6,776 Matching Annotations
  1. Apr 2020
    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      We thank the reviewers and the editor for the insightful and thorough assessment of our manuscript. In this response to review letter, we have listed the original review (black text) and responded to each critique after it.

      Reviewer #1 (Evidence, reproducibility and clarity (Required)):

      Yang et al. submitted a manuscript describing the detection of pseudogenes ("retrocopies") of APOBEC3 (A3) genes in primates. The evolutionary history and relationship to specific A3s was analyzed and speculated that the maintained A3 retrocopies had a functional role at least early in the evolution and some may have still now. Functional data on some of the expressed retrocopies are presented on L1 and HIV.

      The authors claim that "retrocopying expands the functional repertoire of A3 antiviral proteins in primates". While almost of the genetic findings were published recently (Ito et al. 2020), the authors should more clearly describe how their data differ or confirm the data of Ito et. al.

      We thank the reviewer for their helpful comments which have guided revisions to our manuscript. We have taken steps to clarify the dramatic differences between our work and the recent publication from Ito, Gifford, and Sato.

      Foremost, we respectfully disagree with the reviewer that the genetic findings in our work were contained within the Ito, et al manuscript. Using a computational screen of assembled mammalian genome, the Sato group cataloged the gain and loss of APOBEC3 genes during the evolution of mammals. They found a fascinating correlation between the dynamics of A3s and ERVs that formed the precis of the paper. From their genome-wide search for A3s, Ito et al describe several retrocopies of A3s in two New World Monkey species, one of which retains a full-length open reading frame, leading to the statement that this gene may be functional.

      We note that the retrocopies found in the Ito et al paper span only two of the more than 20 species in which we identify A3 retrocopies. Further, as a result of the breadth of our search for A3s, we find additional retrocopies in the same two New World Monkey species that were examined in the Ito et al paper. Finally, our study also examined functional capabilities of these additional A3s. These differences are highlighted by reviewer 3 who writes that relative to Ito et al, our manuscript studies the phenomenon of A3 retrocopies “more deeply both by in silico analyses and cell culture experiments.” Reviewer 3 also summarizes the most important difference in our studies – our work presents a “conceptual advance that the antiviral gene expansion has achieved not only via tandem gene duplication but also via gene retrocopying”.

      Lastly, we want to point out that the findings of our manuscript and Ito et al. 2020 were made concurrently. Indeed, throughout the preparation process of this manuscript, we were both aware of each other’s findings and shared preprints with each other. Most of the participating journals in Review Commons have “scoop protection” mechanisms that typically extend 6 months after the publication of the first article (Ito et al was published Jan 2020), and our article was first submitted to Reviewer Commons on February 14, 2020. Therefore, we feel confident that the ‘no scoop’ policy applies to the minimal overlap between our paper and that of Ito et al.

      Nevertheless, we have modified the text to more clearly acknowledge the parallel finding of some New World monkey retrogenes in the Ito, et al. paper.

      The functional data (Fig. 6) are interesting, but in the current form not complete. The authors have to show protein expression in the transfected cells (A3, L1, HIV) and level of encapsidation into viral particles. In addition, please analyze if the retrocopies express cytidine deaminase active enzymes.

      We thank the reviewer for this comment, and we have added a Western blot of the six long-ORF-containing retrocopies as Figure S5. In this blot (from early in the project), we detected protein production in 293T cells for 3/6 retrocopies. In later optimizations of subsets of this blot, we were able to detect expression of the marmoset A3G and the other two marmoset retrocopies (marmoset-2 and marmoset-4). Despite optimization attempts, we were unable to detect protein for one of the retrocopies that restricts HIV-1ΔVif (capuchin-C1). Unfortunately, at this time the included blot is the only one we have in which all 6 constructs are included on a single blot. Optimally, all 6 constructs would be side-by-side in a single blot with optimized conditions, and we are happy to complete this experiment as soon as we are able to return to our lab after the SARS-2 quarantine is lifted. However, we think the added blot shows that some of the retrocopies produce protein and the absence of detectable protein from capuchin-C1 could suggest that this retrocopy is especially potent in its restriction function or an idiosyncratic problem with detecting this protein using Western blot analyses.

      We have not previously tested our lentiviral particles for levels of encapsidation of protein from each retrocopy. The value we see in this experiment is in explaining why some of the retrocopies that are expressed in producer cells may not restrict in target cells. While we note that precedent in the literature suggests that A3 proteins which restrict HIV-1ΔVif are invariably encapsidated, we would be happy to carry out this experiment when our lab reopens.

      In response to the reviewer’s request to test deaminase activity for each retrocopy, we note that Figure 4 shows the intactness of the deaminase motif in each retrocopy. However, we feel that a description of the mechanisms of restriction of these retrocopies is not a major point of this paper and is beyond the scope of the current investigation.

      Reviewer #1 (Significance (Required)):

      Minor advance compared to Ito et al. 2020.

      We respectfully and rigorously disagree with this assessment. Please refer back to the reviewer’s first comment. We defer, again, to Reviewer 3’s assessment that our work presents a “conceptual advance that the antiviral gene expansion has achieved not only via tandem gene duplication but also via gene retrocopying”. Moreover, we must point out that the Ito et al 2020 paper was entirely computational; indeed, several retrogenes that could computationally be predicted to be ‘dead’ were confirmed by us as having antiviral activity.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      **Summary:**

      Yang et al. study the expansion of APOBEC3 (A3) cytidine deaminases genes in primates. Authors find A3 retrocopies in several lineages in primates using Blast searches. Some are old and some are species specific. Some have disablements and some have intact ORFs. Authors study their mode of evolution, expression and functionality. Authors have performed detailed analyses including functional analyses. Some A3 retrocopies are broadly expressed and some have retained ability to restrain retroelements. I agree with the authors that their data supports that retrocopying has contributed the turnover in the repertoire of host retroelement restriction factors. Authors show that some retrocopies have remained active for long periods of time and they still show that they can restrict retroelements/retrovirus. This work provides an interesting example of immune system diversification. This study of the A3 family of proteins that are part of the vertebrate innate immune system and the data supporting turnover of these kind of immune system genes is strong. The work underscores that this is a way immunity genes evolve and it has parallels in the evolution of the TRIM gene family of immune genes. I just have a few comments. I think the work can gain from analyzing some aspects of the data in more detail and presenting the big picture in a summary table, even if it is just supplementary.

      **Major comments:**

      A3I is in many species. Does this mean it was preserved (i.e., functional for a while)? For how long have disabling mutations been accumulating? Can we get a sense of that? Even for other retrocopies, do we have a sense of how recent has the pseudogenization been? If it is very recent that means that the gene was active until not long ago.

      Our analyses suggest that A3I was born in the common ancestor of simian primates and pseudogenized before the Catarrhini/Platyrrhini split. It is possible that A3I was functional within this extended period (~12-15 million years), but the presence of a shared truncating stop codon amongst all simian A3Is suggests the gene was no longer full-length at the time of diversification of the simians. Instead, the simian LCA likely encoded an A3I with a predicted ORF of 261 codons; if this truncated ORF were functional, it was then further truncated/pseudogenized with additional frame-breaking mutations which follow the phylogeny of primates.

      We estimated the timeline of pseudogenization of each retrocopy using the species distribution of each syntenic retrocopy. We also note that we find full-length ORFs in three retrocopies which have been retained for a period of time at least as long as the age of the last common ancestor of the four New World monkeys. These old but intact retrocopies motivated our simulations of ORF retention rates (Figure 5).

      In the PAML analyses test could be performed to test if the rate of evolution that are higher or lower than 1 for particular genes are actually significantly higher or lower than 1 for the particular gene comparing the likelihoods of the modes with the given rate with the one with the rate fixed to 1. Is there enough power to do this?

      We thank the reviewer for pointing out this omission in our analysis. We did perform these tests and find a significant p-value for two of the nodes p=0.058 and p=0.025 respectively). We have updated the legend for figure S4 to incorporate these p-values

      Page 9. It seems to me that the synteny data Figure S2 reveals they are derived from independent retroposition events and not duplications of segments because those would include flanking genes. Is this correct? Authors could comment on that.

      Yes, we think that each retrocopy we show in Figure S2 is likely created via an independent retrotransposition event. We have clarified in the text that Figure S2 shows the genes used to establish synteny to support orthology of the retrocopies shared amongst multiple species and that each of these ortholog groups presumably originated via distinct retrotransposition events.

      In figure S4, I am not sure why orthologous genes are not grouped together in the phylogeny and why p is smaller than 0.05. How should that figure and the probability be interpreted?

      We thank the reviewer for their comments on this figure. First, the reviewer identified an error in the tree in which the branch labels for ‘night monkey-C2’ and ‘night monkey-SS1’ were inadvertently switched. The corrected tree now follows the pattern expected by the reviewer. Second, we employed RELAX to “determine whether selective strength was relaxed or intensified in one of these subsets relative to the other” (Wertheim, et al. MBE 2014). In this case, the p-value corresponds to the finding that the retrocopies (test branches) show intensification of selection relative to the intron-containing A3Gs (reference branches).

      We have modified Figure S4 and the associated text to more clearly explain the specific hypothesis test we report.

      It would be good to have a summary table that summarizes what genes have support for past or current functionality (preservation for long time or recent pseudogenization, expression, purifying or positive selection, ability to restrict retroelements) and in what lineages.

      We agree with this reviewer suggestion. We have added the additional information including the number of frame disrupting mutations as a measure of age, intactness, and ability to restrict retroelements to Table S1. Thanks to this suggestion, Table S1 now serves as the master table to summarize the analyses of each retrocopy.

      **Minor comments:**

      1. Page 3. Authors say "...the exons and UTRs..." but UTRs are part of exons. Authors could talk about exons only that include protein-coding regions and UTRs.

      Changed the text to "exons".

      Page 7. I would say disabled instead of "... becoming degraded by mutation."

      Fixed according to the reviewer's suggestion.

      I would say neutral evolution not neutral selection.

      Fixed according to the reviewer's suggestion.

      Reviewer #2 (Significance (Required)):

      This work provides an interesting example of immune system diversification. Authors study the APOBEC3 family of proteins that is part of the vertebrate innate immune system and the data supporting turnover of these kind of immune system genes. The work underscores that this is a way immunity genes evolve and it has parallels in the evolution of the TRIM gene family of immune genes revealing patterns in the mode of evolution of immunity genes. The audience of this work will be people interested in evolution of immunity, arms races and gene diversification and all evolutionary biologists interested in adaptation. I work in the field of comparative genomics and molecular evolution.

      Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      **Summary:**

      This manuscript by Yang et al. is an well-written, intriguing paper highlighting the evolutionary significance of the gene creation via "retrocopying". The authors investigated the expansion of antiviral A3 genes via retrocopy in Primates, and found that A3G-like retrocopies have been generated repeatedly during primate evolution. A part of A3 retrocopies found in New World monkeys retained full length open reading flames and anti-lentiviral capacities. Interestingly, the spectrum of anti-retroelement activity of A3 retrocopies was different from the original (i.e., intron-containing) A3G gene in these species, suggesting the occurrence of the functional differentiation followed by gene amplification. However, one of the main findings that many A3 retrocopies are present in New World monkey is in-line to a previous report (i.e., Ito et al., 2020, PNAS), and the experimental validations were based on the human (not New World monkey's) retroelements. Nevertheless, this study deeply investigated the possible importance of A3 retrocopies for the host defense system evolution both by in silico analyses and cell culture experiments. This study provides the findings that can potentially expand our knowledge on the evolutionary arms races between retroelements and the hosts.

      **Major:**

      To strengthen the impact of this work, it would be better to increase the numbers of retroviruses in which the anti-retroviral capacities are investigated. I understand that it is difficult to examine retroviruses or L1s that are colonized naturally with New World monkeys, but I suppose it is not so difficult to investigate a variety of representative retroviruses such as murine leukemia virus (MLV) or the reconstructed human endogenous retrovirus K (HERV-Kcon). This additional experiment would be helpful to highlight that the spectrum of anti-retroviral activity of A3 retrocopies is divergent from the original A3G gene in these species and strengthen the concept to be proposed by this study.

      The reviewer raises a fascinating question about whether retrocopies might have different restriction abilities relative to the other A3s in a given species. First, we feel that showing activity against one pathogen is sufficient for our claim that some of the A3 retrocopies have antiviral potential. Second, we discuss in the paper the idea that HIV-1 is not the actual target of these (or any) innate immune genes in New world primates. We argue that any other targets we might test would also be surrogates for the ‘true’ target of these genes.

      **Specific:**

      1, Since the authors found the expansion of "functional" repertoire of A3 retrocopies specifically in New World monkey, it would be better to rephrase the title as "Retrocopying expands the functional repertoire of APOBEC3 antiviral proteins in New World monkeys".

      We thank the reviewer for this comment but point out that a large portion of our manuscript presents our work on primates outside the New World monkeys. The reviewer is correct to note that our finding of restriction activity is limited to New World monkey retrocopies, but we feel that the current title will attract a broader audience and reflects the broader relevance of this work.

      2, It might be better to add a figure summarizing which A3 retrocopies in which species retain nearly full length ORFs. For example, how about making a figure like Fig. 2A for all the four representative New World monkey species?

      We agree. We have added the length of the longest ORF for each retrocopy to Table S1.

      3, Fig. 3

      It would be helpful to clarify that which cell of the heatmap corresponds to the intact A3 retrocopies.

      We have added labels to indicate the intact A3 retrocopies and adjusted the legend accordingly.

      4, Page 4, line 5

      It would be better to replace the word "protected" with "escaped" because this retrocopy subset should include the ones that are intact but not functional.

      Changed as suggested.

      5, Page 4, line 25

      It would be better to rephrase "the common ancestor of mammals" as "the common ancestor of placental mammals" because A3 gene is absent in Marsupial.

      Changed as suggested.

      6, Page 5, line 5

      Please rephrase "ongoing" as "recently-occurred".

      Changed as suggested.

      7, Page 6, line 19

      I checked the multiple sequence alignment in File S1 and suspect that the codon (alignment) position of the shared premature stop codon is 261 (not 264).

      We thank the reviewer for pointing out this discrepancy. We have revised the text to reflect the correct position of the shared stop.

      8, Page 6, line 23

      I could not understand the meaning of the sentence "Intriguingly, one lineage-specific mutation...".

      Please specify the position of mutation which the authors mentioned (in File S1 or Fig. 1B).

      This portion of the text refers to a reversion of a stop codon in the orangutan A3I; specifically, the stop codon shared in all simians acquired a second mutation that created a longer ORF in only this species. We have removed this sentence from the text for the sake of clarity.

      9, Page 12, line 8

      Please refer Fig. S4 here.

      Changed as suggested.

      10, Page 12, line 8

      Please say "Significant relaxed selection was not detected" rather than "Our analysis detected no relaxation...".

      Changed as suggested.

      11, Page 12, line 8

      Fig. S4 indicates "p=0.015", but the authors regard it as "not significant"?

      We thank the reviewer for pointing out this confusing wording. We employ RELAX to “determine whether selective strength was relaxed or intensified in one of these subsets relative to the other” (Wertheim, et al. MBE 2014). In this case, the p-value corresponds to the finding that the retrocopies show intensification of selection.

      We have modified Figure S4 to more clearly explain the specific hypothesis test for this p-value. We have also modified the text to clarify this point.

      12, Page 12, line 9

      Please here refer the data showing the claim "Instead, these A3G retrocopies have evolved more rapidly than...".

      Changed as suggested; see previous point.

      13, Page 12, line 11

      Did the authors perform the statistical test on the dN/dS ratio analysis? If so, please mention the result of the test.

      Yes we did. Please refer to Reviewer 2’s ‘Major Point 3’.

      14, Page 12, line 15

      It would be better to modify the phrase "show evidence of recurrent selection for functional innovation"

      Changed as suggested.

      Reviewer #3 (Significance (Required)):

      This study provides a conceptual advance that the antiviral gene expansion has achieved not only via tandem gene duplication but also via gene retrocopying.

      Compare to existing published knowledge.

      Although one of the main findings that many A3 retrocopies are present in New World monkey is in-line to a previous report (i.e., Ito et al., 2020, PNAS), this study investigated the above finding more deeply both by in silico analyses and cell culture experiments.

      Audience.

      Evolutionary biologists and researchers in the field of viruses (particularly retroviruses including HIV-1) and transposable elements would be interested in this work.

      Your expertise.

      Bioinformatics, genome biology, viruses, and transposable elements

    1. Technological literacy is when you are completely competent with the use of technology and are open to learning new things about newer devices. There are three aspects to technological literacy which are capabilities, knowledge, and critical thinking. I would say capabilities and knowledge are the most prevalent and the ones outmost known. Some people would know all the features within their device or piece of technology and utilize all of it. I know my friend’s mom who always gets the latest IPhones and hasn’t used Google maps at all. The next important thing is knowledge which can be mentioned as an another word is basically knowing what technology to use at which moments. Sometimes your laptop may be better to type and print things. While purchasing a laptop knowing more about the specifications allows you to know what exactly you are buying. After this course ends, I would say I would focus on learning more and just getting the mere exposure of new technology would be a good start.

      I think the thing that struck me the most in this class would probably be the amount of readings and the wide array of readings we were exposed to. I am lucky to have chosen this class this semester my final semester at the U. I believe as young millennials we do inherently follow some of the principles that were taught in this class. In the future though I will be more open minded about technology and have learned about how technology literacies can change throughout other peoples lives.

    1. Josh Rushton writes: I’ve been following your blog for a while and checked in today to see if there was a thread on last week’s big-splash Stanford antibody study (the one with the shocking headline that they got 50 positive results in a “random” sample of 3330 antibody tests, suggesting that nearly 2% of the population has been infected “under the radar”). I didn’t see anything, so I thought I’d ask if you’d consider opening a discussion. This paper is certainly relevant to the MrP thread on politicization of the covid response, in that the paper risks injecting misinformation into an already-broken policy discussion. But I think it would be better to use it as a case study on poor statistics and questionable study design. I don’t mean to sound harsh, but if scientists are afraid to “police” ourselves, I don’t know how we can ask the public to trust us. Simply put, I see two potentially fatal flaws with the study (full disclosure: I [Rushton] haven’t read the entire paper — a thousand apologies if I’m jumping the gun — but it’s hard to imagine these getting explained away in the fine print): The authors’ confidence intervals cannot possibly be accounting for false positives correctly (I think they use the term “specificity” to mean “low rate of false-positives). I say this because the test validation included a total of 30+371 pre-covid blood tests, and only 399 of them came back negative. I know that low-incidence binomial CIs can be tricky, and I don’t know the standard practice these days, but the exact binomial 95% CI for the false-positive rate is (0.0006, 0.0179); this is pretty consistent to the authors’ specificity CI (98.3%, 99.9%). For rates near the high end of this CI, you’d get 50 or more false positives in 3330 tests with about 90% probability. Hard to sort through this with strict frequentist logic (obviously a Bayesian could make short work of it), but the common-sense take-away is clear: It’s perfectly plausible (in the 95% CI sense) that the shocking prevalence rates published in the study are mostly, or even entirely, due to false positives. So the fact that their prevalence CIs don’t go anywhere near zero simply can’t be right. Recruitment was done via facebook ads with basic demographic targeting. Since we’re looking for a feature that affects something like 2% of the population (or much, much less), we really have to worry about self selection. They may have discussed this in the portions of the paper I didn’t read, but I can’t imagine how researchers would defeat the desire to get a test if you had reason to believe that you, or someone near you, had the virus (and wouldn’t some people hide those reasons to avoid being disqualified from getting the test?)…
    1. According to Global News, Canada may have a cure but we do not know that for sure or if they do if they will share it.

      Frankly, I don't think this is accurate as is a misreading of the piece. There is no cure, but we can be sure that if any one is discovered by most any country, it would be widely known and reported on. Anything reported now as a 'cure' is undoubtedly unproven and anecdotal.

    1. The ability to see oneself in the monument would lead us to consider the piece as a living/breathing monument that is not static or staid, but as one that reflects today’s America and our current political and social moment. Monuments are established with the assumption that we as a nation have collectively decided that something should be remembered, honored, and celebrated.

      Karyn Oliver confirms the idea that a monument can reflect the viewer's beliefs and values. I think she is challenging the idea of collective memory here by saying "monuments are established wth the assumption that we as a nation have collectively decided..." She thinks that not all people have equal power to shape societal narratives, so the monuments are often one sided and not as "collective" as they may seem.

    1. At a time when we are all thinking about how best to respond to the present global crisis, it seems timely to think also about how we, as the Cognitive Science community, can be most effective. What kind of science can we do, and how should we go about doing it? This blog post is an attempt to help fuel discussion on these issues in order to formulate the best community response. It offers a starting point for thinking about cognitive science and coronavirus.  Though thoughts first turn to medicine, virologists, and epidemologists, the CogSci community has many potential contributions to make. Research areas that are established cognitive science topics, ranging from e-learning, e-delivery, media literacy, through risk analysis, risk perception, decision-making, behaviour change, argumentation, or communication are suddenly in high demand. But as cognitive scientists, we also possess key skills: the ability to interface with AI, handle ‘big data’, engage in computational social science, and maybe first and foremost, modelling skills and an ability for model thinking. And, finally, the sheer disciplinary breadth of Cognitive Science, from computer science, through to anthropology and philosophy, can offer much needed, complementary, perspectives and views. While cognitive scientists around the world consider how their own research skills and ideas may usefully be applied, we should also spend some time rethinking and looking to adjust, how we go about doing science. 
    1. There is a paradox in our desire to be seen as virtuous. If we do not overtly display our virtues, others will not be able to see them; yet, if we do overtly display our virtues, others may think that we do so only for social credit. Here, we investigate how virtue signaling works across two distinct virtues—generosity and impartiality—in eleven online experiments (total N=4,586). We demonstrate the novel phenomenon of differential virtue discounting, revealing that participants perceive actors who demonstrate virtue in public to be less virtuous than actors who demonstrate virtue in private, and, critically, that this effect is greater for generosity than impartiality. Further, we provide evidence for the mechanism underlying these judgments, showing that they are mediated by perceived selfish motivations. We discuss how these findings and our novel terminology can shed light on open questions in the social perception of reputation and motivation.
    1. It was not too long ago, that we were living in a place that everyone could call heaven. Everyone took advantage, not realizing how great it was to live back then. Nearly everyone would complain about how life may had sucked then, all because they were bored that day. Everyone could remember those days like it could have been yesterday. Jessica was still a young teenager back then, young, and happy. Her best friend was named Stephanie. She could remember when they would just spend the whole day talking about what boy was cute, what clothes we liked, what our favorite music was, and other things that just made us happy. Everything was so innocent and happy back then. No one had to even think about tomorrow, because they knew that tomorrow would be another day they would live in peace. Everyone knew that they were in great hands since they had the resources to support themselves and their families to encourage everyone to keep going. Everyone thought that this was ironic thinking about this now. People lived in a life that they could possibly even call heaven on earth.

      Again, the intro is highly disconnected from the rest of your story. A good introduction should not only introduce us to who the main characters are, it should also demonstrate what the theme of your story is going to be. As it is, the characters Jessica and Stephanie do not appear anywhere again, while the main characters Akilles and Mike appear far later on.

    1. We are talking about Whiting Petroleum, and Brad serves as both its Chairman of the Board and Chief Executive Officer. On March 26, 2020, that board paid him and his fellow executives $14.6 million in bonuses. Holley himself pocketed $6.4 million. Six days later, that same board sent Whiting Petroleum into Chapter 11 bankruptcy with a proposal that would wipe out 97% of the equity in the company. According to the Board of Directors of the Whiting Petroleum Company, these bonuses were “intended to ensure the stability and continuity of the company’s workforce and eliminate any potential misalignment of interests that would likely arise if existing performance metrics were retained.” If you are a layperson, this explanation may sound to you like a very large crude carrier full of horseshit. I understand why you might think that. But let me assure you as a non-layperson that this explanation is an ultra large crude carrier full of horseshit.

      Disgusting

    1. The importance of self-compassion in tempering the brittleness of self-efficacy

      The main reason is that most people’s risk tolerance is very low, because self-efficacy (defined as “a person’s conviction or confidence about his or her abilities to mobilize the motivation, cognitive resources or courses of action needed to successfully execute a specific task within a given context”) is remarkably fragile. When it comes to trying and learning new things, people have difficulty transferring success in one arena to even highly related ones. Even small failures lead to learned helplessness so quickly, we learn to protect against that eventuality by not trying new things unless success is guaranteed.

      The primary risk of entrepreneurship and other free agent lifestyles is not financial or even social — it is the risk to a person’s very self-concept as someone who does what they set out to do.

      What we need if we want to change behavior at this fundamental level is to replace predictive models of behavior change—do this and you’ll get that —with exploratory models.

      Stories may actually be a more accurate way of describing how people think about and use mental models of behavior change. Stories, like emergent systems, only move in one direction. They cannot be rolled back and played again. This irreproducibility suggests the importance of another form of psychological capital that is also highly correlated with successful behavior change: self-compassion. They are two sides to the same coin — you need self-efficacy to believe you can do it, but you equally need self-compassion to be ok when you don’t. Self-compassion aids change by removing the veil of shame and pain that keeps you from examining the causes of your mistakes (and often, leads you to indulge in the very same bad habit as a way of forgetting the pain). Self-forgiveness is the first step in fostering an invitational attitude that is open to feedback and learning, from yourself and others.

      There is something about the turning of this coin — between efficacy and compassion — that I believe lies at the heart of the experimentation framework I’m envisioning. And the more I think about it, the more I suspect compassion is the far more radical and important side.

    1. Taken from a graduation address delivered at West Point, which is just so good and worth quoting many sections of at length

      That’s really the great mystery about bureaucracies. Why is it so often that the best people are stuck in the middle and the people who are running things—the leaders—are the mediocrities? Because excellence isn’t usually what gets you up the greasy pole. What gets you up is a talent for maneuvering. Kissing up to the people above you, kicking down to the people below you. Pleasing your teachers, pleasing your superiors, picking a powerful mentor and riding his coattails until it’s time to stab him in the back. Jumping through hoops. Getting along by going along. Being whatever other people want you to be, so that it finally comes to seem that, like the manager of the Central Station, you have nothing inside you at all. Not taking stupid risks like trying to change how things are done or question why they’re done. Just keeping the routine going.

      We have a crisis of leadership in America because our overwhelming power and wealth, earned under earlier generations of leaders, made us complacent, and for too long we have been training leaders who only know how to keep the routine going. Who can answer questions, but don’t know how to ask them. Who can fulfill goals, but don’t know how to set them. Who think about how to get things done, but not whether they’re worth doing in the first place. What we have now are the greatest technocrats the world has ever seen, people who have been trained to be incredibly good at one specific thing, but who have no interest in anything beyond their area of exper­tise. What we don’t have are leaders.

      What we don’t have, in other words, are thinkers. People who can think for themselves. People who can formulate a new direction: for the country, for a corporation or a college, for the Army—a new way of doing things, a new way of looking at things. People, in other words, with vision.

      That’s the first half of the lecture: the idea that true leadership means being able to think for yourself and act on your convictions. But how do you learn to do that? How do you learn to think? Let’s start with how you don’t learn to think. A study by a team of researchers at Stanford came out a couple of months ago. The investigators wanted to figure out how today’s college students were able to multitask so much more effectively than adults. How do they manage to do it, the researchers asked? The answer, they discovered—and this is by no means what they expected—is that they don’t. The enhanced cognitive abilities the investigators expected to find, the mental faculties that enable people to multitask effectively, were simply not there. In other words, people do not multitask effectively. And here’s the really surprising finding: the more people multitask, the worse they are, not just at other mental abilities, but at multitasking itself.

      One thing that made the study different from others is that the researchers didn’t test people’s cognitive functions while they were multitasking. They separated the subject group into high multitaskers and low multitaskers and used a different set of tests to measure the kinds of cognitive abilities involved in multitasking. They found that in every case the high multitaskers scored worse. They were worse at distinguishing between relevant and irrelevant information and ignoring the latter. In other words, they were more distractible. They were worse at what you might call “mental filing”: keeping information in the right conceptual boxes and being able to retrieve it quickly. In other words, their minds were more disorganized. And they were even worse at the very thing that defines multitasking itself: switching between tasks.

      Concentrating, focusing. You can just as easily consider this lecture to be about concentration as about solitude. Think about what the word means. It means gathering yourself together into a single point rather than letting yourself be dispersed everywhere into a cloud of electronic and social input. It seems to me that Facebook and Twitter and YouTube—and just so you don’t think this is a generational thing, TV and radio and magazines and even newspapers, too—are all ultimately just an elaborate excuse to run away from yourself. To avoid the difficult and troubling questions that being human throws in your way. Am I doing the right thing with my life? Do I believe the things I was taught as a child? What do the words I live by—words like duty, honor, and country—really mean? Am I happy?

      So it’s perfectly natural to have doubts, or questions, or even just difficulties. The question is, what do you do with them? Do you suppress them, do you distract yourself from them, do you pretend they don’t exist? Or do you confront them directly, honestly, courageously? If you decide to do so, you will find that the answers to these dilemmas are not to be found on Twitter or Comedy Central or even in The New York Times. They can only be found within—without distractions, without peer pressure, in solitude.

      “Your own reality—for yourself, not for others.” Thinking for yourself means finding yourself, finding your own reality. Here’s the other problem with Facebook and Twitter and even The New York Times. When you expose yourself to those things, especially in the constant way that people do now—older people as well as younger people—you are continuously bombarding yourself with a stream of other people’s thoughts. You are marinating yourself in the conventional wisdom. In other people’s reality: for others, not for yourself. You are creating a cacophony in which it is impossible to hear your own voice, whether it’s yourself you’re thinking about or anything else. That’s what Emerson meant when he said that “he who should inspire and lead his race must be defended from travelling with the souls of other men, from living, breathing, reading, and writing in the daily, time-worn yoke of their opinions.” Notice that he uses the word lead. Leadership means finding a new direction, not simply putting yourself at the front of the herd that’s heading toward the cliff.

      So solitude can mean introspection, it can mean the concentration of focused work, and it can mean sustained reading. All of these help you to know yourself better. But there’s one more thing I’m going to include as a form of solitude, and it will seem counterintuitive: friendship. Of course friendship is the opposite of solitude; it means being with other people. But I’m talking about one kind of friendship in particular, the deep friendship of intimate conversation. Long, uninterrupted talk with one other person. Not Skyping with three people and texting with two others at the same time while you hang out in a friend’s room listening to music and studying. That’s what Emerson meant when he said that “the soul environs itself with friends, that it may enter into a grander self-acquaintance or solitude.”

      Introspection means talking to yourself, and one of the best ways of talking to yourself is by talking to another person. One other person you can trust, one other person to whom you can unfold your soul. One other person you feel safe enough with to allow you to acknowledge things—to acknowledge things to yourself—that you otherwise can’t. Doubts you aren’t supposed to have, questions you aren’t supposed to ask. Feelings or opinions that would get you laughed at by the group or reprimanded by the authorities.

      This is what we call thinking out loud, discovering what you believe in the course of articulating it. But it takes just as much time and just as much patience as solitude in the strict sense. And our new electronic world has disrupted it just as violently. Instead of having one or two true friends that we can sit and talk to for three hours at a time, we have 968 “friends” that we never actually talk to; instead we just bounce one-line messages off them a hundred times a day. This is not friendship, this is distraction.

    1. Casca Indeed he is not fit. Decius Brutus Shall no man else be touched but only Caesar? Cassius CassiusThen leave him out.CascaIndeed, he's not a good fit.Decius BrutusAre we just going after Caesar?CassiusGood question Decius. I don't think it's a good idea for Mark Antony, who is so beloved by Caesar, should be left alive. You'll find him a cunning strategist, and if he builds up his power, it may grow so much as to harm all of us. To prevent this, let's kill Caesar and Antony together.Decius, well urged.  I think it is not meet, Mark Antony, so well beloved of Caesar, Should outlive Caesar.  We shall find of him A shrewd contriver; and, you know, his means, If he improve them, may well stretch so far As to annoy us all; which to prevent, Let Antony and Caesar fall together.

      When I was reading this I was using the word bubble whenever I needed it. This was one of the moments that I used it to help me understand what this was saying and that it was telling me that Cassius , Casca, and Brutus were going after Caesar and to also kill Antony when they killed Caesar.

    2. Then, lest he may, prevent. And since the quarrel Will bear no color for the thing he is, Fashion it thus: that what he is, augmented, Would run to these and these extremities; And therefore think him as a serpent's egg — (Brutus)Then, in case he is, we should prevent his ascent. Since this accusation would not be supported by how he is now, the argument against him should be fashioned in this way: given what he is now, with the addition of the power of a crown, will lead to excessive behavior. Therefore, think of him as a snake's egg, which, while not dangerous as it is, will inevitably become deadly as all snakes are. So it would be better to kill him in the shell.[Re-enter Lucius]LuciusThe candle's been lit in your study, sir. While I was looking on the windowsill for a piece of flint, I found this paper sealed up like this, and I'm positive it wasn't there when I went to bed.[Gives him the letter]Which, hatched, would, as his kind, grow mischievous — And kill him in the shell.

      i understand now that they think that Julius Caesar will turn on them all, and be like a snake, which as an egg is harmless, but it can be harmful once it gets out of its shell.

    3. Decius, well urged.  I think it is not meet, Mark Antony, so well beloved of Caesar, Should outlive Caesar.  We shall find of him A shrewd contriver; and, you know, his means, If he improve them, may well stretch so far As to annoy us all; which to prevent, Let Antony and Caesar fall together.

      The word bubble on the left helped me understand this a whole lot more. When I first read it, it seemed that they really liked Antony and were going to try to get him on board with the plan but if he disagreed they'd kill him. When reading the further in context, they more feared him and were worried that if he were alive he'd know about the plan to kill caesar so if they were to kill caesar they have to kill Mark Antony too.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1:

      **Summary**

      Jang et al., address the important question of spatially localized or compartmentalized metabolic enzymes with a focus on the glycolytic enzyme PFK1. Using a good strategy of inserting a fluorescent tag at the endogenous PFK1 locus with tissue-specific inducible expression in C. elegans, combined with strong quantitative longitudinal imaging and innovative bioengineered microfluidic-hydrogels to control oxygen availability as well as optogenetic approaches, they show PFK1 condensates, which are not stress granules and not seen in normoxia, assemble with hypoxia. PFK1 condensates are dynamic, reversible, localized at the synapse in neurons, and recruit aldolase, another glycolytic enzyme. Although glycolytic proteins were previously shown to compartmentalize near the plasma membrane, and PFK1 was previously shown to assemble into filaments in vitro and be punctate at the plasma membrane in mammalian cells, evidence for cellular localized PFK1 condensates in animals is highly significant. The work includes strong biophysical characterization of PFK1 phase-separated condensates, but no clear indication of the composition of condensates. More significantly, the findings lack functional significance related to PFK1 activity or glycolytic flux with hypoxia vs normoxia. Despite previous work by this group showing that disrupting subcellular localization of glycolytic enzymes impairs neuronal activity in response with hypoxia, the reader is left with questions on the importance of localized and PFK1 condensates and their make-up .

      **Major comments:**

      Key conclusions are convincing, and most experimental approaches, biophysical characterization including thermodynamic principles, and data analysis are exemplary and well described. However, as indicated above, the work is limited to a descriptive analysis of cellular localization of PFK1 condensates and their biophysical properties without insights on functional significance relative to enzyme activity - or at least glycolytic flux or metabolic reprogramming with hypoxia. At best, only correlations can be drawn from hypoxia-induced localized PFK1 condensates and the authors' previous report (Jang et al., 2016) on hypoxia-regulated neuronal activity. Some insight or at least prediction in the discussion on the differences in spatially localized PFK1 in muscle vs neurons with regard to metabolic or energy distinctions should be included.

      We have added additional discussions on the differences of the spatially localized PFK-1.1 in muscles versus neurons, explaining that in both tissues the cellular enrichment appears to be at sites predicted to have high ATP consumption (lines 128-133; 482-484).

      Despite the strong biophysical analysis of condensates, several important features are not determined. First is at best a rudimentary analysis of the composition of condensates and also how PFK1 is assembled into these structures. For the former, is the core of the condensate predominantly PFK1 with perhaps aldolase only recruited to the periphery or is aldolase an integral component of the structure. Hence, is it a PFK1 condensate or a glycolytic condensate? For the latter question, is there a particular orientation for PFK1 in condensates, i.e a collection of filaments as previously reported, which might provide insight on assembly? Finally, and less critical but also important is the criterion for spherical, which is not well defined, and at least some idea or speculation on determinants for a spherical morphology - compared with filaments that have been reported for other non-glycolytic metabolic enzymes.

      We have now co-expressed PFK-1.1 and ALDO-1 and examined their dynamic formation during hypoxic conditions. We observe PFK-1.1 and ALDO-1 form condensates simultaneously, with gradual enrichment of both molecules. We now include this new data in Figure 7E and Video 8; lines 422-441, 964-989). We also include genetic data demonstrating the ALDO-1 requires pfk-1.1 to form condensates, and that PFK-1.1 requires aldo-1 as well. Therefore, the enzymes are interdependent on each other to form condensates (Figures 7G, 7H, S7B, and S7C).

      The spheroid geometry reflects liquid-like properties, which arises from surface tension of molecules loosely held together via multi-valent interactions. Filamentous arrangements reflect crystalline-like structures resulting from more stable interactions between molecules into solid-like states. While we did not perform high resolution studies, like Cryo-EM, to resolve this question, the spheroid geometry of PFK-1.1 condensates, along with its fluid-like properties, suggest the condensates are liquid-like compartment distinct to filamentous structures. We now add this discussion in lines 467-470.

      The work is an important advance in our understanding on the self-assembly of metabolic enzymes by showing hypoxia-induced PFK1 condensates in vivo, their spatially-restricted subcellular localization in muscle cells and neurons, and their biophysical properties, the latter being distinct from those of stress granules. Taken together, these findings are more extensive than many previous reports on the assembly of metabolic enzymes into filaments or condensates, but fall short for new insights on functional significance.

      We focus this study on the biophysical characterization of the condensates, and how that results in compartmentalized enrichment of glycolytic proteins. Examination of the functional significance of the phase separation to the enzymatic reactions in vivo is not currently possible because we lack probes we can use in vivo to measure the metabolites resulting from the reaction. We have now added discussion acknowledging this and framing its significance in the context of what has been published in the field (lines 484-492). For example, a recent manuscript in ChemRxiv demonstrated, in vitro, that the enzymatic activity of glycolytic proteins, hexokinase and glucose-6 phosphate dehydrogenase, promote these enzymes condensing into liquid droplets. The authors further found that the condensation accelerated the glycolytic reactions (Ura et al., 2020). This raises the question whether glycolytic proteins compartmentalize, and form condensates, in vivo, which we address in this manuscript. We capture this point in (lines 444-464) where we explain that, while it has long been hypothesized that glycolytic proteins like PFK-1 could be compartmentalized, this remained controversial due to lack of dynamic in vivo imaging. In our study, and through a systematic examination of endogenous PFK-1.1 via the use of a hybrid microfluidic-hydrogel device, we conclusively determine that PFK-1.1 indeed displays distinct patterns of subcellular localization in specific tissues in vivo.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      This paper reports on the condensation of the glycolytic enzyme PFK-1 in response to hypoxic conditions in neurons of C. elegans. The authors employ a microfluidic-hydrogel device to dynamically monitor the relocalisation of PFK-1 from a mostly diffuse state to clusters in response to hypoxia and show that PFK-1 can undergo multiple rounds of PFK-1 clustering and dissolution. The authors work through the key features of a liquid-like compartment (sphericity, fusion, fast internal rearrangements) and give evidence that PFK-1 may have all three. Finally, the authors tag PFK-1 with the light-inducible multimerization domain Cry2 and find that even without light PFK-1 will constitutively form clusters that sequestrate endogenous PFK-1 as well as other glycolytic proteins. The strength of this work is that it is characterizing what appears to likely be phase separation in the context of a whole animal experiencing a stress that it could encounter in the natural world. A limitation of the work is that it is unclear what the functional implications are of condensates of PFK-1 at the molecular or cell scale.

      **Major comments:**

      -All experiments were performed using fluorescently tagged PFK-1 expressed from endogenous promoter or from the native genetic locus which is important for excluding overexpression artifacts. However, there is still risk that the GFP tag is driving the assembly process. In order to exclude tag-specific effects that may cause aggregation of the tetrameric PFK-1, ideally a control would be done in which PFK-1 is visualized through immunofluorescence experiments of WT cells. Alternatively, a short tag (e.g HA, His) as epitope for is an alternative .

      We used fluorescent tags to observe the dynamic relocalization in vivo. While in the study we have not performed immunofluorescence, we established the validity of the labeling method by: 1) using monomeric versions of GFP; 2) using different fluorophores to show the same condensation phenomenon; 3) performing CRISPR for single copy insertions; 4) Demonstrating that different glycolytic proteins form condensates; 5) demonstrating the GFP-tagged versions of the protein are capable of rescuing the loss-of-function alleles and 6) Now adding new data demonstrating the observed localization specifically depend on the presence of other glycolytic proteins. This last result supports that GFP tag is not driving the assembly process of glycolytic condensate and that the glycolytic condensate formation requires the presence of specific molecules in the pathway. I add that we routinely use fluorophore markers to over a dozen distinct proteins that label subcellular compartments, and we have never observed the dynamic relocalization reported here, with the exception of other glycolytic proteins that interact with PFK, suggesting this is a property specific to glycolytic proteins, and, based on the genetic studies, dependent on the glycolytic reaction. We add and discuss these findings in Figures 7G, 7H, S7B, and S7C; lines 422-441, 964-989.

      -For the Cry2-section, the complementation of the pfk-1 mutant supports functionality of the synaptic clustering phenotype. Are there other features of function that can be evaluated or could you look at how Cry-2 vs wt worms recover from different durations of stress or frequencies. Could you see if the Cry-2-fusion will rescue function to a partial-loss-of-function allele or a tetramerization deficient allele? A detailed analysis of the effects of constitutive presence of PFK-1-Cry2 clusters would be necessary to bolster claims that this is fully functional construct. Can enzyme activity be somehow monitored?

      We did not observe any difference between wild-type worms and CRY2-expressing worms with regards to their development, survival, locomotive behavior or synaptic phenotype. While we can not discard the possibility that this is not a full rescue, with available tools, we can not distinguish the recue with PFK-1-Cry2 from that of just PFK-1.

      -The analysis of the sphericity of clusters (4A) is limited due to the diffraction limit of light which limits an analysis of a compartment of this size. While this is a limitation of the live organism, this should be more clearly acknowledged.

      We have included in the Methods section our criteria for quantifying condensates and avoiding diffraction limit artifacts. Briefly, “Considering the resolution limit of a spinning disc confocal (approximately 300nm), any structure with a diameter less than 500nm and an area smaller than 0.2 µm2 was excluded from the analyses”. To better clarify this point, we also now add a description of the criteria used in the main text (lines 242-243).

      In addition, we observed that PFK-1.1 condensates are not perfect spheres, but constrained spheroids (which can not be explained by diffraction-limited point spread functions). We can explain the observed spheroid shapes based on liquid-like properties of the condensates, and the constrains of the diameter of the neurite. To better highlight this finding, we have now moved Figure S4E into the main figure (Figure 4B’).

      -Fusion experiments (4C) do not fully exclude that clusters overlap instead of merging. It would be beneficial to show the foci for several subsequent frames. One would expect that upon fusion, the condensate size would increase, but video 3 suggests the opposite. It would be useful to quantify condensate size before and after fusion for several separate fusion events. -an alternative possible experiment would be the tagging of PFK-1 with a photoconvertible fluorophore (e.g. Dendra2) and subsequent analysis of fusion events

      To better show the fusion events in Figure 4C, we now include all xy, yz, and zx plane views of before and after fusion events of Figure 4C (Figure S5B). We also added a quantification of four independent fusion events in which we compare the sum of the areas of the two puncta before fusion and the size of the area of the single punctum after fusion (Figure S5C). These data support that we are observing fusions events.

      -4D). It is unclear if foci are indeed undergoing fission or if two clusters next to each other are moving apart.

      For Figure 4D, in all the frames we had recorded, a single structure maintains a continuous signal until fission occurs and splits into two structures. To better present this event, we now include an unabridged version of figure of 4D in the supplement that shows all the frames captured (Figure S5D).

      -The analysis of side-by-side growth and dissolution kinetics are interesting and a novel view into the non-equilibrium aspects of phase separation in cells.

      -Purification of PFK-1 and in vitro reconstitution of condensates would be supportive of liquid-like characteristics although I don't think it is necessary however it would add a lot to the relevance to show enzyme activity is different +/- condensate state but I am not sure if an easy enzymatic assay exists in vitro.

      We agree. But the significance of this particular paper, specifically in the context of the in vitro enzymatic work on glycolytic proteins, is to examine the dynamic in vivo localization and the biophysical characteristics of the condensates. To better underscore this in the context of the field, we add discussion of a recent in vitro manuscript demonstrating that liquid droplet formation of glycolytic proteins affect their enzymatic activity (Ura et al., 2020) (lines 444-464; 484-492). While we see the value of future studies reconstituting the glycolytic particles, we believe that is beyond the scope of this particular in vivo study.

      **Minor comments:**

      -Stress granules in other organisms (yeast paper) have different composition depending on stress type. To make the claim that the PFK-1 compartments are independent of SGs one would ideally test multiple different SG markers.

      We selected the stress granule protein TIAR-1 because it is one of the most studied stress granule markers in C. elegans and it is reportedly one of the core proteins and universal components of stress granules irrespective of a stress type (Buchan et al., 2011; Gilks et al., 2004; Huelgas-Morales et al., 2016; Kedersha et al., 1999). Although we did not include images in the manuscript, we had tested a total of three stress granule markers: TIAR-1, TDP-43, and G3BP1 with similar results. We now added that as data not shown (lines 193-194).

