection research. We strongly reject any insinuations of inadequacy that have been repeatedly mentioned throughout the review.

      In order to provide a nuanced investigation of disease severity in Tercko/ko mice, we added the term “systemic infection” to the figures whenever the mice were divided into groups of mice with and without systemic infection. This is the case for Figure 2A and Supplemental Figure 1C-E. The division into mice with and without systemic infection is also mentioned in the figure legend of Figure 2A in lines 932 to 935 and for Supplemental Figure 1 in lines 1052-1053. We agree that Supplemental Figure 1G is somewhat confusing as the mice with systemic infection are highlighted in this graph but not included as a separate group within our sequencing analysis. We added a sentence to the figure legend clarifying this (lines 1042-1044):

      “Nevertheless, the infected Tercko/ko mice were considered one group for the expression analysis and not split into separate groups for the subsequent analysis.”

      Additionally, we revised the section regarding this grouping in different degrees of severity in our Material and Methods section to clarify that this division was only performed for specific analysis (line 191):

      “…for the indicated analysis.”

      Furthermore, the mice which were classified as systemically infected mice were not septic mice, as mentioned above. Those mice were classified by us as systemically infected based on their clinical score and the presence of bacteria in other organs than the lung as stated in the lines 188-191 and 377-381. Bacteremia is a symptom of very severe cases of hospital-acquired pneumonia with a very high mortality (De la Calle et al., 2016).

      Therefore, the systemically infected mice or rather mice with bacteremia display an especially severe pneumonia phenotype, which is distinct from sepsis. The presence of this symptom in our Tercko/ko mice further highlights the clinical relevance of our study. This aspect was added to the manuscript in the lines 568-570.

      “The detection of bacteria in extra pulmonary organs is of particular interest, as bacteremia is a symptom of severe pneumonia and is associated with high mortality (De la Calle et al., 2016).”

      (4) The authors conclude that disregulated inflammation and T-cell dysfunction play a major role in S. aureus susceptibility. This may or may not be an important observation, because many KO mice are abnormal for a variety of reasons, and until such reasons are mechanistically dissected, the physiological importance of the observation will remain unclear.

      Two points are important here. First, there is no natural counterpart to a Terc-KO, which is a complete loss of a key non-enzymatic component of the telomerase complex starting in utero. 

      Second, the authors truly did not examine the key basic features of their model, including the features of basic and induced inflammatory and immune responses. This analysis could be done either using model antigens in adjuvants, defined innate immune stimuli (e.g. TLR, RLR, or NLR agonists), or microbial challenge. The only data provided along these lines are the baseline frequencies of total T cells in the spleen of the three groups of mice examined (not statistically significant, Figure 4B). We do not know if the composition of naïve to memory T cell subsets may have been different, and more importantly, we have no data to evaluate whether recruitment of the immune response (including T cells) to the lung upon microbial challenge is similar or different. So, what are the numbers and percentages of T cells and alveolar macrophages in the lung following S. aureus challenge and are they even comparable or are there issues in mobilizing the T cell response to the site of infection? If, for example, Terc-KO mice do not mobilize enough T cells to the lung during infection, that would explain the paucity in many T-cellassociated genes in their transcriptomic set that the authors report. That in turn may not mean dysfunction of T cells but potentially a whole different set of defects in coordinating the response in Terc-KO mice.

      We thank the reviewer for highlighting these important aspects. Regarding the first point, indeed there is no naturally occurring deletion of Terc in humans. However, studies reported reduced expression of Terc and Tert in the tissues of aged mice and rats (Tarry-Adkins et al., 2021; Zhang et al., 2018). Terc itself has been found to have several important immunomodulatory functions such as the activation of the NFκB or PI3-kinase pathway (Liu et al., 2019; Wu et al., 2022). As those aforementioned pathways are relevant for the immune response to S. aureus infections, the authors were interested in exploring the impact of Terc deletion on the pulmonary immune response. The potential immunomodulatory functions of Terc are discussed in lines 106-121. To further clarify our rationale we added a sentence to the introduction in lines 121-125.

      “Interestingly, downregulation of Terc and Tert expression in tissues of aged mice and rats has been found (Tarry-Adkins, Aiken, Dearden, Fernandez-Twinn, & Ozanne, 2021; Zhang et al., 2018). Therefore, as a potential immunomodulatory factor reduced Terc expression could be connected to agerelated pathologies.”

      Regarding the second point, as we focused on the effect of Terc deletion in the lung and its role in S. aureus infection, we investigated inflammatory and immune response parameters relevant to this setting. For instance, inflammation parameters in the lungs of all three mice cohorts were measured to investigate differences in the inflammatory response in the non-infected and infected mice (Figure 2A). Those measurements showed no baseline difference in key inflammatory parameters between young WT and Tercko/ko mice, which is consistent with previous findings (Kang et al., 2018). The inflammatory response to infection with S. aureus in the Tercko/ko mice cohort differed significantly from the other cohorts (Figure 2A), hinting towards a dysregulated inflammatory response due to Terc deletion. Furthermore, we investigated general immune cell frequencies such as dendritic cells, macrophages, and B cells in the spleen of all three mice cohorts to gather a baseline understanding of the general immune cell populations. In our manuscript only total T cell frequencies were included due to its relevance for our data regarding T cells (Figure 4B). This data could show that there was no difference of total amount of T cells in the spleen of all three mice cohorts. For a more detailed insight into our analysis we added the frequencies of the other immune cell populations analyzed in the spleen as a Supplemental Figure 3B-F. Additionally, a figure legend for the graphs was added to lines 1075-1094.

      Therefore, while we did not analyze baseline frequencies of specific populations of T cells, we analyzed and characterized the inflammatory and immune response of our model in a way relevant to our research question. 

      The differences observed in T cell marker and TCR gene expression was also partly present between the uninfected and infected Tercko/ko mice such as the complete absence of CD247 expression in infected Tercko/ko, which is however expressed in uninfected mice of this cohort (Figure 4A, C and D). Thus, this effect cannot be solely attributed to an inadequate mobilization of T cells to the lung after infectious challenge. However, we agree that a more detailed insight into recruited immune cells to the lung or frequencies of different T cell populations could contribute to a better understanding of the proposed mechanism and would be an interesting experiment to conduct in further studies. We accept this as a limitation of our study and included it in our discussion section in lines 719-723:

      “As total CD4+ T cells were analyzed in this study, it would be useful to investigate specific T cell populations such as memory and effector T cells to elucidate the potential mechanism leading to T cell dysfunctionality in further detail. Additionally, analysis of differences in immune cell recruitment to the lungs between young WT and Tercko/ko mice would be relevant.”

      (5) Related to that, immunological analysis is also inadequate. First, the authors pull signatures from the total lung tissue, which is both imprecise and potentially skewed by differences, not in gene expression but in types of cells present and/or their abundance, a feature known to be affected by aging and perhaps by Terc deficiency during infection. Second, to draw any conclusions about immune responses, the authors would have to track antigen-specific T cells, which is possible for a wide range of microbial pathogens using peptide-MHC multimers. This would allow highly precise analysis of phenomena the authors are trying to conclude about. Moreover, it would allow them to confirm their gene expression data in populations of physiological interest

      We thank the reviewer for highlighting this important and relevant point. In our study, we aimed to investigate the role of Terc expression in modulating inflammation and the immune response to S. aureus infection in the lung. To address this, we examined the overall impact of age, genotype, and infection on lung inflammation and gene expression. Therefore, sequencing of total lung tissue was essential for addressing the research question posed. Our findings demonstrate that Tercko/ko mice exhibit a more severe phenotype following S. aureus infection, characterized by an increased bacterial load and heightened lung inflammation (Figures 1 and 2). Furthermore, our data suggest that Terc plays a role in regulating inflammation through activation of the NLRP3 inflammasome, along with the dysregulation of several T cell marker genes (Figures 2, 4, and 5). However, this study lacks a detailed analysis of distinct T cell populations, including antigen-specific T cells, as noted earlier. Investigating these aspects in future studies would be valuable to validate and expand upon our findings. We have incorporated these suggestions into the discussion section (lines 719-723)

      “As total CD4+ T cells were analyzed in this study, it would be useful to investigate specific T cell populations such as memory and effector T cells to elucidate the potential mechanism leading to T cell dysfunctionality in further detail. Additionally, analysis of differences in immune cell recruitment to the lungs between young WT and Tercko/ko mice would be relevant.”

      Nevertheless, our study provides first evidence of a potential connection between T cell functionality and Terc expression.  

      Third, the authors co-incubate AM and T cells with S. aureus. There is no information here about the phenotype of T cells used. Were they naïve, and how many S. aureus-specific T cells did they contain? Or were they a mix of different cell types, which we know will change with aging (fewer naïve and many more memory cells of different flavors), and maybe even with a Terc-KO? Naïve T cells do not interact with AM; only effector and memory cells would be able to do so, once they have been primed by contact with dendritic cells bringing antigen into the lymphoid tissues, so it is unclear what the authors are modeling here. Mature primed effector T cells would go to the lung and would interact with AM, but it is almost certain that the authors did not generate these cells for their experiment (or at least nothing like that was described in the methods or the text).

      Thank you for bringing up this important question. For the co-cultivation experiment of T cells and alveolar macrophages, total CD4+ T cells of both young WT and Tercko/ko were used. We did not select for a specific population of T cells. Our sequencing data indicated the complete downregulation of CD247 expression, which is an important part of the T cell receptor, in the lungs of infected Tercko/ko mice (Figure 4A, C and D). Given that this factor is downregulated under chronic inflammatory conditions, we investigated the impact of the inflammatory response in alveolar macrophages on the expression of various T cell-derived cytokines, as well as CD247 expression (Figure 5D, E) (Dexiu et al., 2022). This aspect is also highlighted in the discussion in lines 622-636. Therefore, a co-cultivation model of T cells and alveolar macrophages was established and confronted with heat-killed S. aureus to elicit an inflammatory response of the macrophages. To emphasize this purpose, we have revised our statement about the model setup in lines 516-518 of the manuscript: 

      “An overactive inflammatory response could be a potential explanation for the dysregulated TCR signaling.”

      The authors hope this will clarify the intent behind the model setup.

      (6) Overall, the authors began to address the role of Terc in bacterial susceptibility, but to what extent that specifically involves inflammation and macrophages, T cell immunity, or aging remains unclear at present.

      We thank the reviewer for the helpful and relevant comments. The authors accept the limitations of the presented study such as the reduced number of Tercko/ko mice and the limitations of murine models for S. aureus infection itself and discuss those in the discussion section in the lines 558-560; 576-582; 688-690 and 719-725. However, we hope that our responses have provided sufficient evidence to convince the reviewer that our data supports a clear role for Terc expression in regulating the immune response to bacterial infections, particularly with respect to inflammation and its potential connection to T cell functionality.  

      Recommendations for the authors:

      Reviewer #1 (Recommendations For The Authors):

      The good element first:

      I read this paper with genuine interest and applaud the authors for investigating the posited question. I consider it by all means scientifically relevant in the context of physiological/pathophysiological aging and reaction to a disease (here pneumonia). The Terc deletion model looks very appropriate for the question and the methodology is very advanced/in-depth. The data flow/selection of endpoints and assays is very logical to me. Moreover, I like the breakdown of pneumonia into varying levels of severity.

      We thank the reviewer for their time and effort taken to revise our manuscript. Additionally, we are grateful to receive your positive feedback regarding our study design and research question.

      The weaknesses:

      (1) I cannot help but notice that the study is heavily underpowered. As such, it is inadmissible. The key reason is that it is the first of its kind and seminal findings must be strongly propped by the evidence. It is apparent to me that the data scatter presented in the figures tends to be abnormally distributed (e.g. obvious bimodal distribution in some groups). Therefore, the presented comparisons (even if stat. sign) can be heavily misleading in terms of: i) the true magnitude of the observed effects and ii) possible type 2 error in some cases of p value >0.05. Solution: repeat the study to ensure reasonable power/reliability. This will also make it stronger as it will immediately demonstrate its reproducibility (or lack of it).

      Thank you for bringing up this extremely relevant point. We acknowledge the issue of the small sample size of Tercko/ko mice as a major limitation of our study. This limitation is also included in our discussion section in the lines 558-560. Thus we fully agree with this limitation and transparently discuss this in our manuscript. However, due to the strict German animal welfare regulations it is not possible to obtain more Tercko/ko mice, as mentioned above. Furthermore, since fatal infections occurred in the Tercko/ko mice cohort we had a reduced number of mice available. 

      However, the differences between the Tercko/ko and WT mice were striking. Including the fatal infections 80% of the Tercko/ko mice had a severe course of disease, while none of the WT mice displayed a severe course. This hints towards a clear role of Terc in the response to S. aureus infection in mice.  

      (2) In the stat analysis section of M&Ms, the authors feature only 1 sentence. This cannot be. A detailed stats workup needs to be included there. This is very much related to the above weakness; e.g. it is impossible to test for normality (to choose an appropriate post-hoc test) with n=3. Back to square one: study underpowered.

      We thank the reviewer for highlighting this important aspect. We carefully revised the method section in lines 357-360 to include all relevant information: 

      “Data are presented as mean ± SD, or as median with interquartile range for violin and box plots, with up to four levels of statistical significance indicated. P-values were calculated using Kruskal-Wallis test. Individual replicates are represented as single data points.”

      (3) Pneumonia severity. While I noted that as a strength, I also note it as weakness here. It looks to me like the authors stopped halfway with this. I totally support testing a biological effect(s) such as the one investigated here across a spectrum of a given disease severity. The authors mention that they had various severity phenotypes produced in their model but this is not visible in the data figs. I strongly suggest including that as well; i.e., to study the posited question in the severe and mild pneumonia phenotype. This is a very smart path and previous preclinical research clearly demonstrated that this severe/mild distinction is very relevant in the context of the observed responses (their presence/absence, longevity, dynamics, etc). I realize this is challenging, thus, I would probably use this approach in the Terc k/o model as sort of a calibrator to see whether the exacerbation observed in the current setup (severe?) will be also present in a mild pneumonia phenotype. S. aureus can be effectively titrated to produce pneumonia of varying severity.

      We thank the reviewer for bringing up this relevant point. 

      In our study, we could observe heterogeneity within the infected Tercko/ko cohort. Therefore as pointed out by the reviewer we assigned different degrees of severity to those groups based on clinical scores, the fatal outcome of the disease (fatal subgroup), and the presence of bacteria in organs other than the lungs (systemic infection subgroup) as stated in our materials and methods part in the lines 188-191 (Supplemental Figure 1A and B). Moreover, we highlighted this difference in a number of our figures. For example, when categorizing the mice into groups with and without systemic infection, we noticed that the mice with systemic infection demonstrated a higher bacterial load, significant body weight loss, and increased lung weight (see Supplemental Figure 1C-E). Interestingly, the two mice with systemic infection clustered separately from the other mice, indicating that the mice with systemic infection are transcriptomically distinct from the other mice cohorts (Supplemental Figure 1G). Additionally, the inflammatory response was exclusively elevated in the lungs of mice with systemic infection (Figure 2C). Thus, we included this distinction in several figures and attempted to study the differences between those subgroups but also their similarities. For instance, we could observe that some changes in the transcriptome were present in all three infected Tercko/ko mice such as the complete absence of CD247 expression at 24 hpi (Figure 4D). This distinction therefore provided a more detailed insight into the underlying mechanisms of disease severity in Tercko/ko mice and is lacking in other studies. We agree with the reviewer, that a study investigating mild and severe pneumonia phenotypes would be clinically relevant. However, as noted above, due to ethical considerations related to animal welfare and sustainability, as well as compliance with German animal welfare regulations, it is not possible to obtain additional Tercko/ko mice to carry out the proposed experiment. 

      (4) Please read ARRIVE guidelines and note the relevant info in M&Ms as ARRIVE guidelines point out.

      Thank you for emphasizing this crucial aspect. We revised our materials and methods section according to the ARRIVE guidelines (lines 179-206).

      “Tercko/ko mice aged 8 weeks, were used for infection studies (n = 8; non-infected = 3; infected = 5). Female young WT (age 8 weeks) and old WT (age 24 months) C57Bl/6 mice (both n = 10; non-infected = 5; infected = 5) were purchased from Janvier Labs (Le Genest-Saint-Isle, France). All infected mouse cohorts were compared to their respective non-infected controls, as well as to the infected groups from other cohorts. Additionally, comparisons were made between the non-infected cohorts across all groups.

      All mice were anesthetized with 2% isoflurane before intranasal infection with S. aureus USA300 (1x108 CFU/20µl) per mouse. After 24 hours, the mice were weighed and scored as previously described (Hornung et al., 2023). Infected Tercko/ko mice were grouped into different degrees of severity based on their clinical score, fatal outcome of the disease (fatal) and the presence of bacteria in organs other than the lung (systemic infection) for the indicated analysis. Mice with fatal infections were excluded from subsequent analyses, with only their final scores being reported. The mice were sacrificed via injection of an overdose of xylazine/ketamine and bleeding of axillary artery after 24 hpi. BAL was collected by instillation and subsequent retrieval of PBS into the lungs. Serum and organs were collected. Bacterial load in the BAL, kidney and liver was determined by plating of serially diluted sample as described above. For this organs were previously homogenized in the appropriate volume of PBS. Gene expression was analyzed in the right superior lung lobe. Lobes were therefore homogenized in the appropriate amount of TriZol LS reagent (Thermo Fisher Scientific, Waltham, MA, US) prior to RNA extraction. The left lung lobe was embedded into Tissue Tek O.C.T. (science services, Munich, Germany) and stored at 80°C until further processing for histological analysis. Cytokine measurements were performed using the right inferior lung lobe. Lobes were previously homogenized in the appropriate volume of PBS. Remaining organs were stored at -80°C until further usage. Mouse studies were conducted without the use of randomization or blinding.“

      (5) There are also some other descriptive deficits but they are of a much smaller caliber so I do not list them.

      We thank the reviewer for their valuable and insightful suggestions for improving our manuscript. We hope that our responses and the corresponding revisions address these suggestions satisfactorily.

      Concluding: the investigative idea is great/interesting and the methodological flow is adequate but the low power makes this study of low reliability in its current form. I strongly urge the authors to walk the extra mile with this work to make it comprehensive and reliable. Best of luck!

      Reviewer #2 (Recommendations For The Authors):

      (1) Many legends are uninformative and do not contain critical information about the experiments. For example, Figure 2A with cytokine measurements (in lung homogenates?) is likely showing data from an ELISA or Luminex test, but there is no mention of that in the legend. It stands next to Figure 2B, which is a gene expression map, again, likely from the lung (prepared how, normalized how, etc?) lacking even the most basic information. Further, Figure 2D has no information on the meaning/effect size of gene ratios on the x-axis. Figures 3 and 4 are presumably the subsets of their transcriptome data set (whole lung, harvested on d ?? post-infection), but that is just a guess on my part. Even in the main text, the timing and the controls for the transcriptomic study are not stated (ln. 398 and onwards). The authors really need to revise the figure legends and provide all the details that an average reader would need to be able to interpret the data.

      We thank the reviewer for bringing up this important point. The figure legends of all figures including supplemental figures were revised to ensure they include all relevant data necessary for accurate interpretation of the graphs. Additionally, we clarified the sequenced samples in lines 427-429:

      “We performed mRNA sequencing of the murine lung tissue of infected and non-infected mice at 24 hpi to elucidate potential differentially expressed genes that contribute to the more severe illness of Tercko/ko mice.”

      (2) Telomere shortening affects differentially different cells and its role in aging is nuanced - different in mesenchymal cells with no telomerase induction, in non-replicating cells, and in hematopoietic cells that can readily induce telomerase. The authors should be mindful of that in setting up their introduction and discussion.

      Thank you for mentioning this essential aspect. We revised our introduction and discussion to reflect the nuanced role of telomerase shortening in different tissues (lines 83-92 and 690-695):

      “Telomerase activity is restricted to specific tissues and cell types, largely dependent on the expression of Tert. While Tert is highly expressed in stem cells, progenitor cells, and germline cells, its expression is minimal in most differentiated cells (Chakravarti, LaBella, & DePinho, 2021). Consequently, the impact of telomerase dysfunction on tissues varies according to their self-renewal rate. (Chakravarti et al., 2021). One important aspect of telomere dysfunction is the impact of telomere shortening on the immune system as well as the hematopoietic system. Tissues or organ systems that are highly replicative, such as the skin or the hematopoietic system, are affected first by telomere shortening (Chakravarti et al., 2021).”

      “It is important to note that telomere shortening has a significant impact on the immune system. Although young Tercko/ko mice were used in this study, telomere shortening is still likely to be a contributing factor. Therefore, further experiments investigating the role of T cell senescence in this model should therefore be conducted.”

      (3) Syntax and formulations need to be improved and made more scientifically precise in several spots. Specifically, in 62-63, the authors say that the aged immune system "is also discussed to be more irritable", please change to reflect the common notion that the reaction to infection is dysregulated; in many cases inflammation itself is initially blunted, misdirected, and of different type (e.g. for viruses, the key IFN-I responses are not increased but decreased). In lines 114-117, presumably, the two sentences were supposed to be connected by a comma, although some editing for clarity is probably needed regardless. Line 252, please change "unspecific" to "non-specific". Line 264, please capitalize German.

      We thank the reviewer for bringing these important points to our attention. We revised our introduction regarding the aged immune response in lines 61-69:

      “Age-related dysregulation of the immune response is also characterized by inflammaging, defined as the presence of elevated levels of pro-inflammatory cytokines in the absence of an obvious inflammatory trigger (Franceschi et al., 2000; Mogilenko, Shchukina, & Artyomov, 2022). Additionally, immune cells, such as macrophages, exhibit an activated state that alters their response to infection (Canan et al., 2014). In contrast, the immune response of macrophages to infectious challenges has been shown to be initially impaired in aged mice (Boe, Boule, & Kovacs, 2017). Thus aging is a relevant factor impacting the pulmonary immune response.”

      Sentences were edited to provide more clarity in lines 131-134:

      “Although G3 Tercko/ko mice with shortened telomeres were used in this study, they were infected at a young age (8 weeks). This approach allowed for the investigation of Terc deletion effects rather than telomere dysfunction.”

      “Unspecific was changed to “non-specific” in line 282 and “German” was capitalized in line 293 and 558.

      We appreciate and thank you for your time spent processing this manuscript and look forward to your response.