      -it should be stated in the main text that the microfluidic-hydrogel device was fabricated following previously published protocols

      We have added the reference in the main text (line 170) to supplement what we had written in the Methods section: “A reusable microfluidic PDMS device was fabricated to deliver gases through a channel adjacent to immobilized animals, following protocols as previously described (Lagoy and Albrecht, 2015)”.

      -Figure 4b: Y-axis should be changed from probability to fraction of occurrence

      We have corrected this in both the figure and the figure legends (Figure 4B).

      -The discussion should be less speculative concerning any effects seen in PFK1-Cry2 expressing C. elegans

      We have modified the discussion as suggested.

      -it is perplexing that a protein known to tetramerize with no disordered or RNA-binding domains forms condensates like this. Is there anything known from other systems of additional interacting proteins that may have features that promote liquidity and serve to fluidize these assemblies?

      Condensates can form via multivalent interactions, which include, but is not exclusive, to disordered or RNA-binding domains. Because glycolytic proteins have dihedral symmetries that can facilitate multivalent interactions, we believe these structural properties, in combination with regulated conformational changes, promote multivalent interactions leading to their condensation. We had a statement in the discussion (lines 494-519) now add this more clearly in the results (lines 395-398).

      Reviewer #2 (Significance (Required)):

      Stimulus-induced phase separation has been observed for dozens of metabolic enzymes from various different pathways (reviewed in Prouteau, 2018). Several studies have published the formation of condensates through PFK-1 in diverse organisms (C. elegans, Yeast, human cancer cells) in response to hypoxia or in some cancer lines also without hypoxia (Jin, 2017, Jang, 2016, Kohnhorst 2017, etc.). A yeast study showed that PFK-1 condensates contain various other glycolytic enzymes and that condensate formation enhances glycolytic rates (Jin, 2017).

      This study gives the advance of analyzing the dynamics of PFK-1 condensate formation in vivo in the context of a live animal using a microfluidic-hydrogel device and showing that PFK-1 relocalizes to reversible condensates within minutes of hypoxia. If further appropriate experiments (as mentioned above) are performed, this study would strongly suggest that the underlying process of PFK-1 condensate formation is liquid-liquid phase separation. Ideally, if at all feasible, it would be strengthened if there was some insight into the functional consequences of the condensed assemblies formed in hypoxia. These findings may be interesting to researchers working on glycolysis and metabolism in different cells but particularly in neurons.

      Field of expertise

      -Phase separation, microscopy, in vitro reconstitution

      -no experience with C. elegans biology and do not have a practical handle on ease or difficulties of genetic manipulation of C. elegans or metabolic assays for PFK-1

      Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      **Summary:**

      In this manuscript, the authors focus on the subcellular localization of the key glycolytic enzyme PFK-1.1 in C. elegans, initially in whole animals through GFP tagging of the endogenous locus and subsequently in single cells/tissues using a clever genome editing strategy that permitted tissue-specific expression of GFP-tagged PFK-1.1 from its endogenous locus. They observe that PFK-1.1 localization differs from cell-type to cell-type and can be dynamically reorganized in response to exogenous cues. Focusing on hypoxia, they observe that PFK-1.1 forms foci near synapses in neurons under this stress condition. These foci are not stress granules and they are dissolved upon re-oxygenation. These condensates have properties of liquid droplets and can mature (harden) over time. PFK-1.1 fused to the CRY domain can trigger condensate formation under normoxic conditions, which can co-recruit WT PFK-1.1 as well as aldolase.

      **Major comments:**

      The conclusions are convincing but the impact could be increased if the authors were able to demonstrate the physiological role that the observed phase separation plays in this stress response. Would it be possible to assess glycolytic flux under hypoxia vs normoxia?

      It is currently not possible to assess glycolytic flux in vivo in our system, as we lack metabolic sensors (an active area of work we are trying to address, but will take several years to perform correctly). We have added discussion of new in vitro studies examining the consequences of metabolic flux due to glycolytic compartmentation into liquid droplets (Ura et al., 2020), and the significance of those findings in the context of our in vivo studies (lines 444-464; 484-492).

      The authors should comment on viability during the hypoxia time course.

      C. elegans can survive anoxic condition for a day (Powell-Coffman, 2010). Our hypoxic conditions last minutes, and we can rescue live C. elegans upon completion of the assays. We now include a description of this in the Methods (lines 1216-1218).

      The co-clustering of ALDO-1 and PFK-1.1::mCh::CRY2 in Figure 7 should be properly quantified/statistically analyzed

      We quantified the fraction of animals that displays ALDO-1 clustering in PFK-1.1::mCh::CRY2 co-expressing animals, as suggested (Figure S7C).

      A control of mCh::CRY2 + ALDO-1::EGFP is missing from the experiments shown in Figure 7. Is the presence of mCh::CRY2 sufficient to drive ALDO-1::EGFP clustering?

      As a control for the CRY2 tag promoting the formation of glycolytic condensates, we had co-expressed mCh::CRY2 with PFK-1.1::EGFP, which is insufficient to cause the formation of the condensate (Figure 7C). We have now added a new data where we show that in pfk-1.1 deletion mutants, ALDO-1 condensate formation is suppressed, which further demonstrates the dependency between PFK-1.1 and ALDO-1 (Figures 7H and S7C).

      Does hypoxia trigger co-clustering of ALDO-1 and PFK-1.1?

      To answer this question, we examined the dynamic formation of ALDO-1 and PFK-1.1 condensates by co-expressing the two proteins together and observed that hypoxia triggers their co-clustering. We now include this in Figure 7E and Video 8.

      The authors speculate that hypoxia acts via diminished energy (altered ATP AMP ratios). Can this be measured? To support this hypothesis, the authors may wish to test if similar phase separation is triggered by mitochondrial poisons.

      We currently lack sensors that can reliably measure, in vivo, the subcellular changes in energy or metabolic flux in C. elegans neurons. However, we previously did test mitochondrial mutants and observed that in those mutants we observe glycolytic condensates (Jang et al., 2016), supporting the idea that defects in energy production promotes the formation of glycolytic condensates.

      **Minor comments:** Is 21% O2 not hyperoxic for worms?

      While C. elegans are known to prefer lower percentage of oxygen than those in air, in the lab animals are reared in normal air. We therefore used 21% oxygen present in air as our normoxic conditions.

      Can the authors speculate more on how do these condensates exhibit "memory" (how they're able to cluster in the same place repeatedly)? Is there any role for the cytoskeleton in mediating nucleation and/or condensation of PFK and glycolytic enzymes?

      When we were testing the reversibility of PFK-1.1 condensates, we were not expecting the reappearance of PFK-1.1 condensates in the same place repeatedly. Our current speculation is that, because many glycolytic enzymes, such as PFK-1.1, are allosterically regulated by nucleotides, AMP/ATP ratio may play a role on where glycolytic condensates appear. In other words, the specific synaptic areas, where PFK-1.1 condensate repeatedly reappeared, may have different AMP/ATP ratio that may trigger the condensation of the glycolytic proteins in those locationsupon conformational changes in PFK-1. We can’t exclude, currently, the presence of nucleating factors at synapses that facilitate PFK-1 clustering, but we have not yet identified them. We now include a discussion of this (lines 494-519).

      Do the authors think that these clusters are effectively G-bodies from yeast?

      G-bodies from yeast also shows glycolytic proteins changing from its diffuse localization to punctate localization in response to hypoxia (Jin et al., 2017). G-bodies, like C. elegans glycolytic condensates, are forms of subcellular glycolytic organization within eukaryotic cells. Yet, G-bodies take 24 hours to form, while we observe the glycolytic clusters in C. elegans within minutes of hypoxic conditions. We will need to understand the composition and function of both to determine if these forms of glycolytic subcellular organization represent the same structure. We note that glycolytic clusters have also been observed in some human cancer cell lines (Kohnhorst et al., 2017). Observation of glycolytic compartments in multiple different species and cell types suggest that, although the regulation, composition and formation kinetics of the glycolytic condensates may differ, compartmentalization of glycolytic enzymes may be a conserved feature. We now add a sentence discussing this (line 535-537).

      Reviewer #3 (Significance (Required)):

      It is much appreciated that this study tackles the cell biology of signaling and metabolism, which is a fascinating but difficult to study aspect of molecular biology. This work conclusively documents the dynamic reorganization of metabolic enzymes in vivo in response to physiological stimuli. Such reorganization had been proposed previously but was controversial and difficult to study in a controlled way. This work not only confirms previous observations but further demonstrates that the dynamic reorganization is mediated by a liquid-liquid phase separation. What is lacking is a demonstration that this phase separation is physiologically important. Such observations would generate interest from a much broader audience; the present audience presently targeting people specifically interested in non-membrane organelles per se. The reviewer has expertise in cell signalling and its regulation by phase separation.

      As we explain for Reviewer 1, we focus this study on the biophysical characterization of the condensates, and how that results in compartmentalized enrichment of glycolytic proteins. Examination of the functional significance of the phase separation to the enzymatic reactions in vivo is not currently possible because we lack probes we can use in vivo to measure the metabolites resulting from the reaction. We have now added discussion acknowledging this and framing its significance in the context of what has been published in the field (lines 484-492). For example, a recent manuscript in ChemRxiv demonstrated, in vitro, that the enzymatic activity of glycolytic proteins, hexokinase and glucose-6 phosphate dehydrogenase, promote these enzymes condensing into liquid droplets. The authors further found that the condensation accelerated the glycolytic reactions (Ura et al., 2020). This raises the question whether glycolytic proteins compartmentalize, and form condensates, in vivo, which we address in this manuscript. We capture this point in (lines 444-464) where we explain that, while it has long been hypothesized that glycolytic proteins like PFK-1 could be compartmentalized, this remained controversial due to lack of dynamic in vivo imaging. In our study, and through a systematic examination of endogenous PFK-1.1 via the use of a hybrid microfluidic-hydrogel device, we conclusively determine that PFK-1.1 indeed displays distinct patterns of subcellular localization in specific tissues in vivo.

      **REFEREES CROSS-COMMENTING** Globally it seems that all reviewers feel that impact would be increased if the physiological consequence of PFK-1.1 condensates was examined. Other, specific comments seem fair.

    1. Through mutations, these genes may produce proteins that cause a spectrum of inflammatory diseases such as ulcerative colitis and Crohn disease

      Crazy to think that diseases we have today were caused by mutations in evolution.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1 (Evidence, reproducibility and clarity):

      Summary:

      In this work the authors investigate the dynamics of cell morphogenesis in a convenient in vivo system. They use the terminal cells of the embryonic tracheal system and comprehensively address how cell shape change (elongation in this case) takes place and how membrane is remodeled during the process. By combining different high-resolution techniques, i.e. in vivo imaging of terminal cells expressing different membrane markers and serial-section electron tomography, they describe the organelle organization (ER, Golgi, different types of vesicles) in the terminal cells during their elongation. They identify the presence of membrane structures/vesicles particularly abundant at the tip of the cell ahead of the growing tube. When they block endocytosis they find increased tube membrane and lack of basal membrane growth. In addition, in tomograms, they observe clear membrane defects, like invaginations that could even connect the tube and basal membranes. This correlates with the absence of vesicles at the tip observed in normal conditions.

      The analysis of the nature of the vesicles observed indicated the accumulation of late endosomes and MVB, particularly at the tip of the growing terminal cells. Interfering with the formation of these MVB led to defects in the growth of both the tube and the basal membrane.

      Altogether the authors propose a model in which the newly formed membrane (and transmembrane proteins) passes through the ER and Golgi and reaches the apical membrane. The incorporated membrane is then rapidly endocytosed and follows a maturation pathway through MVB, from where different cargoes and membrane would be sorted and recycled back to the apical (tube) membrane, or to the basal membrane through a transcytosis mechanism

      Major comments:

      Are the key conclusions convincing?

      Most of the conclusions presented are convincing and supported by the results observed.

      However, to my understanding, one of the key conclusions of this work (that membrane is transcytosed from the apical to the basal domain) is not fully convincing. A critical result to support the author's conclusion of apical-basal transcytosis is to find clear evidence of basal accumulation of a transcytosed marker.

      1. The authors show accumulation of FGFR-GFP and Myospheroid as evidence. However, I find the results presented not very convincing. The accumulation of FGFR-GFP at the basal membrane in the control is not very clear in the images and movie presented. In addition, in the shibire mutant, some basal accumulation of FGFR-GFP seems to be detected (particularly in the movie). In the figures the authors show an increase of FGFR-GFP intensity when endocytosis is blocked, but this is not explained in the text.

      If we understand the referee correctly, there are two parts to her/his concern:

      1. Are the proteins we use in fact present basally in normal tracheal cells, i.e. are they good candidates for transcytosed cargo?

      2.Do they change their localisation when endocytosis is disrupted? And this point can be divided into two aspects: a. do they change at the basal membrane? b. do they change at the apical membrane (this latter point is not questioned the referee)?

      1. The FGFR and beta-integrin are the only known basal markers in tracheal cells. A major reason for being confident of their presence in the basal membrane, even though they are difficult to visualize, is that the biological function of both is at the basal membrane, with the FGFR receiving growth or chemotactic signals from the surrounding tissue, and integrins anchoring the branches on the underlying tissue. However, it is indeed the case that their expression levels are very low, and it is difficult to visualize them, whether by expression of GFP-labelled constructs or by immunofluorescence. We have pushed to the limit a number of methods to improve the detection, but we seem to be constrained by the biology of these molecules.

      In addition to the low but detectable signal at the outer boundary cell, some signal is always visible within the cell, which we had in the past always interpreted as an artefact or background, but for which our findings here might provide alternative interpretations.

      1. a. We agree with the referee’s assessment that FGFR::GFP is still detectable in the basal membrane after blocking endocytosis. This is, in our view, no contradiction to our model. The most parsimonious interpretation is that this is the FGFR that had already been delivered basally before we interfered with endocytosis, and which remains there after endocytosis is blocked.

      b. In addition to this basal pool of FGFR, cells with blocked endocytosis accumulate abnormally high levels of FGFR at the apical membrane, in fact at much higher intensities than at the basal membrane. This is the more dramatic aspect of the phenotype, and our conclusions therefore rely not so much on a possible reduction of basal signal after blocking endocytosis (which would not be possible to demonstrate reliably), but rather on the abnormally enriched presence in the apical membrane.

      A technical point: The increase in FGFR::GFP on endocytosis blockage that we show in Figure S4 corresponds to the cytoplasmic + apical pool of the FGFR. We used the Dof signal in the cell to create a mask of the total cell volume to 3D-segment the FGFR signal. Therefore, this analysis does not take into account the FGFR that is present in the basal membrane. We had explained this only in the methods section but will now describe it more explicitly in the Results section.

      On the other hand, and very importantly, how does FGFR localization relates to its activity? The authors show that when endocytosis is prevented dpERK (i.e. a reporter of FGFR activation) is not decreased, indicating that FGFR is normally active. Wouldn't this suggest that FGFR is still localized basally to receive Bnl signal?

      Indeed, and this is also what we see. This is not in conflict with any of the results or known functions of the receptor. If endocytosis is blocked, FGFR cannot be internalized and removed from the basal membrane, where it is needed to receive the FGF from the surrounding cells.

      Our concern, and the reason for doing the experiment, had been that endocytosis might be required for FGF signaling, and that this might account for the failure of the cell to grow. But it turns out that our results show that this is not the case, at least not for the terminal cell in this time frame.

      Actually, as the authors indicate, in larval tracheal cells the intracellular accumulation of the FGFR leads to a reduced FGF signal transduction (Chanut-Delalande et al., 2010), suggesting that reduced FGF signaling activity in these cells is due to less FGFR reaching the basal membrane.

      That is true, and again, not inconsistent with our own results. In the cited study, trafficking was blocked at a step downstream of endocytosis. In this experimental situation, the internalisation of the FGFR would therefore occur as normal in these cells, but due to the impaired function of the ESCRT complex, intracellular processing, and therefore potential re-delivery to the basal membrane would be impaired. Furthermore, if (as we now propose) FGFR is also delivered via late endosomes in this context, blocking the ESCRT pathway should also impair initial FGFR delivery. In either way, initial delivery or re-delivery of the receptor being blocked, it is reasonable to assume that reduced signal transduction is the result of reduced basal FGFR.

      Thus in our study we see no reduction in basal FGFR and no reduction (and even an increase) in signaling, while Chanut et al see reduced basal FGFR and reduced signaling, and the reason for this is that they interfere with a different step of the membrane trafficking pathway.

      1. The results with Myospheroid are not very convincing either, as the authors just show a single confocal section of control and shibire mutants. In summary, I consider that this very important point needs to be better documented before concluding that apical membrane material containing basal cargoes is transcytosed to the basal membrane.

      We observed this phenotype in several instances. We will quantify it for the resubmission.

      1. Another conclusion that, to my opinion, should be better explained and documented, is the coordination of tube and basal membrane growth. Following the movements of the vesicles the authors conclude that there is a net displacement of these vesicles to the tip of the cell. This correlates with the presence of mature endosomes there. So the results postulate that transcytosis occurs at the tip, and therefore the growth of the basal membrane would occur preferentially at the tip. It has been demonstrated, as the authors indicate, that the tube membrane grows all along the length of the tube. How is then coordinated the tube and basal membrane growth? If, as the authors propose in their model, the tube membrane also grows after a process of endocytosis and recycling, wouldn't it be expected to have preferential tip growth? How do the authors reconcile all these observations with previously published results (Gervais and Casanova, 2010)?

      The elegant study by Gervais and Casanova (2010) used a very clever method, which was however entirely non- quantitative (and did not make any claims to the contrary, either). The conclusion that material is delivered to the tube throughout its length was based on looking at the displacement relative to the base and the tip of the cell of short and transient secondary branches (seen for example in Fig. 1H in our paper). If the tube would primarily receive material at the tip, these secondary branches would not change their position with respect to the base of the cell. Instead, these branches tend to be displaced towards the tip, which shows that material is also added between the branch and the base of the cell. These branches are seen only in a fraction of wild type terminal cells and quantification is therefore difficult. Thus, the experiment shows convincingly that material is also delivered behind the transient branch and excludes a model by which all growth occurs only at the tip. But it does not discuss what proportion of the total is delivered along the length vs the tip of the branch.

      Our model also does not contest the idea of ubiquitous membrane delivery over the length of the tube, either in the initial delivery step, or during redistribution. On the contrary, the presence along the length of the cell of vesicles carrying FYVE::GFP and Rab7, and of smaller MVB-like bodies in the EM sections, suggest that the pathway can also be deployed at a distance from the tip.

      1. The serial-section electron tomography analysis is very interesting and identifies different sorts of vesicles. However, it is very unclear what the different vesicles referred in the models correspond to (in the in vivo imaging for instance). For instance, the small granular or the dense-core vesicles correspond to endocytic vesicles at different stages of maturation?

      Based on distribution alone, it is almost impossible to determine which of these vesicles correspond to endosomes or to secretory vesicles, even for the extremely experienced EM experts in the team. We would require high resolution CLEM, and a wide range of fluorescent markers to be able to determine which population of vesicles found on EM correspond to each marker. Due to the broad distribution of these vesicles within the cell and their small sizes right now it would be extremely technically challenging to pursue this question (even though we too would love to know)

      1. If there is a constant endocytosis from the apical membrane to generate the basal and build the definitive apical membrane, wouldn't it be expected to find many more vesicles around the tube? Wouldn't it be expected to find coated vesicles around or budding from the tube, as the coated vesicles observed budding from the basal membrane in Fig 2D? Or is the endocytosis observed mediated by non-clathrin coated vesicles?

      We agree, and we had observed this to be the case, but had not quantified this. We have now analysed the distribution of coated pits and their density in the apical or the basal membrane of the cell. Overall, we found a higher density of endocytic events in the apical membrane than in the basal membrane. As the reviewer noticed, we also found that the majority of endocytic events in the basal membrane occur towards the tip of the cell. We will add these data to Figure S3.

      Should the authors qualify some of their claims as preliminary or speculative, or remove them altogether?

      The results of Serp accumulation upon MVB interference can lead to confusion (from line 404). The authors seem to suggest that Serp protein is exclusively produced in the FB and transported by transcytosis to reach the tracheal lumen. However, Serp is also produced in the tracheal cells themselves. In fact, serp expression in the FB seems to be detected by late embryogenesis, while expression in tracheal cells is detected much earlier (Dong et al. 2014; Luschnig et al. 2006; Wang et al. 2006). It was also shown that Serp undergoes a recycling mechanism from the lumen to the lumen, through the endosomes-TGN retrograde trafficking, that may also require Shrub (Dong et al, 2014; Dong et al 2013). Thus, it is unclear (and even unlikely) that the Serp found in the vesicles in Shrub-GFP mutants is derived exclusively from the transcytosed component from the FB. I suggest to better explore this issue or to remove this part.

      We agree that the notion that the Serp we see is exclusively derived from the fat body is not correct. We observed Serp accumulation around Shrb::GFP sites in embryos at early and late stages, so it is likely that what we see is the result both of apical-to-apical redelivery of Serp (as reported in Dong et al., 2014a), and transcytosis of Serp from the basal membrane to the apical. We will therefore rewrite this. But regardless of whether we are looking at transcytosis, or apical-to-apical cycling, this experiment still reinforces the idea of our work that late endosomes serve as stations that collect material from and re-deliver it towards various compartments in the cell.

      Would additional experiments be essential to support the claims of the paper? Request additional experiments only where necessary for the paper as it is, and do not ask authors to open new lines of experimentation.

      As indicated before, more conclusive results for transcytosis should be provided.

      I suggest that the authors determine the presence of apical and basal cargoes (FGFR) in the late endosomes found when Shrub activity is impaired. According to his model, both types of markers should accumulate there. A high accumulation of these markers in those endosomes would reinforce the hypothesis proposed.

      We agree with the reviewer that this would be a great experiment. Since we only have an FGFR tagged with GFP we cannot do this experiment using the Shrb::GFP line, so instead we would have to use shrb mutants. This in itself is not a problem (see also below – we will be adding some data), but the experiment would require multi-generation crosses which could only be started once the current Covid-19 restrictions are lifted and labs opened again. Instead, we propose to cite the following supporting evidence. Chanut-Delalande et al., (2010) showed that mutants for components of the ESCRT pathway hrs and stam show intracellular accumulation of overexpressed FGFR::GFP in tracheal cells of the air sac primordium, and Dong et al., (2014a) show that shrb mutants accumulate Crb in late endocytic compartments in tracheal cells of the dorsal trunks. We would suggest it is very likely that terminal cells therefore also accumulate Crb and FGFR in late endosomes in the absence of Shrb. An experiment would be nicer, but we fear this is the best we can do at the moment.

      While it has been reported that shrub-GFP act as a dominant negative in different contexts (Dong et al, 2014; Sweeney et al 2006) it is unclear why. So it would be desirable to confirm the results with a loss of function condition (either mutant or RNAi line).

      We will now add data on shrb mutants where we find a phenotype that is similar as in Shrb::GFP overexpression.

      Are the data and the methods presented in such a way that they can be reproduced?

      The materials and methods section would benefit from more detailed explanations.

      We agree.

      Are the experiments adequately replicated and statistical analysis adequate?

      Many of the experiments presented in this work are technically very challenging, like the in vivo analyses and particularly the serial-section electron tomography. This prevents having high numbers of replicates on occasions.

      Minor comments:

      1. In the abstract the authors state: "We show that apical endocytosis and late endosome-mediated trafficking determine the membrane allocation to the apical and basal membrane domains". I think that the authors show that "that apical endocytosis and late endosome-mediated trafficking is required for correct membrane growth", but I am not that sure that they show that it determines the membrane allocation

      We agree and will change this.

      1. References for the PH-GFP localization in cells should be provided. Which is the evidence that it only localizes to plasma membrane?

      Apical localization of PH-GFP is preferential rather than exclusive. The construct has nevertheless been widely used as an ‘apical’ marker, based on the fact that this PH domain binds to PIP2, which is enriched in the apical domain of epithelial cells (e.g. Pilot, et al., 2006; Román-Fernández, et al., 2018).

      1. It would be more adequate to always use the same terms to facilitate the reading. For instance, in several figures the membranes are referred as basal plasma membrane and tube membrane, but in others outer and inner membrane

      We will go through the entire manuscript and use a consistent nomenclature.

      1. Figure 3C,D and corresponding text are difficult to understand. The increase of fluorescence of the inner membrane seems to be very high, even higher than the corresponding to the outer membrane. Can the authors explain better this point and also describe better the method applied in the materials and methods section?

      Rather than absolute amounts the graphs show fold increase over the amount of membrane at the beginning of the recording. We had used this representation for two reasons. First, the overall signal intensity can vary from one imaging set to the next, so comparing and representing absolute amounts from different datasets is not easily possible. However, we understand now why the representation in our plots was confusing. We will now show in Figure 3D how the total amount of plasma membrane in shibirets cells increases in the same way as in controls. For Figure 3C, we have found a better way of representing what percentage of the total membrane is present in each compartment as the cell grows. We will rewrite this part to make it clearer, and we will describe more thoroughly in the methods section how the analysis was done.

      Significance:

      This work represents an important advance for the field for several reasons. First of all it represents a technical advance because the authors are able to combine the traditional genetic analysis with two powerful techniques (in vivo imaging and serial-section electron tomography) to analyze single cell behavior at high resolution (temporal and spatial). In addition it represents a conceptual advance as it proposes a mechanism through which membrane growth is coordinated to regulate cell morphogenesis. The mechanism presented (endocytosis and transcytosis) is not new but they find evidence in an in vivo system.

      It was previously known that tracheal terminal cells undergo a process of intracellular tube formation and cell elongation at the same time, but the mechanisms coordinating these two cell events were not known. The proposed mechanism may not only be relevant for the morphogenesis of tracheal terminal cells, but could represent a general mechanism of cell morphogenesis. Therefore, the paper should be relevant for research in the morphogenesis area but also in the cell biology field, as it shows how regulated membrane trafficking can control tissue morphogenesis

      REFEREES CROSS-COMMENTING:

      I agree with reviewer #4 on her/his comments and suggestions about analyzing the involvement of the recycling endosome in the process.

      Reviewer #2 (Evidence, reproducibility and clarity):

      In their manuscript, Mathew et al present a model in which transcytosis is utilized to deliver endocytosed apical membranes to supply basal membrane growth. The authors examined the developing terminal cell of the fruitfly tracheal system, which is a well established tubulogenesis model, as these cells form subcellular tubes by apical plasma membrane invagination. The authors show that basal membrane growth stops when endocytosis or endosomal transport is blocked, while the apical membrane grows excessively or membrane material accumulates in the cytosol, respectively.

      Significance:

      The authors used high-end microscopy (including CLEM and electron tomography) to support their model and in my opinion, the quality and the quantity of the presented data are indeed adequate for this. The text is well written, the figures are of superb quality, and several cartoons help to understand the presented data/experiments. Therefore I highly recommend submitting the manuscript to a cell biology journal in its present form.

      Reviewer #3 (Evidence, reproducibility and clarity):

      This paper investigates the role of membrane trafficking in growth of the polarized tracheal cell that forms a cellular projection containing a subcellular tube. The authors show that apical endocytosis and late endosome-mediated trafficking determine the membrane allocation to the apical and basal membrane domains. Basal plasma membrane growth stops if endocytosis is blocked, whereas the apical membrane grows excessively. Plasma membrane is initially delivered apically, and then appears to be continuously endocytosed, together with apical and basal cargo. The sorting and recycling of apical and basolateral membrane appears to occur in a novel organelle carrying markers of late endosomes and multivesicular bodies (MVBs). Inhibiting endocytosis eliminates this compartment.

      The work in this paper is generally of high quality, and with one exception, quite comprehensive. The writing and figures are clear.

      Major concerns:

      1. A central focus of the paper is that balance between apical and basal membrane and the role of transcytosis in moving membrane from the apical compartment to the basolateral compartment. The current view is that transcytosis in mammalian cells usually goes through the recycling endosomes which are marked by rab11, although there is evidence for some trafficking through MVBs as well. In Drosophila, Rab11 positive recycling endosomes are frequently examined as part of endocytic system analyses. However, rab11 is not used as a marker in this paper and indeed there is no mention at all of recycling endosomes, even though recycling is at the core of the work. Since the authors do not examine rab11 or other possible markers of recycling endosomes, it is unclear whether the organelle they identify as carrying markers of late endosome and MVBs is some MVB/recycling endosome hybrid, or whether the organelle is completely distinct from the recycling endosome. Consequently, it is not possible to assess whether the observed trafficking either uses or does not use involve the recycling endosome. This ambiguity make is difficult to relate the observed trafficking to other systems. Minimally the authors should stain for rab-11 in WT and in some of the conditions where trafficking is perturbed and determine if the MVB-like compartment they are observing is rab11 positive, and whether the recycling endosome are affected by the perturbations. Further experiments may be needed to resolve whether any trafficking is going via the recycling endosome or this new MVB-type structure, but without even preliminary data on the relationship between the MVB compartment and the recycling endosome, its hard to say what might be appropriate or exactly how long addressing this will take. But just staining for rab11 in WT and a few mutant conditions to get a handle on what is up with the recycling endosomes in these cells should take less than a month.

      We had done a number of experiments on Rab11 but did not include them because we felt they did not add any crucial insights on the mechanism we describe here. However, as the reviewer rightfully points out, Rab11 is a classical marker for recycling and transcytosis and we agree that the reader should know our results. We found that overexpressed Rab11::GFP as well as endogenously tagged Rab11:YFP are both highly enriched around the tube. Unlike Rab5 which is seen in widely spaced discrete vesicles, Rab11 forms a cloud of small puncta. We found very low overlap of Rab11 with CD4::mIFP-positive vesicles at the tip of the cell. This suggests that Rab11 is unlikely to be directly involved in the transcytosis pathway we describe here.

      Loss of Rab11 was harder to analyse; Rab11-RNAi did not show any obvious phenotype, which could be due to high maternal contribution or to low knockdown efficiency, none of which we analysed in detail. Expression of a dominant negative Rab11 resulted in very early defects (reported by Le Droguen et al., 2015) which prevented us from analysing the role of Rab11 in tube formation. But because Rab11 does not localize to the compartment at the tip of the cell, we believe that this structure does not rely on Rab11 to transfer material from the apical to the basal membrane of the cell.

      We will add the data on Rab11 distribution in Figure S6.

      1. In addition to the above, I would recommend more discussion of how the authors' results relate to membrane trafficking and transcytosis in other systems. The recycling endosome should be considered, and it may be appropriate to draw comparisons to membrane trafficking in neurons that goes through MVBs (e.g. reviewed in VON BARTHELD and ALTICK Prog Neurobiol. 2011 Mar; 93(3): 313-340.). Although neurons are not hollow, they have definite morphological resemblance to tracheal terminal branches.

      We thank the reviewer for the observation and will expand the discussion on MVB-mediated transcytosis in other systems.

      1. line 204-208 "To test whether raised levels of Crb were responsible for the excessive apical membrane, as reported in other contexts (Pellikka et al., 2002; Schottenfeld-Roames et al., 2014; Wodarz et al., 1995), we knocked down Crb (Fig. S4G-H)." According to the legend for Fig s4, the authors express an RNAi construct against crbs. However, there does not appear to be any quantification of the amount knockdown of crb that was achieved. This is a concern for two reasons: 1) RNAi in the embryonic trachea works poorly for most genes (for unknown reasons) 2) This does not appear to be a clonal experiment but rather a pan tracheal driving of Crb RNAi. Loss of crbs would be expected to have very negative effects on tracheal morphogenesis (although this hasn't been rigorously tested to this reviewer's knowledge), but there doesn't appear to be any adverse effects of pan-tracheal crbs RNAi, suggesting that little if any knockdown of crb was actually achieved.

      The authors either need to document the reduction of crbs or remove this paragraph. Preferably, they would be able to document the reduction of crb because they are trying to address an important point and if they can show the apical expansion is crb-independent, that would be an nice result.

      Loss of Crumbs definitely is detrimental to embryonic epithelia, to different degrees (Tepass and Knust, 1990). We therefore could not use mutants but expressed an RNAi, which does not abolish Crb completely. We have now determined the degree of crb knockdown in our experiments. We stained Crb in embryos that expressed crb-IR in the entire tracheal system (but leaving the epidermal expression intact) and quantified the amount of Crb in the tracheal dorsal trunks, normalized to the signal in the epidermis. We found that in crb-IR embryos, Crb levels were reduced by around 50% compared to control siblings. We will add these results to Fig. S4 in the new version of the manuscript.

      Minor concerns:

      1. Lines 250. "By this interpretation, unscissioned membrane invaginations protruding from the subcellular tube would occasionally have touched the basal plasma membrane or its protrusions and fused with it, as transcytosing vesicles would have done in the normal situation."

      I am not convinced by the argument that the bridging invaginations are fusing analogously to transcytosing vesicles because a protrusion/nascent vesicle coming from the apical surface should have rabs and V-SNAREs that should dock the protrusion/nascent vesicle with an endosomal compartment, not the basolateral surface. A transcytotic vesicle would have the rabs and V-SNAREs for the basolateral membrane. So it would seem that a fusion of the apical surface directly to the basolateral surface would have to be an ectopic event outside of the normal situation.

      We agree that the fusion events could also be unrelated to the normal physiology of the animal. In other contexts (e.g. the embryonic epidermis, the synaptic bouton) blocking dynamin results in long membrane invaginations as a result of failure in membrane scission. In terminal cells, the apical and basal plasma membranes are very close to each other, and we believe this increases the chance of membrane invaginations meeting and fusion to take place. In addition, the long membrane invaginations we see seem to have been stripped of their clathrin coat suggesting that at least some aspects of ‘vesicle’ maturation proceed even though scission had failed. We also find evidence of small vesicles that resemble the contents of MVBs being deposited within the aberrant membrane invaginations. This suggests that MVBs are able to fuse with these unscissioned tubes and sheets, again indicating that the appropriate molecular markers are present, and the machinery in charge of generating these vesicles is active at the invaginated pits directly. In either case, we will rephrase our interpretations of these data and present it as speculation in the discussion section.

      1. Significant figures. This is not a big deal, but the authors are over reporting their significant figures. E.g. "a 7.05-fold increase (+/-2.98 SD)" . With an SD that is 50% the value of the measurement, reporting to hundreds is definitely beyond the accuracy of measurement. Rounding to tenths would be more appropriate.

      We agree with the reviewer. We will rephrase this section and use more appropriate metrics. As prompted by Reviewer #1, we modified the analysis that corresponds to this sentence, which also modified the way data is normalized also reducing the spread. This happened because in the new analysis we compare apical and basal signal for each timepoint, which allows better comparison between different cells.

      Significance:

      As there have not been that many studies on the dynamics of membrane trafficking during morphogenesis, the results should be of broad interest to those studying the endocytic system and the role of membrane trafficking in morphogenesis. However, the paper would be greatly strengthened if the authors considered the recycling endosome in their analysis and write up. As a well-known compartment for trafficking cargo and membrane to both the apical and basolateral surface, it is hard to know how to interpret the observed trafficking without knowing the involvement, or lack thereof, of recycling endosomes in this system.

    2. Note: This preprint has been reviewed by subject experts for Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Referee #1

      Evidence, reproducibility and clarity

      Summary:

      In this work the authors investigate the dynamics of cell morphogenesis in a convenient in vivo system. They use the terminal cells of the embryonic tracheal system and comprehensively address how cell shape change (elongation in this case) takes place and how membrane is remodeled during the process. By combining different high-resolution techniques, i.e. in vivo imaging of terminal cells expressing different membrane markers and serial-section electron tomography, they describe the organelle organization (ER, Golgi, different types of vesicles) in the terminal cells during their elongation. They identify the presence of membrane structures/vesicles particularly abundant at the tip of the cell ahead of the growing tube. When they block endocytosis they find increased tube membrane and lack of basal membrane growth. In addition, in tomograms, they observe clear membrane defects, like invaginations that could even connect the tube and basal membranes. This correlates with the absence of vesicles at the tip observed in normal conditions. The analysis of the nature of the vesicles observed indicated the accumulation of late endosomes and MVB, particularly at the tip of the growing terminal cells. Interfering with the formation of these MVB led to defects in the growth of both the tube and the basal membrane. Altogether the authors propose a model in which the newly formed membrane (and transmembrane proteins) passes through the ER and Golgi and reaches the apical membrane. The incorporated membrane is then rapidly endocytosed and follows a maturation pathway through MVB, from where different cargoes and membrane would be sorted and recycled back to the apical (tube) membrane, or to the basal membrane through a transcytosis mechanism

      Major comments:

      - Are the key conclusions convincing?

      Most of the conclusions presented are convincing and supported by the results observed. However, to my understanding, one of the key conclusions of this work (that membrane is transcytosed from the apical to the basal domain) is not fully convincing. A critical result to support the author's conclusion of apical-basal transcytosis is to find clear evidence of basal accumulation of a transcytosed marker. The authors show accumulation of FGFR-GFP and Myospheroid as evidence. However, I find the results presented not very convincing. The accumulation of FGFR-GFP at the basal membrane in the control is not very clear in the images and movie presented. In addition, in the shibire mutant, some basal accumulation of FGFR-GFP seems to be detected (particularly in the movie). In the figures the authors show an increase of FGFR-GFP intensity when endocytosis is blocked, but this is not explained in the text. On the other hand, and very importantly, how does FGFR localization relates to its activity? The authors show that when endocytosis is prevented dpERK (i.e. a reporter of FGFR activation) is not decreased, indicating that FGFR is normally active. Wouldn't this suggest that FGFR is still localized basally to receive Bnl signal? Actually, as the authors indicate, in larval tracheal cells the intracellular accumulation of the FGFR leads to a reduced FGF signal transduction (Chanut-Delalande et al., 2010), suggesting that reduced FGF signaling activity in these cells is due to less FGFR reaching the basal membrane. The results with Myospheroid are not very convincing either, as the authors just show a single confocal section of control and shibire mutants. In summary, I consider that this very important point needs to be better documented before concluding that apical membrane material containing basal cargoes is transcytosed to the basal membrane.

      Another conclusion that, to my opinion, should be better explained and documented, is the coordination of tube and basal membrane growth. Following the movements of the vesicles the authors conclude that there is a net displacement of these vesicles to the tip of the cell. This correlates with the presence of mature endosomes there. So the results postulate that transcytosis occurs at the tip, and therefore the growth of the basal membrane would occur preferentially at the tip. It has been demonstrated, as the authors indicate, that the tube membrane grows all along the length of the tube. How is then coordinated the tube and basal membrane growth? If, as the authors propose in their model, the tube membrane also grows after a process of endocytosis and recycling, wouldn't it be expected to have preferential tip growth? How do the authors reconcile all these observations with previously published results (Gervais and Casanova, 2010)?

      The serial-section electron tomography analysis is very interesting and identifies different sorts of vesicles. However, it is very unclear what the different vesicles referred in the models correspond to (in the in vivo imaging for instance). For instance, the small granular or the dense-core vesicles correspond to endocytic vesicles at different stages of maturation?. If there is a constant endocytosis from the apical membrane to generate the basal and build the definitive apical membrane, wouldn't it be expected to find many more vesicles around the tube? Wouldn't it be expected to find coated vesicles around or budding from the tube, as the coated vesicles observed budding from the basal membrane in Fig 2D? Or is the endocytosis observed mediated by non-clathrin coated vesicles?.

      - Should the authors qualify some of their claims as preliminary or speculative, or remove them altogether?

      The results of Serp accumulation upon MVB interference can lead to confusion (from line 404). The authors seem to suggest that Serp protein is exclusively produced in the FB and transported by transcytosis to reach the tracheal lumen. However, Serp is also produced in the tracheal cells themselves. In fact, serp expression in the FB seems to be detected by late embryogenesis, while expression in tracheal cells is detected much earlier (Dong et al. 2014; Luschnig et al. 2006; Wang et al. 2006). It was also shown that Serp undergoes a recycling mechanism from the lumen to the lumen, through the endosomes-TGN retrograde trafficking, that may also require Shrub (Dong et al, 2014; Dong et al 2013). Thus, it is unclear (and even unlikely) that the Serp found in the vesicles in Shrub-GFP mutants is derived exclusively from the transcytosed component from the FB. I suggest to better explore this issue or to remove this part.

      - Would additional experiments be essential to support the claims of the paper? Request additional experiments only where necessary for the paper as it is, and do not ask authors to open new lines of experimentation.

      As indicated before, more conclusive results for transcytosis should be provided.

      I suggest that the authors determine the presence of apical and basal cargoes (FGFR) in the late endosomes found when Shrub activity is impaired. According to his model, both types of markers should accumulate there. A high accumulation of these markers in those endosomes would reinforce the hypothesis proposed.

      While it has been reported that shrub-GFP act as a dominant negative in different contexts (Dong et al, 2014; Sweeney et al 2006) it is unclear why. So it would be desirable to confirm the results with a loss of function condition (either mutant or RNAi line)

      - Are the data and the methods presented in such a way that they can be reproduced?

      The materials and methods section would benefit from more detailed explanations.

      - Are the experiments adequately replicated and statistical analysis adequate?

      Many of the experiments presented in this work are technically very challenging, like the in vivo analyses and particularly the serial-section electron tomography. This prevents having high numbers of replicates on occasions.

      Minor comments:

      -In the abstract the authors state: "We show that apical endocytosis and late endosome-mediated trafficking determine the membrane allocation to the apical and basal membrane domains". I think that the authors show that "that apical endocytosis and late endosome-mediated trafficking is required for correct membrane growth", but I am not that sure that they show that it determines the membrane allocation

      -References for the PH-GFP localization in cells should be provided. Which is the evidence that it only localizes to plasma membrane?

      -It would be more adequate to always use the same terms to facilitate the reading. For instance, in several figures the membranes are referred as basal plasma membrane and tube membrane, but in others outer and inner membrane

      -Figure 3C,D and corresponding text are difficult to understand. The increase of fluorescence of the inner membrane seems to be very high, even higher than the corresponding to the outer membrane. Can the authors explain better this point and also describe better the method applied in the materials and methods section?

      Significance

      This work represents an important advance for the field for several reasons. First of all it represents a technical advance because the authors are able to combine the traditional genetic analysis with two powerful techniques (in vivo imaging and serial-section electron tomography) to analyze single cell behavior at high resolution (temporal and spatial). In addition it represents a conceptual advance as it proposes a mechanism through which membrane growth is coordinated to regulate cell morphogenesis. The mechanism presented (endocytosis and transcytosis) is not new but they find evidence in an in vivo system. It was previously known that tracheal terminal cells undergo a process of intracellular tube formation and cell elongation at the same time, but the mechanisms coordinating these two cell events were not known. The proposed mechanism may not only be relevant for the morphogenesis of tracheal terminal cells, but could represent a general mechanism of cell morphogenesis. Therefore, the paper should be relevant for research in the morphogenesis area but also in the cell biology field, as it shows how regulated membrane trafficking can control tissue morphogenesis

      REFEREES CROSS-COMMENTING: I agree with reviewer #4 on her/his comments and suggestions about analyzing the involvement of the recycling endosome in the process.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Review comments Rebuttal

      Reviewer #1 (Evidence, reproducibility and clarity (Required)): **Summary ** This manuscript describes the X-ray structure determination of two SMAD-DNA complexes confirm that SMAD family proteins bind at least two DNA sequences in a similar fashion, and explores dimer versus monomer formation of the non-DNA bounds forms of the proteins which could influence whether the proteins bind as monomers and dimers. This includes identifying a loop which appears to make a major contribution to this process. There is a lot of experimental work and analysis included. **Major comments: ** The overall conclusions of the manuscript are convincing, but some of the detailed analysis is not clear. The structures look good, the experiments look to be generally well controlled, although some details could be provided in the main text to be clear about what methodology is being used or how analysis was carried out and stepwise conclusions obtained. In particular the analysis of SAXS data is not clear. I'd like to see initial data analysis presented as per the guidelines of Trewhella et al 2017 (PMID: 28876235). There is some mention of data in the SASREF database, but it should be in the supplemental data.

      We have prepared a table following this recommendation.

      I can't see any evidence for the conclusions about open versus closed monomer state (how good were the fits obtained) - just a graph and a statement. If this can't be better justified please remove the conclusions about these states (they don't really add to the overall conclusions about monomer/dimer which are much less specific), but even the simple analysis supports mostly monomer and small amounts of dimer or higher aggregates. I would also like to see a clear explanation provided about why the MS data supports dimer over other oligomers

      We have revised and simplified the SAXS section to clarify the main points. We have re-analyzed the conformations in solution, and the values are presented in new Table S4 and new Figure 3D. We have also included new panels (Figure 3E) and explanations with respect to the IM-MS data (pages 8-9).

      State what thermal unfolding experiments are were carried out in the text (and why is the data biphasic?)

      The biphasic graphics were interpreted as the presence of dimers and monomers in equilibrium. As suggested by the other reviewer, we have removed these sections as they do not contribute to clarify the main points of our work.

      The concept of long versus short loops re domain swapping have been studied in the past but there isn't much reference to this.

      https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2373619/

      https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6349918/

      https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0039305

      https://www.ncbi.nlm.nih.gov/pubmed/22411444

      We now mention some related examples in page 8.

      **Minor comments: **

      The last couple of paragraphs of the introduction are a fairly comprehensive summary of the study overall and the conclusions of the paper. While presaging the key findings and conclusions is fairly common in an introduction this seems to be way too much detail. Unless it is a requirement of the journal, reduce these sections to a couple of sentences and use any other word count to explain your analysis better.

      Thank you for this recommendation. We have rephrased and reduced this part of the introduction.

      Figures are quite small and hard to see detail at 1X magnification (in both the main and Supplemental figures).

      We have removed some panels that were not necessary and increased the size of the figures and labels.

      NB.The difference in Tm of SMAD 5 over 8 doesn't seem particularly high as it’s only a couple of degrees (especially when SMAD4 is quite different). The explanation for the Ile>Cys mutation might be about competition of zinc ligation (except that it doesn't seem to cause issues for many zinc finger proteins) but more likely that you've replaced a reasonably bulky hydrophobic sidechain and therefore have lost a bunch of hydrophobic contacts.