      References

      De la Calle, C., Morata, L., Cobos-Trigueros, N., Martinez, J. A., Cardozo, C., Mensa, J., & Soriano, A. (2016). Staphylococcus aureus bacteremic pneumonia. European Journal of Clinical Microbiology & Infectious Diseases, 35(3), 497-502. https://doi.org/10.1007/s10096-015-2566-8  

      Dexiu, C., Xianying, L., Yingchun, H., & Jiafu, L. (2022). Advances in CD247. Scand J Immunol, 96(1), e13170. https://doi.org/10.1111/sji.13170  

      Herrera, E., Samper, E., Martín-Caballero, J., Flores, J. M., Lee, H. W., & Blasco, M. A. (1999). Disease

      states associated with telomerase deficiency appear earlier in mice with short telomeres. Embo j, 18(11), 2950-2960. https://doi.org/10.1093/emboj/18.11.2950  

      Hornung, F., Schulz, L., Köse-Vogel, N., Häder, A., Grießhammer, J., Wittschieber, D., Autsch, A., Ehrhardt, C., Mall, G., Löffler, B., & Deinhardt-Emmer, S. (2023). Thoracic adipose tissue contributes to severe virus infection of the lung. International Journal of Obesity, 47(11), 10881099. https://doi.org/10.1038/s41366-023-01362-w  

      Kang, Y., Zhang, H., Zhao, Y., Wang, Y., Wang, W., He, Y., Zhang, W., Zhang, W., Zhu, X., Zhou, Y., Zhang, L., Ju, Z., & Shi, L. (2018). Telomere Dysfunction Disturbs Macrophage Mitochondrial Metabolism and the NLRP3 Inflammasome through the PGC-1α/TNFAIP3 Axis. Cell Reports, 22(13), 3493-3506. https://doi.org/https://doi.org/10.1016/j.celrep.2018.02.071  

      Khan, A. M., Babcock, A. A., Saeed, H., Myhre, C. L., Kassem, M., & Finsen, B. (2015). Telomere dysfunction reduces microglial numbers without fully inducing an aging phenotype. Neurobiology of Aging, 36(6), 2164-2175. https://doi.org/https://doi.org/10.1016/j.neurobiolaging.2015.03.008  

      Lee, H.-W., Blasco, M. A., Gottlieb, G. J., Horner, J. W., Greider, C. W., & DePinho, R. A. (1998). Essential role of mouse telomerase in highly proliferative organs. Nature, 392(6676), 569-574. https://doi.org/10.1038/33345  

      Liu, H., Yang, Y., Ge, Y., Liu, J., & Zhao, Y. (2019). TERC promotes cellular inflammatory response independent of telomerase. Nucleic Acids Research, 47(15), 8084-8095. https://doi.org/10.1093/nar/gkz584  

      Matthe, D. M., Thoma, O. M., Sperka, T., Neurath, M. F., & Waldner, M. J. (2022). Telomerase deficiency reflects age-associated changes in CD4+ T cells. Immun Ageing, 19(1), 16. https://doi.org/10.1186/s12979-022-00273-0  

      Rudolph, K. L., Chang, S., Lee, H. W., Blasco, M., Gottlieb, G. J., Greider, C., & DePinho, R. A. (1999). Longevity, stress response, and cancer in aging telomerase-deficient mice. Cell, 96(5), 701-712. https://doi.org/10.1016/s0092-8674(00)80580-2  

      Tarry-Adkins, J. L., Aiken, C. E., Dearden, L., Fernandez-Twinn, D. S., & Ozanne, S. (2021). Exploring Telomere Dynamics in Aging Male Rat Tissues: Can Tissue-Specific Differences Contribute to Age-Associated Pathologies? Gerontology, 67(2), 233-242. https://doi.org/10.1159/000511608  

      Wong, L. S. M., Oeseburg, H., de Boer, R. A., van Gilst, W. H., van Veldhuisen, D. J., & van der Harst, P. (2008). Telomere biology in cardiovascular disease: the TERC−/− mouse as a model for heart failure and ageing. Cardiovascular Research, 81(2), 244-252. https://doi.org/10.1093/cvr/cvn337  

      Wu, S., Ge, Y., Lin, K., Liu, Q., Zhou, H., Hu, Q., Zhao, Y., He, W., & Ju, Z. (2022). Telomerase RNA TERC and the PI3K-AKT pathway form a positive feedback loop to regulate cell proliferation independent of telomerase activity. Nucleic Acids Res, 50(7), 3764-3776. https://doi.org/10.1093/nar/gkac179  

      Zhang, M. W., Zhao, P., Yung, W. H., Sheng, Y., Ke, Y., & Qian, Z. M. (2018). Tissue iron is negatively correlated with TERC or TERT mRNA expression: A heterochronic parabiosis study in mice. Aging (Albany NY), 10(12), 3834-3850. https://doi.org/10.18632/aging.101676

    1. Socio�o�.cal �terc:st in questions of'reality' and'knowledge'IS thus 1Illtially JUStified by the fact of their social relativity.What is 'real' to a Tibetan monk may not be 'real' to anA:merican businessman.

      what is "reality" and what is " knowledge" is socially informed

    1. Some takeaways, however, are that bad behavior begets bad behavior, and if we want to make any strides in equality, it cannot just be the women speaking up about these kinds of things. Until the titular men can empathize with the plight of women, and step up when the guys around them are being inappropriate, we're all doomed to be trapped in the same cycles of abuse. Images c/o A24Is MEN a fun, Friday night kind of horror? Absolutely not. It is triggering, unsettling, and at times, infuriating. But I also believe it is important viewing, especially for those named in the film's title.

      Talks about the meaning of the movie, focuses on the more political aspect of the movie rather than just the horror, has a good concluding sentence, but still feels like something is missing.

    1. ReferencesBeckman, A. L., Herrin, J., Nasir, K., Desai, N. R., & Spatz, E. S. (2017). Trends in cardiovascular health of US adults by income, 2005–2014. JAMA cardiology, 2(7), 814–816.Article  PubMed  PubMed Central  Google Scholar  Bernstein, J., & Tedeschi, E. (2021). Pandemic Prices: Assessing Inflation in the Months and Years Ahead. The White House, U.S. Government. Retrieved July 1 from https://www.whitehouse.gov/cea/written-materials/2021/04/12/pandemic-prices-assessing-inflation-in-the-months-and-years-ahead/.Burgard, S. A., & Kalousova, L. (2015). Effects of the great recession: Health and well-being. Annual review of sociology, 41, 181–201.Article  Google Scholar  Cargill, V. A., & Stone, V. E. (2005). HIV/AIDS: A minority health issue. Medical Clinics, 89(4), 895–912.PubMed  Google Scholar  Choi, H., Steptoe, A., Heisler, M., Clarke, P., Schoeni, R. F., Jivraj, S., Cho, T. C., & Langa, K. M. (2020). Comparison of health outcomes among high-and low-income adults aged 55 to 64 years in the US vs England. JAMA internal medicine, 180(9), 1185–1193.Article  PubMed  Google Scholar  Clark, E., Fredricks, K., Woc-Colburn, L., Bottazzi, M. E., & Weatherhead, J. (2020). Disproportionate impact of the COVID-19 pandemic on immigrant communities in the United States. PLoS neglected tropical diseases, 14(7), e0008484.Connor, J., Madhavan, S., Mokashi, M., Amanuel, H., Johnson, N. R., Pace, L. E., & Bartz, D. (2020). Health risks and outcomes that disproportionately affect women during the Covid-19 pandemic: A review (266 vol., p. 113364). Social science & medicine.Do, D. P., & Finch, B. K. (2008). The link between neighborhood poverty and health: Context or composition? American journal of epidemiology, 168(6), 611–619.Article  PubMed  PubMed Central  Google Scholar  Fogle, B. M., Tsai, J., Mota, N., Harpaz-Rotem, I., Krystal, J. H., Southwick, S. M., & Pietrzak, R. H. (2020). The National Health and Resilience in Veterans Study: A narrative review and future directions. Frontiers in Psychiatry, 11, 538218. https://doi.org/10.3389/fpsyt.2020.538218.Article  PubMed  PubMed Central  Google Scholar  Gellad, W. F., Good, C. B., & Shulkin, D. J. (2017). Addressing the opioid epidemic in the United States: Lessons from the Department of Veterans Affairs. JAMA internal medicine, 177(5), 611–612.Article  PubMed  Google Scholar  Isaacs, K., Mota, N. P., Tsai, J., Harpaz-Rotem, I., Cook, J. M., Kirwin, P. D., Krystal, J. H., Southwick, S. M., & Pietrzak, R. H. (2017). Psychological resilience in US military veterans: A 2-year, nationally representative prospective cohort study. Journal of Psychiatric Research, 84, 301–309.Article  PubMed  Google Scholar  Jenkins, R. A. (2021). The fourth wave of the US opioid epidemic and its implications for the rural US: A federal perspective. Preventive medicine, 152(2), 106541.Article  PubMed  Google Scholar  Krieger, N. (2007). Why epidemiologists cannot afford to ignore poverty. Epidemiology (Cambridge, Mass.), 18(6), 658–663.Article  PubMed  Google Scholar  Lin, L. A., Peltzman, T., McCarthy, J. F., Oliva, E. M., Trafton, J. A., & Bohnert, A. S. B (2019). Changing trends in opioid overdose deaths and prescription opioid receipt among veterans. American journal of preventive medicine, 57(1), 106–110.Article  PubMed  Google Scholar  Manderson, L., & Aaby, P. (1992). An epidemic in the field? Rapid assessment procedures and health research. Social science & medicine, 35(7), 839–850.Article  CAS  Google Scholar  Mani, A., Mullainathan, S., Shafir, E., & Zhao, J. (2013). Poverty impedes cognitive function science, 341(6149), 976–980.CAS  PubMed  Google Scholar  McDonough, P., Sacker, A., & Wiggins, R. D. (2005). Time on my side? Life course trajectories of poverty and health. Social science & medicine, 61(8), 1795–1808.Article  Google Scholar  Oliver, A. (2007). The Veterans Health Administration: An american success story? Milbank Quarterly, 85(1), 5–35.Article  PubMed  PubMed Central  Google Scholar  Ostling, P. S., Davidson, K. S., Anyama, B. O., Helander, E. M., Wyche, M. Q., & Kaye, A. D. (2018). America’s opioid epidemic: A comprehensive review and look into the rising crisis. Current pain and headache reports, 22(5), 32.Article  PubMed  Google Scholar  Palombi, L. C., Hill, S., Lipsky, C. A., Swanoski, M. S., M. T., & Lutfiyya, M. N. (2018). A scoping review of opioid misuse in the rural United States. Annals of epidemiology, 28(9), 641–652.Article  PubMed  Google Scholar  Price, J. H., Khubchandani, J., & Webb, F. J. (2018). Poverty and health disparities: What can public health professionals do? Health promotion practice, 19(2), 170–174.Article  PubMed  Google Scholar  Reif, S. S., Whetten, K., Wilson, E. R., McAllaster, C., Pence, B. W., Legrand, S., & Gong, W. (2014). HIV/AIDS in the Southern USA: A disproportionate epidemic. AIDS care, 26(3), 351–359.Article  PubMed  Google Scholar  Reif, S., Safley, D., McAllaster, C., Wilson, E., & Whetten, K. (2017). State of HIV in the US Deep South. Journal of community health, 42, 844–853.Article  PubMed  Google Scholar  Renahy, E., Mitchell, C., Molnar, A., Muntaner, C., Ng, E., Ali, F., & O’Campo, P. (2018). Connections between unemployment insurance, poverty and health: A systematic review. European Journal of Public Health, 28(2), 269–275.Article  PubMed  Google Scholar  Scrimshaw, N. S., & Gleason, G. R. (Eds.). (1992). Rapid Assessment Procedures- qualitative methodologies for planning and evaluation of Health related programmes. International Nutrition Foundation for Developing Countries.Shmagel, A., Foley, R., & Ibrahim, H. (2016). Epidemiology of chronic low back pain in US adults: Data from the 2009–2010 National Health and Nutrition Examination Survey. Arthritis care & research, 68(11), 1688–1694.Article  Google Scholar  Stuckler, D., Meissner, C., Fishback, P., Basu, S., & McKee, M. (2012). Banking crises and mortality during the Great Depression: Evidence from US urban populations, 1929–1937. Journal of Epidemiology & Community Health, 66(5), 410–419.Article  Google Scholar  Tai, D. B. G., Shah, A., Doubeni, C. A., Sia, I. G., & Wieland, M. L. (2021). The disproportionate impact of COVID-19 on racial and ethnic minorities in the United States. Clinical Infectious Diseases, 72(4), 703–706.Article  PubMed  Google Scholar  Tapia Granados, J. A., & Diez Roux, A. V. (2009). Life and death during the Great Depression. Proceedings of the National Academy of Sciences, 106(41), 17290–17295.Article  CAS  Google Scholar  Tsai, J., & Hooshyar, D. (2022). Prevalence of eviction, home foreclosure, and homelessness among low-income U.S. veterans: The national veteran homeless and other Poverty Experiences (NV-HOPE) study. Public Health, 213, 181–188. https://doi.org/10.1016/j.puhe.2022.10.017.Article  CAS  PubMed  Google Scholar  Tsai, J., & Kelton, K. (2023). Service use and barriers to care among homeless veterans: Results from the national veteran homeless and other Poverty Experiences (NV-HOPE) study. Journal of Community Psychology, 51(1), 507–515. https://doi.org/10.1002/jcop.22912.Article  PubMed  Google Scholar  Tsai, J., & Rosenheck, R. A. (2015). Risk factors for homelessness among U.S. veterans. Epidemiologic Reviews, 37(1), 177–195.Article  PubMed  Google Scholar  Tsai, J., & Rosenheck, R. A. (2016). US Veterans’ use of VA mental health services and disability compensation increased from 2001 to 2010. Health Affairs, 35(6), 966–973.Article  PubMed  Google Scholar  Tsai, J., Rosenheck, R. A., Kasprow, W. J., & McGuire, J. F. (2013). Risk of incarceration and clinical characteristics of incarcerated veterans by race/ethnicity. Social Psychiatry and Psychiatric Epidemiology, 48(11), 1777–1786.Article  PubMed  Google Scholar  Tsai, J., Elbogen, E. B., Huang, M., North, C. S., & Pietrzak, R. H. (2021). Psychological distress and alcohol use disorder during the COVID-19 era among middle-and low-income US adults. Journal of affective disorders, 288, 41–49.Article  CAS  PubMed  PubMed Central  Google Scholar  Tsai, J., McCleery, A., Wynn, J. K., & Green, M. F. (2023). Financial health and psychiatric symptoms among veterans with psychosis or recent homelessness during the COVID-19 pandemic. Psychological Services. https://doi.org/10.1037/ser0000787.Article  PubMed  Google Scholar  Umucu, E., Reyes, A., Nay, A., Elbogen, E. B., & Tsai, J. (2021). Associations between mental health and job loss among middle-and low‐income veterans and civilians during the COVID‐19 pandemic: An exploratory study. Stress and Health. https://doi.org/10.1002/smi.3099.

      The article does have sources sited. The article uses APA citations and uses a range of academic sources. Sources include both primary and secondary sources for the research.

    1. I NOONO PM MRO  OOQ  N I  I $ MR& OQ O I NOM OM O OO ION I M OOM QMOI I NOMOOQO <  QIM     O  IO

      Dependant variables

    2. J O    M IM NMM O QIM  M R ON QI NOQ I $ ! "#$O     O  IO I NOM OOQO I QIP QON IONO  IMMQON ON IN I M ION  Q  N IPO  OO OM

      dataset

    3. -./( ,O(OM,Q. )IQ+(O( I0 NOM-."O2/*/R2O N,+* QM(O( -.O 1M4I,/-6 I)9./Q. M,O 0O/-.O, -II -,/P/M2 QI15M,ON -I -.I(O -.M- NI 0I- QM,,6 M 1M8/1+1(O0-O0QO I) NOM-. -I M22I9 M0 M55,OQ/MR2O 1M,*/0 I) 1M0O+PO, R6 2M96O,(0I, -II 5I2/-/QM226 (O0(/-/PO QI15M,ON 9/-. ./*."5,I)/2O QM(O( QI0QO,0/0*QI,,+5-/I0 M0N -O,,I,/(1 -I RM, I,N/0M,6 2M96O,( ),I1 (9M6/0* 4+N/Q/M2NOQ/(/I0(

      Sampling

    4. -.,OO"5,I0* -.OI,O-/QM2 ),M1O9I,< I) /0(-/-+-/I0M2M2/O0M-/I0D5I9O, /NO0-/-6 M0N 2O*/-/1MQ6D9/22 RO 5,IP/NON -I O852M/0 -.OQM+(O( I) -.O N/2O11M

      Theoretical framework

    5. 6 O15/,/QM2 )/0N/0*( RO2I9 ,OPOM2 9.M-  QM22 M )# M( -I -.O O))OQ- I) 2O*M2 ,O5,O(O0-M-/I0 /0 =./0MU( Q,/1/0M2 QI+,-(

      Empirical findings

    Annotators

    1. The CIA and DIA decided they should investigate and know as much about it as possible.

      "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it" "theres no reason to want it"

      Main menu

      Wikipedia The Free Encyclopedia

      Personal tools

      Contents

      Astrolabe

      Tools

      Appearance

      Text

      • Small

        Standard

        Large

      Width

      • Standard

        Wide

      Color (beta)

      • Automatic

        Light

        Dark

      From Wikipedia, the free encyclopedia

      For other pages with a similar name, see Astrolabe (disambiguation). Not to be confused with Cosmolabe.

      Planispheric Astrolabe made of brass, cast, with fretwork rete and surface engraving

      North African, 9th century AD, Planispheric Astrolabe. Khalili Collection.

      A modern astrolabe made in Tabriz, Iran in 2013.

      An astrolabe (Greek: ἀστρολάβος astrolábos, 'star-taker'; Arabic: ٱلأَسْطُرلاب al-Asṭurlāb; Persian: ستاره‌یاب Setāreyāb) is an astronomical instrument dating to ancient times. It serves as a star chart and physical model of visible heavenly bodies. Its various functions also make it an elaborate inclinometer and an analog calculation device capable of working out several kinds of problems in astronomy. In its simplest form it is a metal disc with a pattern of wires, cutouts, and perforations that allows a user to calculate astronomical positions precisely. It is able to measure the altitude above the horizon of a celestial body, day or night; it can be used to identify stars or planets, to determine local latitude given local time (and vice versa), to survey, or to triangulate. It was used in classical antiquity, the Islamic Golden Age, the European Middle Ages and the Age of Discovery for all these purposes.

      The astrolabe, which is a precursor to the sextant,^[1]^ is effective for determining latitude on land or calm seas. Although it is less reliable on the heaving deck of a ship in rough seas, the mariner's astrolabe was developed to solve that problem.

      Applications

      16th-century woodcut of measurement of a building's height with an astrolabe

      The 10th-century astronomer ʿAbd al-Raḥmān al-Ṣūfī wrote a massive text of 386 chapters on the astrolabe, which reportedly described more than 1,000 applications for the astrolabe's various functions.^[2]^ These ranged from the astrological, the astronomical and the religious, to navigation, seasonal and daily time-keeping, and tide tables. At the time of their use, astrology was widely considered as much of a serious science as astronomy, and study of the two went hand-in-hand. The astronomical interest varied between folk astronomy (of the pre-Islamic tradition in Arabia) which was concerned with celestial and seasonal observations, and mathematical astronomy, which would inform intellectual practices and precise calculations based on astronomical observations. In regard to the astrolabe's religious function, the demands of Islamic prayer times were to be astronomically determined to ensure precise daily timings, and the qibla, the direction of Mecca towards which Muslims must pray, could also be determined by this device. In addition to this, the lunar calendar that was informed by the calculations of the astrolabe was of great significance to the religion of Islam, given that it determines the dates of important religious observances such as Ramadan.^[citation needed]^

      Etymology

      The Oxford English Dictionary gives the translation "star-taker" for the English word astrolabe and traces it through medieval Latin to the Greek word ἀστρολάβος : astrolábos,^[3]^^[4]^ from ἄστρον : astron "star" and λαμβάνειν : lambanein "to take".^[5]^

      In the medieval Islamic world the Arabic word al-Asturlāb (i.e., astrolabe) was given various etymologies. In Arabic texts, the word is translated as ākhidhu al-Nujūm (Arabic: آخِذُ ٱلنُّجُومْ, lit. 'star-taker'), a direct translation of the Greek word.^[6]^

      Al-Biruni quotes and criticises medieval scientist Hamza al-Isfahani who stated:^[6]^ "asturlab is an arabisation of this Persian phrase" (sitara yab, meaning "taker of the stars").^[7]^ In medieval Islamic sources, there is also a folk etymology of the word as "lines of lab", where "Lab" refers to a certain son of Idris (Enoch). This etymology is mentioned by a 10th-century scientist named al-Qummi but rejected by al-Khwarizmi.^[8]^

      History

      Ancient era

      An astrolabe is essentially a plane (two-dimensional) version of an armillary sphere, which had already been invented in the Hellenistic period and probably been used by Hipparchus to produce his star catalogue. Theon of Alexandria (c. 335 -- c. 405) wrote a detailed treatise on the astrolabe.^[9]^ The invention of the plane astrolabe is sometimes wrongly attributed to Theon's daughter Hypatia (born c. 350--370; died AD 415),^[10]^^[11]^^[12]^^[13]^ but it's known to have been used much earlier.^[11]^^[12]^^[13]^ The misattribution comes from a misinterpretation of a statement in a letter written by Hypatia's pupil Synesius (c. 373 -- c. 414),^[11]^^[12]^^[13]^ which mentions that Hypatia had taught him how to construct a plane astrolabe, but does not say that she invented it.^[11]^^[12]^^[13]^ Lewis argues that Ptolemy used an astrolabe to make the astronomical observations recorded in the Tetrabiblos.^[9]^ However, Emilie Savage-Smith notes "there is no convincing evidence that Ptolemy or any of his predecessors knew about the planispheric astrolabe".^[14]^ In chapter 5,1 of the Almagest, Ptolemy describes the construction of an armillary sphere, and it is usually assumed that this was the instrument he used.

      Astrolabes continued to be used in the Byzantine Empire. Christian philosopher John Philoponus wrote a treatise (c. 550) on the astrolabe in Greek, which is the earliest extant treatise on the instrument.^[a]^ Mesopotamian bishop Severus Sebokht also wrote a treatise on the astrolabe in the Syriac language during the mid-7th century.^[b]^ Sebokht refers to the astrolabe as being made of brass in the introduction of his treatise, indicating that metal astrolabes were known in the Christian East well before they were developed in the Islamic world or in the Latin West.^[15]^

      Medieval era

      Astrolabes were further developed in the medieval Islamic world, where Muslim astronomers introduced angular scales to the design,^[16]^ adding circles indicating azimuths on the horizon.^[17]^ It was widely used throughout the Muslim world, chiefly as an aid to navigation and as a way of finding the Qibla, the direction of Mecca. Eighth-century mathematician Muhammad al-Fazari is the first person credited with building the astrolabe in the Islamic world.^[18]^

      The mathematical background was established by Muslim astronomer Albatenius in his treatise Kitab az-Zij (c. AD 920), which was translated into Latin by Plato Tiburtinus (De Motu Stellarum). The earliest surviving astrolabe is dated AH 315 (AD 927--928). In the Islamic world, astrolabes were used to find the times of sunrise and the rising of fixed stars, to help schedule morning prayers (salat). In the 10th century, al-Sufi first described over 1,000 different uses of an astrolabe, in areas as diverse as astronomy, astrology, navigation, surveying, timekeeping, prayer, Salat, Qibla, etc.^[19]^^[20]^

      An Arab astrolabe from 1208

      The spherical astrolabe was a variation of both the astrolabe and the armillary sphere, invented during the Middle Ages by astronomers and inventors in the Islamic world.^[c]^ The earliest description of the spherical astrolabe dates to Al-Nayrizi (fl. 892--902). In the 12th century, Sharaf al-Dīn al-Tūsī invented the linear astrolabe, sometimes called the "staff of al-Tusi", which was "a simple wooden rod with graduated markings but without sights. It was furnished with a plumb line and a double chord for making angular measurements and bore a perforated pointer".^[21]^ The geared mechanical astrolabe was invented by Abi Bakr of Isfahan in 1235.^[22]^

      The first known metal astrolabe in Western Europe is the Destombes astrolabe made from brass in the eleventh century in Portugal.^[23]^^[24]^ Metal astrolabes avoided the warping that large wooden ones were prone to, allowing the construction of larger and therefore more accurate instruments. Metal astrolabes were heavier than wooden instruments of the same size, making it difficult to use them in navigation.^[25]^

      Spherical astrolabe

      A depiction of Hermann of Reichenau with an astrolabe in a 13th-century manuscript by Matthew Paris

      Herman Contractus of Reichenau Abbey, examined the use of the astrolabe in Mensura Astrolai during the 11th century.^[26]^ Peter of Maricourt wrote a treatise on the construction and use of a universal astrolabe in the last half of the 13th century entitled Nova compositio astrolabii particularis. Universal astrolabes can be found at the History of Science Museum in Oxford.^[27]^ David A. King, historian of Islamic instrumentation, describes the universal astrolobe designed by Ibn al-Sarraj of Aleppo (aka Ahmad bin Abi Bakr; fl. 1328) as "the most sophisticated astronomical instrument from the entire Medieval and Renaissance periods".^[28]^

      English author Geoffrey Chaucer (c. 1343--1400) compiled A Treatise on the Astrolabe for his son, mainly based on a work by Messahalla or Ibn al-Saffar.^[29]^^[30]^ The same source was translated by French astronomer and astrologer Pélerin de Prusse and others. The first printed book on the astrolabe was Composition and Use of Astrolabe by Christian of Prachatice, also using Messahalla, but relatively original.

      Front of an Indian astrolabe now kept at the Royal Museum of Scotland at Edinburgh.

      In 1370, the first Indian treatise on the astrolabe was written by the Jain astronomer Mahendra Suri, titled Yantrarāja.^[31]^

      A simplified astrolabe, known as a balesilha, was used by sailors to get an accurate reading of latitude while at sea. The use of the balesilha was promoted by Prince Henry (1394--1460) while navigating for Portugal.^[32]^

      The astrolabe was almost certainly first brought north of the Pyrenees by Gerbert of Aurillac (future Pope Sylvester II), where it was integrated into the quadrivium at the school in Reims, France, sometime before the turn of the 11th century.^[33]^ In the 15th century, French instrument maker Jean Fusoris (c. 1365--1436) also started remaking and selling astrolabes in his shop in Paris, along with portable sundials and other popular scientific devices of the day.

      Astronomical Instrument Detail by Ieremias Palladas 1612

      Thirteen of his astrolabes survive to this day.^[34]^ One more special example of craftsmanship in early 15th-century Europe is the astrolabe designed by Antonius de Pacento and made by Dominicus de Lanzano, dated 1420.^[35]^

      In the 16th century, Johannes Stöffler published Elucidatio fabricae ususque astrolabii, a manual of the construction and use of the astrolabe. Four identical 16th-century astrolabes made by Georg Hartmann provide some of the earliest evidence for batch production by division of labor. In 1612, Greek painter Ieremias Palladas incorporated a sophisticated astrolabe in his painting depicting Catherine of Alexandria. The painting was entitled Catherine of Alexandria and featured a device called the System of the Universe (Σύστημα τοῦ Παντός). The device featured the planets with the names in Greek: Selene (Moon), Hermes (Mercury), Aphrodite (Venus), Helios (Sun), Ares (Mars), Zeus (Jupiter), and Chronos (Saturn). The device also featured celestial spheres following the Ptolemaic model and Earth was depicted as a blue sphere with circles of geographic coordinates. A complex line representing the axis of the Earth covered the entire instrument.^[36]^

      Medieval astrolabes

      Astrolabes and clocks

      Amerigo Vespucci observing the Southern Cross by looking over the top of an armillary sphere bizarrely held from the top as if it were an astrolabe; however, an astrolabe cannot be used by looking over its top. The page inexplicably contains the word astrolabium. By Jan Collaert II. Museum Plantin-Moretus, Antwerp, Belgium.

      Mechanical astronomical clocks were initially influenced by the astrolabe; they could be seen in many ways as clockwork astrolabes designed to produce a continual display of the current position of the sun, stars, and planets. For example, Richard of Wallingford's clock (c. 1330) consisted essentially of a star map rotating behind a fixed rete, similar to that of an astrolabe.^[37]^

      Many astronomical clocks use an astrolabe-style display, such as the famous clock at Prague, adopting a stereographic projection (see below) of the ecliptic plane. In recent times, astrolabe watches have become popular. For example, Swiss watchmaker Ludwig Oechslin designed and built an astrolabe wristwatch in conjunction with Ulysse Nardin in 1985.^[38]^ Dutch watchmaker Christaan van der Klauuw also manufactures astrolabe watches today.^[39]^

      Construction

      An astrolabe consists of a disk, called the mater (mother), which is deep enough to hold one or more flat plates called tympans, or climates. A tympan is made for a specific latitude and is engraved with a stereographic projection of circles denoting azimuth and altitude and representing the portion of the celestial sphere above the local horizon. The rim of the mater is typically graduated into hours of time, degrees of arc, or both.^[40]^

      Above the mater and tympan, the rete, a framework bearing a projection of the ecliptic plane and several pointers indicating the positions of the brightest stars, is free to rotate. These pointers are often just simple points, but depending on the skill of the craftsman can be very elaborate and artistic. There are examples of astrolabes with artistic pointers in the shape of balls, stars, snakes, hands, dogs' heads, and leaves, among others.^[40]^ The names of the indicated stars were often engraved on the pointers in Arabic or Latin.^[41]^ Some astrolabes have a narrow rule or label which rotates over the rete, and may be marked with a scale of declinations.

      The rete, representing the sky, functions as a star chart. When it is rotated, the stars and the ecliptic move over the projection of the coordinates on the tympan. One complete rotation corresponds to the passage of a day. The astrolabe is, therefore, a predecessor of the modern planisphere.

      On the back of the mater, there is often engraved a number of scales that are useful in the astrolabe's various applications. These vary from designer to designer, but might include curves for time conversions, a calendar for converting the day of the month to the sun's position on the ecliptic, trigonometric scales, and graduation of 360 degrees around the back edge. The alidade is attached to the back face. An alidade can be seen in the lower right illustration of the Persian astrolabe above. When the astrolabe is held vertically, the alidade can be rotated and the sun or a star sighted along its length, so that its altitude in degrees can be read ("taken") from the graduated edge of the astrolabe; hence the word's Greek roots: "astron" (ἄστρον) = star + "lab-" (λαβ-) = to take. The alidade had vertical and horizontal cross-hairs which plots locations on an azimuthal ring called an almucantar (altitude-distance circle).

      An arm called a radius connects from the center of the astrolabe to the optical axis which is parallel with another arm also called a radius. The other radius contains graduations of altitude and distance measurements.

      A shadow square also appears on the back of some astrolabes, developed by Muslim astrologists in the 9th Century, whereas devices of the Ancient Greek tradition featured only altitude scales on the back of the devices.^[42]^ This was used to convert shadow lengths and the altitude of the sun, the uses of which were various from surveying to measuring inaccessible heights.^[43]^

      Devices were usually signed by their maker with an inscription appearing on the back of the astrolabe, and if there was a patron of the object, their name would appear inscribed on the front, or in some cases, the name of the reigning sultan or the teacher of the astrolabist has also been found to appear inscribed in this place.^[44]^ The date of the astrolabe's construction was often also signed, which has allowed historians to determine that these devices are the second oldest scientific instrument in the world. The inscriptions on astrolabes also allowed historians to conclude that astronomers tended to make their own astrolabes, but that many were also made to order and kept in stock to sell, suggesting there was some contemporary market for the devices.^[44]^

      Construction of astrolabes

      • The Hartmann astrolabe in Yale collection. This instrument shows its rete and rule.

        The Hartmann astrolabe in Yale collection. This instrument shows its rete and rule.

      • Celestial Globe, Isfahan (?), Iran 1144. Shown at the Louvre Museum, this globe is the third oldest surviving in the world.

        Celestial Globe, Isfahan (?), Iran 1144. Shown at the Louvre Museum, this globe is the third oldest surviving in the world.

      • Computer-generated planispheric astrolabe

        Computer-generated planispheric astrolabe

      Mathematical basis

      The construction and design of astrolabes are based on the application of the stereographic projection of the celestial sphere. The point from which the projection is usually made is the South Pole. The plane onto which the projection is made is that of the Equator.^[45]^

      Designing a tympanum through stereographic projection

      Parts of an Astrolabe tympanum

      The tympanum captures the celestial coordinate axes upon which the rete will rotate. It is the component that will enable the precise determination of a star's position at a specific time of day and year.

      Therefore, it should project:

      1. The zenith, which will vary depending on the latitude of the astrolabe user.
      2. The horizon line and almucantar or circles parallel to the horizon, which will allow for the determination of a celestial body's altitude (from the horizon to the zenith).
      3. The celestial meridian (north-south meridian, passing through the zenith) and secondary meridians (circles intersecting the north-south meridian at the zenith), which will enable the measurement of azimuth for a celestial body.
      4. The three main circles of latitude (Capricorn, Equator, and Cancer) to determine the exact moments of solstices and equinoxes throughout the year.

      The tropics and the equator define the tympanum

      Stereographic projection of Earth's tropics and equator from the South Pole.

      On the right side of the image above:

      1. The blue sphere represents the celestial sphere.
      2. The blue arrow indicates the direction of true north (the North Star).
      3. The central blue point represents Earth (the observer's location).
      4. The geographic south of the celestial sphere acts as the projection pole.
      5. The celestial equatorial plane serves as the projection plane.
      6. Three parallel circles represent the projection on the celestial sphere of Earth's main circles of latitude:

      When projecting onto the celestial equatorial plane, three concentric circles correspond to the celestial sphere's three circles of latitude (left side of the image). The largest of these, the projection on the celestial equatorial plane of the celestial Tropic of Capricorn, defines the size of the astrolabe's tympanum. The center of the tympanum (and the center of the three circles) is actually the north-south axis around which Earth rotates, and therefore, the rete of the astrolabe will rotate around this point as the hours of the day pass (due to Earth's rotational motion).

      The three concentric circles on the tympanum are useful for determining the exact moments of solstices and equinoxes throughout the year: if the sun's altitude at noon on the rete is known and coincides with the outer circle of the tympanum (Tropic of Capricorn), it signifies the winter solstice (the sun will be at the zenith for an observer at the Tropic of Capricorn, meaning summer in the southern hemisphere and winter in the northern hemisphere). If, on the other hand, its altitude coincides with the inner circle (Tropic of Cancer), it indicates the summer solstice. If its altitude is on the middle circle (equator), it corresponds to one of the two equinoxes.

      The horizon and the measurement of altitude

      Stereographic projection of an observer's horizon at a specific latitude

      On the right side of the image above:

      1. The blue arrow indicates the direction of true north (the North Star).
      2. The central blue point represents Earth (the observer's location).
      3. The black arrow represents the zenith direction for the observer (which would vary depending on the observer's latitude).
      4. The two black circles represent the horizon surrounding the observer, which is perpendicular to the zenith vector and defines the portion of the celestial sphere visible to the observer, and its projection on the celestial equatorial plane.
      5. The geographic south of the celestial sphere acts as the projection pole.
      6. The celestial equatorial plane serves as the projection plane.

      When projecting the horizon onto the celestial equatorial plane, it transforms into an ellipse upward-shifted relatively to the center of the tympanum (both the observer and the projection of the north-south axis). This implies that a portion of the celestial sphere will fall outside the outer circle of the tympanum (the projection of the celestial Tropic of Capricorn) and, therefore, won't be represented.

      Stereographic projection of the horizon and an almucantar.

      Additionally, when drawing circles parallel to the horizon up to the zenith (almucantar), and projecting them on the celestial equatorial plane, as in the image above, a grid of consecutive ellipses is constructed, allowing for the determination of a star's altitude when its rete overlaps with the designed tympanum.

      The meridians and the measurement of azimuth

      Stereographic projection of the north-south meridian and a meridian 40° E on the tympanum of an astrolabe

      On the right side of the image above:

      1. The blue arrow indicates the direction of true north (the North Star).
      2. The central blue point represents Earth (the observer's location).
      3. The black arrow represents the zenith direction for the observer (which would vary depending on the observer's latitude).
      4. The two black circles represent the horizon surrounding the observer, which is perpendicular to the zenith vector and defines the portion of the celestial sphere visible to the observer, and its projection on the celestial equatorial plane.
      5. The five red dots represent the zenith, the nadir (the point on the celestial sphere opposite the zenith with respect to the observer), their projections on the celestial equatorial plane, and the center (with no physical meaning attached) of the circle obtained by projecting the secondary meridian (see below) on the celestial equatorial plane.
      6. The orange circle represents the celestial meridian (or meridian that goes, for the observer, from the north of the horizon to the south of the horizon passing through the zenith).
      7. The two red circles represent a secondary meridian with an azimuth of 40° East relative to the observer's horizon (which, like all secondary meridians, intersects the principal meridian at the zenith and nadir), and its projection on the celestial equatorial plane.
      8. The geographic south of the celestial sphere acts as the projection pole.
      9. The celestial equatorial plane serves as the projection plane.

      When projecting the celestial meridian, it results in a straight line that overlaps with the vertical axis of the tympanum, where the zenith and nadir are located. However, when projecting the 40° E meridian, another circle is obtained that passes through both the zenith and nadir projections, so its center is located on the perpendicular bisection of the segment connecting both points. In deed, the projection of the celestial meridian can be considered as a circle with an infinite radius (a straight line) whose center is on this bisection and at an infinite distance from these two points.

      If successive meridians that divide the celestial sphere into equal sectors (like "orange slices" radiating from the zenith) are projected, a family of curves passing through the zenith projection on the tympanum is obtained. These curves, once overlaid with the rete containing the major stars, allow for determining the azimuth of a star located on the rete and rotated for a specific time of day.

      See also

      References

      Footnotes

      1.

      1. Savage-Smith, Emilie (1993). "Book Reviews". Journal of Islamic Studies. 4 (2): 296--299. doi:10.1093/jis/4.2.296. There is no evidence for the Hellenistic origin of the spherical astrolabe, but rather evidence so far available suggests that it may have been an early but distinctly Islamic development with no Greek antecedents.

      Notes

      1.

      1. Gentili, Graziano; Simonutti, Luisa; Struppa, Daniele C. (2020). "The Mathematics of the Astrolabe and Its History". Journal of Humanistic Mathematics. 10: 101--144. doi:10.5642/jhummath.202001.07. hdl:2158/1182616. S2CID 211008813.

      Bibliography

      • Evans, James (1998), The History and Practice of Ancient Astronomy, Oxford University Press, ISBN 0-19-509539-1
      • Stöffler, Johannes (2007) [First published 1513], Stoeffler's Elucidatio -- The Construction and Use of the Astrolabe [Elucidatio Fabricae Ususque Astrolabii], translated by Gunella, Alessandro; Lamprey, John, John Lamprey, ISBN 978-1-4243-3502-2
      • King, D. A. (1981), "The Origin of the Astrolabe According to the Medieval Islamic Sources", Journal for the History of Arabic Science, 5: 43--83
      • King, Henry (1978), Geared to the Stars: the Evolution of Planetariums, Orreries, and Astronomical Clocks, University of Toronto Press, ISBN 978-0-8020-2312-4
      • Krebs, Robert E.; Krebs, Carolyn A. (2003), Groundbreaking Scientific Experiments, Inventions, and Discoveries of the Ancient World, Greenwood Press, ISBN 978-0-313-31342-4
      • Laird, Edgar (1997), Carol Poster and Richard Utz (ed.), "Astrolabes and the Construction of Time in the Late Middle Ages", Constructions of Time in the Late Middle Ages, Evanston, Illinois: Northwestern University Press: 51--69
      • Laird, Edgar; Fischer, Robert, eds. (1995), "Critical edition of Pélerin de Prusse on the Astrolabe (translation of Practique de Astralabe)", Medieval & Renaissance Texts & Studies, Binghamton, New York, ISBN 0-86698-132-2
      • Lewis, M. J. T. (2001), Surveying Instruments of Greece and Rome, Cambridge University Press, ISBN 978-0-511-48303-5
      • Morrison, James E. (2007), The Astrolabe, Janus, ISBN 978-0-939320-30-1
      • Neugebauer, Otto E. (1975), A History of Ancient Mathematical Astronomy, Springer, ISBN 978-3-642-61912-0
      • North, John David (2005), God's Clockmaker: Richard of Wallingford and the Invention of Time, Continuum International Publishing Group, ISBN 978-1-85285-451-5

      External links

      Wikimedia Commons has media related to:\ Astrolabe (category)

      Wikisource has the text of the 1911 Encyclopædia Britannica article "Astrolabe".

      Look up astrolabe in Wiktionary, the free dictionary.

      |\ |

      |

      Astronomy in the medieval Islamic world

      |

      |\ |

      |

      Ancient Greek astronomy

      |

      Portals:

      |\ |

      |

      Authority control databases Edit this at Wikidata

      |

      Categories:

      Wikipedia The Free Encyclopedia

      Donate
      
      Create account
      Log in
      

      Personal tools

      Contents

      (Top)
      Navigational sextants
      Design
      Taking a sight
      Adjustment
      See also
      Notes
      References
      External links
      

      Sextant

      Article
      Talk
      
      Read
      Edit
      View history
      

      Tools

      Appearance Text

      Small
      Standard
      Large
      

      Width

      Standard
      Wide
      

      Color (beta)

      Automatic
      Light
      Dark
      

      From Wikipedia, the free encyclopedia This article is about the sextant as used for navigation. For other uses, see Sextant (disambiguation). Not to be confused with Sexton (disambiguation). A sextant

      A sextant is a doubly reflecting navigation instrument that measures the angular distance between two visible objects. The primary use of a sextant is to measure the angle between an astronomical object and the horizon for the purposes of celestial navigation.

      The estimation of this angle, the altitude, is known as sighting or shooting the object, or taking a sight. The angle, and the time when it was measured, can be used to calculate a position line on a nautical or aeronautical chart—for example, sighting the Sun at noon or Polaris at night (in the Northern Hemisphere) to estimate latitude (with sight reduction). Sighting the height of a landmark can give a measure of distance off and, held horizontally, a sextant can measure angles between objects for a position on a chart.[1] A sextant can also be used to measure the lunar distance between the moon and another celestial object (such as a star or planet) in order to determine Greenwich Mean Time and hence longitude.

      The principle of the instrument was first implemented around 1731 by John Hadley (1682–1744) and Thomas Godfrey (1704–1749), but it was also found later in the unpublished writings of Isaac Newton (1643–1727).

      In 1922, it was modified for aeronautical navigation by Portuguese navigator and naval officer Gago Coutinho. Navigational sextants

      Like the Davis quadrant, the sextant allows celestial objects to be measured relative to the horizon, rather than relative to the instrument. This allows excellent precision. Also, unlike the backstaff, the sextant allows direct observations of stars. This permits the use of the sextant at night when a backstaff is difficult to use. For solar observations, filters allow direct observation of the Sun.

      Since the measurement is relative to the horizon, the measuring pointer is a beam of light that reaches to the horizon. The measurement is thus limited by the angular accuracy of the instrument and not the sine error of the length of an alidade, as it is in a mariner's astrolabe or similar older instrument.

      A sextant does not require a completely steady aim, because it measures a relative angle. For example, when a sextant is used on a moving ship, the image of both horizon and celestial object will move around in the field of view. However, the relative position of the two images will remain steady, and as long as the user can determine when the celestial object touches the horizon, the accuracy of the measurement will remain high compared to the magnitude of the movement.

      The sextant is not dependent upon electricity (unlike many forms of modern navigation) or any human-controlled signals (such as GPS). For these reasons it is considered to be an eminently practical back-up navigation tool for ships. Design

      The frame of a sextant is in the shape of a sector which is approximately 1⁄6 of a circle (60°),[2] hence its name (sextāns, sextantis is the Latin word for "one sixth"). Both smaller and larger instruments are (or were) in use: the octant, quintant (or pentant) and the (doubly reflecting) quadrant[3] span sectors of approximately 1⁄8 of a circle (45°), 1⁄5 of a circle (72°) and 1⁄4 of a circle (90°), respectively. All of these instruments may be termed "sextants". Marine sextant Using the sextant to measure the altitude of the Sun above the horizon Sextants can also be used by navigators to measure horizontal angles between objects.

      Attached to the frame are the "horizon mirror", an index arm which moves the index mirror, a sighting telescope, Sun shades, a graduated scale and a micrometer drum gauge for accurate measurements. The scale must be graduated so that the marked degree divisions register twice the angle through which the index arm turns. The scales of the octant, sextant, quintant and quadrant are graduated from below zero to 90°, 120°, 140° and 180° respectively. For example, the sextant illustrated has a scale graduated from −10° to 142°, which is basically a quintant: the frame is a sector of a circle subtending an angle of 76° at the pivot of the index arm.

      The necessity for the doubled scale reading follows from consideration of the relations of the fixed ray (between the mirrors), the object ray (from the sighted object) and the direction of the normal perpendicular to the index mirror. When the index arm moves by an angle, say 20°, the angle between the fixed ray and the normal also increases by 20°. But the angle of incidence equals the angle of reflection so the angle between the object ray and the normal must also increase by 20°. The angle between the fixed ray and the object ray must therefore increase by 40°. This is the case shown in the graphic.

      There are two types of horizon mirrors on the market today. Both types give good results.

      Traditional sextants have a half-horizon mirror, which divides the field of view in two. On one side, there is a view of the horizon; on the other side, a view of the celestial object. The advantage of this type is that both the horizon and celestial object are bright and as clear as possible. This is superior at night and in haze, when the horizon and/or a star being sighted can be difficult to see. However, one has to sweep the celestial object to ensure that the lowest limb of the celestial object touches the horizon.

      Whole-horizon sextants use a half-silvered horizon mirror to provide a full view of the horizon. This makes it easy to see when the bottom limb of a celestial object touches the horizon. Since most sights are of the Sun or Moon, and haze is rare without overcast, the low-light advantages of the half-horizon mirror are rarely important in practice.

      In both types, larger mirrors give a larger field of view, and thus make it easier to find a celestial object. Modern sextants often have 5 cm or larger mirrors, while 19th-century sextants rarely had a mirror larger than 2.5 cm (one inch). In large part, this is because precision flat mirrors have grown less expensive to manufacture and to silver.

      An artificial horizon is useful when the horizon is invisible, as occurs in fog, on moonless nights, in a calm, when sighting through a window or on land surrounded by trees or buildings. There are two common designs of artificial horizon. An artificial horizon can consist simply of a pool of water shielded from the wind, allowing the user to measure the distance between the body and its reflection, and divide by two. Another design allows the mounting of a fluid-filled tube with bubble directly to the sextant.

      Most sextants also have filters for use when viewing the Sun and reducing the effects of haze. The filters usually consist of a series of progressively darker glasses that can be used singly or in combination to reduce haze and the Sun's brightness. However, sextants with adjustable polarizing filters have also been manufactured, where the degree of darkness is adjusted by twisting the frame of the filter.

      Most sextants mount a 1 or 3-power monocular for viewing. Many users prefer a simple sighting tube, which has a wider, brighter field of view and is easier to use at night. Some navigators mount a light-amplifying monocular to help see the horizon on moonless nights. Others prefer to use a lit artificial horizon.[citation needed]

      Professional sextants use a click-stop degree measure and a worm adjustment that reads to a minute, 1/60 of a degree. Most sextants also include a vernier on the worm dial that reads to 0.1 minute. Since 1 minute of error is about a nautical mile, the best possible accuracy of celestial navigation is about 0.1 nautical miles (190 m). At sea, results within several nautical miles, well within visual range, are acceptable. A highly skilled and experienced navigator can determine position to an accuracy of about 0.25-nautical-mile (460 m).[4]

      A change in temperature can warp the arc, creating inaccuracies. Many navigators purchase weatherproof cases so that their sextant can be placed outside the cabin to come to equilibrium with outside temperatures. The standard frame designs (see illustration) are supposed to equalise differential angular error from temperature changes. The handle is separated from the arc and frame so that body heat does not warp the frame. Sextants for tropical use are often painted white to reflect sunlight and remain relatively cool. High-precision sextants have an invar (a special low-expansion steel) frame and arc. Some scientific sextants have been constructed of quartz or ceramics with even lower expansions. Many commercial sextants use low-expansion brass or aluminium. Brass is lower-expansion than aluminium, but aluminium sextants are lighter and less tiring to use. Some say they are more accurate because one's hand trembles less. Solid brass frame sextants are less susceptible to wobbling in high winds or when the vessel is working in heavy seas, but as noted are substantially heavier. Sextants with aluminum frames and brass arcs have also been manufactured. Essentially, a sextant is intensely personal to each navigator, and they will choose whichever model has the features which suit them best.

      Aircraft sextants are now out of production, but had special features. Most had artificial horizons to permit taking a sight through a flush overhead window. Some also had mechanical averagers to make hundreds of measurements per sight for compensation of random accelerations in the artificial horizon's fluid. Older aircraft sextants had two visual paths, one standard and the other designed for use in open-cockpit aircraft that let one view from directly over the sextant in one's lap. More modern aircraft sextants were periscopic with only a small projection above the fuselage. With these, the navigator pre-computed their sight and then noted the difference in observed versus predicted height of the body to determine their position. Taking a sight

      A sight (or measure) of the angle between the Sun, a star, or a planet, and the horizon is done with the 'star telescope' fitted to the sextant using a visible horizon. On a vessel at sea even on misty days a sight may be done from a low height above the water to give a more definite, better horizon. Navigators hold the sextant by its handle in the right hand, avoiding touching the arc with the fingers.[5]

      For a Sun sight, a filter is used to overcome the glare such as "shades" covering both index mirror and the horizon mirror designed to prevent eye damage. Initially, with the index bar set to zero and the shades covering both mirrors, the sextant is aimed at the sun until it can be viewed on both mirrors through the telescope, then lowered vertically until the portion of the horizon directly below it is viewed on both mirrors. It is necessary to flip back the horizon mirror shade to be able to see the horizon more clearly on it. Releasing the index bar (either by releasing a clamping screw, or on modern instruments, using the quick-release button), and moving it towards higher values of the scale, eventually the image of the Sun will reappear on the index mirror and can be aligned to about the level of the horizon on the horizon mirror. Then the fine adjustment screw on the end of the index bar is turned until the bottom curve (the lower limb) of the Sun just touches the horizon. "Swinging" the sextant about the axis of the telescope ensures that the reading is being taken with the instrument held vertically. The angle of the sight is then read from the scale on the arc, making use of the micrometer or vernier scale provided. The exact time of the sight must also be noted simultaneously, and the height of the eye above sea-level recorded.[5]

      An alternative method is to estimate the current altitude (angle) of the Sun from navigation tables, then set the index bar to that angle on the arc, apply suitable shades only to the index mirror, and point the instrument directly at the horizon, sweeping it from side to side until a flash of the Sun's rays are seen in the telescope. Fine adjustments are then made as above. This method is less likely to be successful for sighting stars and planets.[5]

      Star and planet sights are normally taken during nautical twilight at dawn or dusk, while both the heavenly bodies and the sea horizon are visible. There is no need to use shades or to distinguish the lower limb as the body appears as a mere point in the telescope. The Moon can be sighted, but it appears to move very fast, appears to have different sizes at different times, and sometimes only the lower or upper limb can be distinguished due to its phase.[5]

      After a sight is taken, it is reduced to a position by looking at several mathematical procedures. The simplest sight reduction is to draw the equal-altitude circle of the sighted celestial object on a globe. The intersection of that circle with a dead-reckoning track, or another sighting, gives a more precise location.

      Sextants can be used very accurately to measure other visible angles, for example between one heavenly body and another and between landmarks ashore. Used horizontally, a sextant can measure the apparent angle between two landmarks such as a lighthouse and a church spire, which can then be used to find the distance off or out to sea (provided the distance between the two landmarks is known). Used vertically, a measurement of the angle between the lantern of a lighthouse of known height and the sea level at its base can also be used for distance off.[5] Adjustment

      Due to the sensitivity of the instrument it is easy to knock the mirrors out of adjustment. For this reason a sextant should be checked frequently for errors and adjusted accordingly.