      We have removed this section entirely.

      With respect to the Ile>Cys difference, the residue is located in a loop, and it does not participate in hydrophobic contacts. We still believe that its negative role in the stability of the domains arises from the competition for Zn coordination but we agree with the reviewer that quantifying its specific role is not obvious.

      Reviewer #1 (Significance (Required)):

      -This paper clarifies concepts about the state of isolated SMAD proteins (thought be largely monomeric in the absence of DNA) and DNA-binding preferences of these proteins. -I don't have specific expertise in the structure/function of SMAD proteins, but the study appears to include sufficient background to place the study in context.

      -Audience will mostly be those interested in structure/function of SMAD proteins, with some protein engineers interested in the manipulation of monomeric versus dimer.

      -I am a protein chemist and structural biologist with an interest in protein dimerization/oligomerization. I am familiar with most techniques presented, but don't have first-hand experience with IM-MS.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      **Summary**

      The manuscript by Ruiz et al examines how the receptor-activated SMAD (R-SMAD) transcription factors bind DNA, and specifically how the MH1 (DNA-binding domain) of the different classes contributes determining whether they bind as monomers or dimers.

      In the context of the full length SMAD proteins, it is thought that hetero-trimers with one SMAD4 plus two R-SMADs are the functional unit. In general, the SMAD1/5/8 R-SMADs respond to BMPs whereas SMAD2/3 respond to TGF beta. However, what is less clear is how the specificity of the gene responses is determined, since all SMADS are able to bind to each of the two sequence classes of response element (GTCT and GC-rich, or 5GC).

      Previous structural studies suggest that the major contacts between SMAD MH1 and DNA are very similar, irrespective of the particular SMAD or of whether they bind a TGTC or 5GC element. On DNA, MH1 domains have been observed as dimers, but there has been some concern as to whether this (at least in part) is a crystal artefact, or is perhaps forced by the specific DNA sequences use in these studies. For the BMP R-SMADS this may be less likely, since the amino-terminal helix 1 of one dimer is seen to be dislodged from its own intramolecular interactions allowing it to make contacts with the second MH1 domain in the dimer.

      Here the authors test this question of MH1 dimerization and address differences between the BMP responsive and other SMADs. They first show by crystallography that SMAD5 and SMAD8 MH1 domains adopt similar dimeric conformations with the displaced helix 1, and bind to a single 5GC element via one of the MH1 domains. To get at whether these MH1 domains form dimers in solution, they use small angle X-ray scattering, NMR and mass spectrometry, to suggest that the SMAD5 and SMAD8 MH1 domains in solution do not fit with a single conformation, but are better modeled by a mixture of dimer and open monomer. Ion mobility MS also suggested a mix of dimer and open monomer for the BMP SMADs, whereas SMAD3 appeared to be primarily monomer. To test if the MH1 domains themselves encode this potential difference between SMAD5 and SMAD3, they swap loop 1 (6 versus 4 amino acids, between helices 1 and 2) from SMAD3 to SMAD5, and now in solution this chimera appears monomeric, and forms monomers when crystalized with DNA.

      Major comments

      1. Adding the SMAD3 loop to SMAD5 prevents the open dimer - does the reverse also work? Can you make SMAD3 form SMAD5-like open-dimers by adding the loop 1 sequence from SMAD5?

      We have prepared new Smad3 chimeric constructs and we are currently screening crystallization conditions in order to obtain diffracting crystals (if possible). Unfortunately, due to the COVID-19 pandemic, access to our laboratory is highly restricted, while access to synchrotron and mass spectrometry facilities is not available), therefore this work has been postponed until the end of April/May. For this reason, the revised version of the manuscript does not refer to this question. We hope that we will be able to address it in the future.

      1. Can the authors include similar schematic models for how the site spacing would be for SMAD2/3-SMAD4 complexes - adding the SMAD2/3/4 model to Figure 5C?

      We have incorporated new panels to Figure 5 (Figure 5E,F).

      1. The authors comment on the possibility that the dimer conformation dictates the spacing of the sites that will be bound in vivo. In this context, they refer to a previous paper (PMID: 29234012) to suggest differences in site clustering between BMP SMAD and TGF beta SMAD regions of the genome (from ChIP-seq) that fit with the spacing they imply here. However, the major difference shown in this work seems to be between the clustering of GC sites and GTCT sites irrespective of the pathway. Can the authors analyze existing ChIP-seq data to more specifically test the question they raise - ie that SMAD4 bound regions of the genome have different site clustering/spacing depending on whether they are BMP or TGF beta responsive?

      Thank you very much for this recommendation. We agree with the reviewer that this information is very valuable and can help support our hypothesis on the different binding preferences of monomers and dimers of MH1 domains. We have performed this analysis and is now included as two new sections. The results are displayed as new Figure 5A,B.

      1. I think Figure 2C,D is not really well described in terms of the importance to this work. As it is this data does not really seem to add very much, but perhaps I am missing the importance.

      We have entirely removed this section in the new version of the manuscript.

      5.Can the authors comment about the compressed GC element or BRE? This seems to be an unfavorable conformation. How might it be bound in vivo, is it an unusual element, or is it relatively widely found? Is it possible that in vitro it binds two MH1 domains, but in vivo might simply act as a normal 5GC, with an additional site nearby?

      The BRE domain is less abundant than 5GCs and SBE sites, and in fact, this sequence is not enriched in the ChIP-Seq datasets that we have analyzed. We have included a sentence refering to these findings in page 11.

      We have also revised the section comparing the 5GC and BRE-GC site and illustrate this interaction as well as the comparison to our 5GC complex by including two panel in Figure2 that before were displayed as supplementary information. The panels have been edited to clarify the similarities and differences between both complexes. Indeed, the protein-DNA complex made of one BRE motif bound by two MH1 domains as found in the PDB:5X6H crystal structure suffers from several issues, including compactness of the two overlapping Smad-binding motifs that led to distortion of DNA geometry, clashes at protein-protein interface and local cancelation of protein-DNA interactions.

      In this new section (page 8) we include the sentence that “we believe that the most probable binding mode in vivo should be that observed in the 5GC and SBE complexes. It seems very unlikely that two MH1 domains would interact with a reduced BRE motif —using half of their protein binding site and causing a high distortion to the DNA structure— if there is the possibility to interact with neighboring sites (Figure 2B,C) using the full protein binding interface and a perfect accommodation to the DNA”.

      **Minor comments: ** 1.In Figure 1B is one the two DNAs assumed? In the structure was it two MH1 to one DNA or two of each?

      One DNA was hidden for clarity. The crystallographic structure is now shown in full. The crystal structure was solved for a complex made of two MH1 domains bound to a dsDNA molecule that included two Smad-binding sites.

      2.Figure 2C and page 9: the stabilization of SMADs in the text and figure do not agree. Maybe just state the exact numbers from the figure in the text.

      We have entirely removed this section in the new version of the manuscript.

      3.In Figure S1C, can the authors label the retarded complexes on the gels?

      Done.

      4.Figure 4A - explain the asterisk (presumably the SMAD2 insert).

      Yes, it corresponds to the Gly rich region present in loop1. It is indicated now.

      5.In Figure 4B, C (and maybe D) can they color helix 1, loop 1, and helix 2 three separate colors, it might really emphasize the effect of the loop if it was more immediately visible.

      We have improved these figures but we did not change the colors because the figure was getting even more complicated.

      6.The legend to Figure 4 is missing F.

      Thank you. This has now been corrected.

      Reviewer #2 (Significance (Required)):

      The authors conclude that the length of the loop between helices 1 and 2 determines the dimer versus monomer state - a shorter loop as in the BMP SMADS hinders the intramolecular interactions needed for the closed monomeric form, whereas the longer loop in the other SMADS allows the flexibility for these interactions so favors a more closed monomeric form. Showing that the dimers are not forced by crystallography or by binding to fixed DNA elements clearly adds to our understanding of the mechanisms of SMAD function, and it is of interest that the BMP and TGF beta SMADS are different in this respect.

      They speculate that this may contribute to the specificity of the responses activated by BMP versus TGF beta signaling based on the requirements for different site spacing depending on whether an open (BMP) or closed (TGF beta) dimer of R-SMADS is present. This idea is likely to be of interest to anyone who studies the responses to the TGF beta superfamily of signaling molecules, and should spur additional experimentation to test it.

    1. We connected this notion to larger systems of oppression and how stereotypes help create and perpetuate those, noting how, for example, our justice system relies on humans who may harbor stereotypes which can result in severe consequences for those in their charge

      As teachers it is important for us to think about the stereotypes we hold of the students we teach. How does it influence teaching and learning?

    1. Finally, moving maintenance and repair back to the center of thinking around media and technology may help to develop deeper and richer sto-ries of relationality to the technological artifacts and systems that surround us, positioning the world of things as an active component and partner in the ongoing project of building more humane, just, and sustainable collec-tives.

      I think this last point is really excellent. If the ability to repair any infrastructure isn't built holistically into a system the ability for any option other than building over or removing and replacing isn't on the table.

      For example when I was a construction inspector for the Township of Lake Como I worked on their artificial aquifer that fed their lakes and houses. They had chosen to build a piping system that had no shut off connectors for outflow and further draining on the north half of the town and on the southern half they had built into those connectors. We were able to reline the southern half of the town's pipes in 5 weeks and we had to remove and replace almost every major water pipe in the town on the north half which took 6 months. A lack of any ability for maintence leads to greater problems.

    1. Children know this; they have the desire and the ability to search for the meaning of life and their own sense of self as soon as they are born.

      LOVE THIS! Children want to know 'why' they are here? Their purpose (not the 'purpose' their parents think they should have ;)! When we pay close attention we may find that the innate desires/interests that the children show us are in fact tied to their ultimate purpose. For example, a little boy whose passion for building is supported by providing him wood, tools, etc. so that he can build a table - later we come to find out that this same boy became an adult contractor.

    1. The discussion of privacy, intellectual property rights and freedom of information has shown that a good case can be made for the descriptive culture-relativity of these values. These values are central in information ethics, as it has been developed in the West. Moreover, it was argued that the uncovered cultural differences in the appraisal of these values can be placed in the context of a dichotomy between two fundamentally different kinds of value systems that exist in different societies: rights-centered and virtue-centered systems of value. Information ethics, as it has developed in the West, has a strong emphasis on rights, and little attention is paid to the kinds of moral concerns that may exist in virtue-centered systems of morality. In sum, it seems that the values that are of central concern in Western information ethics are not the values that are central in many nonwestern systems of morality. The conclusion therefore seems warranted that descriptive moral relativism is true for information ethics.

      This conclusion proves the point that I made in my alternate annotation. We are obviously able to see so many differences propagated by cultural relevancy phenomenon. In fact, each case study outlines this very thing. There are countless examples down to even when a person becomes an autonomous human entity. So why must we resort to categorizing in such a primitive other-ing way? I think that there could have been many stronger conclusions to this piece and I am disappointed to see the author resort to the insufficient cop out method of binary categorization.

    1. In their minds, clearly, writers fall into three fairly distinct groups: the talented, the average, and the others; and the Writing Center's only logical raison d'etre must be to handle those others- those, as the flyer proclaims, with "special problems."

      I think it is easy to classify writers if grammar is the only factor taken into consideration. Otherwise, everyone has a different idea of what makes someone a good writer. For some, it may be the ability to make the reader feel something. For others, someone who uses big words and long sentences may be thought of as the best writer in the world. I believe our personal classifications are dependent on our own relationship to writing and what we strive to improve in our own writing.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      We thank all the Reviewers for taking the time to evaluate our manuscript and providing us with constructive feedback. We are pleased to hear that all Reviewers appreciate the importance and significance of our study, commenting that our conclusions are ‘convincing, are supported by the presented experimental results’ and that our study ‘will yield novel insights into the regulation and function of PALB2 in DNA repair’.

      Please refer to our point-by-point response to the specific points raised, in which we highlight a couple of key experiments to be conducted to refine our study in bold. We are grateful for all the reviewers’ remarks and suggestions, which will certainly lead to a substantial improvement in our manuscript.

      Point-by-point response:

      Reviewer #1 (Evidence, reproducibility and clarity (Required)): Fournier et al. detect acetylation within the chromatin association motif (ChAM) of PALB2 and demonstrate that KAT2 can acetylate these 7 lysine residues within this region. They then generate K to R mutations (7R) or K to Q mutations (7Q) at these sites and perform assays of fluorescence recovery after photobleaching (FRAP) to measure mobility as a measure of chromatin association, RAD51 foci, PALB2 recruitment at sites of laser-induced DNA damage, and sensitivity to olaparib. They find increased mobility of the 7Q mutant of PALB2 but not 7R in the absence of exogenous DNA damage, as well as defects in DNA damage-induced RAD51 foci and resistance to olaparib. On this basis, the authors conclude that acetylation is required for the association of PALB2 with undamaged chromatin and that deacetylation permits mobilization and association with BRCA1 to enable proper DNA repair. While the manuscript is generally well-written, many of the systems are rather elegant, and this study may yield novel insights into the regulation and function of PALB2 in DNA repair, there are some missing experiments to be added and important contradictions that should be resolved in order to fully establish the new model the authors propose.

      **Major comments:** 1.There are some concerns about the interpretation of experiments with the 7R and 7Q mutants of PALB2. For example, in the description of results in Fig. S2C, the authors state "K to R substitutions maintain the charge yet are unable to accept acetylation and hence mimic constitutively non-acetyl lysine". However, in Fig. 4B the association of the 7R mutant with chromatin is similar to WT and in Fig. 7D,E the relative immobility of the 7R mutant is very similar to WT PALB2. Thus, the conclusion that acetylation is required for PALB2 association with damaged undamaged chromatin and for release of PALB2 upon DNA damage does not appear justified. Perhaps the authors need to better consider whether the 7R mutant mimics acetylation because of its charge. Even so, the mutant then maintains the charge normally associated with acetylated PALB2, calling into question whether deacetylation indeed "releases PALB2 from undamaged chromatin".

      We agree with the Reviewer’s point that there is no or little difference between WT and the 7R mutant in regard to their enrichment on non-damaged chromatin, as detected by fractionation (Fig 4B), or their mobility, as detected by FRAP (Fig 4D and E). Note that Fig. 7D is our model and Fig. 7E does not exist. As the Reviewer suggests, it is possible that, in contrast to the 7Q mutant, which is defective in both nucleosome and DNA binding (Fig. 2E and F), the 7R mutant may maintain its electrostatic interaction with DNA, while lacking its acetylation-mediated nucleosome interaction, masking the impact of substitutions. This assumption is in line with our model in which ChAM DNA binding assists HR repair, which is supported by the 7R mutant but not by the 7Q mutant. To better dissect the question raised by the Reviewer, we will conduct biochemical analyses of the ChAM 7R mutant, testing its direct interaction with nucleosomes and DNA; the results will be included in the revised manuscript (Experiment 1).

      It is also worth noting that full-length PALB2 is enriched at a fraction of H3K36me3-marked exons (which comprise only 1-1.5 % of the whole genome), as shown in our previous genome-wide ChIP-seq analysis (Bleuyard et al., 2017, PNAS). Hence, it is also possible that bulk fractionation or FRAP analyses might not be sensitive enough to highlight the impact of the 7R mutation. Conversely, we foresee that the ChIP-qPCR method, detecting PALB2 association at defined genic regions as shown in Fig S5, will be more appropriate. Thus, in the revised manuscript, we will expand our ChIP-qPCR analyses to further validate our proposed model (Experiment 2).

      2.Related to questions of interpreting results utilizing the 7R and 7Q mutants of PALB2, in Fig. 7B,C the 7R mutant but not 7Q supports RAD51 foci and resistance to olaparib similar to WT PALB2. The authors then state in the Discussion that "our work also suggests that caution should be exercised in the use of K to Q substitutions for functional studies of lysine acetylation". Thus, which mutant is giving the correct and reliable results?

      We apologise for the miscommunication if this point was unclear. Using biochemical approaches, we established that ChAM acetylation, but not K to Q substitution, facilitates its association with nucleosomes (please compare Fig 2E and Fig 3B). This observation clearly demonstrates that K to Q substitution does not mimic acetylation at these residues, but instead renders PALB2 ChAM functionally null. The PALB2 7Q phenotypes therefore demonstrate the importance of the 7K patch for ChAM function in HR repair, rather than its acetylation status.

      Perhaps even more importantly, if results with the 7Q mutant are suspect, the conclusion that deacetylation is required for HR (or DNA repair) is suspect because that is the only case where the authors see a defect in RAD51 foci and resistance to olaparib. Similarly, if the 7R mutant "mimics non-acetyl-lysine" then the fact that it has normal RAD51 foci and resistance to olaparib contradicts the conclusion that deacetylation is required for DNA repair.

      Unfortunately, it is currently technically not possible to ‘lock’ the PALB2 7K patch in its acetylated status in vivo (i.e. preventing PALB2 dissociation from active genes). We thus agree with the Reviewer that it is difficult to draw definitive conclusions on the impact of constitutive PALB2 acetylation in HR, although the importance of the 7K-patch for the functionality of PALB2 is evidenced by the 7Q mutant phenotypes. Similarly, strictly speaking, our results using the 7R mutant support the notion that the ‘non-acetylated’ status of the 7K mutant, but not necessarily the dynamics of ‘de-acetylation’ events, can promote HR repair. In the revised manuscript, we will rephrase and clarify these points.

      3.There are multiple concerns about Figs. 5 and S5. In Fig. 5A-C, difference in cell cycle progression after synchronization are relatively small and no rationale/interpretation is given for how this may be related to PALB2 function is given. In Fig. 5D,E differences in the levels of gamma-H2AX as a marker of DNA damage between different forms of PALB2 do not become readily apparent until about 6 or more days after addition of doxycycline. As such, it seems that these could be indirect effects and it is unclear how strongly this supports the importance of PALB2 acetylation in the DNA damage response.

      We apologise for the miscommunication on these points. We have previously established that steady-state PALB2 chromatin association, jointly mediated by the ChAM and MRG15 interaction, protects a subset of active genes from DNA damage that may otherwise arise from replication-transcription conflicts (Bleuyard et al., PNAS 2017). The results presented in Fig 5 and S5 led us to propose that PALB2 chromatin association is, at least in part, mediated by the ChAM 7K patch, and its acetylation (hindered by 7Q and 7R substitutions, respectively) prevents DNA damage via a similar mechanism, i.e., protecting PALB2-bound genes during replication. This model nicely supports our observations that both 7Q/7R mutants exhibit slow S-phase progression and accumulation of gamma-H2AX over time. These points will be better articulated in the revised manuscript.

      In Fig. S5, it is interesting that there are differences in the association of different forms of PALB2 with 3 distinct active loci, but no error bars or measures of statistical significance are given. Further at 2 of the 3 loci, the association of the 7Q mutant is closer to WT than the 7R mutant. Taken together, neither Fig. 5 nor Fig. S5 strongly support the key conclusion that acetylation regulates the association of PALB2 with actively transcribed genes to protect them.

      We appreciate this constructive comment. The analysis was conducted once, albeit with three technical replicates, which explains why the results are presented without error bars. Nonetheless, we observe a consistent trend at three different loci, that both 7R and 7Q have chromatin association similar to the empty vector, which is background level (FLAG/IgG ChIP) and does not reflect real binding. The revised manuscript will include the results from three biological replicates with statistical evaluation (Experiment 2).

      4.Figs. 6D-G and S6A-D conclude that "DNA damage triggers ChAM deacetylation and induces PALB2 mobilization" based upon FRAP experiments utilizing WT PALB2. But there is no control to demonstrate that this is a specific effect driven by the state of PALB2 acetylation. For example, DNA damage might cause global acetylation changes resulting in relaxed chromatin in which proteins that are not subject to acetylation-deacetylation also show increased mobility.

      We thank the Reviewer for this valuable comment. It is true that we cannot formally exclude the possibility that changes in PALB2 mobility are indirect consequence of damage-induced chromatin reorganisation/increased chromatin mobility. However, our analyses clearly demonstrate that ChAM acetylation increases its association with nucleosomes (Fig. 3B), while non-nucleosome binding ChAM-null (7Q or deletion) increases PALB2 mobility (Fig. 2E, Fig. 4E and Fig. S4C). Further, WT PALB2 mobility increases after KAT2 depletion (i.e. reduction of chromatin acetylation of KAT2 targets, hence chromatin compaction) (Fig. 3F), but reduces upon KDAC inhibition (i.e. global increase in acetylation, hence chromatin relaxation) (Fig. 3G). Considering all these observations collectively, the increase in PALB2 mobility detectable upon DNA damage is unlikely to reflect global chromatin relaxation, and that PALB2 acetylation influences its mobility in both challenged and unchallenged cells. This point will be emphasised in the revised manuscript.

      5.Fig. 7B shows that the 7Q mutant has diminished RAD51 foci while Fig. S7C,D suggests based upon a different methodology (laser-induced damage) that the 7Q mutant does not affect PALB2 recruitment. Since the issue of recruitment is key to the mechanism proposed, the authors should examine PALB2 foci instead as this may be a more sensitive assay of PALB2 recruitment.

      We appreciate the Reviewer’s point. We would like to highlight, however, the well-documented role of BRCA1 in PALB2 recruitment to sites of DNA damage. This supports our notion that the 7Q mutant is recruited to sites of DNA damage, likely mediated via its interaction with BRCA1. As depicted in Fig. 7D, we propose that the 7K patch-mediated PALB2 engagement with damaged DNA, which is disrupted by the K to Q substitutions, is essential for proper RAD51 loading onto DNA, hence RAD51 foci formation and HR repair. This is in line with our observation that PALB2 ChAM deletion, similarly to the 7Q mutant, perturbs damage-induced RAD51 foci formation (Bleuyard et al., EMBO Rep. 2012). We believe that the laser-induced experiments provide high sensitivity and resolution for PALB2 recruitment kinetics, as the data were obtained with real-time live-cell imaging.

      6.The authors state in the last sentence of the Results section that "lysine residues within the ChAM 7K-patch are indispensable for PALB2 function in HR" but never test the mutants for HR using reporter assays. The manuscript would be strengthened by performing such assays.

      RAD51 foci formation and sensitivity to PARP inhibition are well-accepted readouts for HR repair. Conversely, we have been cautious about existing HR reporter systems, which evaluate gene-conversion or targeting events triggered by a ‘clean’ enzyme-induced DSB, but not an authentic repair of ‘dirty’ DSB induced by IR or olaparib.

      7.The model for the role of ChAM acetylation in regulating PALB2 function presented in Fig. 7D is not fully supported by the data presented. Critically, while association with RAD51 and BRCA2 is tested in Fig. S7B, the authors hypothesize that deacetylation is required to release PALB2 to enable association with BRCA1 but this is not tested utilizing the mutants.

      We appreciate the Reviewer’s point. It has been demonstrated that PALB2 interaction with BRCA1 is triggered by damage-induced PALB2 phosphorylation (Ahlskog et al., EMBO Reports, 2016), as well as removal of KEAP1-mediated ubiquitylation in S and G2 (Orthwein et al., Nature 2015). Our preliminary analyses further suggest that BRCA1-PALB2 interaction is highly dynamic, and we propose that damage-induced PALB2 modification and its mobilisation jointly facilitate this interaction.

      Also, there are some specific points that should be considered in the context of the model. This includes how DNA damage may trigger deacetylation, and whether it is the deacetylated state or the process of deacetylation of ChAM that is critical. Also, if acetylation is important for protecting active genes in the absence of DNA damage, is deacetylation necessary to release PALB2 local or global. This is important, because if it is local there needs to be a specific mechanism for local deacetylation, while if deacetylation is global that could result in transcriptionally active genes becoming unprotected.

      We thank this Reviewer for this valuable comment. We agree that, while this study establishes that ChAM is deacetylated upon DNA damage, it remains unclear whether the dynamic ‘de-acetylation’ of PALB2, rather than the ‘non-acetylated status’ of PALB2, is important for HR repair, and whether or not this is a local event. However, we would like to highlight that PALB2-bound genes are mostly periodic, e.g. those required for cell cycle progression (Bleuyard et al., 2017, PNAS). It would therefore be reasonable to speculate that DNA damage triggers the suppression of periodic gene expression as a part of DNA damage checkpoint signalling, possibly in a KDAC-dependent manner, which then allows release of PALB2 without risking DNA damage that could otherwise be caused by replication-transcription conflict. Mobilised PALB2 might then be recruited to sites of DNA damage for HR repair. Further study will be required to fully evaluate this model, for example by identifying the specific KDAC involved in ChAM deacetylation and tracking individual PALB2 molecules, which we consider to be beyond the scope of the present study. In the revised manuscript, we will better describe our model, and further detail the arising questions to be addressed in future studies.

      **Minor Comments:** a.Some parts of the Materials and Methods are overly long (such as the subsection on "Protein purification" and "immunofluorescence microscopy") and could be shortened by consolidating experimental details that are largely the same for related processes.

      We propose to move these experimental sections to the supplementary information.

      b.In the description of Fig. 1D, the statement "7K-patch, which is common to PALB2 orthologs" is misleading since there is not complete conservation of each lysine residue across each ortholog.

      We agree with this Reviewer’s comment and will amend the description in the revised manuscript accordingly.

      c.Figs. 3E,F and S3B,C perform FRAP in cells with knockdown of KAT2A/B as a surrogate for chromatin association. The authors note that this global reduction in acetylation increases PALB2 diffusion, but there is concern that this experiment is not very informative because the increased mobility may have nothing to do acetylation of PALB2.

      Please refer to our answer in response to the Reviewer’s point 4.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      This manuscript reports the control of PALB2 - chromatin interaction by the acetylation of a particular lysine-rich domain of the protein called ChAM. This acetylation is shown to be mediated by the acetyltransferases KAT2A/B. Following these investigations, the authors made an effort to place their findings in the context of DNA replication and DNA repair. The proposed model is that the acetylation-dependent interaction of PALB2 with chromatin could ensure the protection of the genome during DNA replication and control DNA repair. **Specific remarks** 1 - Based on different experiments, essentially the one shown in Fig. 3B, the authors conclude that the acetylation of the ChAM domain enhances its association with nucleosomes. However, taking into account the experimental setting, this conclusion should be largely tuned down. Indeed, this enhanced acetylation-dependent nucleosome binding was observed when the experiment was carried out in the presence of excess of free naked DNA. Under these conditions, the non-acetylated ChAM fragments became mostly trapped by DNA (clearly shown in Fig. 3C/D), and hence would not be available for nucleosome binding, while the acetylated ChAM fragments would remain available for nucleosome association because of their reduced DNA-binding ability. Consequently, the acetylation of the ChAM domain would only play a role on the availability of PALB2 for chromatin/nucleosome binding and not directly stimulate nucleosome binding. Therefore, the nucleosome-binding capacity of ChAM by itself should not be dependent on ChAM domain acetylation.

      If true, this hypothesis could also be relevant in vivo since the poly-K in the ChAM domain could also non-specifically interact with nuclear RNAs and hence its acetylation, by releasing it from nuclear RNAs, would make it available for chromatin-binding. The importance of RNAs in the regulation of PALB2 nucleosome-binding could be tested in the experiments shown in Fig. 2C and 2E by adding RNase to the pull-down medium (WT +/-RNase or addition of increasing exogenous RNAs).

      We are grateful for the Reviewer’s detailed comments and find the potential involvement of RNA very intriguing. Indeed, transcriptionally active loci, which are bound by PALB2, are enriched in nascent RNA, and such local RNA may play an important role in promoting the association of acetylated PALB2 with nucleosomes. However, we believe that investigating the role of RNAs in PALB2 nucleosome binding is beyond the scope of this study. As discussed extensively in response to this Reviewer’s point 2 below, we believe the mode of interaction of ChAM with nucleosomes to be highly complex, being jointly mediated by the N-terminal conserved region and the C-terminal lysine cluster. We will discuss these issues more extensively in the revised manuscript.

      2 - The real question is as follows. While acetylation makes the protein available for nucleosome binding, which part of the ChAM domain is actually mediating nucleosome binding and whether lysine acetylation could be directly involved in this binding. Another question would be to identify the elements in the nucleosome mediating this interaction, histones (core domain, tails, post-translational modifications, specific histone types), histone-DNA, etc...

      We entirely agree with the Reviewer’s question – despite the increasing recognition of the physiological importance of the PALB2 ChAM and our efforts in understanding the mode of association of ChAM with nucleosomes (including the potential involvement of histone tail modifications), this specific question remains enigmatic.

      Explicitly, our previous work demonstrated that substitutions of residues within the evolutionarily highly conserved N-terminal part of the ChAM perturb its association with nucleosomes (Bleuyard et al., 2017, PNAS; Bleuyard et al., 2017, Wellcome Open Research). A recent study by the laboratory of Prof Jackson proposed that basic residues across the ChAM are part of a binding interface with an acidic patch of histone H2A in its nucleosomal context (Belotserkovskaya et al., Nat Comm. 2020). Our results presented in this study introduced an additional complexity, showing that the C-terminal 7K basic patch is essential for ChAM-nucleosome interaction. Intriguingly, our study also suggests that the regions flanking ChAM, which are phosphorylated at multiple residues, play roles in regulating ChAM binding to nucleosomes (Fig 2B and C; please refer to our answer to the Reviewer’s minor point 6 too).

      We are currently working towards solving the structure of ChAM in complex with a nucleosome, which may help to clarify this very important question. At this point, we think that the question about complete elements for the ChAM interaction with nucleosome is out of the scope of this manuscript, and should be addressed in future work. To make this point clear, we will provide an updated overview of the ChAM elements affecting nucleosome interaction in the revised manuscript.

      3 - Taking into account the authors conclusions on the role of ChAM domain acetylation and its impact on PALB2 mobility, in Figure 4D/E, one should expect a difference of t1/2 when wild-type and 7R mutant are assayed by FRAP. At least the measures of t1/2 in the wild-type should have been more heterogeneous compared to the 7R mutant due to the acetylation of the wild-type PALB2 by the endogenous HATs (the impact of endogenous HATs on the wild-type sequence is shown in Fig. 3F). Could the authors comment on this?

      We appreciate this Reviewer’s point. As mentioned in our responses to Reviewer 1’s points 1 and 3, we are unable to exclude the possibility that the 7R mutant still maintains its DNA-binding capacity, masking detectable change in its chromatin enrichment and mobility. Also, PALB2 in vivo chromatin association is limited to a small fraction of periodic genes, hence FRAP assay may not be sensitive enough to detect minute but critical differences. We will conduct biochemical assessment of the ChAM 7R mutant and ChIP-qPCR analyses to assess PALB2 binding to specific genes, results of which will be included in the revised manuscript (Experiments 1 and 2).

      4 - It would be better to remove the data presented in Fig. 5 since, as currently presented, these investigations remain shallow and do not bring much information on what is happening. The presented data are rather confusing since, in the absence of further investigations, it is not clear which one(s) of the mechanisms involved in the control of DNA replication is controlled by PALB2 and many explanations, including artefacts, remain possible.

      The manuscript would gain in interest if the authors would devote the functional studies only to the repair part (Fig.6 and 7).

      We feel it is important to show Fig 5, as although the results may appear confusing, they highlight the importance of the acetylation of the 7K patch at the cellular level. Namely, the non-acetylatable 7R mutant fails to support normal cellular growth, likely due to its impaired association with active genes (Fig S5), which might provide in vivo evidence that non-acetylation of the 7K patch promotes PALB2 release from chromatin (please refer to our response to Reviewer 1’s point 3). We are confident that we will be able to clarify this point with our additional ChIP-qPCR analyses (Experiment 2).

      **Minor points** 5 - High background of non-enzymatic acetylation of PALB2 fragments makes the identification of KAT2A/B specific acetylation not very convincing. The immunoblot detection of acetylation fragments shown in Figure S1 is much more convincing. Therefore, the authors may consider to present Fig S1 as a main Figure and Fig.1B as a supplementary one.

      We will swap or add Fig S1B with or to Fig 1B in the revised manuscript.

      6 - It would be interesting if the authors would comment on why the presence of regions flanking the ChAM domain (Fig. 1A, construct #5) significantly reduces chromatin (Fig. 1B) and nucleosome binding (Fig. 1C).

      We are grateful for this Reviewer’s comment. Indeed, we noticed that the inclusion of the ChAM C-terminal flanking region perturbs its chromatin association. This region is highly enriched with serine and threonine residues which could be targeted for phosphorylation by cell cycle regulators (CDKs and PLK1) and DNA damage-responsive kinases (ATM and ATR). It is therefore tempting to speculate that, when phosphorylated, this flanking region could mask the basic patch of the ChAM, hence facilitating the release of PALB2 from undamaged chromatin region and its recruitment to sites of DNA damage. In the revised manuscript, we will provide the complete list of PTMs and discuss this point.

      Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      KAT2-mediated acetylation switches the mode of PALB2 chromatin association to safeguard genome integrity

      The authors describe a series of experiments examining the consequence of acetylation, within a defined motif (Chromatin Association Motif; ChAM), on the cellular roles of the protein PALB2 (Partner and Localizer of BRCA2).

      The key conclusions drawn by the authors are generally convincing and are supported by the presented experimental results, which indicate that acetylation of PALB2 by KAT2A/KAT2B modulates its cellular behaviour and response to DNA damage. However please see specific comments below:

      **Major Comments**

      Expression of full-length PALB2 in the heterologous host E. coli is highly problematic, as the WD40 domain is generally not correctly folded. The authors use the ArticExpress strain to try and solve/alleviate this problem - but it is clear from the materials and methods section that an ATP-wash step has had to be introduced in order to release the recombinant protein from the chaperone system encoded by the ArticExpress system; i.e. indicating poor / mis-folding. Whilst this does not strictly have an effect on the results presented in Figure 1 (detection of in vitro acetylation sites), they have implications for the wider scientific community, as this may lead to the erroneous assumption that is possible to produce functional / folded full-length PALB2 in this way.

      We apologise if the manuscript conveyed the message that we are able to produce functionally active, full-length PALB2 in bacteria, which was clearly not our intention. Our aim was to test whether KAT2A was able to acetylate PALB2 in vitro. We agree that the folding and the biochemical properties (e.g. WD40-mediated BRCA2 binding) of the bacterially produced full length PALB2 were not fully assessed. We believe that this does not affect the overall conclusions of this study. In the revised manuscript, we will correct this error to make this point clear.

      In vitro modification assays are prone to producing post-translational modifications that are not fully reflective of those observed in vivo, and therefore need to be treated with some caution. This is highlighted by the relatively low modification of K438 in vitro by KAT2A; esp. as this is an acetylation site that has been previously mapped in vivo (by the authors). It would have been useful to include / see the effects on PALB2 function in vivo by modification / alteration of this single site.

      We appreciate the Reviewer’s constructive comment. Redundancy of acetylation acceptor residues within a lysine cluster is common, as is also the case for many ubiquitination events, hence we analysed the 7K patch mutant for phenotypic studies. For the same reason, we trust that the outcome of the characterisation of a K438 mutant would not significantly change our conclusions.

      Figure 3C and Figure 3D do not fully support or reflect the conclusions drawn by the authors - any peptide containing a cluster of positive charged residues are likely to interact with DNA through charge neutralisation of the phosphodiester backbone, concomitantly any alteration to this region of charge (i.e. via acetylation) will perturb this interaction.

      We totally agree with the Reviewer’s view and state, in the main text referring to the results shown in Fig. 3C and D, that “As anticipated, lysine acetylation, which neutralises the positive charge on the lysine side chain, conferred reduced affinity for negatively charged DNA”. In the revised manuscript, we will make this point clearer.

      Furthermore, experiments performed with the synthetic acetylated peptides do not agree with those carried out with the GST-ChAM constructs - GST-ChAM interacts with the nicked and linear forms of the pBS plasmid (Figure 2F) but does not interact with the supercoiled form. The WT synthetic ChAM peptide, in contrast, interacts with all three plasmid states at high concentrations. It is suggested that these two figures are removed.

      It is true that we cannot exclude the potential difference between GST-ChAM and synthetic ChAM peptide: for example, 26 kDa of GST, which can form a dimer, might mask the full biochemical properties of ChAM in DNA binding. However, we believe that the difference is more likely caused by the concentration of ChAM used. While we used the synthetic ChAM peptides at concentrations of 2.97, 5.94, 29.3 µM for Fig. 3C, we used 5.94 µM of GST-ChAM for Fig. 2F, for which we apologise for the omission of the experimental conditions used. This notion is supported by the side-by-side experiment, which was not shown in the original manuscript. In the revised manuscript, we will make these points clear.

      p. 18 : the authors used a PALB2 variant, where the lysines in the 7K patch are mutated to arginine - but don't fully characterise the effects of introducing these particular mutations on the ability of the ChAM fragment to bind to DNA, or indeed to nucleosomes; this is an important control.

      We appreciate the Reviewer’s comment. Biochemical analyses of the 7R mutant were not conducted, as ChAM produced in bacteria is not expected to be acetylated. Nonetheless, as also linked with the concerns of Reviewers 1 and 2, we recognise the importance of 7R biochemical characterisation for accurate interpretation of in vivo phenotypes. We will assess the DNA and nucleosome binding of the ChAM 7R mutant, which will be included in the revised manuscript (Experiment 1).

      Figure 6 : it would be good to show a second supporting example for deacetylation of PALB2 in response to DNA damage - perhaps treatment with MMC?

      We appreciate the Reviewer’s comment. Indeed, we have conducted the analysis upon MMC and Olaparib exposure. Curiously, however, no clear change of ChAM acetylation was detectable. Note that, for this experiment, we assessed the acetylation level of a GFP-fusion of ChAM, exogenously expressed in HEK293, along with endogenous gamma-H2AX as a readout of DNA damage signalling. Unlike ionising radiation, which triggered strong induction of gamma-H2AX (Fig. 6), no clear increase of gamma-H2AX was detectable upon MMC/Olaparib exposure. Hence, we propose that the reduction of ChAM acetylation reflects the cellular response to DNA damage. We will make these points clear in the revised manuscript.

      **Minor Comments**

      p. 16 : 'Our MS analysis of the chromatin-associated GFP-ChAM fragment identified actelyation of all seven lysines within the 7K-patch (Fig. 3A, marked with arrows).

      This part of the manuscript is potentially a little confusing, as Fig. 3A references a series of synthetic peptides rather than the GFP-ChAM fragments themselves.

      We appreciate the Reviewer’s point. Indeed, Fig. 3A shows 1) MS of the chromatin-associated fraction of GFP-ChAM (the top part with arrows) and 2) a schematic diagram of synthetic peptides that we used for biochemical analyses (the bottom part). In the revised manuscript, we will clarify this point and indicate the MS result and the schematic of synthetic peptides in two separate panels and refer each of them appropriately.

      p. 20 : Furthermore, using the FRAP approach, we observed clear differences in diffusion rates of FE-PALB2 following damage by IR, MMC, or olaparib treatment... FE-PALB2 = FL-PALB2?

      We apologise for the confusion. In our study, FE-PALB2 refers to Flag-EGFP tagged PALB2 (full-length). This is defined in the text “To this end, a tandem FLAG- and EGFP-tagged full-length wild-type (WT) PALB2 (FE-PALB2)” (p. 17).

    1. Overall, I think you have a great story. There is definitely a beginning middle and end that work cohesively. I am most interested in the organization and it taking over the government. It then eventually did a lot to change society which was cool, and you described the different things well. I know you probably did it on purposely, but congress, state and local governments were left out. I’m guessing in Healthment’s takeover those institutions ended? I also think that you could consider removing your “prologue.” It may not be necessary given that you do mention many of the things in that part throughout the story. For me if I read the story without that part, I think I would focus mostly on the environmental and health affects that Healthment’s formation and governance had on society. You did a pretty good job referencing and including the city as a character as Dr. Bush “asked” for. I think the chapter about Lairen going to get her mom may not be necessary to your overall plot. Lairen and Xavier talking and becoming even closer could probably happen anywhere or anytime in your story. Regardless of some of my “critiques” you have a story that resonates with me and probably many others when it comes to health and that if the government forced it on people, we would be better off. I think though that maybe it would be more than 4% of the US that would say no to it. Great conflicts and resolutions and an interesting outlook and story of a future where a health/environmental group runs the country.

    1. Late-twentieth-centurymachines have made thoroughly ambiguous the difference betweennatural and artificial

      Machines have progressed in such a way though that the previously formed boundary between human and machine is not clear. No longer is the distinction so clear as: humans=consciousness/subjective experience/natural machines=coded devices/bound to man's limitations/artificial Though...I kind of don't think machines are close to consciousness (have the ability to experience "what it is like" to exist) in these progressive technologies, neither when Haraway was writing nor 2020. This may not be all about consciousness but I still think it is at the root of this distinction. It moreso seems like we are just attributing complexity to machines which are human created nonetheless...e.g. I may just not know enough about machines but how are they "self-developing"? Or is she saying they just seem self-developing and that is enough to have social implications?

    1. And yet I need to say here that silence is not always or nec-essarily oppressive, it is not always or necessarily a denial or extinguishing of some reality. It can be fertilizing, it can bathe the imagination, it can, as in great open spaces-I think of those plains stretching far below the Hopi mesas in Arizona-be the nimbus of a way of life, a condition of vision.

      Beautiful! Silence as a condition of vision. This is brilliant!!!! It made me so happy when I found a way, a phrase that could express why I love the classes Prof. Annabel teaches. I wrote in a piece of paper in order not to forget: "Prof. Annabel makes me believe that the feeling I sometimes have --the feeling of having something to say-- is not false, is not illusory." But now, having read this passage, I may add more to it! I can explain it better. Your classes, the texts you choose for us to engage with, they allow for us to find a path, an always unique path, in which we can celebrate our silence. Not to suffocate with what is not said, but to "bathe [our] imagination" so that when we do break it, it is never to further harm our human relationships. That's so beautiful!

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1 (Evidence, reproducibility and clarity (Required)):

      **General comments**

      The manuscript 'Second messenger control of mRNA translation by dynamic ribosome modification' is a very interesting follow up on the research performed by the authors published in 2016. Here, the authors continue their study by determining the impact of the intricate RimABK pathway in Pseudomonas fluorescens on translational reprogramming by controlled modification of ribosomal protein S6 in response to environmental signals. The manuscript is interesting and well written, and the results are sound. However, in my opinion the general conclusion is not supported by experimental data and leaves several potential explanations open. Thus, I suggest to either perform in vitro translation experiments using ribosomes equipped with glutamated S6 to validate translational selectivity, or to soften the language on the working model shown in Figure 12.

      The authors would like to thank reviewer 1 for their detailed review of our manuscript. We agree with the reviewer that alternative explanations are possible for the translational changes linked specifically to glutamation, as opposed to rimBK deletion. Our intention when writing the discussion was to clearly distinguish glutamation-specific effects from the large number of indirect translational changes associated with Hfq disruption and other uncharacterised consequences of rimBK deletion. With hindsight, we acknowledge that the discussion and the model in figure 12 should more clearly outline the possible alternative causes for the observed glutamation-specific translational regulation. We have modified the discussion and figure 12 (now figure 10) accordingly.

      The reviewer further suggests that we perform in vitro translation experiments using ribosomes equipped with glutamated S6, to prove that glutamation controls translation directly. This is an excellent suggestion that would clarify this important point, and we will certainly attempt it as part of our future analysis of the Rim system. However, at this stage we feel these experiments are beyond the intended scope of this paper, which is to describe the signal inputs and mechanism of the RimABK system and to show evidence for both specific and secondary translational effects of ribosome modification.

      **Specific comments**

      Figure 1 and S1: The RT-PCR analysis shown here does not allow excluding transcription initiation at alternative promoters downstream of the one determined by 5'-RACE. However, an alternative promoter might contribute to relative ratios between the rimA, rimB, and rimK mRNAs. A Northern blot and/or primer extension analysis could clarify this assumption and would give more detailed insights into the specific regulation.

      The reviewer is correct that alternative rim promoters could exist downstream of the amplified 5'-RACE region. To test this hypothesis, we conducted additional RT-PCR experiments to measure expression of rimA (the third gene of the polycistronic rimABK operon) in the same set of conditions as tested for rimK. Relative levels of rimA mRNA do not substantially differ from those seen for rimK, strongly suggesting that the promoter upstream of rimK controls expression of all three rim genes. We have added this dataset to figure S1 and have modified the relevant sections of the text.

      Figure 2B: I'm confused by the results shown here! I do only see a reduction of RpsF in the presence of RimA, RimK and cdG. What indicates the modification? Please, explain the interpretation of the result in more detail. Shouldn't the modified RpsF shift due to the addition of glutamate residues?

      The uncontrolled activity of RimK acting in the absence of RimB (e.g. the experiment represented in Fig 2B) typically results in a reduction of the unmodified RpsF fraction in the reaction, replaced with RpsF proteins with widely varying numbers of glutamate residues attached to their C-termini. The resulting modified RpsF fraction can appear as a smear of protein density throughout the gel. We have clarified the text surrounding figure 2 to make this more explicit.

      Figure 2C: Why does the RpsF modification lead to a supershift? How many glutamate residues are added? Is the smear visible in lane 4 (RpsF+RimK) representing already the slightly modified RpsF protein, which upon addition of RimA results in a supershift? For all SDS-Page analyses shown in the manuscript the validation of the glutamation using the antibodies specific against poly-glutamate would be a great asset to facilitate their interpretation.

      Pseudomonas fluorescens RimK appears to have unregulated ligase activity, with many hundreds of glutamates being added to each RpsF protein in the absence of RimB cleavage. In our 2016 paper (Little et al., PLoS Genetics) we use radiolabelled glutamate incorporation and mass spectrometry to show that the supershifted protein smear is composed entirely of RpsF units with C-terminal glutamate tails of varying length. (It is interesting to note that E. coli RimK, which does not have an accompanying RimB protease, can only add 4-15 glutamates to each RpsF protein). We have modified the text slightly to make this clearer.

      The reviewer’s suggestion to stain the supershifted RpsF with the poly-E antibody is interesting but would likely only reiterate our published results with radiolabelled glutamate (Little et al. 2016).