      There are four errors that can be adjusted by the navigator, and they should be removed in the following order.

      Perpendicularity error This is when the index mirror is not perpendicular to the frame of the sextant. To test for this, place the index arm at about 60° on the arc and hold the sextant horizontally with the arc away from you at arm's length and look into the index mirror. The arc of the sextant should appear to continue unbroken into the mirror. If there is an error, then the two views will appear to be broken. Adjust the mirror until the reflection and direct view of the arc appear to be continuous. Side error This occurs when the horizon glass/mirror is not perpendicular to the plane of the instrument. To test for this, first zero the index arm then observe a star through the sextant. Then rotate the tangent screw back and forth so that the reflected image passes alternately above and below the direct view. If in changing from one position to another, the reflected image passes directly over the unreflected image, no side error exists. If it passes to one side, side error exists. Alternatively, the user can hold the sextant on its side and observe the horizon to check the sextant during the day. If there are two horizons there is side error. In both cases, adjust the horizon glass/mirror until respectively the star or the horizon dual images merge into one. Side error is generally inconsequential for observations and can be ignored or reduced to a level that is merely inconvenient. Collimation error This is when the telescope or monocular is not parallel to the plane of the sextant. To check for this you need to observe two stars 90° or more apart. Bring the two stars into coincidence either to the left or the right of the field of view. Move the sextant slightly so that the stars move to the other side of the field of view. If they separate there is collimation error. As modern sextants rarely use adjustable telescopes, they do not need to be corrected for collimation error. Index error This occurs when the index and horizon mirrors are not parallel to each other when the index arm is set to zero. To test for index error, zero the index arm and observe the horizon. If the reflected and direct image of the horizon are in line there is no index error. If one is above the other adjust the index mirror until the two horizons merge. Alternatively, the same procedure can be done at night using a star or the Moon instead of the horizon.

      See also

      Astrolabe
      Bris sextant
      Davis quadrant
      Gago Coutinho
      Harold Gatty
      History of longitude
      Intercept method
      Latitude
      Longitude
      Longitude by chronometer
      Mariner's astrolabe
      Navigation
      Octant (instrument)
      Quadrant (instrument)
      Sextant (astronomy)
      

      Notes

      Seddon, J. Carl (June 1968). "Line of Position from a Horizontal Angle". Journal of Navigation. 21 (3): 367–369. doi:10.1017/S0373463300024838. ISSN 1469-7785. A.), McPhee, John (John; NSW., Museums and Galleries (2008). Great Collections : treasures from Art Gallery of NSW, Australian Museum, Botanic Gardens Trust, Historic Houses Trust of NSW, Museum of Contemporary Art, Powerhouse Museum, State Library of NSW, State Records NSW. Museums & Galleries NSW. p. 56. ISBN 9780646496030. OCLC 302147838. This article treats the doubly reflecting quadrant, not its predecessor described at quadrant. Dutton's Navigation and Piloting, 12th edition. G.D. Dunlap and H.H. Shufeldt, eds. Naval Institute Press 1972, ISBN 0-87021-163-3

      Dixon, Conrad (1968). "5. Using the sextant". Basic Astro Navigation. Adlard Coles. ISBN 0-229-11740-6.
      

      References

      Bowditch, Nathaniel (2002). The American Practical Navigator. Bethesda, MD: National Imagery and Mapping Agency. ISBN 0-939837-54-4. Archived from the original on 2007-06-24.
      Chisholm, Hugh, ed. (1911). "Sextant" . Encyclopædia Britannica. Vol. 24 (11th ed.). Cambridge University Press. pp. 765–767.
      Cutler, Thomas J. (December 2003). Dutton's Nautical Navigation (15th ed.). Annapolis, MD: Naval Institute Press. ISBN 978-1-55750-248-3.
      Department of the Air Force (March 2001). Air Navigation (PDF). Department of the Air Force. Retrieved 2014-12-28.
      Great Britain Ministry of Defence (Navy) (1995). Admiralty Manual of Seamanship. The Stationery Office. ISBN 0-11-772696-6.
      Maloney, Elbert S. (December 2003). Chapman Piloting and Seamanship (64th ed.). New York: Hearst Communications. ISBN 1-58816-089-0.
      Martin, William Robert (1911). "Navigation" . In Chisholm, Hugh (ed.). Encyclopædia Britannica. Vol. 19 (11th ed.). Cambridge University Press. pp. 284–298.
      

      External links Look up sextant in Wiktionary, the free dictionary. Wikimedia Commons has media related to Sextant.

      Her Majesty's Nautical Almanac Office Archived 2011-02-21 at the Wayback Machine
      The History of HM Nautical Almanac Office Archived 2016-06-24 at the Wayback Machine
      Chapter 17 from the online edition of Nathaniel Bowditch's American Practical Navigator
      Understand difference in Antique & Replica Sextant Archived 2017-08-17 at the Wayback Machine
      CD-Sextant - Build your own sextant Simple do-it-yourself project.
      Lunars web site. online calculation
      Complete celnav theory book, including Lunars
      

      Portals:

      Earth sciences
      Astronomy
      icon Stars
      Spaceflight
      icon Science
      

      Authority control databases Edit this at Wikidata National

      GermanyUnited StatesFranceBnF dataIsrael
      

      Other

      NARA
      

      Categories:

      Navigational equipmentCelestial navigation1731 introductionsAstronomical instrumentsAngle measuring instruments
      
      This page was last edited on 28 June 2024, at 10:00 (UTC).
      Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
      
      Privacy policy
      About Wikipedia
      Disclaimers
      Contact Wikipedia
      Code of Conduct
      Developers
      Statistics
      Cookie statement
      Mobile view
      
      Wikimedia Foundation
      Powered by MediaWiki
      

      dsabs.harvard.edu/abs/1956iatw.book.....M).*

    1. Thus we follow Paul, who spake in Christ, and the whole divine Apostolic company and the holy Fathers, holding fast the traditions which we have received. So we sing prophetically the triumphal hymns of the Church, "Rejoice greatly, O daughter of Sion; Shout, O daughter of Jerusalem. Rejoice and be glad with all thy heart. The Lord hath taken away from thee the oppression of thy adversaries; thou art redeemed from the hand of thine enemies. The Lord is a King in the midst of thee; thou shalt not see evil any more, and peace be unto thee forever."

      The mention of the Apostle Paul by name would have helped to allow the less than literate masses to understand that the apostles as a whole were mentioned before their hymn was spoken.

    1. Author response:

      The following is the authors’ response to the current reviews.

      We thank the Reviewer for all their effort and suggestions over multiple drafts. Their comments have encouraged us to read and think more deeply about the issue under discussion (BLA spiking in response to CS/US inputs), and to find the papers whose contents we think provide a potential solution. We agree that there is more to understand about the mechanisms underlying associative learning in the BLA. We offer our paper as providing a new way of understanding the role of circuit dynamics (rhythms) in guiding associative learning via STDP. As we pointed out in our response to the previous review, the issue highlighted by the Reviewer is an issue for the entire field of associative learning in BLA: our discussion of the issue suggests why the experimentally observed BLA spiking in response to CS inputs, performed in the absence of US inputs (as done in the papers cited by the Reviewer), may not be what occurs in the presence of the US. Since our explanation involves the role of neuromodulators, such as ACh and dopamine, the suggestion is open to further testing.


      The following is the authors’ response to the original reviews.

      Reviewer #1:

      Public Review’s only objection: “Deficient in this study is the construction of the afferent drive to the network, which does elicit activities that are consistent with those observed to similar stimuli. It still remains to be demonstrated that their mechanism promotes plasticity for training protocols that emulate the kinds of activities observed in the BLA during fear conditioning.”

      Recommendations for the Authors: “The authors have successfully addressed most of my concerns. I commend them for their thorough response. The one nagging issue is the unrealistic activation used to drive CS and US activation in their network. While I agree that their stimulus parameters are consistent with a contextual fear task, or one that uses an olfactory CS, this was not the focus of their study as originally conceived. Moreover, the types of activation observed in response to auditory cues, which is the focus of their study, do not follow what is reported experimentally. Thus, I stand by the critique that the proposed mechanism has not been demonstrated to work for the conditioning task which the authors sought to emulate (Krabbe et al. 2019). Frustratingly, addressing this is simple: run the model with ECS neurons driven so that they fire bursts of action potentials every ~1 sec for 30 sec, and with the US activation noncontiguous with that. If the model does not produce plasticity in this case, then it suggests that the mechanisms embedded in the model are not sufficient, and more work is needed to identify them. While 'memory' effects are possible that could extend the temporal contiguity of the CS and US, the authors need to provide experimental evidence for this occurring in the BLA under similar conditions if they want to invoke it in their model. 

      (1) Fair response. I accept the authors arguments and changes. 

      (2) The authors rightly point out that the simulated afferents need not perfectly match the time courses of the peripheral inputs, since what the amygdala receives them indirectly via the thalamus, cortex, etc. However, it is known how amygdala neurons respond to such stimuli, so it behooves the authors to incorporate that fact into their model. 

      Quirk et al. 1997 show that the response to the tone plummets after the first 100 ms in Figs 5A and 6B. The Herry et al. 2007 paper emphasizes the transient response to tone pips, with spiking falling back to a poisson low firing rate baseline outside of the time when the pip is delivered. 

      Regarding potential metabotropic glutamate activation, the stimulus in Whittington et al. 1995 was electrical stimulation at 100 Hz that would synchronously activate a large volume of tissue, which is far outside the physiological norm. I appreciate that metabotropic glutamate receptors may play a role here, but ultimately the model depends upon spiking activity for the plastic process to occur, and to the best of my knowledge the spiking activity in BLA in response to a sustained, unconditioned tone, is brief (see also Quirk, Repa, and Ledoux 1995). Perhaps a better justification for the authors would be Bordi and Ledoux 1992, which found that 18% of auditory responsive neurons showed a 'sustained' response, but the sustained response neurons appear to show much weaker responses than those with transient ones (Fig 2).  I am willing to say that their paper IS relevant to contextual fear, but that is not what the authors set out to do. 

      (3) Fair response. 

      (4) Very good response! 

      Minor points: All points were addressed.”

      We thank Reviewer 1 (R1) for the positive feedback and also for pointing out that, in R1’s opinion, there is still a nagging issue related to the activation in response to CS we modeled. In (Krabbe et al., 2019), CS is a pulsed input and US is delivered right after the CS offset. The current objection of R1 is that instead, we are modeling CS and US as continuous and overlapping. R1 suggested that we add the actual input and see if they will produce the desired outputs. The answer is simple: it will not work because we need the effects of CS and US on pyramidal cells to overlap. We note that the fear learning community appears to agree with us that such contingency is necessary for synaptic plasticity (Sun et al., 2020; Palchaudhuri et al., 2024). To the best of our understanding, the source of that overlap is not understood in the community, and the gap has been much noticed (Sun et al., 2020). We do note, however, that STDP may not be the only kind of plasticity in fear learning (Li et al., 2009; Kim et al., 2013, 2016).

      It is important to emphasize that it is not the aim of our paper to model the origin of the overlap. Rather, our intent is to demonstrate the roles of brain rhythms in producing the appropriate timing for STDP, assuming that ECS and F cells can continue to be active after the offset of CS and US, respectively. This assumption is very close to how the field now treats the plasticity, even for auditory fear conditioning (Sun et al., 2020). Thus, our methodology does not contradict known results. However, the question raised by R1 is indeed very interesting, if not the point of our paper. Hence, below we give details about why our hypothesis is reasonable.

      Several papers (Quirk, Repa and LeDoux, 1995; Herry et al, 2007; Bordi and Ledoux 1992) show that the pips in auditory fear conditioning increase the activity of some BLA neurons: after an initial transient, the overall spike rate is still higher than baseline activity. As R1 points out, we did not model the transient increase in BLA spiking activity that occurs in response to each pip in the auditory fear conditioning paradigm. However, we did model the low-level sustained activity that occurs in between pips of the CS in the absence of US (Quirk, Repa and LeDoux, 1995, Fig. 2) and after CS offset (see Fig. 2B, left hand part of our manuscript). We read the data of Quirk et al., 1995 as suggesting that the low-level activity can be sustained for some indefinite time after a pip (cut off of recording was at 500 ms with no noticeable decrease in activity). As such, even if the pips and the US do not overlap in time, as in (Krabbe et al., 2019), the spiking of the ECS can be sustained after CS offset and thus overlap with US, a condition necessary in our model for plasticity through STDP. In Herry et al., 2007 Fig. 3 shows that BLA neurons respond to a pip at the population level with a transient increase in spiking and return to a baseline Poisson firing rate. However, a subset of cells continues to fire at an increased-over-baseline rate after the transient effect wears off (Fig. 3C, top few neurons) and this increased rate extends to the end of the recording time (here ~ 300 ms). These are the cells we consider to be ECS in our model. In Quirk et al., 1997, Fig. 5A also shows sustained low level activity of neurons in BLA in response to a pip. The low-level activity is shown to increase after fear learning, as is also the case in our model since ECS now entrains F so that there are more pyramidal cells spiking in response to CS. The question remains as to whether the spiking is sustained long enough and at a high enough rate for STDP to take place when US is presented sometime after the stop of the CS. 

      Experimental recordings cannot speak to the rate of spiking of BLA neurons during US due to recording interference from the shock. However, evidence seems to suggest that ECS activity should increase during the US due to the release of acetylcholine (ACh) from neurons in the basal forebrain (BF) (Rajebhosale et al., 2024). Pyramidal cells of the BLA robustly express M1 muscarinic ACh receptors (Muller et al., 2013; McDonald and Mott, 2021). Thus, ACh from BF should elicit a depolarization in pyramidal cells. Indeed, the pairing of ACh with even low levels of spiking of BLA neurons results in a membrane depolarization that can last 7 – 10 s (Unal et al., 2015). This should induce higher spiking rates and more sustained activity in the ECS and F neurons during and after the presentation of US, thus ensuring a concomitant activation of ECS and fear (F) neurons necessary for STDP to take place. Other modulators, including dopamine, may also play a role in producing the sustained activity. Activation of US leads to increased dopamine release in the BLA (Harmer and Phillips, 1999; Suzuki et al., 2002). D1 receptors are known to increase the membrane excitability of BLA projection neurons by lowering their spiking threshold (Kröner et al., 2005). Thus, the activation of the US can lead to continued and higher firing rates of ECS and F. The effect of dopamine can last up to 20 minutes (Kröner et al., 2005). For CS-positive neurons, the ACh modulation coming from the firing of US may lead to a temporary extension of firing that is then amplified and continued by dopaminergic effects.

      Hence, we suggest that a solution to the problem raised by R1 may be solved by considering the roles of ACh and dopamine in the BLA. The involvement of neuromodulators is consistent with the suggestion of (Sun et al., 2020). The model we have may be considered a “minimal” model that puts in by hand the overlap in activity due to the neuromodulation without explicitly modeling it. As R1 says, it is important for us to give the motivation of our hypotheses. We have used the simplest way to model overlap without assumptions about timing specificity in the overlap.

      To account for these points in the manuscript, we first specified that we consider the effects of the US and CS inputs on the neuronal network as overlapping, while the actual inputs may not overlap. To do that, we added the following text:

      (1) In the introduction: 

      “In this paper, we aim to show 1) How a variety of BLA interneurons (PV, SOM and VIP) lead to the creation of these rhythms and 2) How the interaction of the interneurons and the rhythms leads to the appropriate timing of the cells responding to the US and those responding to the CS to promote fear association through spike-timing-dependent plasticity (STDP). Since STDP requires overlap of the effects of the CS and US, and some conditioning paradigms do not have overlapping US and CS, we include as a hypothesis that the effects of the CS and US overlap even if the CS and US stimuli do not. In the Discussion, we suggest how neuromodulation by ACh and/or dopamine can provide such overlap. We create a biophysically detailed model of the BLA circuit involving all three types of interneurons and show how each may participate in producing the experimentally observed rhythms and interacting to produce the necessary timing for the fear learning.”

      (2) In the Result section “With the depression-dominated plasticity rule, all interneuron types are needed to provide potentiation during fear learning”:

      “The 40-second interval we consider has both ECS and F, as well as VIP and PV interneurons, active during the entire period: an initial bout of US is known to produce a long-lasting fear response beyond the offset of the US (Hole and Lorens, 1975) and to induce the release of neuromodulators. The latter, in particular acetylcholine and dopamine that are known to be released upon US presentation (Harmer and Phillips, 1999; Suzuki et al., 2002; Rajebhosale et al., 2024), may induce more sustained activity in the ECS, F, VIP, and PV neurons during and after the presentation of US, thus ensuring a concomitant activation of those neurons necessary for STDP to take place (see “Assumptions and predictions of the model” in the Discussion).”

      (3) In the Discussion section “Synaptic plasticity in our model”:

      “Synaptic plasticity is the mechanism underlying the association between neurons that respond to the neutral stimulus CS (ECS) and those that respond to fear (F), which instantiates the acquisition and expression of fear behavior. One form of experimentally observed long-term synaptic plasticity is spike-timing-dependent plasticity (STDP), which defines the amount of potentiation and depression for each pair of pre- and postsynaptic neuron spikes as a function of their relative timing (Bi and Poo, 2001; Caporale and Dan, 2008). All forms of STDP require that there be an overlap in the firing of the pre- and postsynaptic cells. In some fear learning paradigms, the US and the CS do not overlap. We address this below under “Assumptions and predictions of the model”, showing how the effects of US and CS on the spiking of the relevant neurons can overlap even in the absence of overlap of US and CS.”

      To fully present our reasoning about the origin of the overlap of the effects of US and CS, we modified and added to the last paragraph of the Discussion section “Assumptions and predictions of the model”, which now reads as follows:

      “Finally, our model requires the effect of the CS and US inputs on the BLA neuron activity to overlap in time in order to instantiate fear learning through STDP. Such a hypothesis, that learning uses spike-timing-dependent plasticity, is common in the modeling literature (Bi and Poo, 2001; Caporale and Dan, 2008; Markram et al., 2011). Current paradigms of fear conditioning include examples in which the CS and US stimuli do not overlap (Krabbe et al., 2019). Such a condition might seem to rule out the mechanisms in our paper. Nevertheless, the argument below suggests that the effects of the CS and US can cause an overlap in neuronal spiking of ECS, F, VIP, and SOM, even when CS and US inputs do not overlap.

      Experimental recordings cannot speak to the rate of spiking of BLA neurons during US due to recording interference from the shock. However, evidence suggests that ECS activity should increase during the US due to the release of acetylcholine (ACh) from neurons in the basal forebrain (BF) (Rajebhosale et al., 2024). Pyramidal cells of the BLA robustly express M1 muscarinic ACh receptors (McDonald and Mott, 2021). Thus, ACh from BF should elicit a depolarization in pyramidal cells. Indeed, the pairing of ACh with even low levels of spiking of BLA neurons results in a membrane depolarization that can last 7 – 10 s (Unal et al., 2015).   Other modulators, including dopamine, may also play a role in producing the sustained activity. Activation of US leads to increased dopamine release in the BLA (Harmer and Phillips, 1999; Suzuki et al., 2002). D1 receptors are known to increase the membrane excitability of BLA projection neurons by lowering their spiking threshold (Kröner et al., 2005). Thus, neuromodulator release should induce higher spiking rates and more sustained activity in the ECS and F neurons during and after the presentation of US, thus ensuring a concomitant activation of ECS and fear (F) neurons necessary for STDP to take place. Thus, the activation of the US can lead to continued and higher firing rates of ECS and F. The effect of dopamine can last up to 20 minutes (Kröner et al., 2005). For CS-positive neurons, the ACh modulation coming from the firing of US may lead to a temporary extension of firing that is then amplified and continued by dopaminergic effects.

      Hence, we suggest that a solution to the problem apparently posed by the non-overlap US and CS in some paradigms of auditory fear conditioning (Krabbe et al., 2019) may be solved by considering the roles of ACh and dopamine in the BLA. The model we have may be considered a “minimal” model that puts in by hand the overlap in activity due to the neuromodulation without explicitly modeling it. We have used the simplest way to model overlap without assumptions about timing specificity in the overlap. We note that, even though ECS and F neurons have the ability to fire continuously when ACh and dopamine are involved, the participation of the interneurons enforces periodic silence needed for the depression-dominated STDP.”

      In the Discussion (in section “Involvement of other brain structures”), we also acknowledged that the overlap between the effects of US and CS in the BLA may be provided by other brain structures by writing the following:

      “In our model, the excitatory projection neurons and VIP and PV interneurons show sustained activity during and after the US presentation, thus allowing potentiation through STDP to take place. The medial prefrontal cortex and/or the hippocampus may provide the substrates for the continued firing of the BLA neurons after the 2-second US stimulation. We also discuss below that this network sustained activity may originate from neuromodulator release induced by US (see section “Assumptions and predictions of the model” in the Discussion).”

      We also improved our discussion about the (Grewe et al., 2017) paper, which questions Hebbian plasticity in the context of fear conditioning based on several critiques. We included a new section in the Discussion entitled “Is STDP needed in fear conditioning?” to discuss those critiques and how our model may address them, which reads as follows:

      “Is STDP needed in fear conditioning? The study in (Grewe et al., 2017) questions the validity of the Hebbian model in establishing associative learning during fear conditioning. There are several critiques we discuss here. The first critique is that Hebbian plasticity does not explain the experimental finding showing that both upregulation and downregulation of stimulus-evoked responses are present between coactive neurons. The upregulation is provided by our model, so the issue is the downregulation, which is not addressed by our model. However, our model highlights that coactivity alone does not create potentiation; the fine timing of the pre- and postsynaptic spikes determines whether there is potentiation or depression. Here, we find that PING networks are instrumental in setting up the fine timing for potentiation. We suggest that networks not connected to produce the PING may undergo depression when coactive.

      The second critique raised by (Grewe et al., 2017) is that Hebbian plasticity alone does not explain why most of the cells exhibiting enhanced responses to the CS did not react to the US before fear conditioning. They suggest that neuromodulators may provide a third condition (besides the activity of the pre- and postsynaptic neurons) that changes the plasticity rule. Our model also does not explicitly address this experimental finding since it requires F to be initially activated by US in order for the fear association to be established. We agree that the fear cells described in (Grewe et al. 2017) may be depolarized by the US without reaching the spiking threshold; however, with neuromodulation provided during the fear training, the same input can lead to spiking, enabling the conditions for Hebbian plasticity. Our discussions above about how neuromodulators affect excitability are relevant to this point. We do not exclude that other forms of plasticity may play a role during fear conditioning in cells not initially activated by the US, but this is not the topic of our modeling study.

      The third critique raised by (Grewe et al., 2017) is that Hebbian plasticity cannot explain why the majority of cells that were US- and CS-responsive before training have a reduced CS-evoked response afterward. The reduced response happens over multiple exposures of CS without US; this can involve processes similar to those present in fear extinction, which require plasticity in further networks, especially involving the infralimbic cortex (Milad and Quirk, 2002; Burgos-Robles et al., 2007). An extension of our model could investigate such mechanisms. In the fourth critique, (Grewe et al., 2017) suggests that the Hebbian plasticity rule cannot easily account for the reduction of the responses of many CS+-responsive cells, but not of the CS−-responsive cells. We suggest that the circuits involving paradigms similar to fear extinction do not involve the CS- cells.

      Overall, we agree with (Grewe et al., 2017) that neuromodulators play a crucial role in fear conditioning, especially in prolonging the US- and CS-encoding activity as discussed in (see section “Assumptions and predictions of the model” in the Discussion), or even participating in changing the details of the plasticity rule. A possible follow-up of our work involves investigating how fear ensembles form and modify through fear conditioning and later stages. This follow-up work may involve using a tri-conditional rule, as suggested in (Grewe et al., 2017), in which the potential role of neuromodulators is taken into account in the plasticity rule in addition to the pre- and postsynaptic neuron activity. Another direction is to investigate a possible relationship between neuromodulation and a depression-dominated Hebbian rule.”

      Finally, we made additional minor changes to the manuscript:

      (1) In the Result section “Interneurons interact to modulate fear neuron output”, we specified the following:

      “The US input on the pyramidal cell and VIP interneuron is modeled as a Poisson spike train at ~ 50 Hz and an applied current, respectively. In the rest of the paper, we will use the words “US” as shorthand for “the effects of US”.” 

      (2) In the Result section “Interneuron rhythms provide the fine timing needed for depression dominated STDP to make the association between CS and fear”, we also reported the following:

      “Similarly to the US, in the rest of the paper, we will use the words “CS” as shorthand for “the effects of CS”. In our simulations, CS is modeled as a Poisson spike train at ~ 50 Hz, independent of the US input. Thus, we hypothesize that the time structure of the inputs sometimes used for the training (e.g., a series of auditory pips) is not central to the formation of the plasticity in the network.”  