      Lines 236-238: '...strongly suggesting that the proteomic changes we observe are an active response to modification of ribosomally-associated RpsF proteins.' This is an important suggestion as it allows a flexible and very fast integration of the external signals into a specialized protein synthesis. Thus, it definitely deserves further analysis! Considering that the purified RimA and RimK proteins are available, in vitro modification of RpsF in the context of the purified ribosome would be an important experiment and would greatly increase the quality of the paper. Up to now the selective or specialized translation is pure hypothesis and might also be explained by indirect effects via e.g. increased interaction between the ribosome and HFQ that might mediate interaction with certain mRNAs and thus stimulate their translation.

      We agree with the reviewer that direct measurement of translational changes in vitro would tell us a great deal about the mechanism of RimK regulation. This would enable us to confirm whether the glutamation-specific effect is direct, or if it functions through an as-yet uncharacterised indirect mechanism (such as interaction with another translational regulator). As stated above we feel these major experiments are beyond the scope of the current manuscript, although we are keen to do them (as part of a planned structural biology investigation of modified ribosomes). As stated elsewhere in our response, we have extensively revised the discussion text and figure 12 to clarify the limits of our current understanding and highlight the different potential regulatory routes for RpsF glutamation.

      Lines 322: '...into a single output: the proportion of all ribosomally-associated RpsF proteins that have C-terminal poly-glutamate tails.' Considering the identification of a group of genes whose translation is altered by rimBK deletion, but not by RpsF glutamation (Class 1, Fig 11B), I would suggest softening this statement. If I interpret the data correctly, they pinpoint to a moonlighting function of the rim-pathway that does not target RpsF!

      The genes whose translation is affected by rimBK deletion, but not by RpsF glutamation specifically, include all those genes whose translation is indirectly affected by downstream translational regulators, or through interaction with another affected gene target. As expected, there is substantial overlap between the rimBK and hfq translatomes (Grenga et al. 2017): this analysis can be included in the manuscript as a supplementary table if requested. Importantly, there is very little overlap between the Hfq translatome and those genes that are affected specifically by RpsF glutamation. One possibility is that Hfq interacts with RimK at the ribosome, and the loss of the RimK protein is a major factor in destabilising Hfq function in the ∆**rimK mutant. We have modified figure 12 (now figure 10) and expanded the discussion to include this hypothesis.

      While we cannot exclude the possibility that RimK has other cellular targets in SBW25, we think this is unlikely to be a major cause for the results we see here. We have carefully examined the C-terminal peptides of proteins detected in our various proteomic assays and are confident that RpsF is the sole target of RimK in SBW25 under the conditions we tested. We also directly tested RimK interaction with purified Hfq and confirmed that Hfq is not a direct target of RimK modification.

      Lines 377-76: '...distinguishing features in the primary or predicted secondary structures of the Rim-mRNAs...' As mentioned already above several indirect options are still open that could confer selectivity to the ribosome.

      As stated above, the discussion has been rewritten to more completely reference the possible mechanisms by which RpsF glutamation may lead to translational regulation.

      Reviewer #1 (Significance (Required)):

      The key concept of the manuscript namely the impact of the intricate RimABK pathway in Pseudomonas fluorescens on translational reprogramming by controlled modification of ribosomal protein S6 in response to environmental signals is novel and will significantly impact the field.


      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      **Summary**

      The main question addressed by this research is how bacteria adapt to rhizospheric niche through the RimK ATPase glutaminase. This enzyme post-transcriptionally modifies the ribosomal protein RpsF in a process of complex regulation. Regulation is mediated by c-di-GMP that is degraded by the phosphodiesterase RimA and the protease RimB exerts a role opposite of RimK. Novel findings include the finding of RimK acting as a four-state ATPase, depending on the binding of RimA, c-di-GMP or both. Another important finding is the opposite roles of RimK and RimB on the glutamation/deglutamation of RpsF and the tendency to a steady state of four glutamate residues in the RpsF protein. The authors also use proteomics to determine the effect of glutamation, specially at low temperature and under nutrient limitation.

      We thank the reviewer for their positive review of the manuscript and address their comments below.

      **Major comment**

      In my opinion, the results obtained with the Hfq regulation by RimK blur the message. I firmly think that the Ms is very solid with the results obtained in relation with the RimABK/RpsF regulation in P. fluorescens shown as a model in the Figure 12. Moreover, in this final model presented by the authors (fig. 12) they not included the results related with Hfq. These results could be part of another paper.

      We agree with the reviewer that the Hfq independent effects of RpsF are an exciting finding and should be a major focus of the paper. That said, we feel that the additional work we have done showing how Hfq is affected by RimK should also be retained in the manuscript in some form. Our data (e.g. figure 8) indicate that Hfq is responsible for a large (indirect) fraction of the ∆rimK phenotype, so understanding how it is affected is important to understand how RimK functions. Based on comments from reviewers 2 and 3 we have reviewed the manuscript text (including data on Hfq) to make the narrative as focussed and clear as possible. We have also redesigned figure 12 (now Fig 10) to consider comments from all three reviewers and have changed the text in the discussion to match this.

      **Minor comments**

      In figure 4A, what is lane 5?

      Lane 5 contains RimB without ADP. The figure legend has been modified accordingly, and we thank the reviewer for highlighting this error.

      Line 159 change "suppression of RimK band-shifting" by "suppression of RpsF band shifting"

      This has been fixed.

      Reviewer #2 (Significance (Required)):

      The Ms. is very interesting and deeply describes the relation between environmental conditions, c-di GMP second messenger and the RpsF ribosomal protein posttranscriptional modification in order to respond to low temperatures and changes in nutrient availability. The research developed in this manuscript is original and novel in the field and includes new advances in the signal transduction pathways implicated in the regulation of bacteria adaption to the environment. Besides, the research design and technical methodology is original and includes multidisciplinary approaches of interest to the research community in general.


      Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      **Summary** Post-transcriptional control of protein abundance is an important yet poorly examined regulatory process by which bacteria respond to signals found in the environments they grow in. The authors' team have previously identified, described and published details around a novel regulatory pathway involving the ribosomal modification protein RimK, regulator proteins RimA and RimB, and the widespread bacterial second messenger cyclic-di-GMP (cdG). In the current manuscript builds considerably on those previous findings and goes several steps further, through various approaches including protein biochemistry, computational modelling, quantitative proteomics and ribosomal profiling, the authors described how the RimABK pathway as a novel translator system that controls bacterial adaption to the rhizosphere in the bacterium Pseudomonas fluorescens. They show that the system achieves this through specific controlled modification of the ribosomal protein RpsF. I read the article with excitement and overall the manuscript describes an extensive data set that will be of considerable interest to many readers in several fields. However, I have made a few points below that the authors need to take on board and address. If these issues are addressed, I believe it will make the presented data much clearer to the reader, tidy up a few ambiguities and make the article a little more accessible to many non-specialist readers.

      We thank the reviewer for their thorough and positive assessment of the manuscript. We address their specific points below.

      **Major Comments**

      1) The major finding described in the manuscript and the one that will be of significant interest to reader is that a novel post-translational ribosomal modification regulatory mechanism involving Rim system controls bacterial adaption. The second messenger cdG only plays a small part in this complicated process. Therefore, I believe the title needs to be revised to capture the scope and key findings of the manuscript.

      We are happy to change the title along the lines suggested by the reviewer. We propose: Control of mRNA translation by dynamic ribosome modification as a new title.

      2) The authors present a lot of interesting data; however, I found the manuscript a bit of a dense read. I find the key findings are diluted within the text. I would ask that the authors to make it a little more focused. For example, on the regulatory role of RimK and its influence on Hfq and RpsF has been detailed previously so could be placed in supporting information and briefly mention when required. Also, the experiments on the pvdIJ pathway could be removed or placed in supporting information as they are not the main focus of the manuscript. Fig 5 and 6 could be combined as one figure as well.

      We have modified the manuscript throughout to make it clearer, more concise, and to focus as much as possible on new findings rather than reiterating what we showed in our last manuscript. In line with the reviewers’ recommendation, we have moved the pvdIJ data into the supplementary material (Fig S3) and merged figures 5 and 6 into one. In addition, to support our data on the importance of RpsF glutamation for ribosomal regulation we used Western blotting to confirm that RpsF4/10glu variants incorporate normally into SBW25 ribosomes in vivo (added as supplemental data Fig S5).

      As stated elsewhere, we feel that key data on the relationship between Hfq and RimK should remain in the main manuscript, although we have reviewed the text thoroughly to try to ensure it is as focussed as possible and have moved some results to supplementary material as suggested.

      3) The authors propose a four-state kinetic model for RimK ATPase activity with RimA and cdG (described in Fig2 and Table S1). However, later in the manuscript the authors demonstrate that RimB also stimulates RimK ATPase activity, but this seems to have smaller impact than RimA and cdG (Fig 2E, Fig 3A). Why RimB was not included in the ATPase kinetic model of RimK? Does including the RimB data suggest there might be more conformational states for RimK?

      Thank you for raising this point. The reviewer is correct in that this data does indeed suggest another level of ATPase activity of RimK. We have added text to the manuscript to reflect this. We have also extended the supplemental Table S1 to include these equations.

      4) The authors claim that the suppressive effect of cdG on RimK was depended on the enzyme activity (PDE domain) of RimA. This was tested using an enzymatically inactive RimA variant (RimA-E47A). However, in Fig 3E the amount of RimA-E47A used in the assay seems to be significantly less than wildtype RimA. Additionally, in Fig 2B, the authors show that addition of cdG also stimulates RpsF modification with or without RimA (lane 4-6). I would ask the authors to clarify these points.

      It is difficult to directly compare protein variants due to differences in solubility post-purification. Due to difficulties in purifying this (less soluble) form of RimA, co-purifying contaminants have also probably influenced the determination of RimA-E47A concentration to some extent. This restricts us to making largely qualitative statements about protein function, as we do here. Despite its poor solubility and low concentration, RimA-E47A is still able to stimulate RimK. Furthermore, the relatively low concentration of RimA-E47A in our assays would render it at least as susceptible to any effects of cdG addition as WT RimA, meaning we can be confident that cdG has no effect on RimK stimulation by this variant.

      Our model incorporates direct stimulation of RimK by cdG alongside its effect on RimA. We show evidence for this in this manuscript and in our 2016 paper.

      5) The authors claim that high levels of cdG increase the ratio of RimB protease activity to RimK glutamate ligase activity. However, there is no experiment to provide direct evidence to support this. Please tone down the language used or provide evidence. On the same point Fig 6 was not explained in the main text to support this conclusion. Please include an explanation.

      The hypothesis that high cdG levels favour RimB activity over RimK stems from the observation that cdG suppresses RimK activity (by abolishing RimA stimulation) but does not affect RimB. We have data showing that increasing cdG levels suppresses RpsF band shifting in vitro in an assay containing all three Rim proteins (Fig 4). However, we agree the hypothesis that cdG controls the ratio of RimB to RimK activity by controlling the activity of RimK currently lacks explicit, direct evidence and we have modified the text to tone down the language.

      An explanation for Figure 6 (now 5b) has been added to the manuscript as requested.

      6) In some of the figures/images, for example, Fig2B and Fig 3E, RimA is shown as a major band. However, in other figures/images, for example, Fig 2D, Fig 3D, RimA seems to be two bands. The authors should explain the reason for this.

      Based on extensive experimentation, we are confident that the second band present in some of our assays is a cleavage product of RimA. This is an experimental artefact that is linked to concentration and protein stability in vitro. We must stress that the presence of an inactive fraction of RimA in our assays does not affect the conclusions we are able to draw from these experiments. A note has been added to the relevant section of the text.

      **Minor comments**

      • Line 151, should be RpsF band-shifting instead of RimK.

      • Fig 4A there is no legend for lane 5, which made it very difficult to understand the data presented.

      Please see above. These two minor errors will be fixed.

      • The layout of some figures could be improved.

      We have revised the layout of several figures, in line with the reviewer’s suggestion.

      • If it is possible to have Fig 11 as a Venn diagram or some intuitive diagram, it will help the readers gain access to the data and understand the results.

      We respectfully disagree with the reviewer here. We have tried several different presentation styles for these data, but ultimately considered scatter charts to be the most effective, in line with our previous study of Hfq regulation in Pseudomonas (Grenga et al. Frontiers in Microbiology 2017).

      Fig 12 is very neatly laid out. However, I don't feel it captures the dynamic nature of the system. I am just wondering if the authors could break it down so that it describes the changes relating to environmental conditions and/or different cdG levels?

      Figure 12 (now Figure 10) has been modified to reflect to comments of all three reviewers.

      Reviewer #3 (Significance (Required)):

      The manuscript provides detailed evidence to demonstrate a dynamic, post-translational ribosomal modification mechanism which is an important feature of prokaryotic (potentially archaeal and eukaryotic) environmental adaptation. This is an exciting manuscript and one many will wish to read. The data provided will be of interest to scientists working in many fields including microbiology, biochemistry and plant pathology.

      I have several areas of expertise including genomics, molecular microbiology, small molecule signalling and regulation, micro-host interaction, adaptation,

    1. Skule (1999) describes how an inter-organisational group of workers from five food-and-drink companies were taken through a training program that included "practice in other companies". Says Skule, "Most of the skilled operators described [the experience] in terms like "see things differently", “opened my eyes”, “think more about what I am doing”, “more alert” and “think more about the consequences”. These new perspectives or ways of seeing in turn made operators attend to features in their work situation in a new way. From a former habitual way of working according to minimum standards, many skilled operators developed a more reflectively skilled way of performing their job, within the limits of existing job structures and routines." We believe this kind of benefit may not be as often used as is possible.

      Having teachers participate in laboratory classroom residencies has had this impact, but communicating the importance to experts is a challenge, and the tyranny of experts is to deny the importance of practitioners gaining insight or seeing new possibilities.

    1. How do you think the “inner” and “outer” landscapes apply to the development of the teacher?
      From what I have been able to gather about the “inner” and “outer” landscapes as presented by Parker Palmer, Laura Rendon and the AACU suggests to me that good teachers are genuinely motivated by not only passion for their field and for the reward reflected in the academic successes of their students, but also the personal growth of their students.  Teaching isn’t something they happen to do but something they must do in order to facilitate students’ social consciousness and empowerment. When we encounter students who may be perceived as unmotivated or lazy, we kick it into gear and get creative with approaches to engaging students where they are. Instead of seeing our students from a deficit perspective, we look for their assets—the qualities of our students that can help them learn, such as their bilingualism, creative interests, hobbies or talents outside of our discipline. What we value in our students isn’t a reflection of what we want them to be, but what they want for themselves. We trust our students’ innate capacity to learn and to acquire confidence in being a college student.
      
    1. Dayadhvam: I have heard the key Turn in the door once and turn once only We think of the key, each in his prison Thinking of the key, each confirms a prison Only at nightfall, aethereal rumours Revive for a moment a broken Coriolanus

      Voices: The voices speak of a key that would either lock/unlock the prison they are in. Whether it is real and they believe it or just a fictitious rumor is either possibility. Yet it seems they want freedom from something. Un/natural time/Desire frustrated (maybe?): If their thoughts are mostly on this key, are they keeping track of the passing time other than day and night? How many days are spent in this prison they believe they are in? Exile: They seemed to be trapped in a prison, in search of a key that may or may not free them. Fragments: The lines go back to the key for three of the lines and prison for two lines. These moments seem to only pause when it is night. Text as plagarism/remixed (maybe?): Coriolanus was mentioned. After looking it up, one result was a tragedy Shakespeare wrote.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1 (Evidence, reproducibility and clarity (Required)):

      In this study by Wegwitz et al, the authors examine the tumour promoting properties of RNF40 (and the H2B monoubiquitinylation catalysed by it) in Her2 driven breast cancer.

      They report, using publicly available data, that increased RNF40 expression is associated with reduced overall and disease-free survival.

      Using a mouse model, where they crossed the Erbb2 (mouse Her2) under the control of the MMTV promoter with conditional Rnf40 deletion constructs, the authors found that deletion of Rnf40 simultaneous to Her2 overexpression resulted in a prolonged tumour-free survival, somewhat reduced tumour growth kinetics and tumour incidence.

      siRNA silencing of Rnf40 in two Her2 positive breast cancer cell lines resulted in reduced proliferation, clonogenicity and tumour sphere formation and cellular motility.

      Transcriptome analysis revealed pathways that could explain the phenotype, like increased apoptosis and actin cytoskeleton regulation. The authors then took further some candidates in the later pathway to investigate the mechanism. They find that Rnf40 loss impacts on actin cytoskeletal dynamics. They also investigate the impact on focal adhesion signalling integrity.

      Finally, they investigate the relationship between the transcriptome and H3K4me3 and H2Bub1 landscape in the presence or absence of Rnf40.

      The manuscript is convincing regarding the tumour promoting roles of Rnf40, but the key claim that H2B monoubiquitinylation is essential for activation of the Rho/Rock/Limk pathway, where genes are down regulated upon Rnf40 loss resulting in decreased tumourigenicity of cells, is so far not convincing.

      "Together, these findings support the hypothesis that the actin regulatory gene network is dependent on direct epigenetic regulation by RNF40 through modulation of H2Bub1 and a trans-histone cross-talk with H3K4me3 levels in HER2-positive BC cells."

      Although the correlation is apparent, at this point it's unclear if the phenotype is dependent on the catalytic activity of Rnf40 or it's a non-catalytic effect. Generating a catalytic mutant RNF40 and test it at least in the cell lines studied would be desirable.

      We thank the reviewer for this comment and agree that the addition of data with a catalytic mutant RNF40 could strengthen our findings and further clarify mechanisms involved. Thus, in a resubmission we will directly address this point by performing knockdown/rescue experiments with either wildtype or a RING finger mutant RNF40. This will be done by transfecting cells with expression constructs for either wildtype or mutant RNF40 proteins followed by knockdown of endogenous RNF40 using siRNAs targeting the 3’ UTR. Experiments central to our take-home message will be performed (e.g., cell migration, target gene expression, Western blot for H2Bub1, F-actin formation). Together, we hope these experiments will help significantly solidify the message of this paper and further clarify the individual role of RNF40 within the RNF20/40 heterodimer.

      **Other comments that need a response:**

      1."we investigated RNF40 expression and H2Bub1 levels by immunohistochemical staining of 176 primary BC tumors and 78 brain metastases."

      In Fig 1 I can only count 41 primary BC tumours and 73 brain metastases. Numbers don't add up. Also, how is "low" defined as opposed to negative? What is used as controls?

      We apologize for this mistake. We corrected the numbers of primary and metastatic HER2-positive specimens used in this study.

      2."Moreover, HER2-positive metastatic BC samples showed a particularly high expression of RNF40 compared to primary tumors"

      Figure 1 or Fig S1A does not contain data on HER2-positive metastatic BC

      We think there might have been a confusion regarding this point. The manuscript does provide information about RNF40 and H2Bub1-staining in primary HER2-positive breast cancer lesions as well as HER2-positive brain cancer metastasis specimens in Fig.1A-C as well in Fig.S1A (representative brain metastases are shown in IHC pictures). This is stated both in the main text as well as in the respective figure legends. However, if for some reason this remains unclear, we would certainly be open to suggestions as to how we can modify the respective sections to improve their clarity.

      3."tumors did not display a loss of either RNF40 or H2Bub1 (Fig. 1H) when compared to the adjacent normal mammary epithelium (Fig. S1F)."

      I don't understand what I see in Fig S1F, where is the tumour, what is adjacent?

      We agree with the reviewer that splitting tumor staining in the main Fig 1 and normal tissues in Fig S1 makes a comparison difficult. We will therefore edit the Fig S1F and provide there an overview of tumor and surrounding normal tissues together with magnifications of the respective areas. This should significantly ease a comparison of both RNF40 and H2Bub1 in tumor and adjacent normal tissues.

      4."homozygous loss of Rnf40 (Rnf40fl/fl) resulted in dramatically increased tumor-free survival of MMTV-Erbb2 animals (Fig.1E)." This is overinterpretation of the data, I would not call it dramatic, just significant.

      The MMTV-Erbb2 mouse model is a very reliable mouse model for the induction of HER2-positive lesions. In our hands, the tumor incidence in these animals was 100% with a median tumor free survival of 166 days. In comparison, approx. 20% of the Rnf40fl/fl animals (3 out of 14) never developed the disease during the 18 month observation. The animals that still developed lesions had a median tumor free survival of 241 days, which represents a delay of 75 days (45% delay). In light of this, it seems to us that the effect of RNF40 loss on HER2–positive lesions is, indeed, remarkably strong. However, we do not wish to give an impression of over-interpreting or misrepresenting the data. For that reason we modified the wording in the main manuscript according to the reviewer’s suggestion (line 140: “dramatically” was replaced with “pronounced”).

      5."loss of Rnf40 led to strongly reduced tumor growth kinetics (Fig.1G)." Is this result significant, I did not see an evaluation of statistical significance in this data.

      As suggested by the reviewer, we have performed additional analyses to examine the statistical significance. We have now included the results of these tests in the respective figure.

      6."Rnf40fl/fl lesions displayed a heterogeneous pattern of RNF40 expression (Fig.1H), suggesting that the few tumors that did develop in this model were largely caused by an incomplete loss of the Rnf40 allele." If this conclusion is suggested, the authors should check if the "escaper" cells have failed to flox the Rnf40 allele on the genetic/protein level. Otherwise it's not conclusive.

      The reviewer brings up an interesting and important point about the heterogeneous loss of RNF40 in “escaper” tumors. Very important to note is that these “escaper” tumors developed significantly later and three animals never developed tumors. Thus, the “escaper” phenotype is rare (at the cellular level) and is likely similar to the selective process that occurs in human tumorigenesis and tumor progression. It is well established through a number of publications that deletion of genes essential for tumorigenesis via Cre-based systems frequently results in a specific selection for the rare instance that the Cre-mediated excision is ineffective. These “escaper” cells can then grow out and proliferate because they do not suffer from deletion of the floxed allele. This effect has also been established when combining MMTV-HER2 and MMTV-Cre. For example, analogous findings were recently published by Costa, et al., in Nature Communications (doi: 10.1038/s41467-019-11510-4) where the MMTV-Cre-mediated deletion of Pak4 resulted in impaired MMTV/HER2 or MMTV-PyMT-driven tumorigenesis, but occasional tumors did appear, which all retained some degree of PAK4 expression. This effect, which we have also seen in our system, was also reported by Miao, et al. in Cancer Research (doi: 10.1158/0008-5472.CAN-11-1015) in 2011. In their work the authors observed that deletion of the Myb gene also impaired MMTV-HER2-driven tumorigenesis and those tumors that developed in Myb flox/flox mice displayed a late onset and invariably retained MYB expression. Similar findings have been reported in a number of other tumor types and with various Cre drivers. Thus, we posit that these findings provide further support for the essential role of RNF40 in HER2-driven tumorigenesis to the extent that rare, RNF40/H2Bub1-expressing “escaper” cells are positively selected for during tumorigenesis and tumor progression.

      In order to definitively establish this, we propose performing dual immunofluorescence staining of Rnf40 flox/flox tumors to verify that H2Bub1 is exclusively and universally lost together with RNF40 and that each case of a complete loss of RNF40 also results in a complete loss of detectable H2Bub1 staining. Additionally, we will assess the efficiency of the cre mediated deletion of Rnf40 exons 3 and 4 in Rnf40fl/fl animals by detecting their presence using a conventional PCR approach.

      1. Fig S4D - is this clonogenic assay? How many replicates were done, biological technical?

      We apologize for the imprecise description of this figure. We edited the manuscript accordingly and included details about the number of replicates.

      8."Additionally, treatment with either CYM-5441 (Fig.4J) or …"

      Fig 4J is missing! It makes this section rather hard to follow. Fig S4F-G, how many replicates were done, biological technical?

      We thank the reviewer for noticing this error. The figures were indeed inappropriately referenced in the text. This error has been corrected.

      9."Consistent with our analyses based on changes in H3K4me3 occupancy, genes downregulated upon RNF40 silencing displayed the most prominent decrease in H3K4me3 in the gene body (the 3' end of the peak)"

      The impact of these mods changes is hard to judge because they are rather small (I would not use the wording prominent).

      As implied by the reviewer, we will replace the word “prominent” with “noticeable”.

      Also, are there many other "peak narrowing" genes but they are not downregulated?

      The point mentioned here is very interesting. The bioinformatic analyses performed in this study solely focused on the relationship of significantly regulated genes and the H3K4me3 peak narrowing at their TSSs. However, we did not analyze the global regulation of genes showing H3K4me3 peak narrowing near the tSS. As this information might be of high relevance for this study, we propose to investigate this interesting aspect in the revised version of the manuscript.

      In fact, our analyses have revealed that a large fraction of genes with H3K4me3 narrowing peaks do not show an appreciable decrease in expression. To better understand the epigenetic features determining the sensitivity of genes to H3K4me3 peak narrowing, we studied the occupancy of several histone marks at differently behaving genes. We discovered that sensitive genes globally present lower occupancy of histone modifications which are known to positively influencing gene transcription. We therefore propose that the epigenetic context (i.e., presence of additional histone modifications) strongly determines whether the loss of H2Bub1, and ensuing narrowing of H3K4me3 near the TSS, results in decreased transcription.

      Statistical analysis missing: for example in Fig 2C, Fig 2E, Fig 3G what is n=?, how many technical, biological replicates were analysed?

      This information has been added to the revised manuscript.

      Fig 4E seems to be a partial duplication of Fig 3D!

      The samples in Fig. 3D and 4E originate from independent experiments. In Figure 4D, we indeed provide again PARP and Casp3 signal for siRNF40 samples in order to allow a direct comparison of the effect magnitude between RNF40 depletion and ROCKi treatment.

      **Minor:**

      Figure referencing: it can be quite confusing to see a different ordering of figures compared to the referencing in the manuscript, for example Fih 1H is referenced in the text before Fig 1F, G. The authors should change the order in the main figures....

      We thank the reviewer for pointing this out. We have updated the figure order in the revised manuscript accordingly.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      In this study, Wegwitz et al propose that the E3 ubiquitin ligase RNF40 is highly expressed in HER2+ breast cancer tumours and correlates with poorer survival, using their own and TCGA data. Contrary to observations suggesting a tumour-suppressive role in other cancers, authors show using RNF40-knockout breast cancer mouse models and in vitro data shat RNF40 promotes tumour growth. RNF40 depletion impairs proliferation, survival and sphere formation by inducing apoptosis. In addition, RNF40 promotes cell migration by upregulating expression of cytoskeletal proteins (ROCK1, VAV3, LIMK2) and their effectors such as phosphorylated cofilin. Authors show elegant partial rescue experiments of the effect of RNF40 depletion on apoptosis and survival.

      Given that RNF40 function seems to be context-dependent, findings from this study could have broad significance for other cancers with high RNF40. It also provides some mechanistic data (that should be improved as suggested below) linking this ubiquin ligase to the cytoskeletal machinery and, therefore, control of migration and also proliferation and survival.

      Data are well presented and most conclusions are supported by the data. However, there are some gaps at the mechanistic level. Since migration is controlled by RNF40 in vitro, evaluation of metastatic ability in vivo (local invasion for example as suggested below) should be evaluated and would strengthen this part too.

      **Major comments**

      1. Fig.1A-B, S1A. Specificity of RNF40 antibody should be shown, which could be done quite easily in the tumours from the knockouts. From the datasheets, antibodies recognize human protein only.

      We thank the reviewer for this suggestion and apologize for this mistake. The antibody utilized in the IHC studies is actually from Abcam (ab191309) and, in fact, recognizes both species. Table S5 has been corrected accordingly.

      It is unclear when the murine tumours were analysed, at endpoint? This should be stated.

      We thank the reviewer for this comment. Indeed, all IHC analyses were performed after dissection (endpoint). This information will be added to the manuscript. Kinetic analyses of tumor growth (i.e., Fig. 1G) were performed on the same mouse cohort.

      Could authors establish cell lines from the mouse tumours (knockout, partial knockout escapers..)? These could be very useful tools to evaluate key in vitro findings from the study.

      The reviewer makes an interesting suggestion. Unfortunately, we were not able to establish cell lines from this model and have since stopped breeding this mouse line (due to the relocation of the principle investigator). However, we did try to generate RNF40-deficient breast cancer cell lines using the CRISPR/Cas9 technology. Interestingly, all attempts failed, supporting the fact that the loss or RNF40 is lethal for the cancer cells. However, to further establish this, for the revision we propose to transfect HCC1954 cells with CRISPR/Cas9 constructs targeting exons 3 and 4, similar to our mouse model. We will then assess the evolution of RNF40-negative cells population over time (i.e., via immunofluorescence staining for H2Bub1). This assay should inform about the expected growth “disadvantage” following RNF40 loss.

      Fig.1F-G: since RNF40 controls the cytoskeletal machinery and therefore, migration (Fig. 2G) in the RNF40 knockout tumours, was metastasis (if observed) affected? Or if there was no growth in distant organs detected in the time frame of these experiments, was invasion (and/or pattern of invasion or mode of invasion (morphology of invading cells)) into adjacent tissues affected upon RNF40 depletion? This would add in vivo relevance to the in vitro mechanistic findings, especially since the authors later showed that p-cofilin was also decreased in the RNF40-depleted mouse tumours (Fig.4D).

      We agree that the metastasis data from our mouse genetic tumor model would significantly help solidify our findings. Unfortunately, the MMTV-Erbb2 mouse model (overexpressing wildtype Erbb2 gene) only rarely develops distal metastases. In our analyses, we only ever observed two macroscopically visible metastases (one wt/wt and one in an Rnf40flox/flox mouse). However, we feel that the reviewer’s suggestion is a one and will follow this suggestion and attempt to examine possible changes in local invasion of primary tumors into adjacent tissues.

      Fig.3: most results using HCC1954 cell line. Key findings should be validated in other cell lines.

      We agree with the reviewer about the importance of cross validation of findings using different cell lines. For this purpose, we have now generated data with an additional HER2-positive cell line. These data using the SKBR3 cell line were performed for several of the key experiments. Key findings about phenotypic changes (growth kinetics and colony formation), Ki67 protein levels differences and mRNA regulation of identified regulators of actin cytoskeleton (VAV3, ROCK1, LIMK2 and PFN2) will be included in the revision for both cell lines. Furthermore, as seen in the HCC1954 cell line, an increase of the apoptosis marker cleaved PARP as well as a loss of VAV3 and ROCK1 protein levels was also observed upon RNF40 knockdown in SKBR3 cells. These data will be included in the revised manuscript.

      Fig.3A: authors state "both pathways remained intact following RNF40 depletion". However, from those blots, siRNF40 clearly increases pERK and slightly pAKT, which would be unexpected according to previous data in Fig.2. Authors could show quantifications of different blots, or show a more representative blot if increase in pERK was not consistently observed. Was this also seen in SKBR3 cell line?

      We thank the reviewer for this comment. Initially, we had anticipated that oncogenic signaling may be decreased in the Rnf40 conditional knockout model. However, much to our surprise, the activity of the downstream signaling actually appears to be increased. In fact, the increase in AKT and ERK1/2 phosphorylation following RNF40 silencing was consistent across different experiments and replicates. While this finding is also consistent with our previous results in an ER-positive system (e.g., see Prenzel, et al., 2011), we do not understand the mechanistic underpinnings of this finding. Importantly though, while consistent, we do not feel that this increase explains the observed phenotype. Nevertheless, to more precisely show the overall change of p-ERK/ERK and p-AKT/AKT, in the revision we will provide a densitometry quantification for both cell lines. We will also modify the sentence to more precisely describe this finding and make the point that since these pathways are not reduced/impaired, they are unlikely to be responsible for the increased apoptosis observed upon RNF40-KD. Western blots assessing p-ERK/ERK and p-AKT/AKT levels in SKBR3 upon RNF40 knock-down will also be added into the supplementary data of the revised manuscript (Fig.S3).

      For Fig.3G and Fig.S3A, authors selected genes from this set, how was this done (fold change?). Was expression of the other family members (ROCK2, LIMK1, etc) or of Rho GTPases regulated too?

      This information was indeed missing in the manuscript. We have modified the figure legend and the main text accordingly in order to provide the information about the cutoff used in the Enrichr analysis. Regarding the expression of other family members of the actin regulatory network, in the past we performed a more, in depth and focused analysis of our RNA-seq data, broadening our view to other members of the RHO/RAC/CDC42 pathways. While we did identify a few further potentially regulated target genes (e.g. ROS1 or PAK6), these genes were either only weakly expressed or weakly regulated. For this reason, we presumed that these factors could only play a marginal role in the observed phenotype and have focused our attention on the robust part of the signature.

      Fig.4B: this may not help, decrease of p-cofilin by Vav3 knockdown is way less dramatic compared to RNF40 depletion or ROCK inh treatment. See comment below regarding other effectors such as Myosin.

      Indeed, the consequence of VAV3 loss on p-cofilin levels is less pronounced than the effect observed upon RNF40 knockdown or ROCK1i treatment. Given the fact that RNF40 loss not only affects VAV3 expression, but also has additional direct effects on the expression of other pathway members, this may be expected. We do, however, feel that the VAV3 regulation is likely one component of the effects of RNF40 loss. In addition, it has also been shown that VAV3 is not the only GEF regulating the activity of RHO kinases upstream of ROCK1. Therefore, we would also expect that VAV3 loss only partially reduces ROCK1 activity and therefore only partially phenocopies the effects observed. We will expand the description of these findings in the revised manuscript to reflect these views.

      Fig.4C: does ROCK inh reduce RNF40 levels? It may from the immunofluorescence picture.

      We thank the reviewer for this comment. In fact, we have examined this possibility. However, no significant changes in RNF40 protein levels were observed upon RKI-1447. If helpful, we can provide Western blot data demonstrating this in the supplemental figures.

      Fig.4H-I: the sphingosine 1-phosphate receptor-3 agonist (CYM-5441) partially rescued the effects of RNF40. Since S1P signalling involves Rho GTPase activation -presumably downstream of VAV3 -which is a GEF for Rho, Rac and Cdc42- and upstream of ROCK, LIMK, was activity of these Rho GTPases affected upon RNF40 depletion? This would strengthen the mechanism.

      The reviewer points at an interesting aspect of the actin regulation. Indeed we expect that the reduction of VAV3 levels upon RNF40 loss would significantly influence the activity of the downstream client GTPases. However, the measurement of RHO-GTPase activity is tricky and expensive. Furthermore, as mentioned in the previous comment (#7, part 1) VAV3 is only one component of the four major genes encoding critical actin cytoskeleton regulatory proteins regulated upon RNF40 loss, and the only factor upstream of RHO-GTPases. The reduction of downstream ROCK1, LIMK2 and PFN2 levels also influence the activity of this pathway downstream of RHO-GTPase activity. We therefore focused our efforts on assessing F-actin and p-cofilin levels as these may provide more sensitive readouts about the consequence of RNF40 loss on this signaling cascade. However, if the reviewer considers this information as indispensable, we would attempt to investigate changes in Rho-GTPase activity by commercially available Active Rho Detection Kits, although this will significantly delay the resubmission of a revised manuscript.

      Related to this, was Myosin II activity (phosphorylated MLC2) affected -since its upstream regulators, especially ROCK are controlled by RNF40?

      We thank the reviewer for this insightful suggestion. To address this possibility, we will test this hypothesis for the revised manuscript as suggested by performing Western blot analysis for phosphorylated MLC2.

      Fig. S5E:

      Authors should consider presenting data of decreased histone methylation of cytoskeleton regulators in main Fig. 5, since this is an important conclusion of this part.

      As suggested we will shift the information currently presented in figure S5E to the main figure 5.

      Statistics should be revised throughout the manuscript. Comparisons of more than 2 groups should be performed with ANOVA or similar multiple comparison test (instead of t-test).

      We thank reviewer for this comment. We replaced statistical tests with the appropriate ANOVA in the respective graphs and updated the legends accordingly.

      **Minor comments**

      Statement of significance mentions "Anti-HER2-therapy resistance", but this is a misleading since the paper does not deal with therapy resistance. Or are the cell lines used in the study resistant to anti-HER2?

      We thank the reviewer for this suggestion. While resistance to anti-HER2 therapy remains one of the major clinical challenges in the treatment of HER2 positive BC lesions, we agree that our data do not strictly address this point. Thus, we have modified the sentence accordingly.

      In line with this, authors could add some lines of thought on how RNF40 could be targeted in the clinical/pre-clinical context, which could inform further translational studies.

      This is a great suggestion. In the revised manuscript we will include additional text to specifically address this point.

      Line 117 "Moreover, HER2-positive metastatic BC samples showed a particularly high expression of RNF40 compared to primary tumors".

      Perhaps rephrase, was it that the expression level (intensity) was higher or that the % of positive cells/tumours was higher in the brain mets?

      This is a critical point that we will consider in the revised manuscript. We have modified the sentence accordingly to read, “Moreover, the incidence of RNF40-high specimens was higher in HER2-positive brain metastases compared to primary tumors (Fig.1A-B)”.

      Fig.1D and S1C. while S1C shows TCGA data, it is unclear which set of patients is Fig.1D (since text says publicly available data, line 118-119), are these their own set of patients (used in Fig.1A-B)? This should be specified in the text, legend.

      The origin of the data shown in Fig.1D for relapse free survival of RNF40high and RNF40low patients (KM plotter) is mentioned in the figure legend (kmplot.com) and in the material and method section. However, since this was not apparent, to increase the readability, we have now added a statement about the publically available database of origin for every output graph in the main text as well in the legend and supplementary material.

      Line 122. Authors should be careful with this conclusion so far, a correlation between expression and cancer stage/survival does not necessarily mean a tumor suppressive/supportive role.

      We thank the review for this comment. We agree with this statement. Therefore, we have carefully rephrased this sentence as following, “In summary, these data demonstrate that RNF40 expression is maintained in HER2-driven primary metastatic BC and that its expression correlates with poor prognosis in these patients.”

      Fig. S4E: there are missing labels in graph (control, siRNF40).

      The labels have been added.

      Panels in some figures are discussed in text randomly and not following same order. For example, Fig.1 (after panel D, then panel H, then back to E, F, G), S3, 4A-C,

      We reorganized the order of the different panels of Fig1 to increase the readability. We further screened the main text for similar problems and modified the respective figures accordingly.

      Fig.1E: I would suggest changing the line colours, so Rnf40wt-wt line is red and the fl-fl is black, therefore it is similar to panel D (high Rnf40 red, low in black).

      We thank the reviewer for this suggestion. Accordingly, we have now indicated low RNF40 expression in red (Figure 1D, 1E and S1B) in the same way that we have indicated RNF40 expression throughout the rest of the study.

      Supp Videos: for reviewers and readers, it would help that video has a label while it plays, otherwise after downloading it, video name does not tell whether it is control or RNAi.

      As suggested we have renamed the video files of for each condition and added a label informing about the identity of the sample while the video plays.

      Reviewer #2 (Significance (Required)):

      Given that RNF40 function seems to be context-dependent, findings from this study could have broad significance for other cancers with high RNF40, or even in other pathological contexts -if any- that cursed with high RNF40.

      It also provides some mechanistic data (that should be improved as suggested in comments) linking this ubiquitin ligase to the cytoskeletal machinery and, therefore, control of migration and also proliferation and survival. This will also advance the field.

      Area of expertise

      Actin-myosin cytoskeleton, Rho GTPases-ROCK, cancer, metastasis, cell signalling

      Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      **Summary:**

      Wegwitz and colleagues present extensive and detailed data focussed on the role of the E3 ubiquitin ligase and ring finger protein RNF40 in HER-2 associated breast cancer. It is clear that the role of RNF40 and its major substrate histone H2B (monoubiquitination of histone H2B at lysine 120; H2Bub1) as part of a complex with RNF20, is not a simple one in the context of malignancy. This group, and others, have previously reported on the intriguing role of RNF40 that can in certain circumstances function to suppress tumorigenesis, and in other circumstances function to support tumorigenesis. While H2Bub1 has been shown to be lost in many different malignancies, these investigators show that in HER-2 associated breast cancer, this is not the case. In fact, the results presented in this study show that RNF40-mediated H2Bub1 is important for the expression of genes involved in the actin cytoskeleton and the downstream FAK signalling cascade. Supporting this, mining of a public database showed that RNF40 mRNA was high in HER-2 associated breast cancers and was correlated with a worse prognosis (overall and RFS, relapse free survival). The investigators also used a mouse model (MMTV-Erbb2) generating a tri-transgenic (MMTV-Erbb2; MMTV-Cre; Rnf40flox) that allowed breast tissue specific overexpression of HER2 at the same time as KO of Rnf40, so mimicking the human disease. In fact, mouse tumours recapitulated the human results, including in disease free survival (lower with higher Rnf40), and with less tumours seen when there was less Rnf40 (the Rnf40 floxed tumours appeared heterogenous in staining patterns for Rnf40 and H2Bub1, supporting the concept of "escaper" cells, positive for both Rnf40 and H2Bub1 that would be positively selected during tumorigenesis).

      The authors also took a cell biology approach to studying HER2 positive breast cancer and RNF40 using two HER2 positive cell lines (HCC1954 and SKBR3). RNF40 was down-regulated using siRNA and numerous functional studies showed that targeting RNF40 suppressed behaviours consistent with tumorigenesis (proliferation, migration, clonogenic survival, spheroid formation, growth kinetics). Furthermore, down-regulation of RNF40 in the HCC1954 cell line followed by GSEA identified gene signatures associated with apopotosis and the actin cytoskeleton regulatory pathway (e.g. ROCK1, VAV3, LIMK2, PFN2). They further showed that phospo - cofilin (that occurs downstream of ROCK1) was reduced in RNF40 down-regulated cells, also implicated in regulation of the actin cytoskeleton. Phalloidin staining for F-actin showed disruption of the cytoskeleton in RNF40 down-regulated cells. Additionally, the ROCK1 inhibitor, RKI-1447, showed similar effects to depletion of RNF40.

      The authors then sought to determine whether the RNF40 associated gene expression in HER2 positive cells was in fact happening through H2Bub1 and the active histone mark H3K4me3 it has been reported to cross-talk with. RNF40 regulated genes (up or down-regulated) showed lower levels of H2Bub1 occupancy compared to non-regulated genes. H3K4me3 was lost in most genes influenced by RNF40 down-regulation, including genes associated with the actin regulatory pathway. The overall conclusion is that RNF40 is a major epigenetic regulator of the actin regulatory gene network in HER 2 positive breast cancer and could be a therapeutic target.

      **Major comments: major issues affecting the conclusions.**

      (1) What is happening at the gene level for both H2Bub1 and H3K4me3 in the context of RNF20 down-regulation is complex and would benefit from inclusion of a schematic, or a series of schematics describing different scenarios, as the text is quite difficult to follow.

      This is a very constructive proposition. We will attempt to follow this suggestion in order to simplify the message of the respective section by providing to schematic illustrations depicting the cascade of events occurring upon RNF40 loss in the cancer cells.

      It is not entirely clear that the changes seen in H3K4me3 are a direct result of cross-talk with H2Bub1 (some literature reports that there is no cross-talk between these histone marks for instance). It is also not entirely clear how the other histone marks investigated support the main discoveries of the paper. The authors need to consider this in the way that they present the data and their interpretation of it.

      The reviewer addresses an important point about the mechanistic aspect of the RNF40-dependent epigenetic regulation. We and others have shown that RNF40-mediated H2B monoubiquitination is a central step for activation of the COMPASS complex and the TSS-proximal broadening of H3K4me3 (PMID:31733991, 19410543, 22505722, 28209164). However, the situation certainly is not as straight forward as it is in yeast, where the vast majority of H3K4 trimethylation is H2Bub1-dependent. To what degree global H3K4me3 levels are dependent upon the H2B ubiquitin ligases RNF20 and RNF40 appears to vary, depending upon the investigated system (probably the variation in the literature referred to by the reviewer). However, in our work, we reproducibly see widespread H3K4me3 peak narrowing specifically on RNF40-dependent genes, in a context-dependent manner (i.e., genes displaying these effects are different according to the system investigated). To support and consolidate the central function of the H2Bub1-H4K4me3 crosstalk in our system, we propose to perform rescue experiments: siRNAs targeting the 3’UTR of RNF40 will be co-transfected with an expression construct encoding for either a wild type or a ΔRING (catalytic inactive) form of RNF40 lacking the endogenous 3’UTR. The ability of ectopically expressed wild-type, but not catalytic inactive RNF40, to rescue the expression of the identified actin cytoskeleton genes and downstream signaling should provide a solid argument to support the hypothesis of our study. We will also include additional discussion about the potential different H3K4 methyltransferases that may potentially be involved.

      (2) RNF40 is known to work in a complex with RNF20 to monoubiquitinate histone H2B at lysine 120 (H2Bub1). In experiments where RNF40 has been down-regulated, did the authors also note down-regulation of RNF20 (as has been previously reported).

      This is an interesting question from the reviewer. We indeed observed a consistent reduction of RNF20 protein levels upon RNF40 knockdown (and vice versa) in different cell systems, including the HER2-positive cell lines HCC1954 and SKBR3.

      Is the data presented likely to be the result of abrogation of the complex rather than RNF40 specifically?

      Although particularly difficult to answer, the use of a catalytic mutant in key experiments should at least partially shed light on this aspect (as proposed in the answer to Reviewer #3’s question 1). In that case, the complex integrity can be maintained while specifically abrogating RNF40 ubiquitin ligase activity.

      While I am not asking for experiments to be repeated with down-regulation of RNF20, some consideration of this needs to be included in the Discussion. Is RNF20 also highly expressed in HER2 positive breast cancer (TCGA, KM Plotter data).

      We absolutely agree with the reviewer’s point of view. As an obligate binding partner of RNF40, RNF20 indisputably plays an important function in the phenotype caused through RNF40 loss. We will therefore carefully further discuss this aspect in the revised manuscript. Preliminary analyses based on the TCGA dataset point at a high expression of RNF20 in HER2-positive lesions. Furthermore, survival analysis of HER2+ BC patients based on the same dataset showed that patients with high RNF20 expression harbor an unfavorable prognosis, similar to what we have seen with RNF40. We may therefore implement these expression and survival data in the revised manuscript.

      **Minor comments: important issues that can confidently be addressed.**

      (3) It would appear that immunohistochemistry for RNF40 and H2Bub1 on human samples is only reported as "low" or "high". This is perhaps not dealing with the full spectrum of IHC scores, such as completely absent, although the methods do note a "null" value (no detectable staining). Were there no "null" results? Please define the criteria for "low" or "high".

      Indeed, specimens lacking H2Bub1 or RNF40 staining were attributed the “null” scoring. However, while we have observed null staining in other BC subtypes (e.g., see Bedi, et al., 2015), none of the HER2 positive BC samples were found to be negative for either RNF40 or for H2Bub1. However, for the revision, we will provide representative examples of null-stained tumor specimens (from other BC subtypes) for RNF40 and H2Bub1 from the same tissue microarray.

      (4) I think there might be some confusion in labelling of Fig 1A and B as the legend states that all breast cancers are on the left and the HER-2 positive on the right, for each of primary tumours and brain mets, but I think one is under the other? Labelling should be checked in this figure.

      We apologize for this mistake. This has been corrected in the figure legend accordingly.

      (5) What this IHC data doesn't show is whether RNF40 and H2Bub1 levels are always correlated in individual tumours (i.e. RNF40:H2Bub1, high:high OR low:low OR null:null). Can the authors please include and comment on this data.

      The reviewer has made a very interesting point here. We will comment on this point in the revision.

      (6) Please include overall survival data (KM Plotter) as a panel in figure 1, alongside RFS for RNF40 expression levels (currently in Supplementary).

      We added the OS as well the RFS data from the same database next to each other in the main figure.

      (7) Spheroid formation looks to only be shown in a single cell line (HCC1954). Was the other cell line not suitable for spheroid studies? Some comment should be made and care taken not to "overclaim" as text notes two cell lines.

      SKBR3 are unfortunately not suitable for tumor sphere formation assay. We may provide instead a soft agar assay with SKBR3 cells upon. If needed, we may replace the SKBR3 cell line with BT474 for this specific experiment

      (8) It would have been interesting to see results of a GSEA in the mouse mammary tumours as a complement to human. Is there a reason why this wasn't undertaken?

      Rnf40fl/fl tumors present a large fraction of “escaper” cancer cells retaining RNF40 expression. For this reason, bulk sequencing of such tumors would likely only provide a “diluted” molecular signature consequent to RNF40 loss. For this reason this experiment has not been done.

      (9) Conclusions are made about RNF40 in HER2 positive cells only in the context of H2Bub1 and H3K4me3. Without having conducted similar experiments in HER2 negative breast cancer cell lines / models, it is difficult to draw the conclusion that this is HER2 positive specific. Can the authors either soften some of their conclusions along this line, or consider repeating some of their data in HER2 negative models.

      The scope of the study has deliberately been set on HER2-positive malignancies, because former studies already extensively studied the impact of H2Bub1 loss in TNBC and Luminal BC (PMID 28157208, 18832071). We will therefore modify the manuscript text accordingly and soften the appropriate sections as suggested by the reviewer.

      (10) RNF40 likely has substrates other than histone H2B. There is a report describing interactions with RNF40 (STARING) and syntaxin for e.g., (Chin et al., 2002 J Biol Chem 277:35071-9). Can the authors please comment on other potential substrates of RNF40 in light of their data that focuses only on its epigenetic role as a regulator of the actin cytoskeleton.

      Our study was mainly focused only on the gene expression program driven by RNF40 in HER2+ BC. We therefore do not know nor have we focused on other novel non-histone substrates. We will, however, allude to this possibility in a revised manuscript.

      Reviewer #3 (Significance (Required)):

      Nature and Significance of the Advance:

      Clinically, this work provides a significant advance in that it is zeroing in on HER2 positive breast cancer and generating fundamental data that could underpin development of a new therapy for this malignancy. Conceptually, it is expanding knowledge of how the E3 ubiquitin ligase RNF40 is functioning as an epigenetic modifier of a specific type of malignancy by being important for the actin cytoskeleton.

      Work in Context of Existing Literature:

      As acknowledged by the authors, this work builds on a previous publication of theirs (Xie et. al., 2017 "RNF40 regulates gene expression in an epigenetic context-dependent manner." Genome Biol). They have other recent papers on RNF40 (Schneider et al., 2019 "The E3 ubiquitin ligase RNF40 suppresses apoptosis in colorectal cancer cells", Clin Epigenetics; Kosinsky et al., 2019 "Loss of RNF40 decreases NF-kappaB activity in colorectal cancer cells and reduces colitis burden in mice", J Crohns Colitis). H2Bub1 is one of the least well studied histone modifications and as such, this study of one of its key histone writers, RNF40, is significant in elucidating the significance of this histone mark.

      Audience:

      This paper will suit a discovery-based science audience interested in epigenomic regulation of malignancy. Further, it will suit those looking for new drug development strategies for malignancy.

      My Field of Expertise:

      Basic scientist with expertise in epigenetic/epigenomic regulation in malignancy; cell and molecular biology. I felt capable of reviewing all aspects of this paper.

  2. Mar 2020
    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Rebuttal_ Preprint RC-2020-00156

      We thank the editor for handling our manuscript and both reviewers for their constructive critiques. We provide below a detailed list of results already available and experiments we propose to perform to address the reviewers’ comments and improve the quality of our manuscript.

      Reviewer #1

      In this manuscript, Obacz et al. investigated the role of IRE1 signaling in regulating the recruitment of myeloid cells in glioblastoma multiforme (GBM) microenvironment. They show that inhibition of IRE1 signaling decreased polynuclear neutrophil (PN) infiltration to GBM tumors in an animal model; conversely, IRE1 activation correlated with higher expression of myeloid cells-attracting chemokines in GBM. They also show that IRE1-XBP1s pathway promotes proinflammatory chemokines in GBM tumor cells through upregulation of UBE2D3, which leads to degradation of the NFκB inhibitor IκB and activation of NFκB downstream signaling. Their finding of a novel IRE1/XBP1s/UBE2D3/NFκB axis is important for understanding the basis of pro-tumoral inflammation in GBM, potentially in other 'immune hot' cancers. The manuscript is well written and the conclusion is well supported by the experiments. However, there are a few critical points that need to be addressed to strengthen their study**.

      We thank this reviewer for his/her positive comments on our work and for the suggestions made to improve its relevance

      Review#1 point 1: In this study, the authors used the GBM primary cell line RADH87 with stable overexpression of wild-type (WT) IRE1 or a truncated IRE1 variant. The expression of wild-type IRE1 was confirmed by Western analysis (Figure S1D). However, the expression of truncated IRE1 variant was not shown.

      Response 1.1. The expression on truncated IRE1 variant (designated as Q780* - 80 KDa) is shown in Fig.S1D, following the expression on wild-type (WT) IRE1 (110 KDa). This point will be indicated in the revised version of the supplemental figure legends.

      In addition, without tunicamycin treatment, there was no visible difference in XBP1s expression between the cells expressing WT or the mutant IRE1.

      Response 1.2. Under basal condition, XBP1 splicing is indeed limited and therefore, there is no detectable difference in XBP1s expression level between IRE1 WT and Q780*. In contrast, under tunicamycin treatment (acute stress), reduced XBP1 mRNA splicing is observed (Fig.S1D) thus confirming the functionality of the Q780* truncated form. Of note, RNAseq was performed on these cell lines and basal splicing was quantified showing that even though it is an event that occurs at low frequency, it is decreased in cells expressing the Q780* mutant (this information will be added in the revised manuscript, data are available and analyses ongoing).

      In the Boyden chamber assay (Figure 1C, D), conditioned medium from these cells were used; it was not described whether the cells were treated (e.g. with tunicamycin) to activate the IRE1 pathway. ** Response 1.3. Cells were not treated with Tunicamycin to excluded the impact of other UPR arms in the induction of cytokines expression/myeloid cells attraction. As a consequence, it is the basal secretome (found in conditioned media) that was used in those experiments to evaluate cell migration. We have now strong evidences that blunting IRE1 signaling (either genetically or pharmacologically) has a strong impact on GBM cells proteome and in particular on their secretome even if under basal conditions (manuscript in preparation). This information together with the fact that basal XBP1 mRNA splicing is reduced in IRE1 signaling deficient (Q780* expressing) cells, indicate that in GBM cells, constitutive IRE1 activity contributes to modulate the composition of their secretome towards chemoattraction of myeloid cells. This point will be further detailed in the results and discussion sections of the revised manuscript.

      Review#1 point 2: The evidence that the mRNA expression of UBE2D3 positively correlates with IRE1/XBP1s pathway is weak. First, In Figure 3D, the correlation between the mRNA expression of UBE2D3 and XBP1 does not seem strong. In addition, as XBP1 mRNA level does not reflect IRE1 activation (as opposed to that of XBP1s), the level of XBP1s instead of total XBP1 should be assessed. Furthermore, such correlation should be validated in additional GBM cohorts/datasets.

      Response 2. We agree that the correlation between UBE2D3 and XBP1 mRNA levels in TCGA GBM cohort might not be strong. However data presented in Fig3D were significant. Values indicated in green were Pearson’s correlation values (r). This point will be included in the revised figure legends. Moreover, in the revised version of the manuscript we propose to directly correlate the levels of XBP1s mRNA with the expression levels of SYVN1, UBE2D3 and UBE2J1 mRNAs. These data are available from the RNAseq data obtained from the TCGA cohort and already used previously by us (Lhomond et al. Embo Mol Med 2018). In addition, following this observation we have carried out a number of experimental validations using both established and primary GBM cell lines with genetic modifications of XBP1/XBP1s expression as well as ER stress-dependent induction of XBP1s and we clearly demonstrated that XBP1s mRNA levels correlate with UBE2D3 mRNA expression levels (Fig.3G-H, Fig.S2D-E). In addition, in Fig3E using our IRE1 activity signature we have shown a strong correlation between UBE2D3 and XBP1s, which is even more robust than simply correlating the mRNA levels. Data are already available and analyses are ongoing.

      Review#1 point 3: The results in Figure 3 indicated that XBP1s acts as a transcriptional regulator of UBE2D3 expression. However, it is not clear whether this effect in GBM cells is direct or indirect. Further experiments such as chromatin immunoprecipitation and reporter assays are required to clarify this point.

      Response 3. We agree with this reviewer’s point. Although we have scrutinized the publicly available ChIPseq databases and found UB2D3 among potential XBP1-regulated genes, we did not validate this observation in our model. To address this point we propose to perform ChIP experiments in cells overexpressing a tagged form of XBP1s and validate the presence of UBE2D3 promoter fragments in our experimental system. Moreover, these experiments will also be carried out with endogenous XBP1s (in-house XBP1s antibodies Pluquet et al. Cancer Res. 2013) in our primary GBM lines under basal and ER stress conditions. At last, to further document this, luciferase reporter assays using the UBE2D3 promoter (whose length would be defined based on ChIP experiments and the presence of XBP1s binding sites) upstream the luciferase ORF could be performed. Both ChIP and reporter assays have to be performed.

      Review#1 point 4: In addition to UBE2D3, the two other ubiquitin-protein ligases, SYVN1 and UBE2J1, may also be implicated in the degradation of IκB. Did the authors assess their potential role on IκB degradation in their model system?

      Response 4. We thank this reviewer for this suggestion. We have previously tested the impact of SYVN1 on IkB degradation with results showing a lot of variation. Indeed even though the trend of our results indicated that SYVN1 silencing appeared to lead to a slight increase in IkB expression, they never reached statistical significance. Variability in the results might be due to the efficacy of SYVN1 silencing and as such we propose to repeat further these experiments with SYVN1 siRNA smart pools to improve silencing efficacy. Moreover, SYVN1 has been shown to also contribute to the ubiquitylation and degradation of IRE1 (Gao et al. Embo Rep 2008; Sun et al. Nat Cell Biol 2015) and has its expression regulated by IRE1 activity (Dibdiakova et al. Neurol Res 2019), it might represent as well a very interesting target to study. Regarding UBE2J1, the situation is less documented. However, it was shown that this E2 works together with SYVN1 in conserved manner to contribute to ERAD (Chen et al. Nat Plants 2016). As such it might also be interesting to test whether the silencing of UBE2J1 impacts on IkB expression. To sum up, we propose to test experimentally whether the silencing of UBE2J1 or SYVN1 or both together impacts on IkB expression (we need to perform the experiments).

      Review#1 point 5: The authors only used ectopic expression of relevant proteins to test their hypothesis in U87 and RADH87 cells. It is necessary to validate these findings using siRNAs/inhibitors for IRE1 and UBE2D3 in a GBM cell line that expresses high levels of endogenous IRE1 and UBE2D3.

      Response 5. We propose to test the effect of SYVN1 and UBE2J1 silencing on IkB expression in U87 and RADH87 cells in the revised version of the manuscript (see above). In addition to address this reviewer’s comment, we propose to use U87 and RADH87 cells overexpressing IRE1 (Lhomond et al. 2018) and treat them with MKC886, or with siUBE2D3 or with both and evaluate whether in those conditions the NFkB pathway is affected. These experiments should be carried out relatively easily provided that all the recombinant cell lines, drugs and siRNA are already available.

      Review#1 point 6: In Figure 3I: The protein expression of UBE2D3 should be shown.

      Response 6: We had included control experiments with UBE2B3 expression in FigS3B in the initial version of the manuscript. We will include UBE2D3 expression for Fig3I in the revised version of the manuscript (these data are already available).

      Review#1 point 7: In the right panel of Figure 3I: What do the labels #1, 2, 5 mean? Clear descriptions should be provided in the figure legend.

      Response 7. Those labels correspond to different RADH87 cell lines stably overexpressing UBE2D3 protein. The validation of UBE2D3 expression using Western blotting will be included in FigS3B of the revised version of the manuscript (data are already available).

      Review#1 point 8: In Figure S1D: The expression levels of the truncated IRE1 variant should be shown.

      Response 8. The expression on truncated IRE1 variant (designated as Q780*) is shown in Fig.S1D, following the expression on wild-type (WT) IRE1. This point will be indicated in the revised version of the supplemental figure legends.

      ======================================================================

      Reviewer #2

      In the current study, the authors generate evidence supporting a novel pathway downstream of IRE1α/XBP1s in GBM cells involving the activation of an E2-ubiquitin ligase, UBE2D3. In order to do this, they use a combination of patient derived and established cell lines engineered to overexpress IRE1 mutants, XBP1s or UBE2D3. They claim that UBE2D3 is upregulated downstream of XBP1s in GBM cells, and functions to activate NF-kB through the degradation of IkB, thus promoting CXCL2/IL-6/IL-8 production and the subsequent recruitment of monocytes and polymorphonuclear (PN) cells to the tumor microenvironment. However, the article has major shortcomings that need to be addressed before considering its publication

      We thank this reviewer for his/her constructive comments on our work.

      Review#2 point 1: Fig. 1: Classification of immune cells infiltrating GBM. The characterization of immune infiltrate in GBM is too simplistic. Monocytes, monocyte-derived macrophages and microglia are treated as equivalents along the text (IBA1+), making the story hard to follow. At least in mice, these populations can be easily distinguished based on CD45/CD11b/Ly6C expression (see for example Zhihong Chen et al., Cancer Research, 2017). Can the authors further analyze which of those population are actually affected under IRE1 deficiency and/or UBE2D3 overexpression? On the other hand, it is rather questionable that all CD11b negative cells are exclusively T cells, as suggested in Fig 1B. Can the authors provide evidence and/or references to support their gating strategies?

      Response 1: We thank the reviewer for this comment. Our objective was to test the impact of IRE1 modulation on the infiltration of myeloid cells in the tumor, and we did not plan to describe this effect on the complete and detailed infiltrating myeloid populations in GBM which could represent a full study on its own. However, to address this reviewer’s critique we propose to complete the characterization of the myeloid population in our mouse model using IHC by adding Ly6C staining for macrophages and granulocytes. We did not select flow cytometry approach to explore this point as suggested by the reviewer (Cheng, Cancer Res, 2017), but instead IHC was preferred as we thought that the localization of the infiltrated immune cells was important to evaluate (periphery vs. core of the tumor). The information about the localization of immune cells is already available and will be added to the revised manuscript. Concerning the second point raised by this reviewer, the strategy to characterize the immune population in human GBM specimen was to combine CD45 and CD11b markers as previously described by Hussain et al. Neuro-Oncol 2006 and Parney et al. J Neurosurg 2009. Moreover, the analysis of additional markers allowed us to confirm that CD45+ CD11b+ cells were mainly monocytic cells (that also co-expressed CD14, CD168, CD64 and HLA-DR); CD45 low CD11b high cells were granulocytes (CD66B, CD15 and CD16); and CD45 high CD11b low cells were mainly CD3+ T cells. These data are already available and will be added to the revised manuscript.

      Review#2 point 2: Fig. 1: RADH IRE1 Q780\ model - Can the authors further validate the IRE1 deficiency of their model cell line RADH87 IRE1Q780*? It appears to have severely reduced IRE1 levels when compared to the RAD87-IRE1WT cell line (figS1D). Furthermore, the WT and not the truncated form seems to be predominantly expressed. Intriguingly, XBP1 is still being spliced after tunicamycin treatment in this mutant line. All these results differ significantly from the U87-Q780* cell line originally published by Lhomond et al., 2018. Can the authors comment on these differences? Was there a mixture in cell lines? *

      Response 2: We agree with the reviewer that the level of IRE1Q780* expression on RADH87 cells is lower than the IRE1WT expression (Fig.S1D). As observed by this reviewer, XBP1 was still spliced in Q780* cells but XBP1s expression was reduced as shown in Figure S1D. This is mostly due to the ratio between the expression endogenous IRE1 and that of Q780*, which as previously shown (Lhomond et al; 2018) acts as a dominant negative and preempts endogenous IRE1 signaling. The differences observed are also probably due to the methods used, indeed we measured XBP1 and XBP1s mRNA expression in U87 cells (Lhomond et al. 2018), whereas XBP1s protein expression was used with RADH87 cells (introducing the RNA translation parameter that was not monitored in U87 cells). Differences could be also linked to the cell lines as we used the U87 immortalized and RADH87 primary cell lines.

      Review#2 point 3: Fig. 1: Impact of IRE1 inhibition on recruitment of myeloid cells to the TME. The experiment in figure 1E-F, which is the only in vivo evidence supporting a role of IRE1 signaling on myeloid cell recruitment, is very hard to interpret. The authors show no evidence that IRE1 is being inhibited under the treatment and if so, up to which extent. Furthermore, what are the cells targeted by MKC in this setting? The differences in the infiltration of PN cells seem very slight, nothing is mentioned regarding the number of mice per group, or the statistical analysis performed. I would suggest performing a simpler experiment to demonstrate an intrinsic effect of IRE1 signaling in GBM cells, comparing the recruitment of myeloid cells in tumors generated by GL261 cells expressing WT vs deficient forms of IRE1.

      Response 3: The mouse model used in the paper is fully described in (Le Reste BioRxiv 2020 - doi: https://doi.org/10.1101/841296) and all the details about the procedures can be found in this manuscript. This model was developed to recapitulate in mice the standard of care for GBM patient including surgical resection. In addition, drug delivery in brain tumors is often an issue due to the blood-brain barrier. Therefore, the IRE1 inhibitor was delivered locally after resection of the tumor, exposing both tumor and stromal cells. To quantify the myeloid cell recruitment in Fig1E-F, at least thirty random fields from tumor tissue and at least thirty random fields from tumor periphery were quantified for control (PLUG) and MKC-treated group (2 mice/group). The number of positive cells in tumor tissue and tumor periphery were then pulled together for statistical analyses. The significance of the differences in myeloid cells recruitment between control (PLUG) and MKC-treated group was estimated using unpaired student t-test. At least 8 tumors of each group were analyzed comprising 2 to 3 sections of each and 10 fields per section. In addition, we have also performed the experiments using GL261 cells knockout for IRE1, the data are already available and could be possibly added to the revised manuscript.

      Review#2 point 4: Fig. 2: Correlation between IRE1 signature and cytokine/chemokine signature. In the IRE1 signature as determined in the EMBO Mol Med paper (and to which the authors continuously refer) 6 out of 38 (15%) of the genes correspond to cytokines and/or chemokines (Il6, Il1b, Cxcl2, Cxcl5 and Ccl20) (Lhomond et al., 2018). Besides the fact that it is very unclear how this signature was obtained in the first place, it is rather surprising that in the current paper the authors correlate this "IRE1 activity" signature with the same or other cytokines/chemokines mRNA levels and come to the conclusion that there is a high correlation (fig 2A). Isn't this to be expected? Can the authors clearly explain how the IRE1 signature was determined and prove that their "IRE1 signature" is, in fact, representing IRE1 activity? For instance, it is important to cross validate their results by using an independent signature of IRE1 activity (e.g. ChipSeq XBP1s targets, Chen et al., 2014)?

      Response 4: We thank this reviewer for asking for precisions about the procedure. The IRE1 signature was fully described in Lhomond et al. 2018 and was obtained from transcriptome datasets obtained from U87 modified for IRE1 activity (Pluquet et al., 2013). IRE1 was validated on GBM patients and appeared as an important tool to evaluate IRE1 activity in tumor specimen not only in GBM but also in other tumor types (Rubio-Patiño C, Cell Metab 2018). Furthermore, IRE1 activity was also directly linked to the pro-inflammatory tumor cell secretome in various studies such as Logue et al. 2018. As indicated by this, some cytokines/chemokines studied in this work were indeed part of the IRE1 signature and correlation between this signature and their expression was indeed expected. However the other main cytokines/chemokines studied here were not present in the IRE1 signature indicating that IRE1 could have been involved in the regulation of their expression. As proposed by reviewer#2, we will include in the revised version of the manuscript the analysis of cytokines/chemokines from the dataset ChipSeq XBP1s targets (Chen et al. 2014), although this study was performed on breast tumors.

      Review#2 point 5: Fig 2: XBP1s controlling cytokines/chemokines expression in GBM cells - As suggested by the data on fig1C-D and fig2E, IRE1 appears to be constitutively active in GBM cells, as IRE1 deficiency is sufficient to cause a defect in chemokine production. However, as shown in fig S1D, XBP1s protein was not detected under basal conditions, suggesting that the deficiency in chemokine production in IRE1-deficient cell lines is XBP1s-independent. Can the authors further discuss these results?

      Response 5: We thank the reviewer for commenting this point. We think that indeed IRE1 is constitutively active in GBM cells. As we have tested XBP1s protein expression in untreated and tunicamycin-treated RAD87 cells (FigS1D), and we will also provide real time qPCR data to show the presence of basal XBP1s mRNA levels (data already available). We agree that the way we presented the results are misleading and undermine the basal expression of XBP1s. This will be fixed in the revised manuscript.

      Review#2 point 6: Fig 3: IRE1/XBP1s/UBE2D3/NF-kB axis - Authors must show the activation status of NF-kB in parental U87 cells (Fig3A), as this is a critical evidence to support that IRE1a-deficient U87-DN cells are defective in chemokine production due to an impairment in NF-kB signaling. In addition, even when tunicamycin treatment induce XBP1s and UBE2D3 (figS2D) it does not induce IkB degradation nor NF-kB phosphorylation in parental U87 and RADH87 cells (figS3C) as one should expect if IRE1/XBP1s/UBE2D3/NF-kB pathway is operating in these cells. How can this be explained? Only after XBP1s or UBE2D3 overexpression, NF-kB signaling appears to be affected.

      Response 6: As shown in Fig3A, U87 cells deficient for IRE1 signaling (DN) exhibit decreased NFkB signaling as exemplified by decreased phospho-NFkB and phospho-IkB compared to control U87 cells proficient for IRE1 signaling. In our manuscript, we mainly focused on the activation of the IRE1/XBP1s/UBE2D3/NFkB signaling axis under basal condition. One could speculate that tunicamycin treatment leads to a strong stress response that others mechanisms are activated that overwhelm the IRE1/XBP1s/UBE2D3 pathway we are describing herein. For instance, it has been demonstrated that the IRE1/JNK signaling was linked to NFkB activation upon acute ER stress (Tam et al. PLoS One. 2012;7(10):e45078; Schmitz et al. Biomedicines. 2018 Jun; 6(2): 58.) and furthermore PERK activation upon thapsigargin or tunicamycin treatment was also found to promote NFkB activation (Deng et al. DOI: 10.1128/MCB.24.23.10161-10168.2004; Fan et al. Cell Death Discov. 2018 Feb 12;4:15). We believe that the pathway we describe here might be linked to constitutive activation of IRE1 signaling (proper to tumor cells) rather than acute activation of this pathway and be compatible with sustained proliferation. To further document this point, we have already generated data about the phosphorylation status of NFKB in GL261 cells KO for IRE1 compared to the parental cells (data will be provided in the revised version of the manuscript). In addition we are currently investigating the correlation between IRE1 activity signature and that of NFkB as defined previously (Jin et al. Cancer Res. 2014 May 15; 74(10): 2763–2772.), results should be available shortly and will be added in the revised manuscript.

      Review#2 point 7: Fig 4: UBE2D3 and MIB1 – The authors should discuss better what is the possible interaction between UBE2D3 and MIB1. As shown in fig4G, silencing of MIB1 cause a severe increase in UBE2D3 protein levels but this is not commented in the text.

      Response 7: We thank the reviewer for this comment. We believe that MIB1 might also controls the expression of UBE2D3. The data are already available and will be included in the revised version of the manuscript.

      Review#2 point 8: Fig 6: Chemokines driving recruitment of myeloid cells to UBE2D3 overexpressing tumors. A formal demonstration that GL261-UBE2D3 tumors recruit higher numbers of MM and PNs through an enhanced production of CXCL2, IL-6 and/or IL-8 is lacking. For instance, they could compare the infiltration of myeloid cells in GL261-UBE2D3 vs GL261-UBE2D3-CXCL2KO tumors.

      Response 8: To address this point, we propose to test the expression of these cytokines/chemokines in the GL261 tumors after resection using ELISA. These experiments could be carried out in IRE1 KO tumors, in UBE2D3 overexpressing tumors and performed for instance using perfusion of CXCL2, IL6 or IL8 neutralizing antibodies or cells KO for these chemokines. These experiments could be performed but might lead to inconclusive results (not statistically significant) if there is redundancy between the roles of those chemokines. As such, we think that we could provide in vitro information about the respective roles of these chemokines in recruiting MM and PNs but that at present stage the in vivo demonstration is to premature.

      Review#2 point 9: Authors must provide replicates of the blots to sustain their claims: FigS1D, Fig3A, Fig3I, Fig4G.

      Response 9: Replicates and quantifications are already available and will be provided in the revised version of the manuscript.

      Review#2 point 10: The authors should include a better description of the methods regarding bioinformatic analysis. For instance, which genes where used for MM/PN/T cell signatures in fig1A/S1A?.

      Response 10: We thank the reviewer#2. This information is available and a complete description will be included in the revised version of the manuscript.

      Review#2 point 11: Missing statistical significance on fig 2C and fig 6A to support their claims.

      Response 11: Statistical values will be included in the revised manuscript.

      Review#2 point 12: Fig2F is presented in the text as mRNA levels but in the figure as protein levels.

      Response 12: This point will be fixed in the revised version of the manuscript.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1 (Evidence, reproducibility and clarity (Required)):

      In this report, van Schaik et al., modified an established CUT and RUN method and combined it with previously used DamID to identify Lamin Associated Domains (LADs) with better temporal resolution. Previous DamID experiments labeled locations where lamin proteins were present within a 5-25 hour window while the new technique, pA-DamID, labels DNA within a 30 minute window providing better temporal resolution. The authors used this technique to identify LADs at multiple stages of the cell cycle and applied this protocol to different cell types. The authors FIND differences when comparing data sets between cell cycle time points and cell lines.

      We thank the reviewer for the helpful comments.

      **Major points:**

      1) The data sets generated and displayed in this manuscript seem incomplete. In Figure 1G, the authors compare lamin B2 vs. lamin B1 generated LADs in HAP-1 cells and lamin A/C vs lamin B2 LADs in hTERT-RPE cells. In figure S4, panel C compares lamin B1 and lamin B2 in K562 cells and lamin B2 and lamin A/C in hTERT-RPE cells. It would have been informative to have a complete dataset for lamin B1, lamin B2, and lamin A/C identified LADs in all cell lines analyzed. The information provided from these datasets would be useful to the scientific community.

      We did not think it was necessary to generate every lamin pA-DamID data set in every cell line, given that previous DamID studies indicated that lamins A, B1 and B2 give the same genome-wide pattern {Meuleman, 2013, 23124521; Kind, 2014; 24717229}. However, we agree with the reviewer that the missing data sets lead to a sense of incompleteness and might distract the reader from the main message of the manuscript. We suggest to generate Lamin B1 pA-DamID in hTERT-RPE cells– provided that the current Corona virus shutdown will not prevent us from doing this experiment. Doing so, we 1) have a complete lamin data set in hTERT-RPE cells, which we study in most detail in this manuscript 2) can compare all lamins within the same cell type 3) can compare all Lamin B1 DamID data to the corresponding Lamin B1 pA-DamID data.

      2) The authors discovered that LADs reposition during progression through the cell cycle. It would have been interesting to know whether these changes have transcriptional consequences? One could perform RNA-SEQ experiments to discover if LAD occupancy results in transcriptional changes and choose a few genes to confirm the findings with RT-PCR. Is this the same for lamin B1, lamin B2, and lamin A/C occupied LADs? Analyze if there are any genomic features such as CTCF or transcription factor binding sites that correlate with the loss of LADs.

      In the first part of this point, the reviewer suggests to look at transcriptional consequences of changes in NL interactions. To address this point, we require some measure of nascenttranscription during the cell cycle, which is not available in any of the studied cell lines. A potential experiment would be to map polymerase occupancy with pA-DamID / CUT&RUN or run-on transcription with any other method at the synchronized time points. However, this experiment is not trivial and we feel that this goes beyond the scope of this manuscript, which focuses on the development of pA-DamID and the m6A-Tracer with a proof-of-principle example of NL binding dynamics during the cell cycle.

      In the second part of this point, the reviewer asks whether changes in NL binding correlate with genomic features such as CTCF binding sites or transcription factor binding sites. In the manuscript, we already include correlations with various active features (active gene density / replication timing) (Fig. 3E-G, 4C-E), that generally correlate well with transcription factor binding. We have added CTCF peaks as comparison (Fig. S7F).

      3) The authors state that using H3K27me3/H3K9me3 in pa-DamID showed no enrichment. This is surprising considering that both modifications are enriched in heterochromatin and at the nuclear periphery. It appears that the peripheral enrichment is masked by the larger overall internal pool. The authors should discuss this observation and comment on the sensitivity of the method to detect local enrichment versus the global levels of a protein or modification in pa-DamID.

      We believe that H3K27me3 and H3K9me3 histone modifications show the expected pattern in their distribution in the nucleus. However, due to the peripheral mask slightly extending beyond the cell boundaries, the calculated peripheral enrichment is underestimated. This has been better described in the figure legend.There is a small enrichment at the nuclear periphery compared to diffuse Dam and untargeted pA-Dam (Fig. 1B/1C/1F). To further support the pA-DamID data quality of these histone modifications, we have added a comparison with ENCODE ChIP-seq data tracks in K562 cells (Fig. S3C).

      **Minor points:**

      Figure 1: Change colors for Figure 1F and Figure 2D. The colors are hard to discern.

      Figure 2B: Please mark which antibody was used for this analysis.

      Figure 2C: Please also overlay data from pA-DamID lamin A/C experiments.

      Figure 4: Please mention which antibody was used for the pA-DamID experiments used to generate this dataset.

      Figure 5: Please mention which antibody was used for the pA-DamID experiments used to generate this dataset.

      Figure S5 C and D: Please mention which antibody was used for the pA-DamID experiments.

      We have made edits to address the minor comments above. However, we do not have Lamin A/C data in HAP-1 and K562 cells to add to Fig. 2C.

      Reviewer #1 (Significance (Required)):

      The major contribution of this manuscript is the description of an improved method to map LADs. This is a valuable contribution. By using this new method, the findings of this paper provide some new insight in LAD dynamics throughout the cell cycle although the experiments are largely phenomenological. This is a technically sound study.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      The paper describes a new method for detecting Lamin associated DNA domains, which allows better time resolution than classical DamId. It is a good idea and its functionality is demonstrated in tissue culture cells. There are minor insights but it is important that we advance the field with new and better technologies, thus this version amply suffices to give evidence of that.

      We thank the reviewer for the positive feedback.

      Reviewer #2 (Significance (Required)):

      The audience is all persons working on chromatin organization in the nucleus, which is a large audience. The data are clear as they basically are proof of principle for a new technique. There is nothing major to request as revision. They might cite papers on damID in worms and tissue specific applications of this in living organisms, as this is likely to be the situation that is most interesting in the long run. The resolution (in bp) would be interesting to know and validate.

      We have extended the discussion on new applications of pA-DamID.

      We now compare data quality and resolution between DamID and pA-DamID, focusing on the mapping of NL interactions (Fig. S4D-E).These plots indicate similar data quality and resolution between the two methods.

      I have no other major revisions to request.

      Reviewer #3(Evidence, reproducibility and clarity (Required)):

      In the manuscript by Schaik et al (Van Steensel laboratory) the authors describe a very clever approach to identifying Lamina Associated Domains (LADs) using the principles of the 'cut-n-run' strategy. Specifically, they engineer the Dam methyltransferase used in canonical DamID in frame with a protein A moiety capable of interacting with an antibody (in this case lamins--B1, B2 and A/C). After permeabilization, cells are incubated with antibodies, then pA-Dam purified protein--for a brief time window--is added to mark associated DNA with GmATC. This technique is a valuable contribution to the field, particularly since, as the authors point out,an advantage of pA-DamID is that the labeled DNA can also be visualized in situ using the m6A-Tracer, before this DNA is sequenced. This allows for validation of findings and is highly amenable to cell sorting technologies. In addition, this technology allows for a time-resolved measure of LADs not currently available by standard DamID. The authors apply this technology to four different cell types. They noted that the 'maps' generated by the is technology differed from canonical DamID at very specific regions (small LADs in very localized regions) . They then embark on a series of experiments to show that these differences arise from cell cycle -related differences that are differentially picked up by the methods--with the pA-DamID allowing for dissection of more discrete cell cycle stages/configurations. In general they find an initial preference for sub-telomeric LADs to associate with the nuclear lamina fist, then more centromeric. There is some data suggesting loss/gain of LADs in specific regions/with specific features. The manuscript is well written and the data well presented. However, there are some points that need to be addressed . Overall, there is some oversimplification or omission of previous data in the field, a lack of clarity in how some of the data was interpreted, and some areas where clarification and/or additional analyses would be helpful. I sincerely hope the authors find the following critiques to be useful. Thank you for the opportunity to review your very nice work.

      We thank the reviewer for the constructive and very detailed comments, these have been extremely helpful in improving the manuscript.

      **Introduction:**

      **Microscopy studies found that telomeres are enriched near the NL in early G1 phase, leading to the hypothesis that telomeres may assist in NL reassembly onto chromatin [13].**

      ● There have been numerous studies identifying the timing and disposition of INM proteins and Lamins at m the end of mitosis (during NE reformation). Why are you citing just this one? (e.g. ​Thomas Dechat et al., 2004; T. Dechat et al., 2000; Ellenberg et al., 1997; Haraguchi et al., 2001​)

      We have expanded the introduction to better cover previous work on the reforming NL (paragraph 2) and initial genomic interactions with the NL (paragraph 3).

      **Furthermore, during S-phase B-type lamins have been found to transiently overlap with replication foci in the nuclear interior, at least in some cell types [20]**

      ● While, technically, this has indeed been reported, this study is from 1994 and has not been repeated. The cells used in this study (3T3 fibroblasts) are widely used and others have not noted this phenomenon. Soften this.

      **Other studies have indicated that lamins are important for DNA replication [reviewed in 21].**

      ● Likewise, direct roles for lamins in replication are controversial (acknowledged in the small section of the cited review on the role of lamins in replication).

      ● Perhaps combine the two sentences above to soften the implication that this is a "known" role of B-type lamins. e.g. "A handful of studies have implicated a role for B-type lamins in replication, but the direct role of the lamina in this process remains unclear. Nonetheless, ......"

      This is a very good suggestion by the reviewer. We agree that literature has been controversial and should be approached with care. We have followed the advice and changed this.

      **Results:**

      **So far, the cell cycle dynamics of genome - NL interactions have primarily been studied by microscopy. While these studies have been highly informative, they were often limited to a ​few selected loci.​**

      ● Please cite your own study (Kind et al.) and other recent papers (Luperchio et al.-​https://www.biorxiv.org/content/10.1101/481598v1​;; Zhang et al., Nature-​https://www.nature.com/articles/s41586-019-1778-y​;) in which they were either 1) not limited to a few selected loci and/or 2) not microscopy-directed studies? There is an argument to be made here for the resolution (time and b.p.) you have achieved through your studies that these studies did not.

      To our knowledge, there have been no high-throughput microscopy studies of many individual loci performed studying this. Microscopy has been performed of collective sequences (i.e. all LADs (Kind, 2013 and indeed Luperchio, 2018)), which provide additional insights but lack sequence information in the images. We have expanded the introduction to better acknowledge these microscopy studies that are not limited to single loci.We feel that observations on LAD domain clustering (Luperchio) and B compartment formation (Zhang) are better suited for the Discussion, given that these observations are not directly related to genome – NL contact dynamics. We already discussed B compartment formation in the discussion, but now also include the observed LAD domain clustering. Also, we have discussed data resolution in more detail in the results (see reviewer #2).

      How does this data correlate with TSA-seq, another antibody-based method developed by the Belmont lab, but collaboratively developed for use in identifying LADs (ie Dam alternative) with the Van Steensel group?​ I can imagine there are numerous advantages to this approach (radius of "labeling" being one).

      TSA-seq provides a different perspective on genome – NL interactions, given its distance dependence rather than contact. We have added a comparison with TSA-seq to the Discussion.

      **When Dam-Lamin B1 is expressed in vivo for 5-25 hours during interphase, LADs that interact with the NL become progressively labeled, eventually resulting in a layer of labeled chromatin of up to ~1 μm thick [8]. This is because LADs are in dynamic contact with the NL. We expected that in pA-DamID this layer would be thinner, because the NL-tethered Dam is only activated for 30 minutes. In addition, permeabilization depletes small molecules including ATP and thus prevents active DNA remodeling in the nucleus [26]. Indeed, pA-DamID yields a m6A layer that is ~2.5 fold thinner than the layer in cells that express Dam-Lamin B1 in vivo (Fig. S2A-C). This is not an artifact due to collapse of chromatin onto the NL caused by the permeabilization, because permeabilization of cells expressing Dam-Lamin B1 in vivo did not significantly reduce the thickness of the m6A layer compared to directly fixed cells (Fig. S2C). The thin layer of labeled DNA obtained by pA-DamID points to an improved temporal resolution of pA-DamID compared to conventional DamID.**

      ● I think this requires a bit more care. Your previous work clearly demonstrates LADs are dynamic. Others in the field have shown that these domains are also constrained within the larger sub-chromosomal compartment (self-interaction) of LADs (e.g. Luperchio 2018) within a chromosome. So, this is truly a temporal "snapshot" that may miss some regions of LADs that are less directly (or more dynamically) associated with the lamina, but still compartmentalized into the larger LAD sub-chromosomal compartment. It is unclear if the treatment used for this study perturbs these LAD-lamina​ dynamic​ interactions--one can imagine that the LADs are much less mobile generally under the protocol described in your supplemental information. In other words, ​LADs don't collapse, nor do they behave in the same way they would after permeabilization​. The technique has compromised some of that --which is actually fine for most of the purposes in this manuscript, but this needs to be discussed.

      As the reviewer points out, there are fundamental differences between DamID and pA-DamID in their m6A deposition that should be clear from the text. We elaborated on this in the comparison between pA-DamID and DamID.

      ● In addtion, imaging data showing dam-LaminB1/2 plus m6A-tracer is missing (figure S2). This should be included. Is the intensity of the "tracer" similar between conditions? If so, were the exposures kept constant in all images? This is important since the decay rate is highly related to intensity of signal.

      We are afraid that this figure has been misinterpreted. We have changed the figure labels and legend to explain it better. The HT1080 Dam-Lamin B1 clonal cells (new clone kindly supplied by Jop Kind) still showed significant variation in m6A-Tracer intensity per cell, suggesting different expression levels of Dam-Lamin B1. To create optimal images for halfway decay estimation, laser settings were changed between images. This has now been mentioned more clearly in the methods.

      **In some cell types, especially in​ HCT116 and ​hTERT-RPE​ cells, we noted local discrepancies between the two methods (Fig. 2A,bottom panel). These differences involve mostly regions with low signals in DamID that have higher signals in pA-DamID. However, such differences are not obvious in HAP-1 and K562 cells.**

      ● Only HCT116 data is shown in the indicated figure. hTERT-RPE cells are shown in the accompanying supplemental figure and use a different antibody (lamin B2) as the target for the pA-Dam.

      We have changed the pointer to include the supplementary figure.

      (See reviewer #1 for a similar comment.)We agree that the comparison between Lamin B1 DamID and Lamin B2 pA-DamID in hTERT-RPE cells leads to sense of incompleteness and confusion. We suggest to generate Lamin B1 pA-DamID data in hTERT-RPE cells to solve this – provided that the current Corona virus shutdown will not prevent us from doing this experiment.

      This brings up another point: the data (log2 ratio schema) shown in figure 2 is for HCT116 lamin B1 pA-Dam. Yet, the subsequent studies for transient/building interactions during G1 and into S (Figure 3) are done in hTERT-RPE cells using lamin B2. To be consistent, data from lamin B2 should be used in both figures (it seems lamin B2 data is available for all cell types). The comparison of Dam-Lamin B1 can be addressed in the Venn overlays (as they are now) and in the supplements. The hTERT-RPE data should be in Figure 2 since it is followed up on in the subsequent figure (ie it fails to meet the definition of being relegated to 'supplemental' data).

      As written in the response above, we suggest to generate Lamin B1 pA-DamID data in hTERT-RPE data.This will allow us to make a more consistent story and address these comments.

      **suggesting that the separation of LADs and inter-LADs becomes progressively more pronounced after mitosis. Nevertheless....**

      ● This is overstated, especially given the previously mentioned work (Luperchio, Zhang). More accurate to say LADs ​association with the nuclear lamina becomes more pronounced​. LADs (predominantly B-compartment) and inter-LADs (predominantly A-compartment) show much earlier separation from each other. This may be distinct from association with the lamina. This is an important distinction as it may lead to different hypotheses regarding mechanisms of LAD targeting/association with the lamina.

      We agree that this is an overinterpretation of our data. We have changed the phrasing to make it more accurate.

      **Progression from prometaphase to late telophase in HeLa cells takes about 1 hour [33], suggesting that this timepoint captures the initial interactions with the reforming NL. Remarkably, the majority of these interactions is shared with later time points, indicating that most LADs can interact with the NL throughout interphase and are defined (and positioned at the NL) very soon after mitosis.**

      ● There is wide variability in this number, some cells rapidly exit, others take significantly longer. This number is an average (and, for what it's worth, based on a very compromised cancer cell line). The "interactions' mapped are likely reflecting the ensembe measurements of the many cells that have transited into G1. Also, this statement seemingly directly contradicts the premise of many of your following data/interpretations of a sort of step-wise wave or prefered interactions from telomere proximal toward centromeric regions. This also disagrees with your previous work (Kind et al) and more recent work regarding positioning to the NL very soon after mitosis. Again, this is BULK (many cells of a continuum of configurations) versus single cell observations. This is overstated.

      We felt that there was a need to explain why we interpret the 1h time point as the initial interactions with the NL and included this reference, but the reviewer is correct that this number can vary greatly between cell types and conditions. We have removed the reference and now include FACS and imaging data supporting this claim directly.

      We have changed the phrasing of these results to make our interpretation clearer.

      **We next looked into characteristics of the dynamic LADs. At early time points, LADs with decreasing interactions do not have lower pA-DamID scores than stable LADs, suggesting that their ​detachment from the NL is not simply due to weak initial ​binding**

      ● The methods used here are dynamic proximity measures. Words like "binding" and "attachment" should be avoided (use interacting, associated, etc )

      Good point. We have replaced all occurrences of these words.

      **LAD dynamics are linked to telomere distance and LAD size in multiple cell types**

      ● Perhaps I am missing something, but I find relatively little data showing centromere-proximal LADs across cell cycle stages (referring here to Log2 ratio plots similar to what is shown for telomere-proximal LADs, Supplemental figure 6 is the only place where this is obvious.).

      To better illustrate the inverse dynamics of telomeres and centromeres in hTERT-RPE cells, we have changed Fig. 3B to a full chromosome overview.

      ● In addtion, it seems to me that you are arguing in this and the preceding section for the following parameters: intensity of the LAD region. ie small, telomere-proximal, more euchromatic, AND less "intensely" associated.

      ● What is a "small" LAD? 100 kb or less? In Figure 2 (HCT1016, log 2 ratios), the original observation that leads into a discovery of changing NL associations through the cell cycle, the LAD that changes appears to be at least average size. Perhaps a "small" LAD adjacent to an "average" LAD. Nor do the signals appear to be all that low. There are regions within this sub-chromosomal plot that do appear to be "small" "low intensity" LADs. I am uncertain what parameters are defining these attributes. Are the cut-offs the same between cell types (ie is there a rule here?).

      We do not set any cut-offs for any features that we compare with. We took the strategy to define stable and dynamics LADs (Fig. 3C) and ask whether there are differences in feature distributions, including LAD size, replication timing and other features. As you can see in Fig. 3E, LADs with decreasing NL interaction are smaller than stable or increasing LADs. This strategy is consistent between cell lines. To assist the reader in following our reasoning, we have added LAD domains and their differential status to Fig. 3B.