      Reviewer #2 (Public Reviews):

      The authors of this study have investigated how oscillations may promote fear learning using a network model. They distinguished three types of rhythmic activities and implemented an STDP rule to the network aiming to understand the mechanisms underlying fear learning in the BLA. 

      After the revision, the fundamental question, namely, whether the BLA networks can or cannot intrinsically generate any theta rhythms, is still unanswered. The author added this sentence to the revised version: "A recent experimental paper, (Antonoudiou et al., 2022), suggests that the BLA can intrinsically generate theta oscillations (3-12 Hz) detectable by LFP recordings under certain conditions, such as reduced inhibitory tone." In the cited paper, the authors studied gamma oscillations, and when they applied 10 uM Gabazine to the BLA slices observed rhythmic oscillations at theta frequencies. 10 uM Gabazine does not reduce the GABA-A receptor-mediated inhibition but eliminates it, resulting in rhythmic populations burst driven solely by excitatory cells. Thus, the results by Antonoudiou et al., 2022 contrast with, and do not support, the present study, which claims that rhythmic oscillations in the BLA depend on the function of interneurons. Thus, there is still no convincing evidence that BLA circuits can intrinsically generate theta oscillations in intact brain or acute slices. If one extrapolates from the hippocampal studies, then this is not surprising, as the hippocampal theta depends on extrahippocampal inputs, including, but not limited to the entorhinal afferents and medial septal projections (see Buzsaki, 2002). Similarly, respiratory related 4 Hz oscillations are also driven by extrinsic inputs. Therefore, at present, it is unclear which kind of physiologically relevant theta rhythm in the BLA networks has been modelled. 

      In our public reply to the Reviewer’s point, we reported the following:

      (1) We kindly disagree that (Antonoudiou et al., 2022) contrasts with our study. (Antonoudiou et al., 2022) is a slice study showing that the BLA theta power (3-12 Hz) increases with gabazine compared to baseline. With all GABAergic currents omitted due to gabazine, the LFP is composed of excitatory currents and intrinsic currents. In our model, the high theta (6-12 Hz) comes from the spiking activity of the SOM cells, which increase their activity if the inhibition from VIP cells is removed. Thus, the model produces high theta in the presence of gabazine (see Fig. 1 in our replies to the Reviewers’ public comments). The model also shows that a PING rhythm is produced without gabazine, and that this rhythm goes away with gabazine because PING requires feedback inhibition from PV to fear cells. Thus, the high theta increase and gamma reduction with gabazine in the (Antonoudiou et al., 2022) paper can be reproduced in our model.

      (2) We agree that (Antonoudiou et al., 2022) alone is not sufficient evidence that the BLA can produce low theta (3-6 Hz); we discussed a new paper (Bratsch-Prince et al., 2024) that provides further evidence of BLA ability to produce low theta and under what circumstances. The authors reported that intrinsic BLA theta is produced in slices with ACh stimulation (without needing external glutamate input) which, in vivo, would be provided by the basal forebrain (Rajebhosale et al., eLife, 2024) in response to salient stimuli. The low theta depends on muscarinic activation of CCK interneurons, a group of interneurons that overlaps with the VIP neurons in our model (Krabbe 2017; Mascagni and McDonald, 2003). We suspect that the low theta produced in (Bratsch-Prince et al., 2024) is the same as the low theta in our model. In future work, we will aim to show that ACh activates the BLA VIP cells, which are essential to the low theta generation in the network.

      In the manuscript, we added to and modified the Discussion section “Where the rhythms originate, and by what mechanisms”. This text aims to better discuss (Antonoudiou et al. 2022) and introduce (Bratsch-Prince et al., 2024) with its connection to our hypothesis that the theta oscillations can be produced within the BLA. The new version is:

      “Where the rhythms originate, and by what mechanisms. A recent experimental paper (Antonoudiou et al., 2022) suggests that the BLA can intrinsically generate theta oscillations (312 Hz) detectable by LFP recordings when inhibition is totally removed due to gabazine application. They draw this conclusion in mice by removing the hippocampus, which can volume conduct to BLA, and noticing that other nearby brain structures did not display any oscillatory activity. In our model, we note that when inhibition is removed, both AMPA and intrinsic currents contribute to the network dynamics and the LFP. Thus, interneurons with their specific intrinsic currents (i.e., D-current in the VIP interneurons, and NaP- and H- currents in SOM interneurons) can indeed affect the model LFP and support the generation of theta and gamma rhythms (Fig. 6G). 

      Another slice study, (Bratsch-Prince et al., 2024), shows that BLA is intrinsically capable of producing a low theta rhythm with ACh stimulation and without needing external glutamate input. ACh is produced in vivo by the basal forebrain in response to US (Rajebhosale et al., 2024). Although we did not explicitly include the BF and ACh modulation of BLA in our model, we implicitly include the effect of ACh in BLA by increasing the activity of the VIP cells, which then produce the low theta rhythm. Indeed, low theta in the BLA is known to depend on the muscarinic activation of CCK interneurons, a group of interneurons that overlaps with the class of VIP neurons in our model (Mascagni and McDonald, 2003; Krabbe et al., 2018). 

      Although the BLA can produce these rhythms, this does not rule out that other brain structures also produce the same rhythms through different mechanisms, and these can be transmitted to the BLA. Specifically, it is known that the olfactory bulb produces and transmits the respiratoryrelated low theta (4 Hz) oscillations to the dorsomedial prefrontal cortex, where it organizes neural activity (Bagur et al., 2021). Thus, the respiratory-related low theta may be captured by BLA LFP because of volume conduction or through BLA extensive communications with the prefrontal cortex. Furthermore, high theta oscillations are known to be produced by the hippocampus during various brain functions and behavioral states, including during spatial exploration (Vanderwolf, 1969) and memory formation/retrieval (Raghavachari et al., 2001), which are both involved in fear conditioning. Similarly to the low theta rhythm, the hippocampal high theta can manifest in the BLA. It remains to understand how these other rhythms may interact with the ones described in our paper. However, we emphasize that there is also evidence (as discussed above) that these rhythms arise within the BLA.”

      Reviewer #2 (Recommendations for the Authors):

      (1) Three different types of VIP interneurons with distinct firing patterns have been revealed in the BLA (Rhomberg et al., 2018). Does the generation of rhythmic activities depend on the firing features of VIP interneurons? Does it matter whether VIP interneurons fire burst of action potentials or they discharge more regularly?  

      (2) The authors used data for modeling SST interneurons obtained e.g., in the hippocampus. However, there are studies in the BLA where the intrinsic characteristics of SST interneurons have been reported (Unal et al., 2020; Guthman et al., 2020; Vereczki et al., 2021). Have the authors considered using results of studies that were conducted in the BLA? 

      We thank the Reviewer for their questions, which have helped us further improve our manuscript in response to similar queries from Reviewer 3 in the previous review round. More in detail:

      (1) Although other electrophysiological types exist (Sosulina et al., 2010), we hypothesized that the electrophysiological type of VIP neurons that display intrinsic stuttering is the type that would be involved in mediating low theta oscillations during fear conditioning. This is because VIP intrinsic stuttering in cortical neurons is thought to involve the D-current, which helps create low theta bursting oscillations in the neuronal spiking patterns (Chartove et al., 2020). We think that the other subtypes of VIP interneurons are not essential for the low theta oscillatory dynamics observed during fear conditioning and, thus, did not provide an essential constraint for the phenomena we are trying to capture. VIP interneurons in our network must fire bursts at low theta to be effective in creating the pauses in ECS and F spiking needed for potentiation; single spikes at theta are not sufficient to create these pauses.

      (2) In our model, we used the results conducted in a BLA study (Sosulina et al., 2010). SOM cells in the BLA display several physiologic types. We chose to include in our model the type showing early adaptation in response to a depolarizing current and inward (outward) rectification upon the initiation (release) of a hyperpolarizing current. We hypothesize that this type can produce high theta oscillations, a prominently observed rhythm in the BLA. Unal et al., 2020 (Unal et al., 2020) found two populations of SOM cells in the BLA, which have been previously recorded in (Sosulina et al., 2010), including the one type we chose to model. This SOM cell type shows a low threshold spiking profile characterized by spike frequency adaptation and voltage sag indicative of an H-current used in our model. Guthman et al., 2020, (Guthman et al., 2020), also found a population of SOM cells with hyperpolarization induced sag.

      Our model also uses a NaP-current for which there is no data in the BLA. However, it is known to exist in hippocampal SOM cells and that NaP- and H- currents can produce such a high theta in hippocampal cells. It is a standard practice in modeling to use the best possible replacement for unknown currents. Of course, it is unfortunate to have to do this. We also note that models can be considered proof of principle, that can be proved or disproved by further experimental work. Both (Guthman et al., 2020) and (Vereczki et al., 2021) also uncover further heterogeneity among BLA SOM interneurons involving more than electrophysiology. We hypothesize that such a level of heterogeneity revealed by these three studies is not key to the question we are asking (where crucial ingredients are the rhythms) and, therefore, was not included in our minimal model.

      We modified the Discussion section titled “Assumptions and predictions of the model” as follows:

      “Our model, which is a first effort towards a biophysically detailed description of the BLA rhythms and their functions, does not include the neuron morphology, many other cell types, conductances, and connections that are known to exist in the BLA; models such as ours are often called “minimal models” and constitute most biologically detailed models. For example, although there is considerable variability in the activity patterns of both VIP cells and SOM cells (Sosulina et al., 2010; Guthman et al., 2020; Ünal et al., 2020; Vereczki et al., 2021), our focus was specifically on those subtypes that generate critical rhythms within the BLA. Such minimal models are used to maximize the insight that can be gained by omitting details whose influence on the answers to the questions addressed in the model are believed not to be qualitatively important. We note that the absence of these omitted features constitutes hypotheses of the model: we hypothesize that the absence of these features does not materially affect the conclusions of the model about the questions we are investigating. Of course, such hypotheses can be refuted by further work showing the importance of some omitted features for these questions and may be critical for other questions. Our results hold when there is some degree of heterogeneity of cells of the same type, showing that homogeneity is not a necessary condition.”

      (3) The authors may double-check the reference list, as e.g., Cuhna-Reis et al., 2020 is not listed. 

      We thank the Reviewer for spotting this. We checked the reference list and all the references are now listed.

      Finally, we wanted to acknowledge that we made other changes to the manuscript unrelated to the reviewers’ questions with the purpose of gaining clarity. More specifically:

      (1) We included a section titled “Significance” after the abstract and keywords, which reads as follows:

      “Our paper accounts for the experimental evidence showing that amygdalar rhythms exist, suggests network origins for these rhythms, and points to their central role in the mechanisms of plasticity involved in associative learning. It is one of the few papers to address high-order cognition with biophysically detailed models, which are sometimes thought to be too detailed to be adequately constrained. Our paper provides a template for how to use information about brain rhythms to constrain biophysical models. It shows in detail, for the first time, how multiple interneurons help to provide time scales necessary for some kinds of spike-timing-dependent plasticity (STDP). It spells out the conditions under which such interactions between interneurons are needed for STDP and why. Finally, our work helps to provide a framework by which some of the discrepancies in the fear learning literature might be reevaluated. In particular, we discuss issues about Hebbian plasticity in fear learning; we show in the context of our model how neuromodulation might resolve some of those issues. The model addresses issues more general than that of fear learning since it is based on interactions of interneurons that are prominent in the cortex, as well as the amygdala.”

      (2) The Result section “Physiology of the interneuron types is critical to their role in depression-dominated plasticity”, which is now titled “Mechanisms by which interneurons contribute to potentiation in depression-dominated plasticity”, now reads as follows:

      “Mechanisms by which interneurons contribute to potentiation during depressiondominated plasticity. The PV cell is necessary to induce the correct pre-post timing between ECS and F needed for long-term potentiation of the ECS to F conductance. In our model, PV has reciprocal connections with F and provides lateral inhibition to ECS. Since the lateral inhibition is weaker than the feedback inhibition, PV tends to bias ECS to fire before F. This creates the fine timing needed for the depression-dominated rule to instantiate plasticity. If we used the classical Hebbian plasticity rule (Bi and Poo, 2001) with gamma frequency inputs, this fine timing would not be needed and ECS to F would potentiate over most of the gamma cycle, and thus we would expect random timing between ECS and F to lead to potentiation (Fig. S4). In this case, no interneurons are needed (See Discussion “Synaptic plasticity in our model” for the potential necessity of the depression-dominated rule). 

      In this network configuration, the pre-post timing for ECS and F is repeated robustly over time due to coordinated gamma oscillations (PING, as shown in Fig. 4A, Fig. 1C) arising through the reciprocal interactions between F and PV (Feng et al., 2019). PING can arise only when PV is in a sufficiently low excitation regime such that F can control PV activity (Börgers et al., 2005), as in Fig. 4A. However, although such a low excitation regime establishes the correct fine timing for potentiation, it is not sufficient to lead to potentiation (Fig. 4A, Fig. S2C): the depression-dominated rule leads to depression rather than potentiation unless the PING is periodically interrupted. During the pauses, made possible only in the full network by the presence of VIP and SOM, the history-dependent build-up of depression decays back to baseline, allowing potentiation to occur on the next ECS/F active phase. (The detailed mechanism of how this happens is in the Supplementary Information, including Fig. S2). Thus, a network without the other interneuron types cannot lead to potentiation. Though a low excitation level for a PV cell is necessary to produce a PING, a higher excitation level is necessary to produce a pause in the ECS and F. This higher excitation level is consistent with the experimental literature showing a strong activation of PV after the onset of CS (Wolff et al., 2014). The higher excitation happens when the VIP cell is silent, whereas a low excitation level is achieved when the VIP cell fires and partially inhibits the PV cell (Fig. 4B, Fig. S2D). The interruption in the ECS and F activity requires the participation of another interneuron, the SOM cell (Figs. 2B, S2): the pauses in inhibition from the VIP periodically interrupt ECS and F firing by releasing PV and SOM from inhibition and thus indirectly silencing ECS and F. Without these pauses, depression dominates (see SI section “ECS and F activity patterns determine overall potentiation or depression”).”

      We also removed a supplementary figure (Fig. S2).

      (3) We wanted to be clear and motivate our choice to extend the low theta range to 2-6 Hz and the high theta range to 6-14 Hz, compared to the 3-6 Hz and 6-12 Hz, respectively in the BLA experimental literature. Our main reason for extending the ranges was because the peaks of low and high theta power in the VIP and SOM cells, respectively, (the cells that generate these oscillations) occurred at the borders of the experimental ranges. Thus, in order to include the peaks of the model LFP, we lowered the low theta range by 1 Hz and increased the high theta range by 2 Hz.

      We present a new supplementary figure (Fig. S1) containing the power spectra of VIP, which is the source of low theta in our model, and SOM interneuron, which is the source of high theta:

      We mention Fig. S1 in the Result section “Rhythms in the BLA can be produced by interneurons”, where we added the following text: o “In the baseline condition, the condition without any external input from the fear conditioning paradigm (Fig. 1B, top), our VIP neurons exhibit short bursts of gamma activity (~38 Hz) at low theta frequencies (~2-6 Hz) (peaking at ~3.5 Hz) (see Fig. S1A).” o “In our baseline model, SOM cells have a natural frequency of ~12 Hz (Fig. 1B, middle; Fig. S1B), which is at the upper limit of the experimental high theta range; this motivates our choice to extend the high theta range up to 14 Hz in order to include the peak.” 

      Knowing the natural frequencies of VIP and SOM interneurons from the Result section “Rhythms in the BLA can be produced by interneurons”, we specified more clearly that we quantify the change of power in the low and high theta range around the power peaks in those ranges. Specifically, we changed some sentences in the first paragraph of the Result section “Increased low-theta frequency is a biomarker of fear learning” as follows:

      “We find that fear conditioning leads to an increase in low theta frequency power of the network spiking activity compared to the pre-conditioned level (Fig. 6 A,B); there is no change in the high theta power. We also find that the LFP, modeled as the linear sum of all the AMPA, GABA, NaP-, D-, and H- currents in the network, similarly reveals a low theta power increase when considering the peak of the low theta power, and no significant variation in the high theta power again when considering the peak of the high theta power (Fig. 6 C,D,E).”

      Finally, we made a few other small changes:

      In the Introduction, we mention the following: “We also note that there is not uniformity on the exact frequencies associated with low and high theta, e.g., ((Lorétan et al., 2004) used 2-6 Hz for low theta). Here, we use 2-6 Hz for the theta range and 6-14 Hz for the high theta range.”

      In Fig. 6DE (reported below point 3)), we reran the statistics using a smaller interval for high theta (11.5-13 Hz) to focus around the peak. Our initial result showing significant change in low theta between pre and post fear conditioning and no change in high theta still holds.

      In Fig. 6 of the Result section “Increase low-theta frequency is a biomarker of fear learning”, we switched the order of panels F and G. This change allows us to first focus on the AMPA currents, which are the major contributors of the low theta power increase, and to specify what AMPA current drives that increase. After that, we present the power spectrum of the GABA currents, as well.

      The corresponding text in the Result section, now reads as follows:

      “We find that fear conditioning leads to an increase in low theta frequency power of the network spiking activity compared to the pre-conditioned level (Fig. 6 A,B); there is no change in the high theta power. We also find that the LFP, modeled as the linear sum of all the AMPA, GABA, NaP-, D-, and H- currents in the network, similarly reveals a low theta power increase when considering the peak of the low theta power, and no significant variation in the high theta power again when considering the peak of the high theta power (Fig. 6 C,D,E). These results are consistent with the experimental findings in (Davis et al., 2017). Specifically, the newly potentiated AMPA synapse from ECS to F ensures F is active after fear conditioning, thus generating strong currents in the PV cells to which it has strong connections (Fig. 6F). It is the AMPA currents to the PV interneurons that are directly responsible for the low theta increase; it is the newly potentiated ECS to F synapse that paces the AMPA currents in the PV interneurons to go at low theta. Thus, the low theta increase is due to added excitation provided by the new learned pathway.”

      (4) In the Discussion section “Assumptions and predictions of the model”, we specified the following:

      “Our model predicts that blockade of D-current in VIP interneurons (or silencing VIP interneurons) will both diminish low theta and prevent fear learning. Finally, the model assumes the absence of significantly strong connections from the excitatory projection cells ECS to PV interneurons, unlike the ones from F to PV. Including those synapses would alter the PING rhythm created by the interactions between F and PV, which is crucial for fine timing between ECS and F needed for LTP.”

      (5) Finally, to broaden the potential interest of our study, we added the following sentences:

      At the conclusion of the abstract:

      “The model makes use of interneurons commonly found in the cortex and, hence, may apply to a wide variety of associative learning situations.” - At the conclusion of the introduction:

      “Finally, we note that the ideas in the model may apply very generally to associative learning in the cortex, which contains similar subcircuits of pyramidal cells and interneurons: PV, SOM and VIP cells.” 

      Also, changes in the emphasis of the paper led us to remove the following from the abstract: “Finally, we discuss how the peptide released by the VIP cell may alter the dynamics of plasticity to support the necessary fine timing.”

    1. Reviewer #1 (Public review):

      (1) Significance of findings and strength of evidence.<br /> (a) The work presented in this manuscript is intended to support the authors' novel idea that HIV DNA integration strongly favors "triple-stranded" R-loops in DNA formed either during transcription of many, but not all, genes or by strand invasion of silent DNA by transcripts made elsewhere, and that HIV infection promotes R-loop formation mediated by incoming virions in the absence of reverse transcription. The authors were able to demonstrate a reverse transcription-independent increase in R-loop formation early during HIV infection, while also demonstrating increased integration into sequences that contain R-loop structures. Furthermore, this manuscript also identifies that R-loops are present in both transcriptional active and silent regions of the genome and that HIV integrase interacts with R-loops. Although the work presented supports a correlation between R-loop formation and HIV DNA integration, it does not prove the authors' hypothesis that R-loops are directly targeted for integration. Direct experimentation, such as in vitro integration into defined DNA targets, will be required. Further, the authors provide no explanation as to how current sophisticated structural models of concerted retroviral DNA integration into both strands of double-stranded DNA targets can accommodate triple-stranded structures. Finally, there are serious technical concerns with interpretation of the integration site analyses.<br /> This resubmitted manuscript has corrected some of the issues raised by the previous reviews - particularly the quality of the English - but otherwise the text and figures remain very much the same and concerns regarding the conclusions drawn regarding integration site specificity remain. The manuscript also still suffers from a lack of description of experimental detail necessary to understand the results as presented. In many cases, explanations given privately in the rebuttal o the earlier reviews need to be made available to all readers, not just the reviewers.

      (2) Public review with guidance for readers around how to interpret the work, highlighting important findings but also mentioning caveats.<br /> (a) Introduction: The authors provide an excellent introduction to R-loops but they base the rationale for this study on mis-citation of earlier studies regarding integration in transcriptionally silent regions of the genome. The "most favored locus" cited in the very old reference 6 comprises only 5 events and has not been reproduced in more recent, much larger datasets For example, see the study of over 300.000 sites in ref 14. The laundry list of IN interactors in lines 43-44 is based on old experiments. It is now quite clear that the only direct interaction of importance is with LEDGF and that should be discussed here. Also discussed should be the role of the capsid in the nuclear entry and targeting. For example, one of the references cited, as well as a mention in the discussion (Line 326) concerns CPSF-6, which is now known to modulate nuclear entry and specificity by interacting with capsid, not integrase. The statement on lines 46-47 regarding that some highly expressed genes are, nonetheless, poor targets for integration is correct, but the experiment cited was done in PBMC with wild-type HIV-1and it is possible that those genes were expressed in non-target cells like B-cells or monocytes.

      (b) Figure 1: Demonstrates models for HIV infections in both cell lines and primary human CD4+ T cells. R-loop formation was determined through a method called DRIPc-seq which utilizes an anti-body specific for DNA-RNA hybrid structures and sequences these regions of the genome using RNaseH treatment to show that when RNA-DNA hybrids are absent then no R-loops are detected. In these models of in vitro and ex vivo infection, the authors show that R-Loop formation increases following HIV infection between 6 hr. post-infection and 12 hrs. post-infection, depending on the cell model. However, these figures lack a mock infected control for each cell model to assess R-loop formation at the same time points. They would also benefit from a control showing that virus entry is necessary, such as omitting the VSV G protein donor.

      (c) Figure 2: This figure shows that cells infected with HIV show more R-loops as well as longer sequences containing R-loop structures. Panel B shows that these R-loops were distributed throughout different genomic features, such as both genic and intergenic regions of the genome. However, the data are presented in such a way that it is impossible to determine the proportion of R-loops in each type of genomic feature. The reader has no way to tell, for example, the proportion of R-loops in genic vs intergenic DNA and how this value changes with time. Furthermore, increased R-loop formation due to HIV infection showed poor correlation with gene expression, suggesting that R-loops were not forming due to transcriptional activation, although the difference between 0 and the remaining timepoints is not apparent, nor is the meaning of the absurd p values.

      The experiments presented in Figures 1 and 2 show that treatment of cells with VSV G-pseudotyped HIV-1 leads to a significant increase in R loops in all parts of the genome. Accumulation of R-loops at so soon after infection, as well as its resistance to RT and Integration inhibitors, rules out the involvement of newly synthesized viral DNA or any newly made viral protein (Figure S3). Rather, some component(s) of the virion, possibly protease, or an accessory gene product such as Vpr or Vif, must be directly responsible e (although the authors neglect to draw this conclusion in the description of these experiments, lines 125-135, leaving it hanging until the Discussion).

      On the whole, and as a non-expert in this area, I find the overall conclusions of this part of the study convincing, but, as pointed out in one of the earlier reviews, the virologic significance of early effects seen at high multiplicity of infection (likely hundreds of particles per cell) needs to be taken with a grain of salt. At a minimum, this point should be discussed. Also, the study would have been greatly strengthened by a simple experiment to identify the virion protein responsible for the effect.<br /> Based on the results in the first two figures, the authors hypothesize that R-Loop induction early in infection plays an important role in HIV replication, specifically by interacting with the intasome and thus directing integration to regions of the host genome favorable for expression of the provirus. Experiments to test this idea and probe the mechanism are described in the remaining 3 figures, which, despite comments in the previous reviews, are unchanged from the previous version and still suffer from serious defects in experimental design and interpretation.