      ● The rules outlined above seem to break down across the different cell types. In particular, the number of active genes per Mb seems to have very little correlation overall with LADs that change. In addition, it is very unclear if "LAD size" is really a readout of both size AND intensity of interactions (understanding that this is not necessarily a direct quantitative measure of interactions).

      This comment reflects our reasoning why we added a comparison between cell types in Fig. 4. Indeed, we find no general trend that active gene density correlates with LADs with decreasing NL interactions in every cell type. In contrast, LADs with decreasing NL interactions are consistently close to telomeres and smaller in size than stable or increasing LADs. We made it clearer that LAD size solely reflects the genomic size in basepairs.

      **Correlation of pA- determined LADs that change into G1/S with B-compartment sub-types**

      ● There is certainly Hi-C data on most (all?) of the cell types analyzed in this manuscript. It would be very useful for the authors to parse out how the gain/loss LADs correlate with the B1, B2. A1, A2 (etc) compartment classifications. This may help to address the point above.

      We have now included a comparison with Hi-C sub-compartments (Fig. 4F).

      **Nucleosomal pattern of pA-DamID digestion/amplification (figure S3)**

      ● Onset of apoptosis needs to be ruled out. The nucleosomal (laddering) pattern could be due to DNA getting cleaved through programmed cell death pathways after permeabilization. These fragments could easily be amplified by the subsequent DamID protocol.

      Amplification of apoptotic fragments, if present, is visible in DamID assays using the negative controls. Every library preparation, we include one or more negative controls in which we omit DpnI. If apoptotic fragments are present in this negative control, these can ligate to the DamID adapter and result in amplification, which we consistently do notsee. We have added a supplementary figure that shows this (Fig. S3A).

      **Definition of 'bulk' assays**

      ● All of the assays were done in bulk. Some were synchronized, some were not. This is important since the implication is that anything not 'bulk' is single-cell. Throughout the manuscript and in the figures, please refer to the conditions as 'synchronized' versus 'unsynchronized'

      The reviewer is correct that our terminology is wrong. We changed all occurrences of “bulk” to “unsynchronized”.

      **Much of supplemental Figure 6 should be in a main figure**

      ● It is puzzling why the first (and most easily seen/interpreted) description of LAD organization relative to telomeres/centromeres after exit from mitosis is relegated to supplemental figures. It is a foundational experiment(s) for the paper.

      We have changed the zoomed-in Fig. 3B with a chromosome overview that better captures this main observation. We see the remainder of Fig. S6 as technical controls and details of the experiment that are useful to include but not necessary as main figure.

      **pA-Dam is possibly influenced by cell-cycle related chromatin accessibility (particularly at mitotic exit)**

      ● During the transition from mitosis to early G1, there are dynamic changes to chromatin state that are directly coupled to the cell cycle. A recent report, for instance, highlights that interactions of antibodies (or other proteins) with H3K9me2/3 modifications is likely influenced by phosphorylation of histone tails. The dynamics of histone modification/chromatin state possibly occluding or interfering with the interpretation of the results must be discussed.

      Similar to DamID, pA-DamID utilizes a Dam-control to measure DNA accessibility and control for this. We show that a change in pA-DamID score is due to changes in NL reads, while the Dam reads do not change (Fig. S6F). In other words, we find no evidence that a change in chromatin state impacts the accessibility as measured by our Dam-control and thereby influences the results. We now repeat this observation in the discussion.

      Reviewer #3 (Significance (Required)):

      N/A

    2. Note: This preprint has been reviewed by subject experts for Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Referee #3

      Evidence, reproducibility and clarity

      In the manuscript by Schaik et al (Van Steensel laboratory) the authors describe a very clever approach to identifying Lamina Associated Domains (LADs) using the principles of the 'cut-n-run' strategy. Specifically, they engineer the Dam methyltransferase used in canonical DamID in frame with a protein A moiety capable of interacting with an antibody (in this case lamins--B1, B2 and A/C). After permeabilization, cells are incubated with antibodies, then pA-Dam purified protein--for a brief time window--is added to mark associated DNA with GmATC. This technique is a valuable contribution to the field, particularly since, as the authors point out,an advantage of pA-DamID is that the labeled DNA can also be visualized in situ using the m6A-Tracer, before this DNA is sequenced. This allows for validation of findings and is highly amenable to cell sorting technologies. In addition, this technology allows for a time-resolved measure of LADs not currently available by standard DamID. The authors apply this technology to four different cell types. They noted that the 'maps' generated by the is technology differed from canonical DamID at very specific regions (small LADs in very localized regions) . They then embark on a series of experiments to show that these differences arise from cell cycle -related differences that are differentially picked up by the methods--with the pA-DamID allowing for dissection of more discrete cell cycle stages/configurations. In general they find an initial preference for sub-telomeric LADs to associate with the nuclear lamina fist, then more centromeric. There is some data suggesting loss/gain of LADs in specific regions/with specific features. The manuscript is well written and the data well presented. However, there are some points that need to be addressed . Overall, there is some oversimplification or omission of previous data in the field, a lack of clarity in how some of the data was interpreted, and some areas where clarification and/or additional analyses would be helpful. I sincerely hope the authors find the following critiques to be useful. Thank you for the opportunity to review your very nice work.

      Introduction:

      Microscopy studies found that telomeres are enriched near the NL in early G1 phase, leading to the hypothesis that telomeres may assist in NL reassembly onto chromatin [13].

      ● There have been numerous studies identifying the timing and disposition of INM proteins and Lamins at m the end of mitosis (during NE reformation). Why are you citing just this one? (e.g. ​Thomas Dechat et al., 2004; T. Dechat et al., 2000; Ellenberg et al., 1997; Haraguchi et al., 2001​)

      Furthermore, during S-phase B-type lamins have been found to transiently overlap with replication foci in the nuclear interior, at least in some cell types [20]

      ● While, technically, this has indeed been reported, this study is from 1994 and has not been repeated. The cells used in this study (3T3 fibroblasts) are widely used and others have not noted this phenomenon. Soften this.

      Other studies have indicated that lamins are important for DNA replication [reviewed in 21].

      ● Likewise, direct roles for lamins in replication are controversial (acknowledged in the small section of the cited review on the role of lamins in replication).

      ● Perhaps combine the two sentences above to soften the implication that this is a "known" role of B-type lamins. e.g. "A handful of studies have implicated a role for B-type lamins in replication, but the direct role of the lamina in this process remains unclear. Nonetheless, ......"

      Results:

      So far, the cell cycle dynamics of genome - NL interactions have primarily been studied by microscopy. While these studies have been highly informative, they were often limited to a ​few selected loci.​

      ● Please cite your own study (Kind et al.) and other recent papers (Luperchio et al.-​https://www.biorxiv.org/content/10.1101/481598v1​; Zhang et al., Nature-​https://www.nature.com/articles/s41586-019-1778-y​) in which they were either 1) not limited to a few selected loci and/or 2) not microscopy-directed studies? There is an argument to be made here for the resolution (time and b.p.) you have achieved through your studies that these studies did not.

      ● How does this data correlate with TSA-seq, another antibody-based method developed by the Belmont lab, but collaboratively developed for use in identifying LADs (ie Dam alternative) with the Van Steensel group?​ I can imagine there are numerous advantages to this approach (radius of "labeling" being one).

      When Dam-Lamin B1 is expressed in vivo for 5-25 hours during interphase, LADs that interact with the NL become progressively labeled, eventually resulting in a layer of labeled chromatin of up to ~1 μm thick [8]. This is because LADs are in dynamic contact with the NL. We expected that in pA-DamID this layer would be thinner, because the NL-tethered Dam is only activated for 30 minutes. In addition, permeabilization depletes small molecules including ATP and thus prevents active DNA remodeling in the nucleus [26]. Indeed, pA-DamID yields a m6A layer that is ~2.5 fold thinner than the layer in cells that express Dam-Lamin B1 in vivo (Fig. S2A-C). This is not an artifact due to collapse of chromatin onto the NL caused by the permeabilization, because permeabilization of cells expressing Dam-Lamin B1 in vivo did not significantly reduce the thickness of the m6A layer compared to directly fixed cells (Fig. S2C). The thin layer of labeled DNA obtained by pA-DamID points to an improved temporal resolution of pA-DamID compared to conventional DamID.

      ● I think this requires a bit more care. Your previous work clearly demonstrates LADs are dynamic. Others in the field have shown that these domains are also constrained within the larger sub-chromosomal compartment (self-interaction) of LADs (e.g. Luperchio 2018) within a chromosome. So, this is truly a temporal "snapshot" that may miss some regions of LADs that are less directly (or more dynamically) associated with the lamina, but still compartmentalized into the larger LAD sub-chromosomal compartment. It is unclear if the treatment used for this study perturbs these LAD-lamina​ dynamic​ interactions--one can imagine that the LADs are much less mobile generally under the protocol described in your supplemental information. In other words, ​LADs don't collapse, nor do they behave in the same way they would after permeabilization​. The technique has compromised some of that --which is actually fine for most of the purposes in this manuscript, but this needs to be discussed.

      ● In addtion, imaging data showing dam-LaminB1/2 plus m6A-tracer is missing (figure S2). This should be included. Is the intensity of the "tracer" similar between conditions? If so, were the exposures kept constant in all images? This is important since the decay rate is highly related to intensity of signal.

      In some cell types, especially in​ HCT116 and ​hTERT-RPE​ cells, we noted local discrepancies between the two methods (Fig. 2A,bottom panel). These differences involve mostly regions with low signals in DamID that have higher signals in pA-DamID. However, such differences are not obvious in HAP-1 and K562 cells.

      ● Only HCT116 data is shown in the indicated figure. hTERT-RPE cells are shown in the accompanying supplemental figure and use a different antibody (lamin B2) as the target for the pA-Dam.

      ● This brings up another point: the data (log2 ratio schema) shown in figure 2 is for HCT116 lamin B1 pA-Dam. Yet, the subsequent studies for transient/building interactions during G1 and into S (Figure 3) are done in hTERT-RPE cells using lamin B2. To be consistent, data from lamin B2 should be used in both figures (it seems lamin B2 data is available for all cell types). The comparison of Dam-Lamin B1 can be addressed in the Venn overlays (as they are now) and in the supplements. The hTERT-RPE data should be in Figure 2 since it is followed up on in the subsequent figure (ie it fails to meet the definition of being relegated to 'supplemental' data).

      suggesting that the separation of LADs and inter-LADs becomes progressively more pronounced after mitosis. Nevertheless....

      ● This is overstated, especially given the previously mentioned work (Luperchio, Zhang). More accurate to say LADs ​association with the nuclear lamina becomes more pronounced​. LADs (predominantly B-compartment) and inter-LADs (predominantly A-compartment) show much earlier separation from each other. This may be distinct from association with the lamina. This is an important distinction as it may lead to different hypotheses regarding mechanisms of LAD targeting/association with the lamina.

      Progression from prometaphase to late telophase in HeLa cells takes about 1 hour [33], suggesting that this timepoint captures the initial interactions with the reforming NL. Remarkably, the majority of these interactions is shared with later time points, indicating that most LADs can interact with the NL throughout interphase and are defined (and positioned at the NL) very soon after mitosis.

      ● There is wide variability in this number, some cells rapidly exit, others take significantly longer. This number is an average (and, for what it's worth, based on a very compromised cancer cell line). The "interactions' mapped are likely reflecting the ensembe measurements of the many cells that have transited into G1. Also, this statement seemingly directly contradicts the premise of many of your following data/interpretations of a sort of step-wise wave or prefered interactions from telomere proximal toward centromeric regions. This also disagrees with your previous work (Kind et al) and more recent work regarding positioning to the NL very soon after mitosis. Again, this is BULK (many cells of a continuum of configurations) versus single cell observations. This is overstated.

      We next looked into characteristics of the dynamic LADs. At early time points, LADs with decreasing interactions do not have lower pA-DamID scores than stable LADs, suggesting that their ​detachment from the NL is not simply due to weak initial ​binding

      ● The methods used here are dynamic proximity measures. Words like "binding" and "attachment" should be avoided (use interacting, associated, etc )

      LAD dynamics are linked to telomere distance and LAD size in multiple cell types

      ● Perhaps I am missing something, but I find relatively little data showing centromere-proximal LADs across cell cycle stages (referring here to Log2 ratio plots similar to what is shown for telomere-proximal LADs, Supplemental figure 6 is the only place where this is obvious.).

      ● In addtion, it seems to me that you are arguing in this and the preceding section for the following parameters: intensity of the LAD region. ie small, telomere-proximal, more euchromatic, AND less "intensely" associated.

      ● What is a "small" LAD? 100 kb or less? In Figure 2 (HCT1016, log 2 ratios), the original observation that leads into a discovery of changing NL associations through the cell cycle, the LAD that changes appears to be at least average size. Perhaps a "small" LAD adjacent to an "average" LAD. Nor do the signals appear to be all that low. There are regions within this sub-chromosomal plot that do appear to be "small" "low intensity" LADs. I am uncertain what parameters are defining these attributes. Are the cut-offs the same between cell types (ie is there a rule here?).

      ● The rules outlined above seem to break down across the different cell types. In particular, the number of active genes per Mb seems to have very little correlation overall with LADs that change. In addition, it is very unclear if "LAD size" is really a readout of both size AND intensity of interactions (understanding that this is not necessarily a direct quantitative measure of interactions).

      Correlation of pA- determined LADs that change into G1/S with B-compartment sub-types

      ● There is certainly Hi-C data on most (all?) of the cell types analyzed in this manuscript. It would be very useful for the authors to parse out how the gain/loss LADs correlate with the B1, B2. A1, A2 (etc) compartment classifications. This may help to address the point above.

      Nucleosomal pattern of pA-DamID digestion/amplification (figure S3)

      ● Onset of apoptosis needs to be ruled out. The nucleosomal (laddering) pattern could be due to DNA getting cleaved through programmed cell death pathways after permeabilization. These fragments could easily be amplified by the subsequent DamID protocol.

      Definition of 'bulk' assays

      ● All of the assays were done in bulk. Some were synchronized, some were not. This is important since the implication is that anything not 'bulk' is single-cell. Throughout the manuscript and in the figures, please refer to the conditions as 'synchronized' versus 'unsynchronized'

      Much of supplemental Figure 6 should be in a main figure

      ● It is puzzling why the first (and most easily seen/interpreted) description of LAD organization relative to telomeres/centromeres after exit from mitosis is relegated to supplemental figures. It is a foundational experiment(s) for the paper.

      pA-Dam is possibly influenced by cell-cycle related chromatin accessibility (particularly at mitotic exit)

      ● During the transition from mitosis to early G1, there are dynamic changes to chromatin state that are directly coupled to the cell cycle. A recent report, for instance, highlights that interactions of antibodies (or other proteins) with H3K9me2/3 modifications is likely influenced by phosphorylation of histone tails. The dynamics of histone modification/chromatin state possibly occluding or interfering with the interpretation of the results must be discussed.

      Significance

      N/A

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1 (Evidence, reproducibility and clarity (Required)): **Summary:** The work reports finding a molecular genetic basis for individual differences in behavior in different strains of outbred mice, even including individual behavioral differences between mice of the same inbred genetically isogenic strain. The authors were able to measure copy numbers for the tandemly repeated intronic snoRNA clusters SNORD115 and SNORD116 and found correlation with measures of anxiety in open-field test and elevated plus maze. Expression data for previously proposed targets of these snoRNAs are also provided.

      We note that this description represents only part of the achievements in our paper. The key of our paper is that we have not only used "different strains of outbred mice", but in addition one very different species of mouse (Apodemus) and a Guinea pig species. We believe that the test in very different species with very different genetic backgrounds is the crucial proof for the specificity of the effect.

      **Major comments:** 1.The techniques to measure copy numbers are challenging and the authors' conclusion that ddPCR was their method of choice is convincing. They were able to obtain limited optical mapping (Bionano zephyr) data, only for SNORD116 and only in mouse, but these data are useful to corroborate those obtained with ddPCR. 2.Figure 3 reports single copy numbers for individuals that are presumably heterozygous. Do we have to assume that the numbers reported represent the larger alleles since the ddPCR method does not allow to distinguish two different size alleles, as was shown for optical mapping?

      The numbers are derived from the whole genome DNA, i.e. represent the cumulative copy number of both alleles. We have updated the text to make this clear.

      3.The analyses reported do not take into account the specific parental origin of the alleles used in the regression analyses. Since PWSCR-specific SNORDs are only expressed from the paternal chromosomes, this generates some uncertainty about the whole dataset.

      We had explained why it is not possible to distinguish the two alleles with the current technology. Hence, it is evidently also not possible to determine which allele comes from the paternal side. In fact, given that we showed that copy numbers can change every generation, even the knowledge of which chromosome is the paternal one would not predict its copy number. Accordingly, it lies in the nature of the whole phenomenon that this uncertainty is given. It is therefore just the more surprising that we still can observe correlations that are much stronger than has been shown for natural alleles of any genetic locus implicated in behavioral traits so far.

      4.Lines 353-365: The ankrd11 exon-specific RNAseq data are confusing and too preliminary. More work needs to be done to resolve the splice variants in this region and their relationship to SNORD116 copy numbers. Alternatively lines 356-361 should be deleted.

      We have included the data to show that the mechanism must be different from the one that is seen for Htr2c. This difference is clearly documented and we should therefore like to retain it. What is missing is to show the actual mechanism by which SNORD116 causes the alternative splicing. This will require more biochemical approaches that go beyond the current study.

      5.In all tested rodents, higher SNORD copy number was correlated with higher relative anxiety score. In the human samples, however, higher anxiety scores were associated with lower copy numbers. These apparently contradictory results are not mentioned in the abstract, and are not satisfactory explained in the text.

      We have decided to leave the human data out from the current manuscript. First, the behavioral tests for the rodents are indeed not directly comparable with the questionnaire scores in humans. Second, in human genetics one usually asks the results to be confirmed in an independent study. hence, we plan to extend the human data, but to present them eventually in a follow-up paper.

      6.Extension to other species would be desirable but was limited by availability of genomic data: Results are presented for wood mouse only for SNORD115 and for the guinea pig for SNORD116.

      Given that we show a strong correlation between SNORD115 and SNORD116 copy numbers for those species where the information is available for both loci, we do not think that this is a major limitation of our study.

      **Minor comments:** 1.The authors present skull shape data related to SNORD116 copy numbers, but fail to consider how these data are relevant to the craniofacial abnormalities reported in an ankrd11 mutation. Barbaric et al (2008) reported a dominant ENU- induced mutation caused shortened snouts, wider skull, deformed nasal bones, reduced BMD, reduced osteoblast activity and reduced leptin levels. This phenotype was traced to a heterozygous missense mutation (conserved glutamate to lysine change) in an HDAC binding site. They postulated that the mutation fails to recruit HDACs to a transcription complex and to inhibit hormone-receptor activated gene transcription. What is the postulated link between this mechanism and the here reported skull shape data correlated with SNORD copy number variation?

      The described missense mutation is located in the differentially spliced exon, i.e. a direct functional link is given. We have added this information to the text and compared the direct phenotypic effects from their study and our study.

      2.The observed co-variation of copy numbers between the two SNORD clusters could indicate a duplication involving the entire region, This could be tested by determining the dosage of IPW, UBE3a and Snrpn genes.

      While this is a theoretical possibility, it was not described in the literature before. Also, in our systematic survey of copy number variation in mouse populations (Pezer et al. 2015) we did not find a deviation of these genes from expected diploid copy number in any of the populations analysed.

      3.Line 129 "the RNA coding region" and Line 148 "snoRNA coding parts" (and elsewhere) does seems correct, as by definition, this is non-coding RNA. The region they are referring to could be called the "processed C/D box snoRNA". The mechanism that generates these C/D box snoRNAs is well established: the "genes" are located in introns of host genes - and after transcription - the spliced out introns are exonucleolytically trimmed to the functional sizes. Both SNORD115 and 116 clusters are within a large transcript that originates from the SNRPN promoter of the paternal allele.

      We adjusted the wording to make clear that we refer to the mature RNAs.

      4.Figure 2 does not show data on skull shape as claimed in the legend.

      We apologize - this was a carry-over from an older version of this figure. The skull shape analysis had been moved to a new figure in the current version of the manuscript.

      5.S1 Figure: Snprn should be Snrpn

      Thank you for spotting the error - we have corrected this

      Reviewer #1 (Significance (Required)): This provocative work proposes the regulation of behavioral variance by dosage changes of a regulatory RNA. The dosage changes are apparently caused by dynamic and frequent alteration in copy number. This is a novel concept and worthy of publicizing. Extensive data documentation is provided for others to analyze and possibly replicate. The data potentially throw light on the function of the tandemly repeated imprinted snoRNA clusters in the PWS critical region. Novel aspects of this work include the discovery of copy number variation of these snoRNAs; and validation of a target of SNORD116: Ankrd11 is one of many potential targets of SNORD116 that was previously computationally predicted, this paper reports experimental evidence for this interaction. The work would be of interest to researchers in behavioral evolution, non-coding RNA function, epigenetics and overall genome evolution. Define your field of expertise with a few keyword: Molecular genetic disorders, Prader-Willi syndrome, mouse models

      Reviewer #2 (Evidence, reproducibility and clarity (Required)): **Summary** Maryam Keshavarz et al. aimed at seeking the molecular basis underlying individual behavioral variance within populations. Focusing on the Prader-Willi Syndrome (PWS) gene complex, which has been well recognized being associated with neurodevelopmental disorders, anxiety and metabolic issues, the authors found that the levels of PWS region's small nucleolar RNAs SNORD 115/116 of individual animals correlated with these individuals' behavioral test scores. The variations in transcript processing of some anxiety-associated target genes also revealed correlation with SNORD 115/116 copy numbers. Authors implicated that the copy numbers of SNORD 115/116 within PWS plausibly influenced behavioral variances among individuals. • Authors first validated that the droplet digital PCR (ddPCR) was suitable for quantifying variations in copy numbers of genomic clusters. Their ddPCR data showed confident correspondence with reads calculation of whole-genome-seq dataset. Also, ddPCR showed good replicability and congruent tissue-to-tissue similarity. • Authors found the ddPCR-measured SNORD copy numbers from several mice populations showed significant regression with SNORD RNA levels, respectively. Also, the anxiety profiling using Open Field Test and Elevated Plus Maze test indicated a significant regression between SNORD copy numbers and anxiety profiling scores, namely individual mouse with higher copy numbers received higher relative anxiety scores. Some other representative genes outside PWS, such as Sfi1 and Cwc22, failed to show such copy number-anxiety score regression. • Authors applied RNA-seq of individual mice with different SNORD 115/116 copy numbers and analyzed potential target gene regions. They found the level of alternative splice-resulted exon Vb of gene Htr2c, a serotonin receptor, was positively correlated with SNORD 115 copy number. Also, an alternative splicing product of gene Ankrd11, a chromatin receptor regulating GABA receptor, was found to positively correlated with SNORD 116 copy number. Positive correlation to SNORD copy numbers also occurred to some Htr2c and Ankrd downstream genes. • Authors used a landmark-based analysis to score mice craniofacial features and found the scores were in relationship with SNORD 116 copy numbers. • Authors also found significant regression between SNORD copy numbers and behavioral evaluations in other rodents. In humans, the Tridimensional Personality Questionnaire (TPQ) based evaluation also showed correlation with SNORD 115 and 116 copy numbers. **Major comments** The study mainly revealed important correlations between copy numbers of 2 small nucleolar RNAs and cognitive behavioral variance of different individual animal. Although very useful and important findings, the study did not provide any evidence about the causality between SNORD 115/116 and the observed behavioral phenotypes. For instance, • #1: the behavioral observations (i.e. anxiety) may not be merely regulated by the PWS gene complex.

      It is already well understood that the respective behavioral observations have a polygenic basis. But our data show that the SNORD copy numbers act as major modulators of the behavior.

      • #2: the paper did not show if manipulations on mouse SNORD 115/116 could affect target genes as well as the consequential behavioral phenotypes.

      A direct interaction between SNORD115 and its target gene HTr2c has previously been shown in cell culture experiments. Further, we show that the commonly used inbred mouse strain C57Bl6 carries already different copy number alleles that would not be different from artificial manipulation of the copy number. There is a long tradition in mouse genetics to accept also spontaneous alleles as genetic proof, not only the alleles that were created by artificial intervention.

      Further, as also pointed out in response to reviewer 1, in the absence of the possibility to do a direct genetic manipulation in a given genetic background, we use the comparative analysis between different genetic backgrounds to prove causality.

      Reviewer #2 (Significance (Required)): Authors provided a potential molecular basis regulating the PWS region, which is a genomic imprinted gene complex and related to many neurodevelopmental diseases in mammals, including humans. Considerably cost-saving than whole-genome deep-seq, the application of droplet digital PCR on copy number (esp. in stretching regions) measurement can overcome some technical difficulties, for example, qPCR has limit in resolution when differentiating subtle variance in copy numbers; the Nanopore seq and current mapping algorithm show difficulties when placing the internal repeats also. Authors proposed SNORD copy number as a potential explanation to the individual-to-individual variance within the same species or even the same population.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Reviewer #1:

      (Evidence, reproducibility and clarity (Required)):

      This study aims to develop tools for yeast researchers to automatically segment and classify yeast colonies. The machine learning method enables rapid classification compared to manual counting.

      \*MAJOR CONCERNS:***

      Please include additional details about the types of images that must be captured for segmentation and categorization. It is important to provide details of what level of magnification might be needed during image capture. We anticipate that providing clear protocols for altering thresholds to classify colonies might be one way to overcome this challenge

      That’s correct. Details on image acquisition, such as the level of magnification, are important to obtain accurate results.

      To address this, we provide a detailed protocol in our companion article on ProtocolExchange: https://protocolexchange.researchsquare.com/article/nprot-7305/v1

      We have updated the manuscript to include this link.

      While the program crops colonies and segments them accurately, there is no spatial information of where these colonies are located in the image. This loss of spatial information limits the ability to use this platform to identify colonies of interest following experiments such as a genetic screen.

      In principle it would be possible to retain the location of each cropped colony in the form of (x,y) coordinates in pixels. This could be included in a future release. However, we doubt the utility of such information for a genetic screen, unless identification of a positive hit could be linked to robotic picking of the identified colony (which would certainly go beyond the scope of this work). In reality, researchers will pick positive hits manually anyways, making our pipeline superfluous for such an application. We emphasize that we have developed our pipeline for large-scale quantification of red/white color assays. Here the pipeline makes a huge difference, as compared to manual counting.

      The inability to accurately recognize sectored colonies as sectored (rather than red) is a significant limitation to the usage of this program for quantitative assays. While differentiating between red and white colonies is useful, the conclusion by the authors about its value for quantitative assays is limited unless variegation can be accurately defined. The authors should either soften this conclusion or qualify what quantitative measurements might mean given the limitations of their classification program. This somewhat diminished our overall enthusiasm.

      The reviewer correctly points out that our algorithm shows lower accuracy when differentiating between red and variegating colonies than when differentiating between white and non-white colonies (including red, variegating and pink). Given this observation, we initially focused on predicting white vs. non-white colonies with our tool. However, the output of our pipeline also includes more granular predictions of numbers of white, red, pink and variegating colonies. We therefore leave it up to the user to decide which level of granularity is more appropriate, taking into account the tradeoff between granularity and accuracy. In particular, we note that for the colonies we tested, splitting the non-white category of predictions into red, variegating and pink resulted in a decrease of sensitivity from 0.98 for the non-white category to 0.86-0.88 for the individual categories, while the corresponding specificity showed a smaller reduction from 1.0 to 0.97-0.98. Considering that a lack of any predictions for the red, pink, and variegating categories effectively prohibits the researcher from detecting them at all, even a reduced sensitivity may be better than nothing and therefore acceptable in this case. In order to make this clearer in the text, we provide a more detailed comparison of performance metrics between levels of prediction, which may help to guide the user’s decision.

      This program must be benchmarked with other colony classifiers. Cell Profiler is an example of a popular yeast colony segmentation program. How does this machine learning based tool compare with other colony segmentation and categorization programs. One possibility is to include an additional figure that compares their program with clear benchmarks. The outcome of effort based on benchmarking is not as important since we believe it is useful to have many alternatives for yeast segmentation and categorization. We think this revision would be essential to the manuscript and would add significant value.

      We have used other approaches and were not satisfied with the outcomes. Hence, we developed our own pipeline, specifically designed to accurately distinguish red from white colonies and quantify such assays at a large scale.

      When using CellProfiler we could not reliably distinguish variegating, pink, and red colonies. White colonies show up in the Red, Blue and Green channel, Red colonies mainly in the Red Channel. Therefore, variegating, pink and red colonies can be distinguished from white by reduced Blue and Green values, which is indirect and caused several issues. One of the problems was reflection of the flash during image acquisition, giving two reflective white patches on each colony that differed in pixel size depending on the magnification and colony size. We tried to prevent reflection with a ‘tent’, which reduced but could not eliminate the reflection. Therefore, the MaxIntensity of the Green/Blue channel was always the same of each colony, impeding classification. Furthermore, most red/pink colonies had a slim white rim, which was sometimes bigger/smaller and the relative area of rim to colony depends on the colony size, which made it impossible to tell a bit variegating from red by the output values from CellProfiler.

      If deemed useful by the editors, we will be happy to mention this in the manuscript. A systematic comparison with other classifiers seems to be a bit of an overkill though. As stated by this reviewer, the outcome of such comparison would not matter much. It is important that the community has several approaches to choose from, so that the best solution can be found for each specific application.

      \*MINOR CONCERN***

      The program currently saved cropped images of each segmented colony. This takes up a lot of storage space. It might be useful to provide an option to save or not save these cropped images. This flexibility will be valuable for users but does not detract from the major conclusions of the manuscript.

      While we appreciate that the need to save individual images of cropped colonies may be a drawback for some users, in the current implementation it is not possible to avoid this step. One could imagine a scenario in which all cropped images were stored in RAM prior to classification rather than written to a computer’s disk; however, we believe that most users would have more limitations on the availability of RAM than on disk storage, therefore making this option also not feasible.

      The authors have provided excellent examples of colonies they believe are red, white or sectored. More accurately defining a pink colony would be valuable for users of this program. How much of red is classified as pink by this program?

      As the reviewer points out, it is difficult to give an objective definition of a pink colony. In this case, we relied exclusively on subjective expert annotations to define which colonies were pink (as well as for all other categories).

      We acknowledge that this may introduce some error into the model, as there may be some overlap between red and pink colonies or between pink and variegating colonies; however, this problem also exists in the case of manual annotation. As shown in Figure 1d, for the colonies we tested, 4 out of a total of 55 colonies annotated as red by an expert were predicted as pink by our algorithm. We would like to emphasize that our pipeline alleviates biases between different researchers who would be annotating colony color manually, therefore improving reproducibility. Such biases could be subjective or objective, such as different monitors used to inspect the images.

      Providing an example data set with the protocol would be helpful for users with limited Python experience. In combination with their protocol on Protocol exchange, this would serve as a valuable resource for novices in programming.

      We agree with the reviewer’s suggestion and will be happy to provide an example dataset used in the manuscript. We will defer to the journal’s guidelines as to the best way to share these raw images.

      One technical issue of the program is that the program tries to open all files in the specified folder even if they aren't jpg. This causes problems if there are additional or hidden files in the folder and the program cannot process the additional files.

      We appreciate the reviewer pointing out this issue and have fixed it in a new version of the code.

      Reviewer #1 (Significance (Required)):

      This manuscript describes a machine learning approach to segment and categorize yeast colonies based on a red/white selection assay. The approach has been implemented using Python which makes this widely accessible to many researchers. Their detailed protocol on Protocol Exchange is a valuable resource which made it possible for us to evaluate its performance. The program meets its goals of reducing user time via manual counting. It is also reasonably accurate in discriminating between red and white colonies based on our initial tests. However, there are several important concerns that the authors will need to address before this manuscript can become a valuable resource for the yeast community. It is important to note that our framework is one where we have a great interest in quantitative yeast genetics but cannot evaluate the strengths and weakness of the computational approach. So much of the review is focussed on what would be needed to make this tool more user appropriate.

      Reviewer #2

      (Evidence, reproducibility and clarity (Required)):

      \*Summary:***

      Carl et al present an application of a deep learning-based image analysis able to segment and classify individual yeast colonies by their phenotype in a special plate. They evaluated the method and show that it provides the accuracy similar to the one achieved by experts' manual classification.

      \*Major comments:***

      The key conclusions are convincing. The evaluation is performed on 3 datasets showing different properties (strong presence of phenotype, almost lack of the phenotype, gradual change of the phenotype).

      The claims are carefully formulated. The deep learning methodology (training, validation, using modern technologies such as transfer learning, Unet, augmentation) is carefully designed and carried out. The evaluation is sound. The limitations are discussed.

      For a short paper as it's formulated currently, no additional experiments are necessary.

      The methods are implemented and are available on GitHub.

      However, I'd strongly recommend to share also the data used in the paper, to make possible the reproduction of the results as well as to be used as examples for future users.

      As stated above, we agree with the reviewer’s suggestion and will be happy to provide an example dataset used in the manuscript. We will defer to the journal’s guidelines as to the best way to share these raw images.

      No replicates are provided unfortunately. The manuscript would benefit from showing results from replicates, especially because they should be easily obtainable.

      It is not clear to us to which experiment the reviewer is referring. All of the results presented in Figure 2 did include replicates, as detailed in the figure legend.

      \*Minor comments:***

      I'm not familiar with the state of the art to judge on whether prior studies are referenced.

      The text and fitures are very clear and well formulated.

      Reviewer #2 (Significance (Required)):

      Despite the conceptual innovation is average, the method is well-developed and seems to be very useful for yeast analysis.

      I'm not an expert in the application area to judge the state of the art. The carried out deep learning methodology is top notch.

      The manuscript can be interesting and useful for experts using the described assay for yeast.

      My expertise is in omics, image analysis, and machine learning.

    1. Super. Clearly defined research focus, although a massive topic in terms of scope and scale. Some thoughts.

      (1) Might not be a bad idea to revisit some of the traditional development economic works on rural to urban migration, although the push / pull factors you are identifying are much more regional or global in nature. Two good ones to look at are Todaro:

      https://www-jstor-org.proxy.wm.edu/stable/1807860?seq=1#metadata_info_tab_contents

      and Sir Arthur Lewis' Economic Development with Unlimited Supplies of Labour. Please let me know if you can't find a copy of his 1954 essay that earned him the Nobel Prize.

      (2) I'm wondering a bit about which data science methodology is best to investigate further with regard to your research topic. Argument could be made for thinking about the application of a hierarchical bayesian model with the survey data you have identified. There are also arguments in favor or gravity type models with the CDR data you are considering.

      (3) Migration patterns are such a big topic that it can be difficult to know where to start in terms of geospatial data, data science / machine learning methods / models etc…A common starting point for thinking about migration is in terms of push factors and/or pull factors, more traditionally within the context of rural to urban migration. The scope and scale of what you are investigating is of a much greater magnitude and complexity than these traditionally considered foundations from development economics. Additionally, thinking of migration of this magnitude in terms of only human movement and behavior, likely over simplifies the problem. For example, we could use CDR data to infer the origins and destinations of where people are coming from and where they wish to go as part of a transportation system model (even if it is by foot or mixed mode). I think you need something that seeks to accomplish far more than simply transport behavior and movement, because you also wish to understand the motivations behind why people choose to leave (push factors) as well as the reasons they are attracted to some location (pull factors). I think looking into agent based models as a data science method for describing, analyzing could also be a promising path forward. A simulation system, such as an ABM, may incorporate different model that address factors at the origin as well as at the destination.

      Will be very interested to find out more about the direction you have selected moving forwards! Just keep going!

    1. Really good stuff. Your research focus is very clearly defined. Some thoughts.

      (1) Migration patterns are such a big topic that it can be difficult to know where to start in terms of geospatial data, data science / machine learning methods / models etc...A traditional starting point for thinking about migration is in terms of push factors and/or pull factors, more traditionally within the context of rural to urban migration. The scope and scale of what you are investigating is of a much greater magnitude and complexity than these traditionally considered foundations from development economics. Additionally, thinking of migration of this magnitude in terms of only human movement and behavior, likely over simplifies the problem. For example, we could perhaps use CDR data to infer the origins and destinations of where people are coming from and where they wish to go as part of a transportation system model (even if it is by foot or mixed mode). I think you need something that seeks to accomplish far more than simply transport behavior and movement, because you also wish to understand the motivations behind why people choose to leave (push factors) as well as the reasons they are attracted to some location (pull factors). I think looking into agent based models as a data science method for describing, analyzing and potentially predicting migration throughout North America might be a good place to start. A simulation system, such as an ABM, may incorporate different model that address factors at the origin (crime as a push factor) as well as at the destination (income differentials, as discussed by Todaro). There is simply a lot to think about here.

      (2) It might be helpful to reflect back on some of the historical references. Todaro is an often cited source.

      https://www-jstor-org.proxy.wm.edu/stable/1807860?seq=1#metadata_info_tab_contents

      Another good one to consider is Sir Arthur Lewis and his Economic Development with Unlimited Supplies of Labour. Please let me know if you can't find a copy of his 1954 essay that earned him the Nobel Prize.

      Another good source, is WIEGO.

      https://www.wiego.org

      Just keep going!

    1. et still find that our students of color struggle and fai

      This may be a pet peeve, but I feel many in the the discipline fail to think sociologically about these kinds of questions, and focus far too much on what is right in front of their noses - language, assessment, feedback, etc. Consider, for example, Ira Kaznelson's When Affirmative Action Was White, and Rothstein's The Color of Law. They describe how the huge, transformative public policy programs of the New Deal and Fair Deal, as well as areas like housing policy, lending, zoning, etc. gave enormous, staggering, transformative boosts to white Americans, while systematically excluding people of color. The largest middle class the world has known was created through a slew of programs that people of color were excluded from, and a whole set of policies, esp, housing and lending and zoning and penal, made sure to engrave racism in our schools, housing, urban geographies, prisons, and in wealth accumulation (most family wealth is generated via the transfer of housing value from one generation to the next). Obviously many other forms of racism were important, but this huge framework of laws, regulations, and policies both reflected racism, and were absolutely crucial in reproducing it, with affects the have an enormous impact today.

      Yes racism is overdetermined. I'm just skeptical that how teachers assess or give feedback to students in first year university writing classes matters much. I say that (I hope) not defensively or out of a sense of guilt or to deflect blame. I just think we could change everything about how we give feedback and assess writing (we could even follow Inoue's "labor based" model of assessment) and this would change...nothing.

      Furthermore, from my perspective, the great strains and stresses on universities that I see doing the most to undermine education come largely from the neoliberalization of higher ed - the relentless defunding of public ed and shifting of costs to students, in order to pay for tax cuts for the wealthiest; casualization of labor, deprofessionalization, adjunctification, the explosion of class sizes to save costs, etc etc. Those things drive pedagogy in many ways. Most of our writing teachers teach 5 sections of 30 students, and sometimes other sections at community college. They work 70-80 hours a week. Their feedback and assessment practices are driven largely by these material considerations. In such situations poor students, first gen students, students of color, may suffer most as they don't have all the support and familiarity with university that other students do. These kinds of issues seem largely ignored by Inoue, although I imagine he must be aware of them.

    2. I know you are good people. And because I love you, I will be honest with you, and it may hurt. But I promise you, it hurts not because I’ve done something wrong, but because I’m exposing your racial wounds.

      This is a really interesting set of sentences. It echoes the intro to George Yancey's Backlash: What Happens When We Talk Honestly About Racism in America. Yancey's book emerged from his "Dear White America" columns for the NYT, and the ferocious, staggering racism with which these columns were received by some white Americans. The book asks white readers to think honestly and deeply about impulses to deny, ignore, or get angry when racism is discussed. But I have several reactions to Inoue's framing. 1) It could be a way of asking white readers to do the kind of careful introspection Yancey describes.2) it could be a way of framing things that constructs in advance objections or challenges as "hurt" and resentment at hearing Inoue's "honesty," his revealing of racial wounds. It also frames things in terms of love/hate, honesty/dishonesty, wounding/healing. In this scenario, if I disagree with Inoue am I necessarily accusing him of doing something "wrong," or refusing racial healing? This second framing seems to move things away from the space of argument and debate and into some other space. Perhaps that space is valuable in some ways. But this framing carried into the later online discussions of Inoue's text, and was used by some to dismiss critique as refusal to acknowledge racial injury or refusal to acknowledge the reality if racism in the U.S.

    1. Quarterly Journal of Speech Vol. 95, No. 1, February 2009, pp. 43􏰀65 Bordering the Civic Imaginary: Alienization, Fence Logic, and the Minuteman Civil Defense Corps D. Robert DeChaine

      Current figurations of the ‘‘immigration problem’’ in the United States challenge our understanding of the rhetoricity of contemporary bordering practices. The public discourse of the Minuteman Civil Defense Corps serves to chart the alienization of undocumented migrants and the enactment of alien abjection on the U.S.􏰀Mexico border. Alienization promises an antidote to majoritarian anxieties regarding national disunity in the form of a shoring-up of cultural boundaries that border-crossing subjects render troublesome. Ultimately, the fence logic engendered by groups such as the Minutemen reveals how struggles over the boundaries of citizenship both enable and limit an affect-charged civic imaginary.