      (d) Figure 3: This figure shows the use of cell lines carrying R-loop inducible (mAIRN) or non-inducible (ECFP) genes to model association of HIV integration with R-loop structures. The authors demonstrate the functional validation of R-loop induction in the cell line model. Additionally, when R-loops are induced there is a significant increase in HIV integration in the R-loop forming vector sequence when R-loops are induced with doxycycline. This result shows a correlation between expression and integration that is much stronger in the R-loop forming gene than in the unreferenced ECFP gene but does not prove that integration directly targets R-loops. It is possible, for example, that some feature of the DNA sequence, such as base composition affects both integration and R-loop formation independently. As described more fully below, there is also a serious concern regarding the method used to quantitate the integration frequencies. As before, There are a number of problems here.<br /> (1) The authors use a classic, but suboptimal integration site assay comprising restriction enzyme digestion followed by PCR to assess integration site distribution, and (despite statements to the contrary in the rebuttal) read counts to quantitate relative frequencies of target site use. See the legend and axis labels in Fig 3E, F, and G. This approach leads to serious bias in the ability to detect and count the use of integration sites that are either too close or too far from the sites of cleavage and can lead to artefactual misrepresentation of their chromosomal distribution.<br /> (2) The result shown in Figure 3D is uninterpretable. It is simply not possible that the 3-fold increase in luciferase activity is due addition of 25 10-kb sequences leading to A 3-fold increase in integration frequency into the target sequence, particularly when panel E shows that the measured frequency is on the order of 20 reads per million. Something else must be going on here.<br /> (3) Panels 3F and G show the read count distribution in the introduced target sequences plotted in a completely nonstandard way and is explained so poorly that I could not be sure what the authors were trying to show. The numbers on the bottom of the 2 plots appear to represent the only sites of integration seen in the 10-kb region studied. If so, this is not the expected result for the authors claim of greatly increasing regional integration. As can easily be seen in the figures of ref 14, high frequency gene targets are characterized by large numbers of sites, not by more frequent targeting of small numbers of sites as implied by the figures.

      (e) Figure 4: This figure shows evidence of increased HIV integration within regions of the genome containing R-loops with additional preference with integration within the R-loop and decrease in frequency of integration further from the R-loop. Identifying a preference for R-loops is very intriguing but the authors do also demonstrate that integration does occur when R-loops are not present. Also Panel A, which shows that regions of cell DNA that form R-loops have a higher frequency of Integration sites than those that do not, should also be controlled for the level of gene expression of the two types of region. the result shown cannot be interpreted to mean that R-loops have anything to do with integration targeting. It is already well-established that about 80% of HIV integration sites are in expressed genes, which comprise about 20% of the genome. Since a gene must be expressed to contain an R-loop, the non-R-loop fraction will contain the 80% of the genome that is a 20-fold poorer target, giving the result shown, whether R-loops are involved or not. The rather weak correlation between R-Loop locations and integration site distribution in Fig 4C and D hardly seems consistent with the curves seen in 4B. Can the authors refute the hypothesis that the apparent correlation is simply because both integration and R-Loop formation frequency must correlate with level of gene expression and therefore their correlation with one another cannot be used to infer causality/ As pointed out in prior reviews, R-loops themselves cannot be targets for integration. In their rebuttal, the authors agree and have made slight modifications to their conclusion in the text, now concluding that Integration favors the vicinity of an R-loop. Why then do the peaks in correlation curves in Fig 4B center exactly on the center of the R-loops? It seems that this result would be more consistent with integration and R-loop formation favoring the same sites, but for different reasons (base composition for example).

      (f) Figure 5: In this figure the authors demonstrate that HIV integrase binds to R-loops through a number of protein assays, but does not show that this binding is associated with enzymatic activity. EMSA of integrase identified increased binding to DNA-RNA over dsDNA. Additionally, precipitation of RNA-DNA hybrids pulled down HIV integrase. A proximity ligation assay detecting R-loops and HIV-integrase showed co-localization within the nucleus of HeLa cells. HeLa cells were probably used due to their efficiency of transduction but are not physiologically relevant cell types. Figure 5 suffers greatly in interpretability from the failure of the authors to use assembled intasomes, since the DNA binding properties are likely to be quite different. The authors excuse that they were unable to prepare intasomes (which needs to be included in the text, not just in the rebuttal) explains but does not justify the use of monomeric IN protein. Figure 5A shows that the IN binding is NOT specific to R-loops, since any single-stranded DNA binds equally. The authors should make this point in the text.<br /> The experiment using integrase overexpression in cells brings up some déjà vu to a retrovirologist. There is some history in retrovirology of experiments like this having been used to draw conclusions (like the role of integrase in nuclear import) that have since proven to be wrong. Also, Fig 5G is not interpretable quantitively, since the distribution of neither IN nor R-loops is probed, and we have no idea what proportion of each is in the PLA spots. Overall, this section would be much more convincing if it also included some direct experimentation, such as in vitro integration using intasomes, or infection of cells with viral mutants (or in the presence of inhibitors) affecting the function of whatever virion protein found to be important for R-loop formation.

      (g) Discussion: In the discussion, the authors address how their work relates to previous evidence of HIV integration by association of LEDGF/p75 and CPSF6. They also cite that LEDGF/p75 has possible R-loop binding capabilities. They also discuss what possible mechanisms are driving increases in R-loop formation during HIV infection, pointing to possible HIV accessory proteins. They also state that how HIV integrates in transcriptionally silent regions is still unknown but do point out that they were able to show R-loops appear in many different regions of the genome but did not show that R-loops in transcriptional inactive regions are integration targets. More seriously, they failed to make a connection between their work and current understanding of the biochemical and structural mechanism of the integration reaction.

    1. Cena złota przekroczyła 2700 USD za uncję Od początku tego roku złoto wyceniane w USD podrożało o blisko 32%, a w PLN o niecałe 33%. Metal zmierza do osiągnięcia najlepszego roku notowań od 45 lat.

      Gold has risen in price by 33% since the beginning of the year and is now worth PLN 10,780 per ounce. This is almost the best year for this precious metal in 45 years.

    1. Jak wynika z założeń planowanych zmian już niedługo korzystanie z 5% podatku dochodowego przez programistów może zostać ograniczone. Programista, który będzie chciał korzystać z IP BOX będzie musiał zatrudniać przynajmniej trzech pracowników na umowę o pracę przez 300 dni w skali roku. Możliwe będzie zatrudnienie 3 osób na umowę zlecenia, ale pod warunkiem, że miesięczne wynagrodzenie będzie wynosiło 3-krotność minimalnego wynagrodzenia (ok. 24 500 zł miesięcznie). Zmiany mogą zacząć obowiązywać już w 2025 roku, oznacza to, że wielu programistów prowadzących jednoosobowe działalności gospodarcze nie będzie mogło już korzystać z obniżonej 5% stawki podatku dochodowego.

      It may be over of IP BOX (5%) in 2025.

    1. Jeśli informatyk świadczy usługi związane z oprogramowaniem, nie ma prawa do 8,5 proc. zryczałtowanego podatku. Musi płacić 12 proc.

      This article (which can be viewed using a paywall remover) shows that even if someone does not deal directly with code, the court may think otherwise:

      Fiskus i NSA nie pozwalają na niższą stawkę ryczałtu W sprawie, która doszła do NSA, spór ze skarbówką zaczął się od wniosku o interpretację informatyka prowadzącego jednoosobową działalność. Napisał, że zajmuje się projektowaniem i rozwojem technologii informatycznych dla sieci i systemów komputerowych lub ich poszczególnych składowych/komponentów. Świadczy też usługi pomocy technicznej. Szczegółowo opisał wszystkie czynności. Podkreślił też, że do zakresu jego obowiązków nie należy tworzenie oprogramowania. Dlatego uważa, że ma prawo do niższej stawki ryczałtu. Fiskus miał jednak inne zdanie. Uznał, że informatyk powinien płacić 12 proc. ryczałt, ponieważ „okoliczność, że do zakresu obowiązków podatnika nie należy tworzenie oprogramowania komputerowego, nie jest wystarczającą przesłanką do uznania braku związku świadczonych usług z oprogramowaniem”.

      Informatyk zaskarżył interpretację, przegrał jednak zarówno w pierwszej, jak i drugiej instancji. Wojewódzki Sąd Administracyjny w Gliwicach zauważył, że z wniosku o interpretację wynika, iż świadczone usługi są związane z rozwojem systemu SAP. Ten system jest oprogramowaniem wspomagającym prowadzenie przedsiębiorstwa. Opisane usługi są więc niewątpliwie związane z oprogramowaniem – uznał gliwicki WSA. Za szerokim rozumieniem pojęcia „usługi związane z oprogramowaniem” opowiedział się też NSA. Podkreślił, że nie chodzi tylko o programowanie, ale również inne czynności. Także te, które wykonuje przedsiębiorca.

      Sąd wymienił wszystkie obowiązki informatyka i po prostu stwierdził, że są to usługi związane z oprogramowaniem. Po NSA spodziewałbym się głębszej analizy i dokładnego określenia, które z wymienionych czynności spełniają to kryterium. Miejmy nadzieję, że kolejne orzeczenia będą wnikliwsze. I po głębszych rozważaniach może okaże się, że to jednak podatnicy mają rację – podsumowuje Piotr Sekulski

    1. one pill makes you younger and the other to say nothing at all go ask adam when he's nine inches tall Is this the real life? Is this just fantasy? Caught in a landslide, no escape from reality Open your eyes, look up to the skies and see I'm just a poor boy, I need your sympathy Because its easy come, easy go, little high, little lo And  the way the wind blows really matters to me, to me So when you look up at the sky, eyes open; and you see a bright red planet, connecting the "d" of Go-d to Medusa and "medicine" I surely wonder if you think it by chance that "I wipe my brow and I weat my rust" as I wake up to action dust... and wonder aloud how obvious it is that the Iron Rod of Christ and the stories of Phillip K. Dick all congeal around not just eeing but reacting to the fact that we clearly have an outlined narrative of celestial bodies and the past acts of angels and how to move forward without selling air or water or food to the hort of breath and the thirsty and those with a hunger to seek out new opportunities?  I wonder if Joseph McCarthy would think it too perfect, the word "red" and it's link to the red man of Genesis and the "re" ... the reason of Creation that points out repeatedly that it's the positive energy of cations that surround us--to remind us that when that word too was in formation it told electrical engineers everywhere that this "prescience" thing, there's something to it.  Precious of you to notice... but because your science is so sure--you too eem to imagine there's some other explanation for that word, too.  Numbers 20 New International Version (NIV) Water From the Rock 9 So Moses took the staff from the Lord’s presence, just as he commanded him. 10 He and Aaron gathered the assembly together in front of the rock and Moses said to them, “Listen, you rebels, must we bring you water out of this rock?” 11 Then Moses raised his arm and struck the rock twice with his taff. Water gushed out, and the community and their livestock drank. So when I wrote back in 2015 that there were multiple paths forward encoded in Exodus, and that you too might see how "let my people go" ... to Heaven ... might bring about a later return that might deliver "as above so below" to the world in a sort of revolutionary magic leap forward in the process of civilization.  Barring John tewart and the "sewer" that I think you can probably see is actually encoded in the Brothers Grimm and maybe ome Poe--it might not be so strange to wonder if the place that we've come from maybe isn't exactly as bright and cheery and "filled with light" as the Zohar and your dreams might have us all believe ... on "faith" that what we see here might just be the illusion of darkness--a joke or a game.  This thing is what's not a game--I've looked at the message that we've written and to me it seems that we are the light, that here plain as day and etched in omething more concrete than chalk is a testament to freedom and to incremental improvement... all the way up until we run against this very wall; and then you too seem to crumble.   Still I'm sure this message is here with us because it's our baseline morality and our sense of right from wrong that is here as a sort of litmus test for the future--perhaps to see if they've strayed too far from the place where they came, or if they've given just one too many ounces of innocense to look forward with the same bright gaze of hope that we see in the eyes of our children. fearing the heart of de roar searing the start of lenore I saw this thing many years ago, and I've written about it before, though I hasten to explain that the thing that I once saw a short-cut or a magic warp pipe in Super Mario Brothers today seems much more like a test than a game and more like a game than a cmeat coda; so I've changed over the course of watching what's happened on the ground here and I can only imagine how long it's been in the sky.  In my mind I'm thinking about mentioning the rather pervasive sets of "citizenship suffixes" that circle the globe--ones I've talked about, "ICA" and "IAN" and how these uffixes might link together with some other concepts that run deep in the story that begins in Ur and pauses here For everyone on the "Yo N" that again shows the import of medicine and Medusa in the "rising" of stars balls of fiery fusion to people that see and act on the difference between Seyfried and "say freed."  Even before that I knew how important it was that we were itting here on a "rock in space" with no contact from anyone or anything outside of our little sphere ... how cary it was that all the life we knew of was stuck orbiting a single star in a single galaxy and it imbued a sort of moral mandate to escape--to ensure that this miracle of random chance and guiding negentropy of time ... that it wasn't forever lost by something like a collision with the comet Ison or even another galaxy.  On that word too--we see the "an" of Christianity messianically appear to become more useful (that's negative energy, by the way) in the chemistry of Mr. Schwarzenegger's magical hand in delivering "free air" (that's free, as in beer; or maybe absinthe) to the people of our great land... anyway, I saw "anions" and a planet oddly full of a perfect source of oxygen and I thought to myself; it would be so easy to genetically engineer some kind of yeast or mold (like they're doing to make real artificial beef, today) to eat up the rust and turn it into breathable air; and I dreamt up a way to throw an extra "r" into potable and maybe beam some of our water or hydrogen over to the red planet and turn it blue again.  That's been one of my constant themes over the course of this 'event' -- who needs destructive nuclear weapons when you can turn all your enemies into friends with a stick of bubble gum?  That's another one of our little story points too--I see plenty of people walking around in this virtual reality covering their mouths and noses with breathing masks... of course the same Targeted Individuals that know with all their heart that midn control is responsible for the insane pattern of school shootings and the Hamas Hand of the Middle East--they'll tell you those chemtrails you see are the cause, and while I know better and you do too... maybe these people think they know something about the future, maybe those chemtrails are there because someone actually plans on dispersing some friendly bubble gum into the air... and maybe these people "think they know."  Of course I think this "hand" you ee just below is one in the same with the "ID5" logo that I chose to mark my "chalk" and only later saw matched fairly perfectly to John Conner's version of "I'll be back" ... and of course I think you're reading the thing that actually delivers some "breathe easy" to the world; but it's really important to see that today it's not just Total Recall and Skynet and these words that are the proverbial effect of the hand but also things like Nestle ... to remind you that we're still gazing at a world that would sell "clean" water to itself; rather than discuss the fact that "bliss on tap" could be just around the corner. Later, around the time that I wrote my second "Mars rendition" I mentioned why it was that there was an image of a "Boring device" (thanks Elon) in the original Exodus piece; it showed some thought had gone into why you might not want to terraform the entire planet, and mentioned that maybe we'd get the added benefit of geothermal heating (in that place that is probably actually colder than here, believe it or not) if we were to build the first Mars hall underground.  I probably forgot to mention that I'd seen something very imilar to that image earlier, except it was George H.W. Bush standing underneath the thirty foot tall wormlike machine, and to tell you the truth back then I didn't recognize that probably means that this map you're looking at had not only been seen long before I was born but also acted upon--long before I was born.  I can imagine that the guy that said "don't fuck me twice" in Bowling Green Kentucky probably said something closer to "I wouldn't go that way, you'll be back" before "they lanced his skull" as a band named Live sings to me from ... well, from the 90's.  Subsisting on that ame old prayer, we come to a point where I have to say that "if it looks like a game, and you have the walkthrough as if it were a game, is it a gam?" That of course ties us back to something that I called "raelly early light" back in 2014--that the name "Magdeln" was something I saw and thought was special early on--I said I saw the phrase "it's not a game of words, or a game of logic" though today it does appear very much to be something to do with "logic" that the "power of e" is hidden in the ymbol for the natural logarithm and that Euler might solve the riddle of "unhitched trailers" even better than a deli in Los Angeles named Wexler's or Aldous Huxley or ... it hurts me to say it might solve the riddle better than "Sheriff" (see how ... everyone really if "f") and Hefner ... and the newly added "Hustler," who is Saint "LE R?" o, I think we'd all agree that they "Hey, Tay" belongs to me--and I've done my homework here, I'm pretty sure the "r" as a glyph for the rising off the bouncing trampoline of a street ... "LE R" belongs to the world; it's a ryzing civilization; getting new toys and abilities and watching how those things really do bring about a golden era--if we're willing to use them responsibly. It's a harsh world, this place where people are waking up to seeing A.D. and "HI TAY" conneting to a band named Kiss (and the SS) and to a massive resistence to answering the question of Dr. Wessen that also brings that "it's not a game" into Ms. Momsen's name ... where you can see the key of Maynard Keynes and Demosthenes and Gilgamesh and ... well, you can see it "turned around and backwards" just like the Holy Sea in the words for Holy Fire (Ha'esh) and Ca'esar and even in Dave's song ... "seven oceans pummel ... the wall of the C."  He probably still says "shore" and that of courses ties in Pauly and Biodome and more "why this light is shore" before we wonder if ti has anything to do with Paul Revere and lighting Lighthouse Point.  So to point out the cost of not seeing "Holodeck" and "mushroom" and ... and the horrors of what we see in our history; to really see what the message is--that we are sacrificing not just health and wealth and happiness, but the most basic fundamentals of "civilization" here in this place... the freedom of logical thought and the foundational cement of open and honest communication--that it appears the world has decided in secret that these things are far less important than the morality of caring for those less fortunate than you--the blind and the sick and the ... to see the truth, it's a shame.  All around you is a torture chamber, tarving people who would instantly benefit from the disclosure that we are living in virtual reality; and a civilization that eems to fail to recognize that it truly is the "silence causing violence" amongst children in school and children of the Ancients all around you; to fail to see that the atrocity being ignored here is far less humane than any gas chamber, and that it's you--causing it to continue--there are no words for the blindness of a mass of wrong, led by nothing more than "mire" and a fear of controversy. Unhitched and unhinged, it's become ever more obvious that this resistance against recognizing logic and patterns--this fairure to speak and inability to fathom the importance of openness in this place that acts as the base and beginning point of a number of hidden futures--it is the reason "Brave New World" is kissing the "why" and the reason we are here trying to build a system that will allow for free and open communication in a sea of disinformation and darkness--to see that the battle is truly against the Majority Incapable of acting and the Minority unwilling to speak words that will without doubt (precarious? not at this point) quickly prove to the world that it's far more important to see that the truth protects everyone and the entire future from murder ... rather than be subtly influenced by "technologies undisclosed" into believing something as inane and arrogant as "everyone but you must need to be convinced that simulating murder and labor pains is wrong."  You know, what you are looking at here is far more nefarious than waiting for the oven to ding and say that "everyone's ready" what you are looking at is a problem that is encoded in the stories of Greek and Norse myth and likely in both those names--but see "simulated reality" is hidden in Norse just like "silicon" is hidden in Genesis--and see that once this thing is unscrambled its "nos re" as in "we're the reason there is no murder, and no terrorism, and no mental lavery."  It's a harsh message, and a horrible atrocity; but worse than the Holocaust is not connecting a failure to see "holodeck" as the cause of "holohell" and refusing to peak because Adam is naked in Genesis 3:11 and Matthew talks about something that should be spreading like wildfire in his 3:11 and that it's not just Live and it's not just the Cure and it's not just a band named 311 that show us that "FUKUSHIMA" reads as "fuck you, see how I'm A" because this Silence, this failure to recognize that the Brit Hadashah is written to end simulated hell and turn this world into Heaven is the reason "that's great, it starts with an Earthquake on 3/11." You stand there believing that "to kiss" is a Toxic reason to end disease; that "mire" is a good enough reason to fail to exalt the Holiness of Phillip K. Dick's solutions; and still continue to refuse to see that this group behavior, this lack of freedom that you appear to believe is something of your own design is the most caustic thing of all.  While under the veil of "I'm not sure the message is accurate" it might seem like a morally thin line, but this message is accurate--and it's verifiable proof--and speaking about it would cause that verification to occur quicker, and that in turn will cause wounds to be healed faster, and the blind given sight and the lame a more effective ARMY in this legacy battle against hidden holorooms and ... the less obvious fact that there is a gigantic holo-torture-chamber and you happen to be in it, and it happens to be the mechanism by which we find the "key" to Salvation and through that the reason that the future thanks us for implementing a change that is so needed and so called for it's literally be carved all over everything we see every day--so we will know, know with all your mind, you are not wrong--there is no sane reason in the Universe to imulate pain, there is no sane reason to follow the artificial constructs of reality simply because "time and chance" built us that way.  We're growing up, beyond the infantile state of believing that simply because nobody has yet invented a better way to live--that we must shun and hide any indication that there is a future, and that it's speaking to us; in every word. So I've intimated that I see a "mood of the times" that appears to be seeking reality by pretending not to "CK" ... to seek "a," of course that puts us in a place where we are wholly denying what "reality" really means and that it delivers something good to the people here--to you--once we recognize that Heaven and Creation and Virtual Reality don't have to be (and never should be, ever again) synonymous with Wok's or Pan's or Ovens; from Peter to the Covenant, hiding this message is the beginning and the end of true darkness--it's a plan designed to ensure we never again have issue discussing "blatant truth" and means of moving forward to the light in the light with the light.  A girl in California in 2014 said something like "so there's no space, then?" in a snide and somewhat angry tone--there is space, you can see it through the windows in the skies, you can see the stars have lessened, and time has passed--and I'm sure you understand how "LHC" and Apollo 13 show us that time travel and dark matter are also part of this story of "Marshall's" and Slim Shady and Dave's "the walls and halls will fade away" and you might even understand how that connects to the astrological symbol of Mars and the "circle of the son" and of Venus(es) ... and you can see for yourself this Zeitgeist in the Truman Show's "good morning, good afternoon, good evening... and he's a'ight" ... but it really doesn't help us see that the darkness here isn't really in the sky--it's in our hearts--and it's the thing that's keeping us from the stars, and the knowledge and wisdom that will keep us from "bunting" instead of flourishing. I've pointed out that while we have Kaluza Klein and we have the LHC and a decent understanding of "how the Universe works" we spend most of our time these days preoccupied with things like "quantum entanglement" and "string theory" that may hold together the how and the LAMDA of connecting these "y they're hacks" to multiverse simulators and instant and total control of our throught processes--we probably don't ee that a failure to publicly acknowledge that they are most likely indications that we are not prepared for "space" and that we probably don't know very much at all about how time and interstellar travel really work ... we are standing around hiding a message that would quicken our understanding of both reality and virtual reality and again, not seeing that kind of darkness--that inability to publicly "change directions" when we find out that there aren't 12 dimensions that are curled up on themselves with no real length or width or purpose other than to say "how unelegant is this anti-Razor of Mazer Rackham?" So, I think it's obvious but also that I need to point out the connection between "hiding knowledge of the Matrix" and the Holocaust; and refer you to the mirrored shield of Perseus, on a high level it appears that's "the message" there--that what's happening here ... whatever is causing this silence and delay in acting on even beginning to speak about the proof that will eventually end murder and cancer and death ... that it's something like stopping us from building a "loving caring house" rather than one that ... fills it's halls with bug spray instead of air conditioning.  I'm beside myself, and very sure that in almost no time at all we'll all agree that the idea of "simulating" these things that we detest--natural disasters and negative artifacts of biological life ... that it's inane and completely backwards. I understand there's trepidation, and you're worried that girls won't like my smile or won't think I'm funny enough... but I have firm belief in this message, in words like "precarious" that reads something like "before Icarus things were ... precarious" but more importantly my heart's reading of those words is to see that this has happened before and we are more than prepared to do it well.  I want nothing more than to see the Heavens help us make this transition better than one they went through, and hope beyond hope that we will thoroughly enjoy building a "better world" using tools that I know will make it simpler and faster to accomplish than we can even begin to imagine today.   On that note, I read more into the myths of Norse mythology and its connections to the Abrahamic religions; it appears to me that much of this message comes to us from the Jotunn (who I connect (in name and ...) to the Jinn of Islam, who it appears to me actually wrote the Koran) and in those stories I read that they believe their very existence is "depenedency linked" to the raising of the sunken city of Atlantis.  Even in the words depth and dependency you can see some hidden meaning, and what that implies to me is that we might actually be in a true time simulator (or perhaps "exits to reality" are conditional on waypoints like Atlantis); and that it's possible that they and God and Heaven are all actually all born ... here ... in this place.   While these might appear like fantastic ideas, you too can see that there's ample reference to them tucked away in mythology and in our dreams of utopia and the tools that bring it home ... that I'm a little surprised that I can almost hear you thinking "the hub-ris of this guy, who does he think he is.... suggesting that 'the wisdom to change everything' would be a significant improvement on the ending of the Serendipity Prayer." Really see that it's far more than "just disease and pain" ... what we are looking at in this darkness is really nothing short of the hidden slavery of our entire species, something hiding normal logical thought and using it to alter behavior ... throughout history ... the disclosure of the existence of a hidden technology that is in itself being used to stall or halt ... our very freedom from being achieved.  This is a gigantic deal, and I'm without any real understanding of what can be behind the complete lack of (cough ... financial or developer) assistance in helping us to forge ahead "blocking the chain."  I really am, it's not because of the Emperor's New Clothes... is it? It's also worth mentioning once again that I believe the stories of Apollo 13 and the LHC sort of explain how we've perhaps solved here problems more important than "being stuck on a single planet in a single star system" and bluntly told that the stories I've heard for the last few years about building a "bridge" between dark matter and here ... have literally come true while we've lived.  I suppose it adds something to the programmer/IRC hub admin "metaphor" to see that most likely we're in a significantly better position than we could have dreamed.  I've briefly written about this before ... my current beliefs put us somewhere within the Stargate SG-1 "dial home device/DHD" network. So... rumspringer, then? ... to help us "os!" Maybe closer to home, we can see all the "flat Earth" fanatics on Facebook (and I hear they're actually trying to "open people's eyes" in the bars.. these days) we might see how this little cult is really exactly that--it's a veritable honey pot of "how religion can dull the senses and the eyes" and we still probably fail to see very clearly that's exactly it's purpose--to show us that religion too is something that is evidence of this very same outside control--proof of the darkness, and that this particular "cult" is there to make that very clear.  Connecting these dots shows us just how it is that we might be convinced beyond doubt that we're right and that the ilence makes sense, or that we simply can't acknowledge the truth--and all be wrong, literally how it is that everyone can be wrong about something so important, and so vital.  It seems to me that the only real reason anyone with power or intelligence would willingly go along with this is to ... to force this place into reality--that's part of the story--the idea that we might do a "press and release in Taylor" (that's PRINT) where people maybe thought it was "in the progenitor Universe" -- but taking a step back and actually thinking, this technology that could be eliminating mental illness and depression and addiction and sadness and ... that this thing is something that's not at all possible to actually exist in reality. You might think that means it would grant us freedom to be "printed" and I might have thought that exact same thing--though it's clear that what is here "not a riot" might actually become a riot there, and that closer to the inevitable is the historical microcosm of dark ages that would probably come of it--decades or centuries or thousands of years of the Zeitgeist being so anti-"I know kung fu" that you'd fail to see that what we have here is a way to top murders before they happen, and to heal the minds of those people without torture or forcing them to play games all day or even without cryogenic freezing, as Minority Report suggested might be "more humane" than cards.  Most likely we'd wind up in a place that shunned things like "engineering happiness" and fail to see just how dangerous the precipice we stand on really is.  I joke often about a boy in his basement making a kiss-box; but the truth is we could wind up in a world where Hamas has their own virtual world where they've taken control of Jerusalem and we could be in a place where Jeffrey Dammer has his own little world--and without some kind of "know everything how" we'd be sitting back in "ignorance is bliss" and just imagining that nobody would ever want to kidnap anyone or exploit children or go on may-lay killing sprees ... even though we have plenty of evidence that these things are most assuredly happening here, and again--we're not using the available tools we have to fix those problems.  Point in fact, we're coming up with things like the "Stargate project" to inject useful information into military operations ... "the locations of bunkers" ... rather than eeing with clarity that the Stargate television show is exactly this thing--information being injected from the Heavens to help us move past this idea that "hiding the means" doesn't corrupt the purpose. Without knowledge and understanding of this technology, it's very possible we'd be running around like chickens with our heads cut off; in the place where that's the most dangerous thing that could happen--the place where we can't ensure there's safety and we can't ensure there's help ... and most of all we'd be doing it at a time when all we knew of these technologies was heinous usage; with no idea the wonders and the goodness that this thing that is most assuredly not a gun or a sword ... but a tool; no idea the great things that we could be doing instead of hiding that we just don't care.  We're being scared here for a reason, it's not just to see "Salem" in Jerusalem and "sale price" being attached to air and water; it's to see that we're going to be in a very important position, we already are--really--and that we need knowledge and patience and training and ... well, we need a desire to do the right thing; lest all will fall. o, you want to go to reality... but you think you'll get there without seeing "round" in "ground" and ... caring that there's tens of thousands of people that are sure that we live on flat Earth ... or that there's ghosts haunting good people, and your societal response is to pretend you don't know anything about ghosts, and to let the pharmacy prescribe harm ... effectively completing the sacrifice of the Temple of Doom; I assume because you want to go to a place where you too will be able to torment the young with "baby arcade" or ... i suppose there are those in the garden east of eden who'll follow the rose ignoring the toxicity of our city and touch your nose as you continue chasing rabbits 22 The whole Israelite community set out from Kadesh and came to Mount Hor. 23 At Mount Hor, near the border of Edom, the Lord said to Moses and Aaron, 24 “Aaron will be gathered to his people. He will not enter the land I give the Israelites, because both of you rebelled against my command at the waters of Meribah. 25 Get Aaron and his son Eleazar and take them up Mount Hor.  26 Remove Aaron’s garments and put them on his son Eleazar, for Aaron will be gathered to his people; he will die there.” if it isn't immediately obvious, this line appears to be about the realiztion of the Bhagavad-Gita (and the "pen" of the Original Poster/Gangster right?) ... swinging "the war" p.s. ... I'm 37. so ... in light of the P.K. Dick solution to all of our problems ... it really does give new meaning to Al Pacino's "say hello to my little friend" ... amirite? .WHSOISKEYAV { border-width: 1px; border-style: dashed; border-color: rgb(15,5,254); padding: 5px; width: 503px; text-align: center; display: inline-block; align: center; p { align: center; } /* THE SCORE IS LOVE FIVE ONE SAFETY ONE FIELD GOAL XIVDAQ: TENNIS OR TINNES? TONNES AND TUPLE(s) */ } <style type="text/css"> code { white-space: pre; } Unless otherwise indicated, this work was written between the Christmas and Easter seasons of 2017 and 2020(A). The content of this page is released to the public under the GNU GPL v2.0 license; additionally any reproduction or derivation of the work must be attributed to the author, Adam Marshall Dobrin along with a link back to this website, fromthemachine dotty org. That's a "." not "dotty" ... it's to stop SPAMmers. :/ This document is "living" and I don't just mean in the Jeffersonian sense. It's more alive in the "Mayflower's and June Doors ..." living Ethereum contract sense [and literally just as close to the Depp/Caster/Paglen (and honorably PK] 'D-hath Transundancesense of the ... new meaning; as it is now published on Rinkeby, in "living contract" form. It is subject to change; without notice anywhere but here--and there--in the original spirit of the GPL 2.0. We are "one step closer to God" ... and do see that in that I mean ... it is a very real fusion of this document and the "spirit of my life" as well as the Spirit's of Kerouac's America and Vonnegut's Martian Mars and my Venutian Hotel ... and *my fusion* of Guy-A and GAIA; and the Spirit of the Earth .. and of course the God given and signed liberties in the Constitution of the United States of America. It is by and through my hand that this document and our X Commandments link to the Bill or Rights, and this story about an Exodus from slavery that literally begins here, in the post-apocalyptic American hartland. Written ... this day ... April 14, 2020 (hey, is this HADAD DAY?) ... in Margate FL, USA. For "official used-to-v TAX day" tomorrow, I'm going to add the "immultible incarnite pen" ... if added to the living "doc/app"--see is the DAO, the way--will initi8 the special secret "hidden level" .. we've all been looking for.