      Keywords: Borders; Alienization; Minuteman Civil Defense Corps; Citizenship; Social Imaginaries

      The specter of the border haunts the language of social relations. At present, some 12 million undocumented migrants reside temporarily or permanently in the United States.1 Many of them entered the country across the border with Mexico, a frontier spanning nearly 2,000 miles from the Californian Baja through Texas and to Tamaulipas. These border-crossing individuals, the majority of whom venture to the United States in search of work and enhanced economic opportunities, are not recognized by the U.S. government as citizens, defined in legal terms as native or naturalized rights bearers. Nor, for the most part, are they considered legitimate in the broader sense of what Charles Taylor terms ‘‘recognition’’*that is, they are not viewed as valued and respected members of the national community.2 Indeed, upon D. Robert DeChaine is Associate Professor of Communication Studies and Liberal Studies at California State University, Los Angeles. An earlier version of this essay was presented at the 2007 National Communication Association convention in Chicago. The author would like to thank Editor John Louis Lucaites, Mike Willard, Michelle Ladd, Scott Rodriguez, and two anonymous reviewers, each of whom made decisive contributions to the quality of the essay. Correspondence to: Department of Communication Studies, California State University, Los Angeles, 5151 State University Drive, Los Angeles, CA 90032-8111, USA. Email: ddechai@calstatela.edu ISSN 0033-5630 (print)/ISSN 1479-5779 (online) # 2009 National Communication Association DOI: 10.1080/00335630802621078

      44 D. R. DeChaine close examination, the cultural politics of recognition reveals a telling link between state legitimacy and public morality. As Kent Ono and John Sloop note in their analysis of the role of media rhetoric in the passage of California’s Proposition 187 in the 1990s, [T]he contemporary citizenship narrative casts immigration in moral terms: Those who abide by U.S. laws and procedures for how to become U.S. citizens are cast as good and moral citizens; those who do anything but systematically follow expectations of U.S. government officials and their supporters are seen as bad and immoral ‘‘illegals.’’3 The transgressive act of unauthorized border crossing thus produces a double exclusion: it renders migrant persons both legally and morally abject. Given the subordinate status of undocumented migrants in the United States today, what is particularly interesting regarding the ‘‘immigration problem,’’ as it is typically invoked in public discussion, is that it is not framed predominantly in terms of the migrants themselves. After all, the United States is a nation composed of immigrants, so the oft-repeated narrative goes, and its promise as a land of opportunity for hard-working, law-abiding citizens continues to be exalted as among its preeminent gifts. Rather, the problem is most often cast in terms of a lack of border integrity: its leakiness; the ease with which undocumented migrants are able to slip across it unnoticed; and the inability or unwillingness by the U.S. and Mexican governments to seal, secure, and protect the national frontier and its stark line of demarcation. Notwithstanding the nativism and xenophobia that have historically shaped and continue to shape popular attitudes toward undocumented migrants in the United States, the problem of immigration, it seems, lies not with the migrant, but with the border.4 The prevalent characterization of the immigration problem as primarily a concern about the border gestures toward a number of longstanding assumptions regarding what a border is and how it functions. According to the traditional geography-based logic, a border exists as a given entity whose contours can be cleanly and clearly recognized, measured, and mapped.5 A border’s givenness and mappability implies its stability as a resource for delineating spatial territory. Despite its tenacity, the traditional border logic has increasingly been subjected to critique. This scrutiny is owing in part to the emergence and development of postmodern theories of the social character of space beginning in the 1960s, and to a subsequent proliferation of spatial metaphors endemic to human social life in a globalized world.6 Against the traditional view of borders as given and stable entities, the countervailing claim is that whatever form they may assume, all borders are socially motivated constructs.7 They are bounding, ordering apparatuses, whose primary function is to designate, produce, and/or regulate the space of difference. Thus conceived, borders simulta- neously shore up insides and mark off outsides while establishing the terms of their relationality. They perform both division and containment functions, differentiating the self from others, one culture from another, desirable elements from undesirable ones, and, often enough, ‘‘us’’ from ‘‘them.’’ Moreover, according to the revisionist

      account, a border’s contingent configuration is often masked by certain political and economic discourses that labor diligently, sometimes feverishly, to maintain the semblance of stability, integrity, and reality. Recent scholarship in communication studies, chiefly in the area of immigration discourse, has begun to attend to the subject of borders and their cultural significance. A majority of this work aligns with critical scholarship that ascribes a truth function to the border, focusing on its constructedness and on the ambivalent identities of border(ed) subjects.8 Thus considered, a border operates as an inducement to action, deployed by agents in specific contexts to warrant claims to both unity and division.9 Circulating as a robust spatial metaphor, the figure of the border functions as a prevalent organizing doxa in a group’s collective vocabulary. Such assumptions, theorizations, and criticism regarding the constitution and function of the border beckon a considera- tion of two interrelated questions, each of which holds epistemological and ontological significance. What kinds of operations are at play in the construction of borders? And once entwined in the cultural fabric of a political community, how do constructed borders shape human values, attitudes, and actions? The aim here is to focus on the rhetoricity of contemporary bordering practices by charting the ‘‘alienization’’ of undocumented migrants in the United States, and to explicate the operations by which alienizing discourse is enacted on and around the U.S.􏰀Mexico border.10 Alienization, I contend, is a bordering project that draws force from a variety of common linguistic and nonlinguistic resources to render individuals and groups abject and unassimilable*irredeemable others whose putative exclusion from the national body is virtually absolute. Alienization materializes as a reactionary rhetoric goaded by a profound anxiety of incompleteness, an anxiety akin to what Arjun Appadurai refers to as a ‘‘fear of small numbers’’ engendered by a minority population whose alterity is perceived by a majoritarian national ethnos as a threat to its unity.11 Thus conceived, alienization promises an antidote to disunity and incompleteness in the form of a shoring-up of cultural boundaries that border-crossing migrant subjects reveal to be troublesome. Moreover, as a form of world making, alienization shapes a population’s collective attitudes toward and practices of citizenship. I share Robert Asen’s view of citizenship as a discursive mode of public action that is ‘‘always conditioned by social status, relations of power, institutional factors, and material constraints’’; as such, citizenship enactment necessarily involves hegemonic struggles over the very meaning of the term ‘‘citizen’’ in a multipublic sphere.12 Evoking the concept of the ‘‘social imaginary,’’ I examine how struggles over the boundaries of citizenship both enable and limit an affect-charged ‘‘civic imaginary.’’ An analysis of alienization and its bearing on the constitution of the civic imaginary requires a shift in focus away from the consideration of borders as physical, geographical entities to consideration of their instrumentality as performative, sociocultural productions. It places emphasis on the process, practice, and affect of bordering, and on the effects, both material and discursive, of border rhetorics on particular social collectivities. My chief ambition, then, is to throw light on the relationship between physical and social bordering practices, and to identify the very human implications of those practices for the shaping of civic culture. In order to lend historical specificity to the Bordering the Civic Imaginary 45

      46 D. R. DeChaine discussion, I focus attention on the crafting of public appeals in support of the Border Fence Project, an initiative launched by the Minuteman Civil Defense Corps (MCDC) in 2006. Originally created in 2005 by former elementary school teacher, military veteran, and California resident Chris Simcox in response to a perceived ineffective- ness of U.S. governmental action, MCDC proclaims itself to be ‘‘the country’s largest volunteer grassroots border security advocacy group,’’ boasting more than 350,000 constituents.13 The professed aim of the MCDC’s Border Fence Project is ‘‘to secure America’s sovereign territory against incursion, invasion, and terrorism’’ through the construction of a steel security fence along the U.S.􏰀Mexico border.14 The MCDC and its Border Fence Project has garnered considerable attention from popular media, and support from prominent members of the U.S. government. Drawing on a range of textual evidence including websites, speeches, visual and print media, an online discussion forum, and interviews with Simcox and other MCDC members, I show how the group’s public advocacy of the border fence reflects an articulation of economic, racist, and nationalist narratives that together produce a border rhetoric in which the alienized subject becomes both figurally and literally fenced out of the sacrosanct space of U.S. citizenship. The MCDC’s Border Fence Project presents a timely example of a symbolic enactment of alienization that fuels public sentiment and influences policy regarding undocumented migrants in the United States. Rather than dismiss the organization as extremist, as popular U.S. media often do, or consider its views to be peripheral to dominant attitudes toward immigration, I argue that a close examination of the MCDC identifies its reliance on symbolic strategies and commonly shared values that are anything but radical. In the analysis, I hope to illustrate the ease with which physical and geopolitical borders map onto cultural and ideological borders. Against the popular argument that the immigration problem is preeminently about the integrity of the border rather than about the qualities of the migrant as a human being, I contend that their relationship is in fact profoundly fraught. ‘‘Suspect bodies,’’ asserts Lisa Flores, ‘‘carry the border on them.’’15 As a transgressive, racialized subject, the alienized migrant literally embodies the border, rendering problematic any tidy relationship between physical and social space. Crafting the Abject: The Border(ing) Project of Alienization An examination of the rhetorical dimensions of the border requires a shift in focus from borders to bordering, from a consideration of static entities to analysis of a dynamic practice. As a social ordering practice, bordering produces and enforces spaces of identity and difference, defining terms of identification and exclusion. As such, it influences a community’s ways of seeing and experiencing itself, its members, and those deemed to be outside or unworthy of membership. In this section, I outline a project of cultural and political abjection, whose symbolic form operates according to an affective logic of alienization. My intention is to identify the characteristic features of alienization, to explain its motivations and functions, and to suggest some of its implications for its bordered subjects. My discussion is informed by the

      complementary projects of critical rhetoric and cultural studies, each of which claims a stake in uncovering operations of power that shape human experience.16 While I would propose a certain degree of applicability to non-U.S. contexts, my focus is on the specific formation of alienization in post-9/11 U.S. society. Alienization in the United States did not materialize full-blown in the present social-political moment. Indeed, its current manifestation attests to a historical record of laws, policies, and practices reflecting longstanding attitudes about immigration and migrants. As Flores contends, ‘‘Contemporary images of immi- grants, such as that of the illegal alien, do not emerge in a vacuum. Instead, they are part of our nation’s history of immigration, race, and nation; they bring with them varied meanings, reflecting their origins and uses.’’17 This history has been steeped in nativism, an ideology based on a systematic exclusion of designated others, that can be traced back to at least the nineteenth century. Driven by the twin discourses of racism and capitalism, nativism has contributed to the construction of narratives that cast the migrant as culturally different or inferior, a necessary source of labor, and a drain on U.S. government resources.18 Its early manifestations are evidenced in the Chinese Exclusion Act of 1882, which denied migrants citizenship on the basis of national origin, and the Immigration Acts of 1921 and 1924, which placed numerical limits on immigration while entrenching for decades ‘‘a global racial and national hierarchy that favored some immigrants over others.’’19 During the Great Depression, as demand for labor diminished and job competition increased, nativism was reinvigorated in the form of voluntary repatriation campaigns that resulted in the deportation of a half a million Mexican undocumented migrants, U.S. citizens of Mexican descent, and permanent legal residents. During World War II, the U.S. government, presuming that all U.S. citizens of Japanese origin were racially inclined to disloyalty, incarcerated 120,000 persons, effectively nullifying their citizenship status. After the war, with the increased demand for labor, the government instituted the Bracero program, a contract labor policy for Mexican migrants that Mai Ngai describes as ‘‘America’s largest experiment with a ‘guest worker program’’’ to date.20 Arcing into the present, nativism has endured in actions such as 1954’s Operation Wetback, which led to the forcible deportation of more than a million Mexican migrant laborers, efforts in the 1980s to militarize the U.S.􏰀Mexico border, California’s Operation Gatekeeper, Propositions 187 and 209 in the 1990s, state laws mandating English-only policies, and recurring efforts to pass an English Language Amendment to the U.S. Constitution. As such historical patterns of response to migrants underscore, an account of the present conjunctural formation necessarily includes the history of nativist-born attitudes and practices that have designated immigration as a problem and the migrant subject as an undesirable outsider to the American civic community. In its most elemental sense, alienization is a form of otheringa way of seeing and not seeing, of experiencing and not experiencingthat conditions modes of human subjectivity and action. Rather than considering alienization primarily as a condition, or as a terminal state, or in terms of a culmination of effectsalthough it is certainly experienced on each of these registersI propose that it is most usefully understood Bordering the Civic Imaginary 47

      48 D. R. DeChaine as an unstable hegemonic process that must constantly adjust the character of its form if it is to win the consent of a national community guided by properly American liberal democratic values. As a hegemonic process, alienization operates as a fundamentally rhetorical mode of action. Invoking Kenneth Burke’s formulation, it functions terministically to direct and reflect the experiential reality of symbol users.21 As a shaper of collective attitudes, it provides a national community with a repertoire of symbolic resources for naming and thus bringing into being its valuative structure. These resources include an array of metaphors ascribed to alienized persons, as well as linguistic and visual figures that serve both to condense and to amplify public values. As I elaborate below, for example, the metaphoric construction of an alien invasion, and inverted visual images such as an upside-down American flag or a photograph of a breached border fence, can provide powerful symbolic grist for mobilizing public sentiment against those perceived as threatening to the sanctity of American values and national security. Moreover, alienizing rhetoric operates according to an essentialist logic based on negative linguistic difference. As Mark Lawrence McPhail explains, ‘‘The socio-political realities of negative difference are products of a language defined in essentialist terms as much as they are a reflection of self-evident realities that exist independent of the languages we use to construct them.’’22 Viewed in this light, alienization operates as a moralizing discourse that tells the truth about undocumented migrants and the essential nature of their otherness. The terministic and ideological functions of language and imagery are integral to the development of a hegemonic border logic that negatively posits absolute identities onto other(ed) migrant individuals and groups. Alienization signifies a context-specific conjuncture of discourses that interanimate and mutually reinforce one another. In its present configuration, it is enacted as an expression of racial, ethnic, and national identity that categorizes and differentiates Americans from non-Americans*or, more accurately, un-Americans. It demon- strates the intimate social and political linkage of race and nation in directing racism as an expression of xenophobic attitudes toward inferior and undesirable constituents of the national body.23 As a bordering practice, alienization shares much in common with what Howard Winant describes as ‘‘racialization,’’ a process involving attempts to fix identities provisionally in accordance with particular social, historical, and political attitudes about race.24 Furthermore, racializing rhetoric is readily linked with economic arguments that reinforce cultural and political attitudes toward migrants. In their analysis of the rhetoric of California’s Proposition 187, for example, Ono and Sloop describe the racialization of the migrant as the discursive production of an ambivalent subject who is both desired and reviled, necessary for both capitalist production and the object of ‘‘loathing of the laborer who does anything other than work specific jobs associated with facilitating the interests of efficient capital processes.’’25 Arguments about the migrant’s relative economic value are tethered to ideologically charged prescriptions of racial and ethnic identity. The undocu- mented migrant becomes both integral to and separated from proper capitalist relations of production; as such, alienization bears more than a passing resemblance to Karl Marx’s conception of ‘‘alienation.’’26

      Alienization functions discursively to shape public understandings of social and political identities. However, to gauge its influence only in terms of discourse misses a great deal about what drives it as an expression of national communal values. At the motivational level, alienization operates according to an affective logic similar to that which Appadurai describes in terms of an ‘‘anxiety of incompleteness.’’27 Appadurai accounts for what he takes to be an increasing propensity towards ethnic-based violence committed by national majorities (including liberal democracies) against their minority populations, a tendency he attributes in large part to the anxieties of social life in a globalized world: [W]here the lines between us and them may have always, in human history, been blurred at the boundaries and unclear across large spaces and big numbers, globalization exacerbates these uncertainties and produces new incentives for cultural purification as more nations lose the illusion of national economic sovereignty or well-being.... [T]he tip-over into ethnonationalism and even ethnocide in democratic polities has much to do with the strange inner reciprocity of the categories of ‘‘majority’’ and ‘‘minority’’ in liberal social thought, which produces what I call the anxiety of incompleteness. Numerical majorities can become predatory and ethnocidal with regard to small numbers precisely when some minorities (and their small numbers) remind these majorities of the small gap which lies between their condition as majorities and the horizon of an unsullied national whole, a pure and untainted national ethnos . . . . The anxiety of incompleteness (always latent in the project of complete national purity) and the sense of social uncertainty about large-scale ethnoracial categories can produce a runaway form of mutual stimulation, which is the road to genocide.28 According to Appadurai, it is the national ethnic minority populations who bear the brunt of the uncertaintiesand the violencespurred by globalization and its disjunctive modes of organization. Majorities, goaded by the anxiety of incomplete- ness and a fear of small numbers, find a scapegoat in the figure of the minority, whose presence is both necessary and unwelcome: necessary for dirty work such as fighting wars and shouldering menial labor, but unwelcome for the threats their racial, financial, linguistic, and cultural border-blurrings pose. Above all, Appadurai claims, national ethnic minorities ‘‘blur the boundaries of national peoplehood,’’ a cardinal transgression for which they are not to be forgiven.29 They are the embodiment of the anxiety of incompleteness. Minorities problematize the meanings of ‘‘us’’ and ‘‘them’’*and for that, they must pay. Appadurai’s argument regarding the majoritarian fear of small numbers lends to an understanding of the affective logic of alienization in the United States today. In a globalized world, where both ‘‘vertebrate’’ and ‘‘cellular’’ tendencies of hypercapit- alism move across national boundaries with swiftness and ease, it is the figure of the border-crossing migrant who increasingly signifies the social (dis)ease of the U.S. border problem.30 To be sure, arguments casting undocumented migrants as criminals and threats to national security have long figured in U.S. popular, political, and legal discourse. However, public expressions of anxiety regarding the status of migrants have once again become pronounced in the wake of global free trade policies such as those engendered in the General Agreement on Trade and Tariffs Bordering the Civic Imaginary 49

      50 D. R. DeChaine (GATT) and the North American Free Trade Agreement (NAFTA). This has partly to do with the U.S.-led effort to relax economic borders under the auspices of creating an integrated North American market while at the same time resisting an equivalent integration of cross-border labor.31 However, underlying this contradictory policy, I contend, is an affective impulse motivated by fear of losing control. As economic borders loosen, sociocultural borders tighten; as the U.S. economy becomes ever more subject to the disjunctive flows of a global cultural economy, its majoritarian reaction is to allay its anxieties by maintaining control where it canon cultural terrain. In a post-9/11 climate stoked by an omnipresent affect of terrorthe threat of a cellular enemy who is both outside and potentially inside our national borders it is perhaps unsurprising that the population’s fears and uncertainties, as well as its search for enemies, turn inward. Undocumented migrants and their rapidly growing small numbers serve as constant reminders of the incompleteness of a unified, pure American ethnos. Their geographical and cultural border crossings are perceived as challenges, indeed threats, to national sovereignty. Alienization promises an antidote to border anxieties: the present U.S. cultural climate precipitates uneasiness and a compulsion to engage in shoring-up operations, to effect a return to an imagined wholeness, unity, authenticity, and knowability. Thus conceived, alienization is the panicked reaction to the anxiety of incom- pleteness. Coursing through the national body, it casts alienized subjects as abject, inassimilable outsiders to the American community. The abject migrant is not absent from social experienceabjection is not synonymous with absence, as non- recognition is not the antonym of recognition. Rather, because she is both necessary and unwelcome, she is both visible and invisible, both acknowledged and ignored.32 Indeed it is this ambiguous positionality, the troublesome both/and of migrant subjectivity, that compels a national community to search for a means of reconciliation. However, reconciliation entails symbolic violence. In its materializa- tion as a border rhetoric, alienization operates through victimage. Blamed for the ills of a society that proclaims root values of tolerance and pluralism but longs for wholeness, the undocumented migrant fulfills the role of a ‘‘perfect enemy,’’ a vessel for that which the American reviles, disavows, and fears.33 Rhetorical victimage relies on reductive categories and stereotypical modes of representation in its rendering of the subject-scapegoat it designates. Marouf Hasian Jr. and Fernando Delgado note this reductive tendency in their analysis of California’s Proposition 187: ‘‘The typology of illegal immigrant becomes a signifier meaning Mexican (collapsing distinctions among Mexicans, Mexican Americans, Latinos) in a stereotypical manner similar to the social construction of welfare mother as African American female.’’34 Through victimage, the reductive figure of the border-crossing, border-blurring migrant serves as a vessel for containing the threat of an un-American presence from within. As an ideological production that is woven thickly into the fabric of society, alienization is infused in the language and images of everyday communication practices. A reactionary expression of the nativism that has historically shaped the character of U.S. political culture, alienization assumes a more rather than less

      ordinary rhetorical form. Nowhere is its manifestation more apparent than in the invocation of ‘‘illegal immigration,’’ a key figure that is rapidly subsuming the normative rhetoric of immigration in U.S. political culture. Its ubiquity in popular media, town hall meetings, public policy analysis, congressional hearings, and political campaign platforms attests to its ascendance as an orienting devil term. And the potency of illegal immigration is nowhere more concentrated than in the signifier for its idealized subject, the ‘‘illegal alien.’’ The illegal alien is the ideal embodiment of illegal immigration precisely because she is always already doubly stigmatized. Through a process of repetition and sedimentation in public culture, the articulation of the designations ‘‘illegal’’ and ‘‘alien’’ gives them the appearance of a singularity, of being inextricably interlocked. More and more, in fact, ‘‘illegal’’ is becoming an implicit modifier, the already- present threat that marks the alienized subject. To invoke the term ‘‘alien’’ is now nearly all that is required. Her illegality is given. Through the alien’s consolidation as the implicit subject-signifier of illegal immigration, alienization is enacted linguis- tically and performatively as a self-evident expression of the abject other. Moreover, through her tacit link with illegal immigration, the alien is made available for identification with a variety of other(ing) signifiers. These have historically included constructions of the alien as ‘‘criminal,’’ ‘‘communist,’’ ‘‘animal,’’ ‘‘dirt(y),’’ and ‘‘disease(d).’’35 Such signifiers call attention to the ultimately unknowable quality of the alien, an ascription that is threatening to the national community since it belongs to the one who seeps through the cracks, gets in and out, and troubles the very discreteness of the national inside/outside binary. Across all of its identifications and significations, it has become clear, ‘‘Whether invoked directly or indirectly, the figure of the ‘illegal alien’ is hauntingly consistent.’’36 Indeed, the totalizing ascription of ‘‘illegal alien’’ to the alienized subject performs an essentializing function that literally denies the possibility of a positive referent. Given her overwhelmingly negative social-cultural status, redemption of the alienized subject is unlikely in the United States today. In order to be refigured as a potential member of the American community, she would need to undergo a radical transformation, entailing both avowed and ascribed identity reformation. In effect, the alien would have to become an altogether different person. It is true that there are legal pathways to U.S. citizenship, although in rapidly restricting forms.37 However, the fact that alienization involves concomitant racialization makes the prospect of redemption difficult, if not doubtful. Not only do border guards check papers, but since the alienized subject carries the border on her back, she is constantly subject to surveillance and search. She may or may not be what she seems; although she is among the community, although she may be naturalized, she is not naturally of the community. As Bhikhu Parekh astutely notes in his discussion of multicultural citizenship, ‘‘Although equal citizenship is essential to fostering a common sense of belonging, it is not enough. Citizenship is about status and rights; belonging is about acceptance, feeling welcome, a sense of identification. The two do not necessarily coincide.’’38 Bordering the Civic Imaginary 51

      52 D. R. DeChaine Alienization, I have suggested, is a border(ing) rhetoric par excellence. It operates in U.S. society as a hegemonic project concerned with the forging and maintaining of dominant American civic values. At the structural level, it signifies an alliance of racist, capitalist, and nationalist discourses that materializes rhetorically. At the motivational level, it is goaded by majoritarian anxieties of national incompleteness and a longing for civic communion. Although reactionary in tone, it reflects widely shared values and attitudes. Dogged by the threat of an ambiguous enemy within, the primary labor of alienizing rhetoric is the production of the abject subject, the illegal alien, the embodiment of that which is both necessary and unwelcome in the space of U.S. citizenship. Reviled for her border-crossing and border-blurring behavior, the alien is constructed through symbolic acts of reduction and victimage. With her identity tethered to the negative, racialized figure of illegal immigration, the alien’s prospects for redemption are acutely diminished. Above all, the rhetorical production of the alien illustrates the collective desire for purity, perfection, and order*a compulsion, as Burke insists, that is a hallmark of the human condition.39 Put differently, although alienization appears primarily to be about the imputed qualities of the undocumented migrant, it is also substantially about the fraught logic of the border and the symbolic power that it wields. Pledging ‘‘Eternal Vigilance’’: Rhetorical Alienization in the Minuteman Civil Defense Corps Since its inception under the leadership of its founder Chris Simcox, the Minuteman Civil Defense Corps has been effective in shaping public attitudes about the immigration problem in the United States. Proclaiming itself as ‘‘one of the most important, socially responsible, and peaceful movements for justice since the civil rights movement of the 1960s,’’ Simcox and the MCDC have garnered support from a number of legislators, including Republican representatives Duncan Hunter of California and Tom Tancredo of Colorado.40 Like other contemporary social movement groups, the MCDC is acutely attuned to the politics of the public screen and its power to mobilize popular attitudes.41 In order to promote its mission and its border operations, the organization relies heavily on hypermedia for the dissemina- tion of information, public statements, speeches, fundraising campaigns, and volunteer musters. Its official and unofficial discourse proliferates in the blogosphere, and postings of speeches by Simcox as well as protests against him can be found on popular video sites such as YouTube. Its continued media presence and its often infamous appearances on college campuses have helped the MCDC to maintain a significant profile in the public conversation on immigration reform, while contributing to its ethos as a controversial activist group. A substantial amount of the MCDC’s public advocacy has focused on its effort to secure funding for the construction of approximately 70 miles of fencing along portions of the U.S.􏰀Mexico border in southeastern Arizona. The MCDC has dubbed the initiative the Minuteman Border Fence Project, a campaign that serves as an umbrella for a number of regional fundraising efforts.42 Professing to be ‘‘doing the

      job the [U.S.] President and the Senate refuse to do,’’ MCDC-aligned volunteers began constructing bits of the fence themselves in October 2006.43 Referring to the proposed border fence as ‘‘America’s ultimate protection against foreign invasion and terrorism,’’ the MCDC capitalizes on the historical symbolism of the Minutemen of the American Revolution, describing its undertaking as not a solution but an example of what committed AmericansWe the Peoplemust do in order to safeguard the border and the citizenry.44 Through its efforts to rally public support for a security fence along the U.S.􏰀Mexico border, particularly in its crafting of appeals that draw on affect-charged language and images of formative American values, the border(ing) rhetoric of the MCDC demonstrates how public under- standings of national identity, community, citizenship, and ‘‘the other’’ are mutually constructed. Reflecting commonly shared beliefs about migrants and immigration in U.S. political culture, its appeals bespeak a ‘‘fence logic’’ that effectively displaces claims about alien subjectivity and refigures them as claims about conditions said to result from nonsecure U.S. borders. In this way, the group enacts a project of alienization that avoids overt racism by framing the immigration problem as a concern about geographical borders rather than about the alien per se. In all, the MCDC contributes to the production of an anxiety-ridden narrative of citizenship of what it means to be a member of the broadly imagined American Community. Ultimately, its fence logic both shapes and reflects broadly held attitudes about culture and difference in contemporary U.S. society. The MCDC demonstrates its similarity to other social-political movement groups insofar as its public appeals, if they are to be acted on, must successfully construct an orientation toward a situationa compelling exigency, a plausible accounting of involved actors, and a fitting and attainable mode of redress. What most distinguishes the MCDC from other activist groups is its particular crafting of a vision of national community, an understanding of civic identity that seeks resonance with a dominant regime of true American values. In constructing appeals that articulate values of social unity, national security, rule of law, and civic responsibility, the MCDC draws from a common vocabulary of U.S. political culture to advance an alienizing logic that shores up communal boundaries while simultaneously defining terms of exclusion. The MCDC’s casting of the rhetorical situation turns on its characterizations of the duty-bound Minuteman volunteer and the nature of the national security nightmare at the U.S.􏰀Mexico border that impels him to action.45 The United States, the group warns, is a nation in peril. The threat strikes at the heart of the American democratic ethos: the Border Fence website asserts that the country ‘‘is under siege by forces and interests that have the capacity, over time, to destroy our great experiment of responsible self-government.’’46 The sovereignty of the nation and the unity of the American people have become jeopardized as a result of those whose unauthorized movements impinge on them. The danger, the MCDC insists, issues from the current state of unsecured U.S. borders, giving rise to a ‘‘human tsunami’’ of illegal border crossers and the threats they pose to citizen safety, economic stability, and cherished American values.47 Bordering the Civic Imaginary 53

      54 D. R. DeChaine The forces and interests that are claimed to undermine American unity and sovereignty are both internal and external. In an address entitled ‘‘A Letter to My Fellow Americans,’’ Jim Wood, Executive Director of the Border Fence Project, cautions, ‘‘[T]he national language, character and culture of our sovereign American people are under attack by ‘multi-culturalism’ run rampant. It’s dangerous and it’s destructive.’’48 Employing violent metaphors and reductive categories to consolidate the gravity of the alien threat, constituents of the MCDC make repeated reference to the imputed ‘‘illegal invasion’’ now said to be underway.49 Such an evocation points to the danger to the American ethnos of an abstract, massified enemy already among us, ‘‘the illegal aliens residing in our midst who have been allowed by a feckless government to violate our laws and mock our sovereignty as a nation.’’50 The fear of increasing numbers of alien noncitizens in the United States and their ability to undermine American unity is further evidenced on the Border Fence Project’s website, which cites California as an example of the disunity produced by an ‘‘increased flux of illegals, who displace legal citizens whose numbers are decreasing there.’’ Moving unchecked across the U.S. border, the alien-enemy is now within, infecting the body politic. It corrupts the government, disunifies its citizenry, dilutes its culture, and precipitates a virulent strain of anti-Americanism: as Simcox stated, in response to May 1, 2007 demonstrations in which ‘‘anti-American extremist militants’’ flew upside-down U.S. flags and flew Mexican flags above the U.S. flag, I think it exposes an anti-American, anti-European sentiment. And we see that on college campuses across the country. The vitriol, the hate. The hate groups that exist on college campuses and then take to the streets are calling for a reconquista of the United States.51 Flags and other visual imagery are routinely employed by the MCDC to dramatize the anti-Americanism fueled by the alien invasion. For example, an image on the Border Fence Project website titled ‘‘Tear for My Country’’ features a close-up photograph of a portion of a human face, eye cast downward, with a tear rolling down its cheek. In the foreground flies a Mexican flag, positioned on its mast above an upside-down American flag. Superimposed at the bottom of the image is an iconic rendering of Uncle Sam (unaccompanied by its familiar ‘‘I Want You!’’ caption) pointing at the viewer, as if to admonish her to take up the pro-American resistance. In public appearances, Simcox and other MCDC members also often display photographs of anti-American migrant protesters, offering them as evidence of an enemy in our midst whose force, like that of a virulent disease or inexorable flood, must be contained. The destructive forces that threaten American unity, sovereignty, and democracy are the byproduct of more ominous threats to national security and public safety that an unsecured U.S. border represents. The MCDC invokes national security as a caution to Americans about the dangers of terrorism, criminality, and violence posed by an illegal invasion across broken borders. The alien-terrorist menace is real. ‘‘We’re being attacked by people from a foreign country,’’ exclaims Simcox; ‘‘Is that not

      Bordering the Civic Imaginary 55 terrorism in its own right?’’52 Those who threaten national security, whether wittingly or unwittingly, are culpable: ‘‘If you’re breaking into this country when this country is at war, then you’re a potential enemy of this country, and you should be treated accordingly.’’53 In MCDC discourse, a link between illegal immigration and ‘‘terrorism,’’ another prominent devil term in post-9/11 U.S. society, is forged through an association of the border crosser with crime and violence. Simcox, emphasizing this association, makes reference to ‘‘the violence caused daily by illegal entrants and often violent alien intruders,’’ and advocates ‘‘the feasibility and efficacy of fencing to secure America’s borders from illegal incursion by aliens and international criminal cartels.’’54 And the alien-borne violence is growing.55 As the number of unauthorized border crossings increases, ‘‘More gang violence erupts in our cities by murderous thugs such as MS-13, the ruthless gang of self-professed friends of al Qaeda.’’56 The deadly admixture of crime, violence, and terrorism at the hands of undocumented border crossers is perhaps most dramatically asserted by the Border Fence Project: ‘‘Because illegal aliens murder 5,000 innocent Americans every year and we take a trillion dollar hit overall to our economy, illegal immigration rewards us with a 9/11 or worse every year.’’57 Close-up photographs of decrepit and hole- ridden fencing along the U.S.􏰀Mexico border, and images of aliens individually and collectively breaching the fence, are offered by the MCDC as evidence of the national security nightmare that is claimed to exist. A Minuteman Border Cam with multiple views of the border fence is featured on the MCDC website, so that viewers may witness for themselves the always-looming threat to national security in real time. By playing on national anxieties regarding a terrorist threat both beyond and within U.S. borders, the MCDC collapses categorical distinctions between terrorism, criminality, and alien subjectivity, drawing an abstract figure of the dangerous, already suspect un-American other. The MCDC readily identifies the U.S. government as the primary agency responsible for the immigration problem. Although it is the alien who crosses the border into the United States, she is rarely directly named as the villain. Rather, the group insists, it is the U.S. government (and to a lesser extent, the Mexican government) and its lax attitude toward border enforcement that allows aliens to cross the border. The government’s negligence in upholding its commitment to safeguard the border has ominous consequences. As Simcox fervently warns, The existing border crisis is a dereliction of duty by those entrusted with American security and sovereignty, leaving America vulnerable to terrorist infiltration and an unprecedented crime wave caused by drug smugglers, rapists, thieves, human traffickers and murderers who currently cross our borders at will.58 In its attribution of the problem, the MCDC fuses the values of national security and the rule of law, imputing a causal relationship between lax border enforcement, a permissive welfare state, and the economic and social burdens shouldered by law- abiding U.S. citizens. Placing emphasis on this causal relationship, Simcox calls on fence logic to offer a remedy:

      56 D. R. DeChaine When you secure the borders, cut off welfare and social services to illegal aliens at the expense of the American taxpayer, and strictly enforce the laws against hiring illegally, the problem of what to do with the estimated 12-20 million illegal aliens already in this country will drastically shrink in size and scope.59 Political, economic, and social reform such as that proposed by Simcox and the MCDC requires a strong, morally committed U.S. government. Simcox warns, In a time of war, the future of the American republic hangs in the balance . . . . The confidence of we the people can only be restored by those elected officials who will truly act in defense of Americaher liberty, sovereignty, security and prosperity in the face of all foreign threats.60 Taken at face value, the MCDC’s assignation of blame to the U.S. government would seem to belie the main thrust of alienization, the chief operation of which is the rendering of the abject alien subject. However, the displacement of the alien and her deflection away from being the primary agent of blame is key to the crafting of the group’s persuasive appeals. For all its drama and hyperbole, the MCDC’s alienizing, nativist rhetoric appears on its surface to be relatively devoid of overt racism and open hostility toward migrants as persons. Notwithstanding the xenophobic tenor of its appeals, one is hard pressed to locate explicit epithets directed against migrants in its official discourse. It is tempting to attribute this lack of directness to what Stuart Hall terms ‘‘inferential racism,’’ those ‘‘apparently naturalised representations of events and situations related to race, whether ‘factual’ or ‘fictional’, which have racist premises and propositions inscribed in them as a set of unquestioned assumptions.’’61 As its narrative makes clear, inferential racism infuses the group’s language and visual imagery. Be that as it may, the indirectness of the MCDC’s alienizing project is also reflective of its formal construction, which effectively displaces an alien-centered threat and refigures illegal immigration as a border-centered threat. Alienizing rhetoric does not so much actively ascribe an identity quality to the alien subject as to passively describe that which is said to result from the condition of unsecured borders. As an effect of this formal refiguration, ‘‘invader’’ is reinscribed as ‘‘invasion’’; rather than an agent-centered claim that aliens are invading our nation, it is more common in MCDC discourse to encounter condition-centered statements such as ‘‘Our borders are under attack’’ or ‘‘Our borders are being invaded.’’ Likewise, agent-centered references to aliens as terrorists or criminals are more often refigured as statements referring to the threat of terrorism and criminal activity*both claimed to be effects of the condition of unsecured borders. Functioning as the rhetorical form of inferential racism, alienization depersonalizes (and dehumanizes) the alien subject while providing the rhetor, whether an individual or an organization, with an alibi. By establishing a socially acceptable position for anti-migrant sentiment, one that places blame not on a person or an ethnic group but on an impersonal condition, the formal construction of alienization provides an inoculation against charges of racism and scapegoating. Thus conceived, rhetorical alienization allows the MCDC and other alienizers to proclaim unself-

      consciously that broken borders, not aliens, are the source of the immigration problem. As the MCDC’s account of the exigency works to underscore, the dire situation on the U.S.􏰀Mexican border demands immediate and decisive action. Against the corrupting forces of an alien invasion and a complicit U.S. government, the group calls on true Americans ‘‘to safeguard our beloved nation from violence, from sedition, from wholesale attack by those who do not love America and wish to see her destroyed or irremediably altered from a nation of liberty, equality, and justice, and a bastion of western civilization.’’62 Such an intervention requires selfless action, honor, respect for tradition, and love of country: moral qualities embodied in the figure of the MCDC citizen volunteer. Deriving ethos from the venerable narrative of the American Revolutionary Minuteman, the MCDC citizen volunteer exemplifies the values of a national polity based on the rule of law and civic responsibility. As Article Four of the Minuteman Pledge attests, ‘‘[a] Minuteman believes in a strong, safe and secure America that begins with borders open only to those who have a legal right to enter, and who have met all the lawful criteria to cross into our territory established by the sovereign American people.’’63 In its appeal to the U.S. citizenry to secure its borders, the MCDC extols individual and collective responsibility, cementing together American virtues of patriotism and duty in taking action against present and future threats of an alien invasion. The U.S. government’s dereliction of duty must be met by the force of duty-bound American citizens*patriotic Minutemen who ‘‘will not sit idly by while we are colonized by another country.’’64 As the Minuteman Border Fence Project proclaims, ‘‘The politicians will talk; the liberal media and the ‘Hate America’ crowd will offer AMNESTY to law breakers. The Minutemen will ACT in defense of America!’’65 The appeal to American responsibility is future oriented: in the fight to secure U.S. borders against the alien invasion, the ‘‘future security and public tranquility for generations of our American posterity’’ hangs in the balance.66 Looking toward the future well-being of the country, the MCDC citizen pledges his commitment to responsibility as an individual, consecrating it in a vow before God and his fellow Americans. Invoking a phrase popularized by Wendell Phillips in a speech to American abolitionists, the Minuteman declares, ‘‘‘Eternal vigilance is the price of liberty . . . ’ And so I will stand watch on America’s borders and in her sovereign interest until relieved from duty by my fellow countrymen.’’67 As movement-oriented action, this commitment to responsibility is not simply individual; it is also collective. The MCDC pledges eternal vigilance, promising to ‘‘continue to stand watch at the border and report illegal activity, build border fencing, urge local and federal officials to enforce the law and push for the enforcement of our laws to keep our country and your families and children safe.’’68 Several Border Fence Project websites feature photographs of groups of MCDC citizen-patriots building, repairing, and guarding the border fence, offering a vivid demonstration of the organization’s collective commitment to civic duty and responsibility. The theme of eternal vigilance recurs Bordering the Civic Imaginary 57

      58 D. R. DeChaine regularly in MCDC discourse and serves to codify its sacred pledge to the American people. On the California border, an MCDC-run outpost named Camp Vigilance serves as a base for the group’s semi-annual musters, from whence fence-building teams are organized and deployed. Additionally, the MCDC offers an opportunity to enact eternal vigilance virtually. On joining its ‘‘Become a Cyber Minuteman!’’ campaign, those owning property on the U.S.􏰀Mexico border are provided with motion-sensing surveillance cameras that down-stream video directly to MCDC representatives, local police departments, and U.S. Border Patrol agents.69 What is apparent from this brief examination of the MCDC’s rhetoric is that its impassioned call for greater U.S. border security bespeaks an intense border insecurity. Relying on common tropes of American identity in the crafting of its appeals, the group’s rhetoric reveals a stock of motivations consonant with broadly shared majoritarian anxieties. Through hyperbolic appeals to the oblique yet powerful values of social unity, national security, rule of law, and civic responsibility, the group crafts a vivid human drama in which modern Minutemen take up their historical calling to pledge eternal vigilance, dutifully safeguarding American borders from the threat that lies beyondand, increasingly, within. The current corruption of the U.S. government, its political process, its economy, and its cultural character provides proof that the danger posed by millions of necessary but unwelcome border- crossing aliens is real. The alien invasion strikes at the very heart of national civic identity, threatening its purity. Harboring terror both known and unknown, the invasion must be stopped; the future safety of American citizens and the sanctity of American values are at stake. The fear of small but increasing numbers of illegal aliens combines with anxieties of national disunity and a federal government complicit in a hegemonic project of colonization. Only a counter-hegemonic movement led by a unified corps of committed American patriots can hope to stop the invasion, fence the border, protect national sovereignty, and illuminate a path toward civic restoration. As its appeals make clear, the MCDC relies on a fence logic that underwrites its construction of the immigration problem. In characterizing the threat of an alien invasion as preeminently an issue of border security, the MCDC contributes to an essentializing epistemology of the border. In its public discourse, national borders are static and given; their realness is never in question. The implications of such an epistemology and the worldview it constructs are not only political but profoundly ethical. Fence logic works to (re)inscribe the naturalness of geographical borders, positing the alien as a subject who is naturally out of place. Border security is thus framed as being about legal enforcement, not about wielding power and control. As Joseph Nevins explains, [T]he ‘‘illegal’’ is someone who is officially out of placein a space where he does not belong. Thus, the official relationship of the ‘‘illegal alien’’ to the particular national space in which he finds himself defines his status. The practice of territorialitythe effort to exert influence over people and/or other phenomena by asserting control over a defined geographic areareinforces the designation of the ‘‘illegal.’’ Territoriality helps to obfuscate social relations between controlled and

      Bordering the Civic Imaginary 59 controller by ascribing these relations to territory, and thus away from human agency.70 It is not only geographical borders that are naturalized. As a territorializing apparatus, the MCDC’s fence logic also works to (re)inscribe the social-cultural borders as natural. Defining clear and self-evident lines between American citizen and alien invader, as the MCDC does, reveals the ease with which psychic territories and their cultural investments map onto and reinforce physical territories and their geopolitical investments. More importantly, the us/them binary that such bordering practices work to cement into place all but guarantees an irredeemable non-place for the racialized, alienized, border-crossing migrant in the United States today. Ultimately, as the MCDC’s rhetoric illustrates, the naturalization of borders reflects an affect-charged, ideological operation. It provides an anxiety-ridden American ‘‘we’’ with terms for ordera common-sense orientation for gauging the truth about people, places, social statuses, and communal allegiances. Bordering the Civic Imaginary I have argued for the centrality of the figure of the border in contemporary rhetorical culture. In so doing, I have advanced an account of political and cultural abjection that prompts a scholarly reorientation away from a static concept of borders toward a dynamic conception of bordering practices. Proposing alienization as the name for a racializing project that produces an abject migrant subject, I have focused attention on the articulation of discourse and affect and its labor across geopolitical and sociocultural space to subjugate the border-crossing migrant. In particular, I have aimed to convey a sense of the panicked character of alienizing rhetoric, and, through the example of the Minuteman Civil Defense Corps, to illustrate the enduring tenacity of fence logic in a globalized world. Although reactionary in tone, the symbolic strategies that the MCDC uses to craft its appeals, and the attitudes it expresses, are far from radical. The liberal democratic values propounded by the groupunity, national security, the rule of law, patriotism, and responsibilityand the ordinariness of the language and images it mobilizes to advance its cause demonstrate the group’s close affinities with the tradition of U.S. social justice movements. As such, its narrative offers a cautionary tale about the all too easy slide from communal appeals based on majoritarian values to violent ethnonationalist exhortations. Writ large, the fears and anxieties that spur the MCDC’s alienizing practices signal the increasing friction between the denationalizing tendencies of economic and cultural globalization and a redoubling of desire for a singular national community, purity, and civic identitya condition betraying a long history of racial, ethnic, socioeconomic, and gender exclusions in the United States. The alienization enacted by the MCDC and other adherents of fence logic is goaded by an overriding fear of losing control: this fear itself is based on a fictional premise*that the American community (and its putative boundaries of identity and citizenship) was ever in control, secure in a state of order, sovereignty, and wholeness. ‘‘Borders,’’ as Anne

      60 D. R. DeChaine Demo reminds, ‘‘function as an index of sovereignty because their very presence (real or imagined) symbolizes claims of authority over a territorial entity.’’71 In this sense, border(ing) rhetorics serve as crucial sites for investigating intersections of community, territory, identity, and power in contemporary society. As the analysis illustrates, rhetorical renderings of the border are instrumental in the crafting of American civic community. In his discussion of borders and power relations, David Newman argues, [T]he stronger the barrier function of the border, the more powerful the imagined, the more abstract the narrative of what is perceived as lying on the other side. Perceptions of borders usually focus on what exists on the other ‘‘invisible’’ side of the line of separation. Borders exist in our mind by virtue of the fear we have of the unknown of the ‘‘there’’ and which, in turn, causes us to stay on our side of the border in the ‘‘here.’’72 Newman’s emphasis on the correlation between the fear of the unknown, the perceived integrity of borders, and the mystification of the other speaks to the current hold that fear has on U.S. civic culture. The oxymoronic alien subjectshe who is both known and unknown, simultaneously inhabiting the ‘‘here’’ and ‘‘there’’ of the national bodyincites a redoubling of political and moral boundaries in an era of an omnipresent war on terror. Burke’s dictum that ‘‘[a] way of seeing is always a way of not seeing’’ aptly characterizes the situation of the always already suspect border- crossing migrant.73 The intensifying compulsion to deal with the immigration problem, a defining exigency of post-9/11 America, underscores the terministic power of alienizing rhetoric to direct and reflect the social reality of the abject alien noncitizen. Put another way: as alienization is enacted, citizenship is enacted. Significantly, the fears and anxieties foregrounded in this discussion also attest to the force of the imagination as an integral agency in human social life.74 The construction of modern social imaginaries, according to Taylor, involves ‘‘the ways people imagine their social existence, how they fit together with others, how things go on between them and their fellows, the expectations that are normally met, and the deeper normative notions and images that underlie these expectations.’’75 Extending Taylor’s definition, my analysis of the excision of the alienized subject from the space of U.S. citizenship lends credence to an equally powerful notion of the civic imaginary as a social horizon for defining the constituents and limits of civic culture. A contested space for adjudicating conditions of citizen identity and inclusion, the civic imaginary is a contentious production with material consequences for those who deliberately or incidentally occupy it. Both real and imagined, performative and affective, it is a consummately rhetorical space where culture and politics converge, identity is shaped, and power is wielded. An adjunct of the public sphere, it proscribes conditions for citizenship enactment and the voices that are to be included in and excluded from deliberation.76 More than anything, the space of the civic imaginary serves as an ethical horizon for the articulation of the citizen as an embodiment of personhood. For alienizers like the MCDC, civic personhood reduces the border-crossing migrant to a racialized juridical subject. Crucially lacking in such a formulation is consideration of the border-crossing migrant as a human being

      worthy of recognition, respect, and dignity. For this alone, the present construction of the American civic imaginary warrants concerted critical attention. Alienization continues apace in the United States today, with real implications for those alienized. In 2006, approximately 222,000 undocumented migrants were removed from the United States, roughly a 20 percent increase from the previous year.77 Moreover, as Ngai notes, ‘‘In the aftermath of the terrorist attacks on the United States on September 11, 2001, the Department of Justice used immigration laws to arrest and detain over 1,100 aliens, many without charge and in secret.’’78 Despite resistance in Congress and protests by numerous city mayors and property owners, plans to complete a security fence along the U.S.􏰀Mexico border have been recently stepped up by way of a presidential mandate granting Michael Chertoff, Secretary of the U.S. Department of Homeland Security, supra-constitutional authority to build it. Current U.S. immigration policies and the social attitudes that shape them do more than affect individuals’ legal status; they tear apart families, deny basic services to those in need, and create conditions whereby growing numbers of the U.S. population are demonized as necessary but unwelcome nonpersons. Such attitudes and conditions, as Dana Cloud has convincingly argued, are not new. Indeed, they are entirely congruent with the naturalizing border epistemology of Samuel Huntington’s ‘‘clash of civilizations’’ thesis and its ascendant hegemony.79 What is novel, I have claimed, is the discursive-affective alliance that shapes its present rhetorical form. The ordinariness of alienization as a mode of citizenship enactment beckons scholars to attend closely to the ways in which alienizing rhetoric works its way into the public vernacular. As I have hoped to show, its conception of the American citizen reveals a profoundly immoral discourse that excludes, racializes, and otherizes individuals and groups*a discourse all too readily conscripted for the cause of national unity in troubled times. A vibrant civic imaginary requires an understanding of personhood that moves beyond questions of legal status to include recognition and respect as formative constituents of citizenship. In the name of such a counter- hegemonic project, it is the debunking of alienizing practices that is urgently needed today. This does not mean substituting border logic for a logic premised on a ‘‘world without borders,’’ as some have suggested; to unborder, after all, is still a bordering practice.80 Rather, it entails a collective effort to recognize, make public, and work against alienization and its material and symbolic violence. Such a project, I have insisted, begins by taking borders seriously. In his meditation on the ‘‘unreflective nationalism’’ that an uncritical view of borders is currently fomenting in U.S. civic culture, Robert Chang observes, ‘‘Although the border is everywhere, your perspective may render it invisible. It is through this invisibility that the border gains much of its power.’’81 Working to unmask this invisibility will be vital to a project that aspires to broaden rather than border the horizon of the civic imaginary. Bordering the Civic Imaginary 61

      62 D. R. DeChaine Notes [1] Jeffrey S. Passel, ‘‘The Size and Characteristics of the Unauthorized Migrant Population in the U.S.,’’ Pew Hispanic Center, March 7, 2006, http://pewhispanic.org/files/reports/61.pdf/. It must be acknowledged that this is a contested statistic. My choice of ‘‘migrant’’ to characterize undocumented persons in the United States reflects my intention to leave open the variety of statuses, motivations, and modes of mobility of border-crossing individuals. For a sympathetic discussion of the term, see Mae M. Ngai, Impossible Subjects: Illegal Aliens and the Making of Modern America (Princeton: Princeton University Press, 2004), xix􏰀xx. [2] Charles Taylor, ‘‘The Politics of Recognition,’’ in Multiculturalism and ‘‘The Politics of Recognition,’’ ed. Amy Gutmann (Princeton: Princeton University Press, 1992), 25􏰀73. [3] Kent A. Ono and John M. Sloop, Shifting Borders: Rhetoric, Immigration, and California’s Proposition 187 (Philadelphia: Temple University Press, 2002), 26. [4] Ronald Walter Greene, ‘‘Malthusian World(s): Globalization, Race, and the American Imaginary in the Immigration Debates of the Twentieth Century,’’ in Argumentation and Values: Proceedings of the Ninth SCA/AFA Conference on Argumentation, ed. Sally Jackson (Annandale, VA: Speech Communication Association, 1995), 191􏰀95. See also Marouf Hasian Jr. and Fernando Delgado, ‘‘The Trials and Tribulations of Racialized Critical Rhetorical Theory: Understanding the Rhetorical Ambiguities of Proposition 187,’’ Communication Theory 8 (1998): 245􏰀70; Justin Akers Chaco ́n and Mike Davis, No One Is Illegal: Fighting Violence and State Repression on the U.S.􏰀Mexico Border (Chicago: Haymarket Books, 2006). [5] Michael Curry, ‘‘On Space and Spatial Practice in Contemporary Geography,’’ in Concepts in Human Geography, ed. Carville Earle, Kent Mathewson, and Martin Kenzer (Lanham, MD: Rowman and Littlefield, 1995), 3􏰀32; Henk Van Houtum, ‘‘The Geopolitics of Borders and Boundaries,’’ Geopolitics 10 (2005): 672􏰀79. [6] D. Robert DeChaine, ‘‘Imagined Immunities: Border Rhetorics and the Ethos of Sans Frontie`risme,’’ in Interdisciplinarity and Social Justice: Revisioning Academic Accountability, ed. Ranu Samantrai, Joe Parker, and Mary Romero (New York: State University of New York Press, in press). [7] Phil Hubbard, Rob Kitchin, Brendan Bartley, and Duncan Fuller, Thinking Geographically: Space, Theory and Contemporary Human Geography (New York: Continuum, 2002), 33; Joe Moran, Interdisciplinarity (New York: Routledge, 2002), 165. [8] On the rhetorical constructedness of borders, see Lisa A. Flores, ‘‘Constructing Rhetorical Borders: Peons, Illegal Aliens, and Competing Narratives of Immigration,’’ Critical Studies in Media Communication 20 (2003): 362􏰀87; D. Robert DeChaine, Global Humanitarianism: NGOs and the Crafting of Community (Lanham, MD: Lexington Books, 2005). On the ambivalent character of border(ed) subjects, see Gloria Anzaldu ́ a, Borderlands/La Frontera: The New Mestiza (San Francisco: Aunt Lute, 1987); Pablo Vila, Crossing Borders, Reinforcing Borders: Social Categories, Metaphors, and Narrative Identities on the U.S.􏰀Mexico Frontier (Austin: University of Texas Press, 2000). [9] Aimee Carrillo Rowe, ‘‘Whose ‘America’? The Politics of Rhetoric and Space in the Formation of U.S. Nationalism,’’ Radical History Review 89 (2004): 119􏰀20. [10] I borrow the term ‘‘alienization’’ from Joseph Nevins, Operation Gatekeeper: The Rise of the ‘‘Illegal Alien’’ and the Making of the U.S.􏰀Mexico Boundary (New York: Routledge, 2002), 143. [11] Arjun Appadurai, Fear of Small Numbers: An Essay on the Geography of Anger (Durham, NC: Duke University Press, 2006), 51􏰀52. [12] Robert Asen, ‘‘A Discourse Theory of Citizenship,’’ Quarterly Journal of Speech 90 (2004): 204. [13] Minuteman Civil Defense Corps, ‘‘Minuteman Civil Defense Corps Replaces Volunteer Administrators,’’ http://minutemanhq.com/hq/print.php?sid􏰁342/.