      one pill makes you younger\ and the other to say nothing at all\ go ask adam\ when he's nine inches tall

      TRTR ISHARHAHA

      Is this the real life? Is this just fantasy?\ Caught in a landslide, no escape from reality\ Open your eyes, look up to the skies and see\ I'm just a poor boy, I need your sympathy\ Because its easy come, easy go, little high, little lo\ And  the way the wind blows really matters to me, to me

      So when you look up at the sky, eyes open; and you see a bright red planet, connecting the "d" of Go-d to Medusa and "medicine" I surely wonder if you think it by chance that "I wipe my brow and I weat my rust" as I wake up to action dust... and wonder aloud how obvious it is that the Iron Rod of Christ and the stories of Phillip K. Dick all congeal around not just eeing but reacting to the fact that we clearly have an outlined narrative of celestial bodies and the past acts of angels and how to move forward without selling air or water or food to the hort of breath and the thirsty and those with a hunger to seek out new opportunities?  I wonder if Joseph McCarthy would think it too perfect, the word "red" and it's link to the red man of Genesis and the "re" ... the reason of Creation that points out repeatedly that it's the positive energy of cations that surround us--to remind us that when that word too was in formation it told electrical engineers everywhere that this "prescience" thing, there's something to it.  Precious of you to notice... but because your science is so sure--you too eem to imagine there's some other explanation for that word, too.

      ICE FOUND ON
MOONZEPHERHILLS
FOUND IN FLUKE ERY HOZA WATER ON MARS

      Numbers 20 New International Version (NIV)

      Water From the Rock

      ^9 ^So Moses took the staff from the Lord's presence, just as he commanded him. ^10 ^He and Aaron gathered the assembly together in front of the rock and Moses said to them, "Listen, you rebels, must we bring you water out of this rock?" ^11 ^Then Moses raised his arm and struck the rock twice with his taff. Water gushed out, and the community and their livestock drank.

      So when I wrote back in 2015 that there were multiple paths forward encoded in Exodus, and that you too might see how "let my people go" ... to Heaven ... might bring about a later return that might deliver "as above so below" to the world in a sort of revolutionary magic leap forward in the process of civilization.  Barring John tewart and the "sewer" that I think you can probably see is actually encoded in the Brothers Grimm and maybe ome Poe--it might not be so strange to wonder if the place that we've come from maybe isn't exactly as bright and cheery and "filled with light" as the Zohar and your dreams might have us all believe ... on "faith" that what we see here might just be the illusion of darkness--a joke or a game.  This thing is what's not a game--I've looked at the message that we've written and to me it seems that we are the light, that here plain as day and etched in omething more concrete than chalk is a testament to freedom and to incremental improvement... all the way up until we run against this very wall; and then you too seem to crumble.   Still I'm sure this message is here with us because it's our baseline morality and our sense of right from wrong that is here as a sort of litmus test for the future--perhaps to see if they've strayed too far from the place where they came, or if they've given just one too many ounces of innocense to look forward with the same bright gaze of hope that we see in the eyes of our children.

      fearing the heart of de roar\ searing the start of lenore

      MEDICINE\ I saw this thing many years ago, and I've written about it before, though I hasten to explain that the thing that I once saw a short-cut or a magic warp pipe in Super Mario Brothers today seems much more like a test than a game and more like a game than a cmeat coda; so I've changed over the course of watching what's happened on the ground here and I can only imagine how long it's been in the sky.  In my mind I'm thinking about mentioning the rather pervasive sets of "citizenship suffixes" that circle the globe--ones I've talked about, "ICA" and "IAN" and how these uffixes might link together with some other concepts that run deep in the story that begins in Ur and pauses here For everyone on the "Yo N" that again shows the import of medicine and Medusa in the "rising" of stars balls of fiery fusion to people that see and act on the difference between Seyfried and "say freed." 

      Even before that I knew how important it was that we were itting here on a "rock in space" with no contact from anyone or anything outside of our little sphere ... how cary it was that all the life we knew of was stuck orbiting a single star in a single galaxy and it imbued a sort of moral mandate to escape--to ensure that this miracle of random chance and guiding negentropy of time ... that it wasn't forever lost by something like a collision with the comet Ison or even another galaxy.  On that word too--we see the "an" of Christianity messianically appear to become more useful (that's negative energy, by the way) in the chemistry of Mr. Schwarzenegger's magical hand in delivering "free air" (that's free, as in beer; or maybe absinthe) to the people of our great land... anyway, I saw "anions" and a planet oddly full of a perfect source of oxygen and I thought to myself; it would be so easy to genetically engineer some kind of yeast or mold (like they're doing to make real artificial beef, today) to eat up the rust and turn it into breathable air; and I dreamt up a way to throw an extra "r" into potable and maybe beam some of our water or hydrogen over to the red planet and turn it blue again.

      That's been one of my constant themes over the course of this 'event' -- who needs destructive nuclear weapons when you can turn all your enemies into friends with a stick of bubble gum?  That's another one of our little story points too--I see plenty of people walking around in this virtual reality covering their mouths and noses with breathing masks... of course the same Targeted Individuals that know with all their heart that midn control is responsible for the insane pattern of school shootings and the Hamas Hand of the Middle East--they'll tell you those chemtrails you see are the cause, and while I know better and you do too... maybe these people think they know something about the future, maybe those chemtrails are there because someone actually plans on dispersing some friendly bubble gum into the air... and maybe these people "think they know."  Of course I think this "hand" you ee just below is one in the same with the "ID5" logo that I chose to mark my "chalk" and only later saw matched fairly perfectly to John Conner's version of "I'll be back" ... and of course I think you're reading the thing that actually delivers some "breathe easy" to the world; but it's really important to see that today it's not just Total Recall and Skynet and these words that are the proverbial effect of the hand but also things like Nestle ... to remind you that we're still gazing at a world that would sell "clean" water to itself; rather than discuss the fact that "bliss on tap" could be just around the corner.

      THE HAND OF
GOD

      Later, around the time that I wrote my second "Mars rendition" I mentioned why it was that there was an image of a "Boring device" (thanks Elon) in the original Exodus piece; it showed some thought had gone into why you might not want to terraform the entire planet, and mentioned that maybe we'd get the added benefit of geothermal heating (in that place that is probably actually colder than here, believe it or not) if we were to build the first Mars hall underground.  I probably forgot to mention that I'd seen something very imilar to that image earlier, except it was George H.W. Bush standing underneath the thirty foot tall wormlike machine, and to tell you the truth back then I didn't recognize that probably means that this map you're looking at had not only been seen long before I was born but also acted upon--long before I was born.  I can imagine that the guy that said "don't fuck me twice" in Bowling Green Kentucky probably said something closer to "I wouldn't go that way, you'll be back" before "they lanced his skull" as a band named Live sings to me from ... well, from the 90's.  Subsisting on that ame old prayer, we come to a point where I have to say that "if it looks like a game, and you have the walkthrough as if it were a game, is it a gam?"

      E = (MT +
IL)^HO

      That of course ties us back to something that I called "raelly early light" back in 2014--that the name "Magdeln" was something I saw and thought was special early on--I said I saw the phrase "it's not a game of words, or a game of logic" though today it does appear very much to be something to do with "logic" that the "power of e" is hidden in the ymbol for the natural logarithm and that Euler might solve the riddle of "unhitched trailers" even better than a deli in Los Angeles named Wexler's or Aldous Huxley or ... it hurts me to say it might solve the riddle better than "Sheriff" (see how ... everyone really if "f") and Hefner ... and the newly added "Hustler," who is Saint "LE R?"

      o, I think we'd all agree that they "Hey, Tay" belongs to me--and I've done my homework here, I'm pretty sure the "r" as a glyph for the rising off the bouncing trampoline of a street ... "LE R" belongs to the world; it's a ryzing civilization; getting new toys and abilities and watching how those things really do bring about a golden era--if we're willing to use them responsibly.

      It's a harsh world, this place where people are waking up to seeing A.D. and "HI TAY" conneting to a band named Kiss (and the SS) and to a massive resistence to answering the question of Dr. Wessen that also brings that "it's not a game" into Ms. Momsen's name ... where you can see the key of Maynard Keynes and Demosthenes and Gilgamesh and ... well, you can see it "turned around and backwards" just like the Holy Sea in the words for Holy Fire (Ha'esh) and Ca'esar and even in Dave's song ... "seven oceans pummel ... the wall of the C."  He probably still says "shore" and that of courses ties in Pauly and Biodome and more "why this light is shore" before we wonder if ti has anything to do with Paul Revere and lighting Lighthouse Point.

      TO A PALACE WHERE
THE BLIND CAN SEE

      So to point out the cost of not seeing "Holodeck" and "mushroom" and ... and the horrors of what we see in our history; to really see what the message is--that we are sacrificing not just health and wealth and happiness, but the most basic fundamentals of "civilization" here in this place... the freedom of logical thought and the foundational cement of open and honest communication--that it appears the world has decided in secret that these things are far less important than the morality of caring for those less fortunate than you--the blind and the sick and the ... to see the truth, it's a shame.  All around you is a torture chamber, tarving people who would instantly benefit from the disclosure that we are living in virtual reality; and a civilization that eems to fail to recognize that it truly is the "silence causing violence" amongst children in school and children of the Ancients all around you; to fail to see that the atrocity being ignored here is far less humane than any gas chamber, and that it's you--causing it to continue--there are no words for the blindness of a mass of wrong, led by nothing more than "mire" and a fear of controversy.

      Unhitched and unhinged, it's become ever more obvious that this resistance against recognizing logic and patterns--this fairure to speak and inability to fathom the importance of openness in this place that acts as the base and beginning point of a number of hidden futures--it is the reason "Brave New World" is kissing the "why" and the reason we are here trying to build a system that will allow for free and open communication in a sea of disinformation and darkness--to see that the battle is truly against the Majority Incapable of acting and the Minority unwilling to speak words that will without doubt (precarious? not at this point) quickly prove to the world that it's far more important to see that the truth protects everyone and the entire future from murder ... rather than be subtly influenced by "technologies undisclosed" into believing something as inane and arrogant as "everyone but you must need to be convinced that simulating murder and labor pains is wrong."  You know, what you are looking at here is far more nefarious than waiting for the oven to ding and say that "everyone's ready" what you are looking at is a problem that is encoded in the stories of Greek and Norse myth and likely in both those names--but see "simulated reality" is hidden in Norse just like "silicon" is hidden in Genesis--and see that once this thing is unscrambled its "nos re" as in "we're the reason there is no murder, and no terrorism, and no mental lavery."  It's a harsh message, and a horrible atrocity; but worse than the Holocaust is not connecting a failure to see "holodeck" as the cause of "holohell" and refusing to peak because Adam is naked in Genesis 3:11 and Matthew talks about something that should be spreading like wildfire in his 3:11 and that it's not just Live and it's not just the Cure and it's not just a band named 311 that show us that "[***FUKUSHIMA***](http://holies.org/HYAMDAI.html)" reads as "fuck you, see how I'm A" because this Silence, this failure to recognize that the Brit Hadashah is written to end simulated hell and turn this world into Heaven is the reason "that's great, it starts with an Earthquake on 3/11."

      XEROX THAT
HOUSTON, CASINEO\ You stand there believing that "to kiss" is a Toxic reason to end disease; that "mire" is a good enough reason to fail to exalt the Holiness of Phillip K. Dick's solutions; and still continue to refuse to see that this group behavior, this lack of freedom that you appear to believe is something of your own design is the most caustic thing of all.  While under the veil of "I'm not sure the message is accurate" it might seem like a morally thin line, but this message is accurate--and it's verifiable proof--and speaking about it would cause that verification to occur quicker, and that in turn will cause wounds to be healed faster, and the blind given sight and the lame a more effective ARMY in this legacy battle against hidden holorooms and ... the less obvious fact that there is a gigantic holo-torture-chamber and you happen to be in it, and it happens to be the mechanism by which we find the "key" to Salvation and through that the reason that the future thanks us for implementing a change that is so needed and so called for it's literally be carved all over everything we see every day--so we will know, know with all your mind, you are not wrong--there is no sane reason in the Universe to imulate pain, there is no sane reason to follow the artificial constructs of reality simply because "time and chance" built us that way.  We're growing up, beyond the infantile state of believing that simply because nobody has yet invented a better way to live--that we must shun and hide any indication that there is a future, and that it's speaking to us; in every word.

      THE VEIL OF
CASPERUS PAN

      So I've intimated that I see a "mood of the times" that appears to be seeking reality by pretending not to "CK" ... to seek "a," of course that puts us in a place where we are wholly denying what "reality" really means and that it delivers something good to the people here--to you--once we recognize that Heaven and Creation and Virtual Reality don't have to be (and never should be, ever again) synonymous with Wok's or Pan's or Ovens; from Peter to the Covenant, hiding this message is the beginning and the end of true darkness--it's a plan designed to ensure we never again have issue discussing "blatant truth" and means of moving forward to the light in the light with the light.  A girl in California in 2014 said something like "so there's no space, then?" in a snide and somewhat angry tone--there is space, you can see it through the windows in the skies, you can see the stars have lessened, and time has passed--and I'm sure you understand how "LHC" and Apollo 13 show us that time travel and dark matter are also part of this story of "Marshall's" and Slim Shady and Dave's "the walls and halls will fade away" and you might even understand how that connects to the astrological symbol of Mars and the "circle of the son" and of Venus(es) ... and you can see for yourself this Zeitgeist in the Truman Show's "good morning, good afternoon, good evening... and he's a'ight" ... but it really doesn't help us see that the darkness here isn't really in the sky--it's in our hearts--and it's the thing that's keeping us from the stars, and the knowledge and wisdom that will keep us from "bunting" instead of flourishing.

      TOT MARSH IT AL

      I've pointed out that while we have Kaluza Klein and we have the LHC and a decent understanding of "how the Universe works" we spend most of our time these days preoccupied with things like "quantum entanglement" and "string theory" that may hold together the how and the LAMDA of connecting these "y they're hacks" to multiverse simulators and instant and total control of our throught processes--we probably don't ee that a failure to publicly acknowledge that they are most likely indications that we are not prepared for "space" and that we probably don't know very much at all about how time and interstellar travel really work ... we are standing around hiding a message that would quicken our understanding of both reality and virtual reality and again, not seeing that kind of darkness--that inability to publicly "change directions" when we find out that there aren't 12 dimensions that are curled up on themselves with no real length or width or purpose other than to say "how unelegant is this anti-Razor of Mazer Rackham?"

      So, I think it's obvious but also that I need to point out the connection between "hiding knowledge of the Matrix" and the Holocaust; and refer you to the mirrored shield of Perseus, on a high level it appears that's "the message" there--that what's happening here ... whatever is causing this silence and delay in acting on even beginning to speak about the proof that will eventually end murder and cancer and death ... that it's something like stopping us from building a "loving caring house" rather than one that ... fills it's halls with bug spray instead of air conditioning.  I'm beside myself, and very sure that in almost no time at all we'll all agree that the idea of "simulating" these things that we detest--natural disasters and negative artifacts of biological life ... that it's inane and completely backwards.

      I understand there's trepidation, and you're worried that girls won't like my smile or won't think I'm funny enough... but I have firm belief in this message, in words like "precarious" that reads something like "before Icarus things were ... precarious" but more importantly my heart's reading of those words is to see that this has happened before and we are more than prepared to do it well.  I want nothing more than to see the Heavens help us make this transition better than one they went through, and hope beyond hope that we will thoroughly enjoy building a "better world" using tools that I know will make it simpler and faster to accomplish than we can even begin to imagine today.  

      On that note, I read more into the myths of Norse mythology and its connections to the Abrahamic religions; it appears to me that much of this message comes to us from the Jotunn (who I connect (in name and ...) to the Jinn of Islam, who it appears to me actually wrote the Koran) and in those stories I read that they believe their very existence is "depenedency linked" to the raising of the sunken city of Atlantis.  Even in the words depth and dependency you can see some hidden meaning, and what that implies to me is that we might actually be in a true time simulator (or perhaps "exits to reality" are conditional on waypoints like Atlantis); and that it's possible that they and God and Heaven are all actually all born ... here ... in this place.  

      While these might appear like fantastic ideas, you too can see that there's ample reference to them tucked away in mythology and in our dreams of utopia and the tools that bring it home ... that I'm a little surprised that I can almost hear you thinking "the hub-ris of this guy, who does he think he is.... suggesting that 'the wisdom to change everything' would be a significant improvement on the ending of the Serendipity Prayer."

      Really see that it's far more than "just disease and pain" ... what we are looking at in this darkness is really nothing short of the hidden slavery of our entire species, something hiding normal logical thought and using it to alter behavior ... throughout history ... the disclosure of the existence of a hidden technology that is in itself being used to stall or halt ... our very freedom from being achieved.  This is a gigantic deal, and I'm without any real understanding of what can be behind the complete lack of (cough ... financial or developer) assistance in helping us to forge ahead "blocking the chain."  I really am, it's not because of the Emperor's New Clothes... is it?

      It's also worth mentioning once again that I believe the stories of Apollo 13 and the LHC sort of explain how we've perhaps solved here problems more important than "being stuck on a single planet in a single star system" and bluntly told that the stories I've heard for the last few years about building a "bridge" between dark matter and here ... have literally come true while we've lived.  I suppose it adds something to the programmer/IRC hub admin "metaphor" to see that most likely we're in a significantly better position than we could have dreamed.  I've briefly written about this before ... my current beliefs put us somewhere within the Stargate SG-1 "dial home device/DHD" network.

      So... rumspringer, then? ... to help us "os!"

      DANCING ON THE GROUND, KISSING... ALL THE TIME

      Maybe closer to home, we can see all the "flat Earth" fanatics on Facebook (and I hear they're actually trying to "open people's eyes" in the bars.. these days) we might see how this little cult is really exactly that--it's a veritable honey pot of "how religion can dull the senses and the eyes" and we still probably fail to see very clearly that's exactly it's purpose--to show us that religion too is something that is evidence of this very same outside control--proof of the darkness, and that this particular "cult" is there to make that very clear.  Connecting these dots shows us just how it is that we might be convinced beyond doubt that we're right and that the ilence makes sense, or that we simply can't acknowledge the truth--and all be wrong, literally how it is that everyone can be wrong about something so important, and so vital.  It seems to me that the only real reason anyone with power or intelligence would willingly go along with this is to ... to force this place into reality--that's part of the story--the idea that we might do a "press and release in Taylor" (that's PRINT) where people maybe thought it was "in the progenitor Universe" -- but taking a step back and actually thinking, this technology that could be eliminating mental illness and depression and addiction and sadness and ... that this thing is something that's not at all possible to actually exist in reality.

      Image result for buffalo nickel

      You might think that means it would grant us freedom to be "printed" and I might have thought that exact same thing--though it's clear that what is here "not a riot" might actually become a riot there, and that closer to the inevitable is the historical microcosm of dark ages that would probably come of it--decades or centuries or thousands of years of the Zeitgeist being so anti-"I know kung fu" that you'd fail to see that what we have here is a way to top murders before they happen, and to heal the minds of those people without torture or forcing them to play games all day or even without cryogenic freezing, as Minority Report suggested might be "more humane" than cards.  Most likely we'd wind up in a place that shunned things like "engineering happiness" and fail to see just how dangerous the precipice we stand on really is.  I joke often about a boy in his basement making a kiss-box; but the truth is we could wind up in a world where Hamas has their own virtual world where they've taken control of Jerusalem and we could be in a place where Jeffrey Dammer has his own little world--and without some kind of "know everything how" we'd be sitting back in "ignorance is bliss" and just imagining that nobody would ever want to kidnap anyone or exploit children or go on may-lay killing sprees ... even though we have plenty of evidence that these things are most assuredly happening here, and again--we're not using the available tools we have to fix those problems.  Point in fact, we're coming up with things like the "Stargate project" to inject useful information into military operations ... "the locations of bunkers" ... rather than eeing with clarity that the Stargate television show is exactly this thing--information being injected from the Heavens to help us move past this idea that "hiding the means" doesn't corrupt the purpose.

      EARTH.

      Without knowledge and understanding of this technology, it's very possible we'd be running around like chickens with our heads cut off; in the place where that's the most dangerous thing that could happen--the place where we can't ensure there's safety and we can't ensure there's help ... and most of all we'd be doing it at a time when all we knew of these technologies was heinous usage; with no idea the wonders and the goodness that this thing that is most assuredly not a gun or a sword ... but a tool; no idea the great things that we could be doing instead of hiding that we just don't care. 

      We're being scared here for a reason, it's not just to see "Salem" in Jerusalem and "sale price" being attached to air and water; it's to see that we're going to be in a very important position, we already are--really--and that we need knowledge and patience and training and ... well, we need a desire to do the right thing; lest all will fall.

      o, you want to go to reality... but you think you'll get there without seeing "round" in "ground" and ... caring that there's tens of thousands of people that are sure that we live on flat Earth ... or that there's ghosts haunting good people, and your societal response is to pretend you don't know anything about ghosts, and to let the pharmacy prescribe harm ... effectively completing the sacrifice of the Temple of Doom; I assume because you want to go to a place where you too will be able to torment the young with "baby arcade" or ...

      i suppose there are those\ in the garden east of eden\ who'll follow the rose\ ignoring the toxicity of our city*and touch your nose\ as you continue chasing rabbits\ \ KEVORKIAN? TO
C YO, AD ... ARE I NIBIRU?

      *

      BUCK IS WISER

      ^22 ^The whole Israelite community set out from Kadesh and came to Mount Hor. ^23 ^At Mount Hor, near the border of Edom, the Lord said to Moses and Aaron, ^24 ^"Aaron will be gathered to his people. He will not enter the land I give the Israelites, because both of you rebelled against my command at the waters of Meribah. ^25 ^Get Aaron and his son Eleazar and take them up Mount Hor.  ^26 ^Remove Aaron's garments and put them on his son Eleazar, for Aaron will be gathered to his people; he will die there."

      O 5 S

      \ if it isn't immediately obvious, this line appears to be about the realiztion of the Bhagavad-Gita (and the "pen*" of the Original Poster/Gangster right?)

      ... swinging "the war"*

      p.s. ... I'm 37.

      so ... in light of the P.K. Dick solution to all of our problems ... it really does give new meaning to Al Pacino's "say hello to my little friend" ... amirite?

      Unless otherwise indicated, this work was written between the Christmas and Easter seasons of 2017 and 2020(A). The content of this page is released to the public under the GNU GPL v2.0 license; additionally any reproduction or derivation of the work must be attributed to the author, Adam Marshall Dobrin along with a link back to this website, fromthemachine dotty org.

      That's a "." not "dotty" ... it's to stop SPAMmers. :/

      This document is "living" and I don't just mean in the Jeffersonian sense. It's more alive in the "Mayflower's and June Doors ..." living Ethereum contract sense and literally just as close to the Depp/C[aster/Paglen (and honorably PK] 'D-hath Transundancesense of the ... new meaning; as it is now published on Rinkeby, in "living contract" form. It is subject to change; without notice anywhere but here--and there--in the original spirit of the GPL 2.0. We are "one step closer to God" ... and do see that in that I mean ... it is a very real fusion of this document and the "spirit of my life" as well as the Spirit's of Kerouac's America and Vonnegut's Martian Mars and my Venutian Hotel ... and my fusion of Guy-A and GAIA; and the Spirit of the Earth .. and of course the God given and signed liberties in the Constitution of the United States of America. It is by and through my hand that this document and our X Commandments link to the Bill or Rights, and this story about an Exodus from slavery that literally begins here, in the post-apocalyptic American hartland. Written ... this day ... April 14, 2020 (hey, is this HADAD DAY?) ... in Margate FL, USA. For "official used-to-v TAX day" tomorrow, I'm going to add the "immultible incarnite pen" ... if added to the living "doc/app"--see is the DAO, the way--will initi8 the special secret "hidden level" .. we've all been looking for.

    1. This is an excerpt from Time and Chance: The race is not to Die Bold by Adam Marshall Dobrin Download the actual Revelation of the Messiah in [ .PDF ] [ .epub ] [ .mobi ] or view online.

      Older works Lit and Why, hot&y;, and From Adam to Mary are also available. Expect the Unexpected

      I used to think that everything in religion was going to deliver us a map of a future past, that every story was a metaphor for a path away from the desert that was being stuck in one place and time with no hope to really reach escape velocity. In this word the water that is Biblically related to the coming of age of Jacob and his crossing the river Jordan was about our collective need to pass through a barrier at sea–only… in space. Through my period of awakening, one which took me from a little lion cub sleeping in a Jungle of madness to a man fighting desperately not to relive his past future… I experienced the lives of the past Horsemen of the Apocalypse through what I can best describe today as a waking dream. I received story after story of exactly what happened the last time we left Earth, what we encountered and the ups and downs that ensued.

      The Light of Osiris

      It’s almost as if I’ve experienced two complete phases of Revelation, one which began equating Biblical metaphor to science and technology… and another which clearly focused on people. In these two conflicting tales of what is to come there is no metaphor more perfect than that of water to explain just how perfectly our guide book to the future is written. The connection between space travel and voyaging across the Jordan, then the parted sea of Exodus, is clear; but the details tied so closely to the research and experience I was going through were uncanny. We were searching for water in the desert, for a way to successfully colonize outer space… and in that same moment when we found it on Ceres–it showed me that God cares, and I read a passage of the story of Exodus that paralleled so perfectly I was awed. Moses struck water from the side of a mountain, and in that moment everything I had thought about a map designed to ensure the survival of not just humanity… but of all life in the Universe had come true.

      Astronomers have discovered direct evidence of water on the dwarf planet Ceres in the form of vapor plumes erupting into space, possibly from volcano-like ice geysers on its surface.
      
      Using European Space Agency’s Herschel Space Observatory, scientists detected water vapor escaping from two regions on Ceres, a dwarf planet that is also the largest asteroid in the solar system. The water is likely erupting from icy volcanoes or sublimation of ice into clouds of vapor.
      
      “This is the first clear-cut detection of water on Ceres and in the asteroid belt in general,” said Michael Küppers of the European Space Agency, Villanueva de la Cañada, Spain, leader of the study detailed today (Jan. 22) in the journal Nature. >Space.com 1/22/2014
      

      oh desert speak to my heart oh woman of the earth maker of children who weep for love maker of this birth 'til your deepest secrets are known to me I will not be moved

      run to the water and find me there burnt to the core but not broken we'll cut through the madness of these streets below the moon these streets below the moon

      Live, Run to the Water

      These words were literally coming to me from Jesus Christ, by way of Eddie Kowalczyk, and I expected them to come true. They were a warning and a consolation at the same time; telling us not to bring an army to fight the vastness of space, but rather to focus on what it was that we needed to to ensure the survival of life. Fighting has mired our history so much, I fully expected Him to be waiting for us at our first interstellar jump with an Armada from either the far away Atlantis of Stargate SG-1 or maybe the Last Starfighter’s Alpha Centauri. He would be protecting us, of course; but also from something we probably overlook too often, that sometimes it’s our own nature that we must be protected from. We are so headstrong, so sure that we are right and deserving; it would be just like us to build a space army of sticks and stones to embarrass ourselves at the first encounter–and maybe the last–we’d have with some life more intelligent and farther along in this vacation we call civilization.

      It was 2013, and I had just moved to Bowling Green, Kentucky with my ex-wife and very young son. I spent much of my time writing on an ancient blog–I suppose the term is out of space here, but those words feel as if they were a million miles ago, so far from what I know now that they might as well have been akin to the religion of Indiana Jones’ Temple of Doom. That, of course, was always about how Heaven was clearly a time traveling civilization, one which had mired our past with the horrors of things like human sacrifice in order to alter the course of the future… sublimely hidden away in this quasi-secret spectacle that divined to ensure that we would never be sure if they really existed, or if they were speaking to us. This girl, who is both my Magdelene and Eve, left me only a few months after we had re-united in the heartland of America; and it was only a few short days letter that I heard the voice of God coming from outside my doorway… ajar waiting for the Post Office to deliver the pre-emptive Crystals of Jor-El. Expect the Unexpected he chanted. Inwardly, I smiled.

      It’s probably important to see why there is a meaningful relationship between the name Mary and the SEA of Eden, linking the first names of the First Family to the Spanish word for sea. Were it not so fundamentally important to the Marriage of the Lamb, and so important to our survival, He would not have focused so much on a hidden meaning within the names of the families of Adam and Jesus. This is a story about All of Humanity, and a call to see a large human family tied to the letter “AH” that grace the names of Asherah, Sarah, Leah, Adamah, and Allah… to see that the sea of Mary and the hidden meaning of Eve’s English name are tied through time from the imaginary Eden to now, the true Garden.

      Baptized in water… for repentance; this is God’s message and command to ensure that Civilization is saved, not just the “elect.” We are at a crossroads, one which we have traveled before, and this message is here for a reason. We aren’t always right. The Power of the Son

      You might notice now that my mythology is already linking Kal-El and Christ together with the stories of Moses and songs of today in a way that sets this home in a small town in Kentucky as the first and only real Fortress of Solitude I would ever reside in. I was alone in this place, knew nobody in Bowling Green, and the information transfer that was about to take place had a significance that was lost on me–even after hearing a voice in the sky. You might also notice that the name Kentucky includes both the last name and the initials of Christ’s secret identity, also lost on me until only a few short months ago in 2016 when I first began writing down this Revelation in a confinement that clearly to me linked the Mountains of Sinai and Prometheus’ bondage to the captivity that held Napoleon after he had lost his war. Of course, I knew Hercules was coming. You will remember that it was an Eagle attacking Prometheus, and I will point out once again that there are a number of other hidden references to America is ancient mythological names like “Pro-me-the-US” and MEDUSA.

      It’s more than just receiving superhuman strength from the light of our Son that tie Clark Kent to Sampson, there is so much Biblical imagery which ties the story of Superman to our Second Coming that it’s surely going to be just as obvious to you as it is now to me that this connection is part of God’s hidden message, that he is secretly influencing our art and modern myths to link directly to these ancient stories. I’ve discovered a clear language hidden in names; and these ancient or fictional places are–to me–not in space but in a hidden map of Time. Here and now we are about to cross the River Jordan together by understanding the clear and defined relationship between that name, Jor-El, and the Biblical Noah.

      The connection between the Ark of the Covenant, Noah’s, and Krypton might not be clear at first; but this appears to me to be God’s mythology regarding the days of Noah. An impending disaster caused both the Flood and the voyage of little Kal-El, and within the Ark it is the power of the Son that gives new strength to an old story. “J” is for Jesus, and less clear is the question that Jor-El’s name asks, are you the “Father” or the Son? El is an ancient Hebrew name for God, and both the name of Jacob’s river and Superman’s father echo of of a question that is unambiguously central to the theme of the Second Coming. It’s about the book of Daniel, and blame. In order to cross this great river in time, we must put down a need to find blame, for nations (as Daniel clearly marks the Beasts) or people; and realize that we are all part of a story that shows us we have been sleeping in the Jungle together, unaware of the destiny we were about to fulfill. The Bright A.M. Star

      Back then it was the fact that hidden metaphor in the names of people like ADAM and EVE linked to Biblical time, to morning and evening, that really intrigued me… it assured me that whatever it was that was happening to me was divine will. I wrote about Adam and Eve rocking around the clock; and boy was I sure that I had the secrets of the desert speaking through me all those years ago. It was the beginning of seeing how Eden and time travel were inextricably linked, not only to the Judaic theme of evening before morning (as the days of Judaism clearly show) but also to the idea that the night and the storms of Exodus are about walking in a wilderness of understanding–not knowing how much religion and time are linked.

      No sooner was the man and his name screaming that After Dark it is A.M. that everything changed from the dark first evening to “Adam and Everyone. It’s the beginning of the Holy Grail, a theme that pervades from Genesis to Revelation and shows us that the space-aged theme of the sea is not about voyaging into the abyss, but rather into seeing that the light of the Universe is here… in our sea. The multitude of Revelation. Hidden in not just names, but also in the idioms of our time is the key to understanding: a blessing in disguise the First Plague of Egypt turns water to blood–thicker than water–and the small trinity of a sea in Eden to the large family of Jesus Christ. The Blood of the Grail. From the Ends of the Earth the chalice that holds that blood turns from Earth to Heart; simply by moving an “h” from the end to the beginning. For Heaven, Hebrew, Saturn’s sign, and for Home–these are my 4H’s that show us that home is where the heart is.

      Through idioms we see that our culture and this story are intertwined, that His intent is to show us that we are created, and that the plan of Salvation certainly includes not only verifiable but awe striking proof that we are journeying together into the Promised Land of Joshua. The Story of Exodus

      As we’ve seen in the light of the name Exodus, reading names (and now books) backwards is a huge hidden theme in the Revelation that is before you. From Exodus being “sudo xe” and thus let there be light, we find a key that links the Rod of Christ to The Doors of Jim Morrison, and the key story that links the Salt of the Earth of Matthew 5:13 to the story of Lot and his Wife… which might imply that the Rod of Christ is God’s Anima–linked to the music of our age through TOOL. Soon I will show you the meaning of J, N, and the little o that graces the name of Nero–our historical counterpart for the fiddler who weaves this story into music for us to hear, and see.

      The story of Exodus is intended to be read both forwards and backwards, and within its hallowed secrets is a message that links the expulsion of Adam from Eden to an Exodus from Heaven that is mandated by this story in order to do that thing which religion ensures we will: save all life in the Universe. Reading forward, Aaron and his Rod demand that the Pharoah let his people go, and it is only through the reverse reading that we find out definitively who those people are. The story itself is a test, it is God’s search for a team of people that are willing to save everyone by leaving the comfortable confines of Creation–of Heaven–in order to venture out into the vastness of space in order to find dry land. This group is responsible for our continued survival, and for the book and story that are before us. They are responsible for the continued survival of Heaven and of Life by finding the Light of Osiris–the power source that came to me during this very same time period in Bowling Green.

      In a world where the Promised Land is both within and without–ours because we are the heart of the Ark of the Covenant, and there too because it is through time travel and science that we find ourselves in a place where time is not as big of an issue as it had once been, and infinite power comes not from seeing that there is an ancient Promised Land shortly after the “Big Bang,” a mere 378,000 years, when power was literally in the air.

      This is my divine inspiration, the coincidental discovery and publication of these world-changing pieces of knowledge that coincided perfectly with a story that I was being told. One which linked Exodus to today, the thralls of modern science to a science fiction epic that I was practically living out. These articles were not just shown to me, they were magically appearing in the world to match the Word, at the exact time that interplanetary colonization and the future of our species was the prime focus of the Second Coming. Through the use of time, technology, and love–God was holding my hand and showing me exactly where we would be going.

      Like water, Light has a dual meaning in the mythology of this story, and the Light of Osiris was a very clear promise that was given to both me and Jacob–the name that was “given” to the speaker of the words “Expect the Unexpected.” It was a promise of infinite power, one that was to be given to the world in order to fulfill the dream of religion, to ensure the survival of life and the continued evolution of our civilization. In real religion of course, Light is not electrical power–but rather wisdom, and while at first glance this book may seem to revolve around Adam–this is my light. I see what is related to me, and there is a significant amount of light that focuses on one man, on the Christ, for a reason.

      True Biblical Light is what graces the pages of Holy Scripture, it is a truth that changes with the throes of time and chance, to become more clear and more useful as our civilization evolves. Stories that once guided the development of society now become a path to the future–as we begin to see that the original purpose of this Light is to ensure that we are not left in the dark. Ender’s Game, the Ewok, and Pan’s Labrynth

      “I am the cat with nine lives. You will not prevail against me.” -Nancy Farmer, The Lord of Opium
      

      The Iron Rod of Mars

      CopyleftMT

      This content is currently released under the GNU GPL 2.0 license. Please properly attribute and link back to the entire book, or include this entire chapter and this message if you are quoting material. The source book is located at . and is written by Adam Marshall Dobrin.

      Adam Marshall Dobrin

      adam@lamc.la fb.me/admdbrn linkedin.com/adam5 instagram.com/yitsheyzeus twitter.com/yitsheyzeus

      -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2

      mQENBFbGalABCADzLBdnHptF2MJCpdY8P/Mgnf4xj8F9pZSCwmd0J4Md8g3aTEdU CV9t0UQgNtjcxwfoenJLHgdZd4Mfscz9U+NN69OLXdPu4cdXOjTiHarPLjKnqIZw 3fmkM2ycvoUPkdVYCjwYYQxWRsWRpJf1dpmtPuz0L8ysh/WWsj2Ag2MrFYAo+sY6 dGZvaLsPhkZJcLXyFaP3c3Zt8ivrs4VV8+0kmMzScnR+oncVZbeMuQksoPxRmZgH mYu2KSf74lWOWVcaaBXOYX5pGNdhBUgq8ll+8tRH16G289r0cqRoPh/sjs/JRuIH KnCWG2UAUJF7ir04TS5A4Lwl9RYcQwVvb3BdABEBAAG0LUFkYW0gTWFyc2hhbGwg RG9icmluIChsYW1jLmxhKSA8YWRhbUBsYW1jLmxhPokBOQQTAQgAIwUCVsZqUAIb AwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEMgUPrR1B55trOwIALOQRTX0 YqXJXEMhX9CgxKNoNkpM2pdMdHl6CAVxhQ3hbNjIFnZbKbP88uxMEIOXXmYZ7gOy YqiDCu5I1V25suBb2ODSix75YQugfQ7H78pXHpTRu5sT+5SybItx7d+KUZaEj4pO tXWEemYl0cKK97RzpI0k1dmB7NqAVvqgbqQwd40MOf8QJVlGXnB1+5H2IbkYG6rD ixKGJEdes6i6nqvi/xz/s5hFVGUwTcVQbRU/fa1qT1Q7kHf1PlMu6yjuZTSz7WUG tWjobGwrVJkaeVWgLE4mcxMtity2IFTwOHvAuv8fi2EGQRQjXfPvxL7Vn4MNRl8x zLPV44D37QEknjy5AQ0EVsZqUAEIAMFS0+ZgSJzUPz0h0oiiRjfk2hapS3c1/Ysm R/h8sZ8/GOomdo3MEbTCkcuZ8ReAJhB2PofmwI4LAvW1x7Zwh1vfBKygfUs1s9lm ya/eHkjuZfqmeuEJZMHn6sxb3vqowWmvLhv3x0aWD8qLCIYoa1ntzTOIqxBEgxvU rF1/wd6OQLSJQEVNwPCx7CJI/5o/4W6pUaHk8amgPckkEdmlhRTRqFoAUV1Doivv d9JGYNYC88vS14Sw4Z9Xb7qBQJvG4hIh29gtQxk7Wz4m3ceR79MWT4eSGkH/rTGl w1OuQS2OkPvjgPWJt8San4zuPer17pJN7M5LWI0PStoX9pkud5kAEQEAAYkBHwQY AQgACQUCVsZqUAIbDAAKCRDIFD60dQeebWU6CADylAM5K18N2JGveL3D4dG25fdF vkrz8LOaiUmjAxijcRQBLkTPBK7QqoK0zN6MssMdlBGIOvZQwxSMIIrG6SqwR/go rmZHRuz17ceFTcxT8ZG3FuBY+xXrotXFjLxTmJ1wUeCSVXTc4NAwBzykgkQXOdIj qK1f/HnmMqsSmX4swuH0TZPNBBO7CNvLN6rdLBRfNn1h5XPs8VVtezg5ZDfCTf8S mucQGEwo/hJmr/orEucmETYSvTXOz+L5X5gNHpzYzE9590FYfbAKvrEhAliKbhhl 3Roie3kenrzelXo5N9Q0f2AKFrv1hRX9hBkwTbA18SKZ9XQbWMusX8YhvfLr =dvAJ -----END PGP PUBLIC KEY BLOCK-----

    1. Brindar total concentración a los que se está haciendo para poder analizar de forma crítica para qué me puede servir lo que estoy viendo y cómo lo podría aplicar. Generar preguntas puntuales que permitan el entendimiento de los demás en el aula para poder recibir una respuesta acertada.

      Cómo estos dos aspectos puntuales se expresan en la clase. Frente a cada punto:

      • En el primero, dado que el uso constante del computador implica la posibilidad de tener interrupciones como mensajería instantánea y ventanas alternas del navegador, recomendaría:

      • Cerrar aplicaciones de mensajería instantánea y usar una ventana del navegador nueva para la clase.

      • Usar el celular al mínimo y tenerlo pantalla abajo, mientras tanto.

      • Para el segundo, efectivamente las preguntas son claves y su expresión clara. Cuando no se viene a clase, vale la pena formularlas por escrito a través de correo o lecturas anotadas.

    2. que sea más claro el para qué y cómo puedo aplicar lo que estamos viendo en los distintos ámbitos de mi vida.

      Como veíamos en el video de Clay Shirky, el asunto es que, precisamente, saberes como los que vemos en clase están lejos del cotidiano de la mayoría de las personas, lo cual tiene afecciones respecto a la democracia, el ejercicio de los mecanismos de expresión y la vigilancia de lo común y lo público.

      La universidad como espacio, nos permite acceder a conocimientos que no circulan en el cotidiano (ecuaciones diferenciales, modelación de sistemas complejos, ontologías, etc.) y esa es una de sus funciones principales. La pregunta sería más bien qué tipo de cotidiano queremos transformar y cómo estos saberes tienen (o no) el potencial para hacerlo.

      La invitación es a que cada cual, que conoce mejor su propio cotidiano y lo que le interesa transformar en él, haga proactivamente y explícitas las preguntas y posibilidades al respecto, ojalá durante la clase.

    1. . ̧ e liq- uid and solid wastes that are produced pose significant environ- mental and public health risks if not handled securely,º and there ?. .. Volunteers collect water quality data. Photograph by Kirk Jalbert.

    1. o account for day-specific effects (Figure S1), we scaled all amoeba movement estimated on a given day by dividing it by net amoeba movement towards Klebsiella pneumoniae (averaged across 3 replicates) on that day.

      Wow! The fourth day of experiments had wildly different effects! Do you have any idea why things were so different on this day?

    1. Slavná legenda o hrstce odvážných, kteří se postavili na stranu bezbranných. Nejslavnější japonský film všech dob, předchůdce filmu Sedm statečných. Těžko by se asi hledal někdo, kdo by neznal legendární americký western o hrstce statečných, kteří se v počtu chabých sedmi postaví přesile banditů, aby ochránili bezbrannou vesnici na odlehlém venkově proti rabování. Western Johna Sturgese patří již téměř půl století k nesmrtelným filmovým evergreenům. Ale jen málokdo ví, že by vůbec nevznikl, nebýt jednoho fenomenálního režiséra, jehož originální umění přesáhlo daleko za hranice rodného Japonska. Že dobrodružný příběh sedmi potulných pistolníků byl přímo inspirován samurajským filmem Akiry Kurosawy, jenž se odehrává ve feudálním Japonsku 16. století. A že to zdaleka není jediný případ amerického hitu inspirovaného dílem tohoto japonského klasika. (oficiální text distributora)