      Bordering the Civic Imaginary 63 [14] Minuteman PAC, http://www.minutemanpac.com/about.php/. [15] Flores, ‘‘Constructing Rhetorical Borders,’’ 381. See also Robert S. Chang and Keith Aoki, ‘‘Centering the Immigrant in the Inter/National Imagination,’’ California Law Review 85 (1997): 1397; Linda Bosniak, The Citizen and the Alien: Dilemmas of Contemporary Membership (Princeton: Princeton University Press, 2006). [16] On the complementarity of critical rhetoric and cultural studies, see Maurice Charland, ‘‘Rehabilitating Rhetoric: Confronting Blindspots in Discourse and Social Theory,’’ Communication 11 (1990): 253􏰀64; Thomas Rosteck, ed., At the Intersection: Cultural Studies and Rhetorical Studies, Revisioning Rhetoric: A Guilford Series (New York: Guilford Press, 1999), 1􏰀23. [17] Flores, ‘‘Constructing Rhetorical Borders,’’ 363. [18] Pierrette Hondagneu-Sotelo, ‘‘Unpacking 187: Targeting Mejicanas,’’ in Immigration and Ethnic Communities: A Focus on Latinos, ed. Refugio I. Roch ́ın (East Lansing: Julian Samora Research Institute, Michigan State University, 1996), 93. [19] Ngai, Impossible Subjects, 3. [20] Ngai, Impossible Subjects, 129. [21] Kenneth Burke, Language as Symbolic Action: Essays on Life, Literature, and Method (Berkeley: University of California Press, 1966), 44􏰀62. [22] Mark Lawrence McPhail, The Rhetoric of Racism Revisited: Reparations or Separation? (Lanham, MD: Rowman and Littlefield, 2002), 66. [23] Hemant Shah, ‘‘Race, Nation, and Citizenship: Asian Indians and the Idea of Whiteness in the U.S. Press, 1906􏰀1923,’’ Howard Journal of Communications 10 (1999): 251. [24] Howard Winant, Racial Conditions: Politics, Theory, Comparisons (Minneapolis: University of Minnesota Press, 1994), 59. [25] Ono and Sloop, Shifting Borders, 27. [26] See, for example, Marx’s discussion of alienation in ‘‘Economic and Philosophical Manuscripts,’’ in Karl Marx: Early Writings, trans. Rodney Livingstone and Gregor Benton (London: Penguin Books, 1975), 279􏰀400. [27] Appadurai, Fear of Small Numbers, 8􏰀10. [28] Appadurai, Fear of Small Numbers, 7􏰀9. [29] Appadurai, Fear of Small Numbers, 45. [30] Appadurai, Fear of Small Numbers, 21􏰀31. [31] Douglas S. Massey, ‘‘Understanding America’s Immigration ‘Crisis’,’’ Proceedings of the American Philosophical Society 151 (2007): 309􏰀27. [32] It is worth adding that women and men are often differently alienized. As some scholars have noted, the meaning of ‘‘alien’’ is itself gendered, shifting its connotation according to particular sociohistorical exigencies. Hondagneu-Sotelo, for example, notes, ‘‘Contemporary xenophobia targets women and children because it is they who are central to making settlement happen’’ (‘‘Unpacking 187,’’ 93). [33] Burke, Language as Symbolic Action, 18. [34] Hasian and Delgado, ‘‘Trials and Tribulations,’’ 257. [35] Otto Santa Ana, ‘‘‘Like an Animal I Was Treated’: Anti-immigrant Metaphor in U.S. Public Discourse,’’ Discourse and Society 10 (1999): 191􏰀224. See also Sarah Hill, ‘‘Purity and Danger on the U.S.􏰀Mexico Border, 1991􏰀1994,’’ South Atlantic Quarterly 105 (2006): 777􏰀99. [36] Flores, ‘‘Constructing Rhetorical Borders,’’ 363. [37] With a recent increase in applications for U.S. naturalization, and under pressure to err on the side of caution in vetting applicants for potential security threats, federal examiners have increased their rejection rates. In 2007, for example, approximately 12 percent of applications for naturalization were denied. See Julia Preston, ‘‘Perfectly Legal Immigrants, Until They Applied for Citizenship,’’ New York Times, April 12, 2008.

      64 D. R. DeChaine [38] Bhikhu Parekh, ‘‘What Is Multiculturalism?’’ Multiculturalism: A Symposium on Democracy in Culturally Diverse Societies 484 (December 1999), http://www.india-seminar.com/1999/ 484/484%20parekh.htm/. [39] Burke, Language as Symbolic Action, 3􏰀24. [40] Chris Simcox, ‘‘About Us,’’ Minuteman Civil Defense Corps, http://www.minutemanhq.com/ hq/aboutus.php/. [41] Kevin Michael DeLuca and Jennifer Peeples, ‘‘From Public Sphere to Public Screen: Democracy, Activism, and the ‘Violence’ of Seattle,’’ Critical Studies in Media Communication 19 (2002): 125􏰀51. [42] The Border Fence Project emerged on the heels of the 2006 Secure Fence Act, authored by California Republican Representative Duncan Hunter, which required the U.S. Department of Homeland Security to build 854 miles of fence along the 1950-mile U.S.􏰀Mexico border. [43] Chris Simcox, ‘‘Senate and President Promote Anarchy at Borders and in American Cities,’’ Minuteman National Blog, April 11, 2006, http://www.minutemanhq.com/b2/index.php/ national/2006/04/11/. [44] Border Fence Project, BorderFenceProject.com, http://www.borderfenceproject.com/. [45] Chris Simcox, ‘‘Minuteman Corps Expands is [sic] Efforts to Secure the Border,’’ Minuteman Border Fence, January 2, 2007, http://www.minutemanhq.com/bf/pl7.php/. [46] ‘‘About Us,’’ Minuteman Border Fence, http://www.minutemanhq.com/bf/about.php/. [47] Simcox, ‘‘Minuteman Corps.’’ [48] Jim Wood, ‘‘A Letter to My Fellow Americans,’’ BorderFenceProject.com, http://www.border fenceproject.com/letter.shtml/. [49] See, for example, Minuteman Border Fence. [50] Chris Simcox, ‘‘Open Letter to the President of the United States,’’ MCDC Forums, June 19, 2007, http://forum.minutemanhq.com/phpBB2/viewtopic.php?t􏰁11793/. [51] Chris Simcox, interview by Trish Hinojosa, NOW on the News, PBS, May 4, 2007. [52] Chris Simcox, interview by Alan Colmes, Hannity & Colmes, Fox News, April 3, 2006. [53] Susy Buchanan and David Holthouse, ‘‘Minuteman Leader has Troubled Past,’’ Southern Poverty Law Center, http://www.splcenter.org/intel/news/item.jsp?aid􏰁149&site_area􏰁 1&printable􏰁1/. [54] Simcox, ‘‘Open Letter’’; ‘‘Donate to the Minuteman Border Fence,’’ Minuteman Border Fence, https://secure.responseenterprises.com/mmfence/?a􏰁571. [55] The MCDC works to document what it perceives as an increase in criminal activity in the United States as a result of unsecured borders. For example, the online MCDC forum includes a main thread titled ‘‘Illegal Alien Crime,’’ with the subheading ‘‘Please post any articles about illegal alien crime and DUI incidents here. Having these in one place will illustrate the tragic consequences of illegal migration.’’ ‘‘MCDC Forums,’’ Minuteman Civil Defense Corps, http://forum.minutemanhq.com/phpbb2/. [56] Simcox, ‘‘Minuteman Corps.’’ [57] ‘‘DIY Border Fence,’’ PirateNews.org, http://www.piratenews.org/newswire/html/. No docu- mentation for either of these statistics is provided on the website. [58] Brian Bonner, ‘‘Minutemen to Build Arizona-Mexico Border Fence,’’ April 20, 2006, http:// bonner.wordpress.com/2006/04/20/minutemen-to-build-arizona-mexico-border-fence/. [59] Chris Simcox, ‘‘Message from Chris Simcox,’’ Minuteman Border Fence, http://www. minutemanhq.com/bf/about.php/. [60] Simcox, ‘‘Open Letter.’’ [61] Stuart Hall, ‘‘The Whites of Their Eyes: Racist Ideologies and the Media,’’ in The Media Reader, ed. Manuel Alvarado and John O. Thompson (London: BFI Publishing, 1990), 13. [62] Minuteman Civil Defense Corps, ‘‘About Us.’’ [63] Minuteman Civil Defense Corps, ‘‘The Minuteman Pledge,’’ http://www.minutemanhq.com/ hq/mmpledge.php/. [64] Wood, ‘‘Letter to My Fellow Americans.’’

      Bordering the Civic Imaginary 65 [65] ‘‘Build It Now!’’ Minuteman Border Fence, http://www.minutemanborderfence.com/. [66] Simcox, ‘‘Open Letter.’’ [67] Minuteman Civil Defense Corps, ‘‘Minuteman Pledge.’’ [68] Simcox, ‘‘Minuteman Corps.’’ [69] ‘‘Become a Cyber Minuteman!’’ BorderFenceProject.com, http://www.borderfenceproject. com/cybermm.php/. [70] Nevins, Operation Gatekeeper, 147􏰀48. [71] Anne Demo, ‘‘Sovereignty Discourse and Contemporary Immigration Politics,’’ Quarterly Journal of Speech 91 (2005): 295. [72] David Newman, ‘‘On Borders and Power: A Theoretical Framework,’’ Journal of Borderlands Studies 18 (2003): 20. [73] Kenneth Burke, Permanence and Change: An Anatomy of Purpose (New York: New Republic, 1935), 70. [74] Cornelius Castoriadis, The Imaginary Institution of Society, trans. Kathleen Blamey (Cam- bridge, MA: MIT Press, 1987). See also Arjun Appadurai, Modernity at Large: Cultural Dimensions of Globalization (Minneapolis: University of Minnesota Press, 1996); Charles Taylor, Modern Social Imaginaries (Durham, NC: Duke University Press, 2004); Benedict Anderson, Imagined Communities: Reflections on the Origin and Spread of Nationalism (London: Verso, 1983). [75] Taylor, Modern Social Imaginaries, 23. [76] See, for example, Michael Warner, Publics and Counterpublics (New York: Zone Books, 2005); Dilip Parameshwar Gaonkar and Benjamin Lee, eds., ‘‘New Imaginaries,’’ Special Issue, Public Culture 36 (2002); Robert Asen and Daniel C. Brouwer, eds., Counterpublics and the State (Albany: State University of New York Press, 2001); Craig Calhoun, ed., Habermas and the Public Sphere (Cambridge, MA: MIT Press, 1993). [77] Julia Preston, ‘‘As Pace of Deportation Rises, Illegal Families Are Digging In,’’ New York Times, May 1, 2007. I was unable to locate reliable data regarding 2007 deportation rates. [78] Ngai, Impossible Subjects, 269. [79] Dana L. Cloud, ‘‘‘To Veil the Threat of Terror’: Afghan Women and the BClash of Civilizations􏰂 in the Imagery of the U.S. War on Terrorism,’’ Quarterly Journal of Speech 90 (2004): 285􏰀306. [80] DeChaine, ‘‘Imagined Immunities.’’ [81] Robert S. Chang, ‘‘A Meditation on Borders,’’ in Immigrants Out! The New Nativism and the Anti-Immigrant Impulse in the United States, ed. Juan F. Perea (New York: New York University Press, 1997), 244, 246.

    1. April is the cruellest month, breeding Lilacs out of the dead land, mixing Memory and desire, stirring Dull roots with spring rain.

      While we may imagine spring as a great season, where life begins to bloom from the earth, who exactly would think the opposite? Why would spring be considered cruel?

    1. NBA suspends season until further notice after player tests positive for the coronavirusplayundefinedPlay VideoPlayUnmuteCurrent Time 0:00/Duration 4:29Loaded: 0.00%0:00Stream Type LIVESeek to live, currently playing liveLIVERemaining Time -4:29 SharePlayback Rate1xChaptersChaptersDescriptionsdescriptions off, selectedCaptionscaptions settings, opens captions settings dialogcaptions off, selectedClosed CaptionsAudio Trackdefault, selectedAutoplay, selectedClosed CaptionCaption SettingsSettingsFull ScreenThis is a modal window. An error occurred during video playback, possibly due to network connectivity or being in a backgrounded browser tab. Please try again. Error Code: PLAYER_ERR_TIMEOUT Session ID: 2020-03-16:f17f313a4840e53d53e1f0b0 Player Element ID: vjs_video_3 OK Close Modal DialogBeginning of dialog window. Escape will cancel and close the window.TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaqueFont Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall CapsReset restore all settings to the default valuesDoneClose Modal DialogEnd of dialog window.ForegroundWhiteBlackRedGreenBlueYellowMagentaCyanOpaqueSemi-OpaqueBackgroundBlackWhiteRedGreenBlueYellowMagentaCyanOpaqueSemi-OpaqueTransparentWindowBlackWhiteRedGreenBlueYellowMagentaCyanTransparentSemi-OpaqueOpaqueFont Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyMonospace SerifProportional SerifMonospace Sans-SerifProportional Sans-SerifCasualScriptSmall CapsLanguage SettingsoffReset to DefaultsDoneCaptions PreviewAdLearn MoreSkip Ad5Close Modal DialogThis is a modal window. This modal can be closed by pressing the Escape key or activating the close button.CloseFacebookTwitterEmailCopy LinkCopy Embed LinkURLURLStart atCopyEmbed CodeCopyNBA season suspended due to coronavirus (4:29)Adrian Wojnarowki joins SVP to give the latest details about the NBA's suspending the season after Rudy Gobert tests positive for the coronavirus. (4:29)FacebookTwitterFacebook MessengerEmailMar 12, 2020ESPN News Services FacebookTwitterFacebook MessengerPinterestEmailprintThe NBA suspended its season after a Utah Jazz player tested positive Wednesday for the coronavirus."The NBA is suspending game play following the conclusion of [Wednesday's] schedule of games until further notice,'' the league said in a statement issued shortly after 9:30 p.m. ET. "The NBA will use this hiatus to determine next steps for moving forward in regard to the coronavirus pandemic.''The player is Rudy Gobert of the Jazz, sources told ESPN's Adrian Wojnarowski. That led to Utah's game at Oklahoma City being postponed just before tipoff.The NBA is expected to address next steps with teams when it conducts a call with the board of governors at 12:30 p.m. ET Thursday, sources told ESPN's Ramona Shelburne.Also Wednesday, the NBA G League announced in a statement that it has "suspended the 2019-20 season, effective after tonight's games."Mavericks owner Mark Cuban said during ESPN's broadcast of Dallas' 113-97 victory over the visiting Denver Nuggets that he was shocked by the news that the season was being suspended.Editor's PicksSources: Jazz center Gobert has coronavirusWhat we know and don't know about the NBA's suspension of playNBA players react to league suspending season due to coronavirus2 RelatedHe said his initial reaction was, "This is crazy. This can't be true."He continued: "I mean, it's not within the realm of possibility. It seemed more like out of a movie than reality."Cuban then added that he isn't an expert and defers to NBA commissioner Adam Silver on these matters."I trust Adam [Silver]. You know what? It's really not about basketball or money," Cuban said. "Literally, if this thing is exploding to the point where all of a sudden players and others have had it, you think about your family. You want to make sure you're doing this the right way. Now it's much more personal, and you've seen what's happened in other countries, but just the whole idea that it's come this close and potentially a couple players have it, just, 'stunning' isn't the right word. Just crazy."After the game, Cuban said teams have been told they can continue to practice, and he added that players have been told they should not have visitors from out of town.The last game to be completed Wednesday was Dallas' win over Denver, as the New Orleans Pelicans' game at the Sacramento Kings was postponed because one of the referees scheduled to work that game worked Utah's game on Monday."The game was canceled out of an abundance of caution," the NBA said.A source told ESPN's Royce Young that Gobert was never at Chesapeake Energy Arena on Wednesday, but he was in Oklahoma City and was set to play if he tested negative for the coronavirus.Players were on the floor for warm-ups when they were told to return to the locker rooms. About 30 minutes later, fans were told by the public-address announcer that the game was postponed "due to unforeseen circumstances."The Thunder players were cleared to leave the arena, but Utah's players are still there, and sources told Wojnarowski that the team would need to coordinate with Oklahoma and Salt Lake City public health organizations before it could return to Utah.Players from teams the Jazz have played within the past 10 days were told to self-quarantine, sources told ESPN's Brian Windhorst. Those teams are the Cleveland Cavaliers, New York Knicks, Boston Celtics, Detroit Pistons and Toronto Raptors."I'm sure I probably had contact with [Gobert]. But at the same time, like I said, [I'm] just taking precautions," Detroit's Langston Galloway said. "We've been washing our hands, and when the reports started coming out, everybody's kinda been on their hand sanitizer, washing their hands, just staying focused on that moment of, hey, [we have] interaction with a lot of different people and knowing that at the end of the day, you might've touched the ball, you might've interacted with a fan, and just being [cautious] with that going forward."Charlotte Hornets coach James Borrego, speaking before his team played Wednesday at Miami -- where news of the shutdown broke during the fourth quarter -- said, "These are scary times.''There are 259 games, roughly 21% of the schedule, left to play this season -- and no one knows if, or when, things will resume."We believe in the leadership of the league,'' Philadelphia 76ers general manager Elton Brand said.Information from The Associated Press was used in this report. FacebookTwitterFacebook MessengerEmailby Taboolaby TaboolaSponsoredSponsoredPromoted LinksPromoted LinksYou May LikeCars | Search Ads8 Cheap Luxury Cars On Sale Below MSRPCars | Search AdsUndoColliderThe Most Famous Movie To Take Place In Every U.S. StateCollider

      Authority The information on this website is provided by the U.S non-profit organization which is associated with the ESPN press and news.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      We are grateful to all three reviewers for their careful analysis of the manuscript, and for their constructive comments. Two common critiques were:

      (1) that assaying origin firing via an independent method would strengthen the conclusions, and (2) that additional analysis of ribonucleotide incorporation to exclude the retention of lagging-strand primers would allow us to definitively determine whether Pol ɛ plays a role in lagging-strand synthesis.

      We will include experiments to address both critiques in a revised manuscript. To independently verify changes in origin efficiency, we will sequence nascent BrdU-containing DNA across a time course from cells released into S-phase: we will also use the last timepoint of our Okazaki sequencing analysis to control for potential cell-cycle differences. To further test the contribution of Pol ɛ and ascertain whether lagging-strand primers are retained, we will analyze ribonucleotide incorporation in both wild-type and pol2-M644L (Pol ɛ ribonucleotide hypo-incorporating) strains. We address individual specific comments and our planned revisions in more detail below.

      Reviewer #1 (Evidence, reproducibility and clarity (Required)):

      This study examined the consequences of limiting levels of DNA polymerase d (Pol d) in yeast. The authors first reported multiple genome instability consequences following lowered Pol d level, including defect in S phase progression, growth defect, elevated spontaneous DNA damage, accumulation of ssDNA and activation of replication and DNA damage checkpoint. These observations are solid but not unexpected. By genome wide analysis using the Okazaki fragment (OF) mapping and ribonucleotide mapping (for polymerase usage), the authors claim a few potentially novel and striking observations that lowered Pol d differentially impact efficiencies of early vs. late origins, and that lowered Pol d results in Pol e participating in lagging strand synthesis around late origins. However, I remained unconvinced based on the data presented. These observations need to be further substantiated and alternative interpretations should be considered.

      \*Main concerns:** *

      One of major conclusions the authors tried to make is that the early vs. late origins are differentially affected by low level of Pol d. First, they used OF mapping data to examine origin efficiency. Asynchronous "Cultures were treated with IAA for 2h before the addition of rapamycin for 1h to deplete DNA ligase I (Cdc9) from the nucleus via anchor-away". IAA concentrations used were of 0, 0.2 mM, 0.6 mM, and 1 mM. The problem is that Figure S1 clearly showed that treating asynchronous cultures with >0.1 mM of IAA for as short as 30 min significantly alters the cell cycle profiles, mainly resulting in accumulation of S phase cells, to different extent. Presumably Okazaki fragments accumulated from these cultures suffering from the synchronizing effect may not be representative of the real change in global replication profile. For instance, it is not difficult to predict that the Okazaki fragments enrichment may be skewed towards late origins if more cells are accumulated in mid S phase following Pol d depletion. For this reason, I don't believe the result is conclusive. The experiment may be re-designed for samples at different time points following release from G1.

      We agree that altered cell-cycle profiles might affect the number of Okazaki fragments sequenced in late vs early replicating regions of the genome. As noted by reviewer 3 in cross-commenting, these differences should not affect origin efficiency calculations as these are based on the ratio of reads on each strand (and therefore normalized). To more directly address this question, we will calculate origin firing efficiencies from the final timepoint of the arrest-release experiments shown in Figure 4 as suggested by the reviewer. We will also analyze origin efficiency using BrdU over a time course.

      This concern also should preclude the authors from drawing conclusion about Pol e usage on lagging strands based on comparison between HydEn-seq data and OF mapping data shown in Figure 6. In fact, the rNMP incorporation change is very similar between early and late origins. The only evidence that the author rely on is the discrepancy in OF data between the two groups origins, which makes the reliability if origin efficiency measurement the central piece of data in this study. Thus, alternative approaches should also be considered to map origin efficiencies.

      As noted above, we agree that an independent method of tracking origin firing efficiencies would be helpful to strengthen our conclusions. To this end, we will analyze time courses of BrdU incorporation from cultures released into S-phase.

      Even if Pol e strand bias is lowered at late origins, as the authors tend to believe, there are still alternative models other than Pol e being used for lagging strand synthesis. For instance, if TLS polymerases are used on lagging strands, it could result in more ribonucleotide incorporation on the lagging strand, as they are lower-fidelity polymerases. Alternatively, if Pol d scarcity leads to more Pol e synthesis or lower RNA primer processing, it might also contribute to more apparent ribonucleotide incorporation on the lagging strands.

      We feel that the widespread use of TLS polymerases is unlikely, especially given the data in figure 6A that show no growth or viability change upon deletion of all three TLS polymerases in the Pol ∂ depletion strain, even at very low levels of Pol ∂. We agree with the reviewer that our data do not conclusively rule out increased retention of lagging-strand primers – as we state in the text. We aim to test this possibility by analyzing ribonucleotide strand bias in a pol2-M644L strain that incorporates fewer ribonucleotides than the wild-type Pol ɛ. In this case, increased lagging-strand primer retention would lead to a lagging-strand bias of ribonucleotides upon Pol ∂ depletion, while increased Pol ɛ usage would not. An analogous experiment with wild-type POL2 is potentially harder to interpret because the wild-type polymerase is the predominant source of ribonucleotides in a wild-type strain (Nick McElhinny et al, 2010 - PMID:20729855), but we now have the data for this strain in hand and ready to analyze.

      In Figure S5, the two HydEn-seq replicates are very different, where replicate1 shows very low strand bias. I suspect perhaps the strain used for replicate 1 does not contain pol2-M644G or rnh202 deletion.

      The change in ribonucleotide incorporation is indeed substantially stronger in one replicate than the other. We have additional time-course data from a Pol ∂ depletion showing that ribonucleotide strand bias decreases over time as Pol ∂ is depleted, and will include this in a revised manuscript.

      Reviewer #1 (Significance (Required)):

      Given that different aspects of Pol d deficiency have been implicated in various human diseases and cancer, this type of analysis is of interest to the field.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      \*Summary** *

      In this manuscript the authors explore the basis of the deleterious effects of reduced levels of the replicative Polymerase delta. This polymerase plays several important roles in the replication process: it synthesizes most of the lagging strand, but also extends the first primer during the synthesis of the lagging strand, and it contributes to the removal of the RNA and most of the DNA synthesized by primase/Polymerase alpha during Okazaki fragment maturation. In this study, the authors systematically analyze the impact of Pol delta depletion in S. cerevisiae. They use a degron-tagged allele to modulate the levels of the polymeraes and apply mainly NGS methods and classical genetics to explore the consequences for survival, checkpoint signalling and replication features such as fork speed, origin firing efficiency and Okazaki fragment length and distribution. They report that Pol delta depletion leads to a checkpoint activation via the Rad9-dependent damage signalling pathway (but not the Mrc1-dependent replisome-associated signalling) and an accumulation of single-stranded DNA. Phosphorylation of histone H2A is taken as a marker of DNA double-strand breaks, and from the observation that deletion of recombination factors, but not end-joining factors aggravate the fitness of Pol delta-depleted cells they conclude that homologous recombination is responsible for the repair of these breaks. Analysis of replication by Okazaki fragment sequencing indicates a slight decrease in the firing efficiency of early/efficient origins, but an increase in the firing efficiency of late origins. They also observe a reduction in fork speed, although they are not able to attribute this to either a globally slower fork movement or an increase in the stalling of individual forks. They find that Pol delta depletion does not change the size of Okazaki fragments, but causes defects in the nick translation during Okazaki fragment maturation. Finally, they use NGS technology to show that the leading strand Polymerase epsilon engages in lagging strand replication particularly at late origins when Pol delta is depleted. From their observations, the authors develop a model where depletion of Pol delta primarily affects late replicating regions. They explain this by invoking a stable association of Pol delta with early replisomes, which sequesters the enzyme, thus causing an under-supply at replisomes that assemble later during S phase. This then leads to the involvement of Pol epsilon on the lagging strand. Based on the observation that fork speed and Okazaki fragment maturation are both affected, they propose that these two reactions normally compete for Pol delta, suggesting that optimal replication would require two molecules of the polymerase per fork.

      \*Major comments** *

      The experiments shown here are largely clean and well controlled, and the manuscript is written nicely and well-structured.

      Compared to the Okazaki fragment analysis, the treatment of double-strand breaks appears somewhat cursory and remains inconclusive. Phosphorylation of H2A seems insufficient evidence for double-strand breaks, as other structures could also give rise to that signal. These lesions should be detected in a more direct manner, e.g. pulsed-field gel electrophoresis. The authors also don't provide a mechanism by which such breaks would emerge. Related to the minor effect of the ku mutant, I am wondering about the altered appearance of the colonies in Figure 2F (concerning both ku70 and rad51) - what is different about these, and could their „denser" appearance explain the slight suppression effect observed?

      We agree that our treatment of double-strand breaks is limited: consistent with comments from all three reviewers about which aspects of this work are most novel, we intend to focus as much as possible on replication enzymology here. We will tone down the language around double-strand breaks in the manuscript.

      Concerning the damage signalling: it is surprising to see a damage signal at concentrations of IAA that do not lead to a significant depletion of Pol delta yet (0.05 mM). At this point, it is hard to imagine DSBs to form. Could the authors explain this discrepancy?

      We note that, as observed in Figure 1A and to a slightly lesser extent in Fig. 2E, Pol ∂ levels are already substantially reduced in 0.05 mM IAA. This reduction appears sufficient to induce damage

      The notion that late origin firing is enhanced despite checkpoint activation is counterintuitive. Do the authors think that this effect overcomes the suppression of late origins that is normally associated with checkpoint activation? It would be helpful to test whether abolishing that phenomenon (e.g. by a mec1-100 mutant) would enhance the effect and render late origins even more active.

      We thank the reviewer for this excellent suggestion: we will test the effects of a mec1-100 mutant and include the results in a revised manuscript.

      It would be important to characterise the fork speed defect better, using alternative methods rather than just relying on Okazaki fragments. A differentiation between slower fork progression and more frequent fork stalling would be relevant and might help to evaluate the contribution of Pol epsilon. This might be accomplished by DNA fibre analysis. Alternatively, BrdU incorporation could serve to observe replication over the entire genome rather than only in the vicinity of replication origins. It would also be important to differentiate fork speeds in early versus late replicating regions - according to the authors' model, the defects should be most obvious in the late regions (Fig. 4 concerns only early origins).

      As noted above in our response to reviewer 1, we will use BrdU incorporation to independently verify changes in fork speed and origin firing. Analysis of fork speed in late-replicating regions is challenging regardless of the methodology used, due to contributions from converging forks, but we will try to do this

      Figure S3: Considering the differences in cell cycle progression, it would make more sense to compare equivalent stages of the cell cycle / S phase rather than identical time points.

      We can include this analysis, although the changes in cell cycle progression and origin firing efficiency make such comparisons somewhat subjective

      Considering that the Okazaki fragment analysis was done with non-synchronised cultures, is it possible that the skew in the cell cycle profile could influence the Okazaki fragment pattern?

      (copy-pasted from our response to a similar query by reviewer 1)… We agree that altered cell-cycle profiles might affect the number of Okazaki fragments sequenced in late vs early replicating regions of the genome. As noted by reviewer 3 in cross-commenting, these differences should not affect origin efficiency calculations as these are based on the ratio of reads on each strand (and therefore normalized). To more directly address this question, we will calculate origin firing efficiencies from the final timepoint of the arrest-release experiments shown in Figure 4 as suggested by the reviewer.

      Would it be possible to monitor not only total Pol delta levels, but also the level of Pol delta bound to the chromatin? It is shown that the level of Pol delta is depleted in the whole cell extracts, but it would be interesting to see how severe the depletion is on the chromatin.

      We agree that the relative fraction of chromatin-bound vs free Pol ∂ is an interesting question, and will attempt this experiment. However, we note that extensive depletion of Pol3 makes it hard to detect by Western blot, so the results are likely to be most informative at modest depletion levels. Regardless, these data should give us an idea of the size of the ‘free’ Pol ∂ pool in cells with normal or mildly reduced Pol ∂.

      Figure 6 is confusing and should be clarified: - Figure 6B: assigning the Watson and Crick strands in the schematic would make that figure easier to understand; - Figure 6B-C: the axes are labeled as 'Fraction of rNMP on Watson strand', but would it not make more sense if they were labeled 'Fraction of rNMP in Crick strand'? - Figure 6D-E: the right side scale is labelled as 'increase in rNMP on Crick strand' while in the figure legend is says it is 'change in the fraction of ribonucleotides mapping to the Watson strand. That description should be clarified; - Figure 6D: using 'Change in Okazaki fragments strand bias' to label the black line (description in the box above the figure) instead 'Change in Okazaki strand bias' would be more appropriate; - Figure 6F: the authors seem to have subtracted strand bias measured for Okazaki fragments from the strand bias measured for rNMP. It is valid to subtract these biases from each other, considering that the two structures arise independently and with different frequencies?

      We can make changes to figure 6 as suggested. Regarding the validity of subtracting strand biases, we think this is sufficient to give at least a semi-quantitative view of Pol ɛ usage since both of our sequencing approaches produce quantitative readouts that directly report on replication direction or polymerase usage, respectively.

      \*Minor comments:** *

      Can the authors conclude that Pol delta deficiency/ incompleteness of lagging strand synthesis affects the nucleosome deposition onto DNA? (Figure 5-A)

      We cannot rule out that this is occurring, and we agree that this is an interesting question for future studies. But the changes that we observe Okazaki fragment terminus location are very similar to our previously published observations from cells lacking Rad27 function, consistent with decreased nick translation.

      Why did the authors use rnh202Δ and not a mutant in the catalytic subunit of RNase H2?

      Deletion of any subunit of the heterotrimeric RNase H2 complex completely abolishes its function in yeast, so RNH202 was a somewhat arbitrary choice

      An extra control might be useful: comparing POL3-AID rnh202Δ with the POL3-AID pol2M644G rnh202Δ triple mutant could further confirm that the observed effect is Pol epsilon-dependent.

      We agree (see also our response to reviewer 1). In addition to the wild-type, we will analyze pol2-M644L – a mutant in which Pol ɛ incorporates fewer than normal ribonucleotides. An increase in ribonucleotide density on the lagging strand in pol2-M644L would support increased primer retention on the lagging strand.

      Figure 2H: It would be good to see the cell cycle distribution corresponding to the western blot images.

      We can include this

      Various spelling, grammar or precision of expression issues: - Pg. 4, line 4: endonucleolytically instead of nucleolytically. - Pg. 6, line 10: Remove 'was'. - Pg. 6, line 12: Remove 'in vivo' from the subtitle. - Pg. 6, line 14: 'an C-terminal' should be 'a C-terminal' - Pg 16, line 13: Phrasing implies that the synthesis of both leading and lagging strands by Pol delta in regions in the vicinity of replication origins is essential - please quote any paper testing its essentiality. - Please follow standard yeast genotype nomenclature, remove ';' when listing the yeast genotypes (e.g. POL3-AID mec1Δ sml1Δ instead of POL3-AID;mec1Δ;sml1Δ- example from Figure 2-B). - Concentrations of IAA are missing in few places (e.g. legend of Figure 1-C, page 24). - Figure 1A: add the label 'IAA (mM)' - Figure 2G: pleae provide a shorter exposure of the H4 blot in addition to the one shown. - Figure 6: adding a schematic presenting the events at actively and passively replicating late origins (and the predictions about leading and lagging strand bias) would help to understand the figure. - The format of the references is inconsistent. - 'On Watson/Crick strand' should be replaced with 'in Watson/Crick strand' We will fix typos, etc

      Reviewer #2 (Significance (Required)):

      This is a nice piece of work that provides in vivo confirmation of several observations that have been made in purified recombinant systems. In that sense, the overall novelty is limited, but this type of study is still important to do, as biochemical assays do not always reflect what is happening in cells, and this study gives insight into basic activities of the replisome. The participation of Pol epsilon in lagging strand synthesis is an interesting observation. Overall, the study will be of interest for the DNA replication field. My own expertise is in replication, predominantly in yeast. I have experience in NGS analysis of replication as well as in genetic analysis of the DNA damage response. I therefore feel competent to evaluate all aspects of the manuscript.

      Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      This manuscript describes the consequences of reducing the cellular concentration of a pol-delta subunit in S. cerevisiae. Pol-delta plays multiple cellular roles at both the replication fork (it is one of two DNA polymerases responsible for lagging strand synthesis) and during repair synthesis after DNA damage. The authors combine genetic and genomic methodologies to characterise how reduction in pol-delta concentration impacts on cellular fitness and specifically lagging strand synthesis. Overall it is technically a well executed study that is clearly presented and the data are predominantly appropriately interpreted.

      \*I have a number of major comments:** *

      1) The authors apply OK-seq (a methodology first developed by the senior author and therefore they are clearly experts at this) to study the consequence of pol-delta depletion on genome replication. OK-seq requires isolation of Okazaki fragments and this in turn requires removal of DNA ligase (Cdc9) - the authors achieve this with the anchor away system. My concern is that in these experiments the authors are depleting two factors required for lagging strand synthesis: pol-delta and ligase; it is unclear to me how the authors can determine the relative contribution of each depletion to the observed phenotypes. Could some of the observed phenotypes (e.g. fork slowing, 5' and 3' ends of Okazaki fragments, etc) be a consequence of the double depletion, rather than just pol-delta depletion as concluded by the authors? The authors present this as a method to determine genome replication timing, but really it is an assay to look at fork direction. Given the need for an addition mutation in OK-seq (cdc9), I would encourage the authors to consider a more direct assay for replication dynamics upon pol-delta depletion, such as a copy number measure (or BrdU-ip) of DNA replication or DNA combing - these methods don't require Cdc9 depletion and could therefore ensure that observed phenotypes are a consequence of pol-delta depletion (rather than the double depletion).

      As outlined in our response to the first two reviewers, we will do BrdU-IP experiments. We agree that the double depletion may have an effect on fork speed, and that BrdU-IP will allow us to test this possibility. However, we note that our analysis of Okazaki fragment initiation/processing requires the depletion of Cdc9, so for this we are limited to looking at differences between Cdc9 depletion alone vs Cdc9 depletion + Pol3 depletion.

      2) One major conclusion reached by the authors is that pol-epsilon can contribute to lagging strand synthesis upon pol-delta depletion (at least during late replication). This conclusion comes from the authors use of HydEn-seq to measure rNTP incorporation from which the contribution of a polymerase (pol-epsilon in this case) to strand synthesis can be determined. In a manner analogous to OK-seq, this requires the introduction of additional mutations (both in the polymerase and by the removal of RNaseH activity). The authors interpretation that pol-epsilon can play a role in lagging strand synthesis is dependent upon there being no temporal change in pol-delta strand-displacement activity, despite continued pol-delta depletion through S phase. It is not clear to me that the data presented in Fig 5 & 6 has the sensitivity to conclude this (and the OK-seq data is also subject to the potential bias of the double depletion of pol-delta and Cdc9). I feel that a necessary control to support this conclusion, would be to undertake the HydEn-seq experiment in the absence of the pol-epsilon mutation (just pol-delta depletion in the absence of RNaseH activity). This would allow the authors to measure any increase is residual rNTPs (likely from pol-alpha primase) on the lagging strand as a consequence of pol-delta depletion and determine whether they are equally likely in early and late S phase.

      As discussed in our response to the first two reviewers, we will analyze analogous data from both a POL2 wild-type and a pol2-M644L strain that incorporates fewer ribonucleotides than the wild-type.

      \*The following comments are more minor:** *

      -for the experiment in Fig S1B, the growth in 1.0 mM IAA is somewhat surprising given how sick the cells appear on equivalent plates. I couldn't find in the methods a description of the experimental conditions.

      The cells grow very slowly in 1 mM IAA (doubling time doubles). We think this is quite consistent with the poor growth on plates

      -there is considerable variability in the S phase kinetics from bulk DNA analysis (flow cytometry) when comparing Fig 1C, 2D, S3. Fig 1C appears to be the exception, with all the other figures showing poor S phase progress by comparison. It would be useful for the authors to recognise these differences and comment upon them. E.g. they appear to all be identical experiments, but are there experimental differences that could explain the different kinetics?

      We see some variability in our release, but generally cells enter S-phase at around 30 minutes. The release in figure S3 was carried out at 25 ˚C rather than 30 ˚C, which accounts for the additional delay in these data

      -Fig 2F, why is the rad51-deletion less severe that rad52-deletion - should they not be identical?

      We agree that these should logically be very similar: we do not know why the two mutants behave slightly differently at some (but not all) IAA concentrations

      -Fig 2H - could the authors show the flow cytometry (in a supplemental figure) for this experiment?

      We can show this

      -Fig 3B-E: OEM is described as a measure of origin efficiency - how is possible for this to have negative values?

      OEM describes Okazaki fragment strand bias around previously identified origins. If such an origin does not fire in our strain background, a negative OEM can result.

      -pp9: "Analysis of Okazaki fragment strand bias across the genome suggested that the average direction of replication was relatively similar at most loci across all Pol3 depletion conditions". The authors data is quantitative and they should be able to quantify how similar their data are across the various conditions, rather than making a qualitative statement: "relatively similar".

      We apologize and can re-phrase this. The intention of this statement is simply to draw the reader’s attention to the fact that global distributions of Okazaki fragments are not completely altered (e.g. only 1-2 origins per chromosome) as a prelude to the more quantitative analysis that follows in figure 3.

      -pp9: "origin firing efficiency in S. cerevisiae correlates strongly with replication timing"; it would be useful for the authors to support this statement with a citation.

      We will add 1-2 citations to support this statement

      -Fig 4A: it would help the reader if the authors could show 'zoomed in' examples of the points that the authors make (in addition to the whole chromosome view): slowed fork progression, reduced early origin activity, increased late origin activity (e.g. an origin that is normally passively replicated, that upon pol-delta depletion is no longer passively replicated and therefore becomes more efficient), etc.

      We agree that this would be helpful, and can add examples in the supplement

      -pp11: "An analogous global decrease in replication-origin firing efficiency has been observed in Pol ∂-deficient human fibroblasts" - but the authors are reporting a global increase in origin firing efficiency (Fig 3B).

      We can re-phrase this.

      -the nucleosomal ladder in Fig 5A is only weakly apparent from the gel and not particularly apparent from the density trace, this makes it's disappearance upon IAA treatment hard to interpret. Is the weak nucleosomal ladder what the authors had anticipated (in the absence of IAA)?

      We do not expect a weaker nucleosomal ladder than normal in the absence of IAA. In our experience these gels just sometimes give better ladders than others, and we hope that the traces help with interpretation

      -I found the effects being described by the authors in Fig 5B & C difficult to see, particularly for the transcription factors. Furthermore, why are these data differently normalised to those in Fig 4B & C (median vs. maximum)

      In figure 4 we normalize to maximum since all DNA should eventually be replicated, and we therefore think that showing coverage relative to a maximum value of 1 is most informative. In figure 5 we compare distributions of termini around obstacles, and therefore feel that normalizing to the median is a more appropriate way to compare enrichment around a given meta-element. The shapes of the graphs would be unchanged by choosing a different normalization point. In order to make changes easier to see, we can make the lines thinner in figure 5 and/or change the y-axis scale.

      -the final sentence of the results section returns to an analysis of the OK-seq data and is essentially a temporally segregated analysis (Fig S6) otherwise equivalent to that presented in Fig 5B. Given the importance placed on these data by the authors in the interpretation of the HydEn-seq data, I feel that it would help the reader to have been presented with these data earlier in the results section.

      We can move these data up

      -p22: OK-seq methods. The authors should indicate the culture conditions for these experiments.

      We can include this

      -p22: Computational analyses: the authors should indicate which reference genome assembly they used.

      We can include this

      -Fig 6B & C: the y-axis labels are confusing - do the authors mean Crick strand here?

      Oops. Yes, we do. We thank the reviewer for catching this

      \*REFEREE CROSS COMMENTING:** *

      All three reviewers seems to be in broad agreement about this manuscript. There is one significant concern raised by the other reviewers that I'd missed: that some of the Okazaki fragment analysis was done with non-synchronised cultures. I agree with this concern, however I don't think that there is necessarily a problem with the alternative explanation suggested by reviewer #1 ('Okazaki fragments enrichment may be skewed towards late origins'). While the accumulation of S phase cells might well be expected to lead to a bias towards isolating more Okazaki fragments from around late origins, the authors calculate the fraction of reads (i.e. Okazaki fragments) mapping to each strand. The potential presence of more late S phase cells would give greater sequence coverage over late replicating regions, but alone would not alter the fraction of reads mapping to each strand. However, I agree that interpretation of this experiment is not as simple as suggested by the authors and there may well be alternative explanations along the lines suggested by reviewer #1.

      There was a subsequent Okazaki fragment experiment performed with synchronised cells (Fig 4) and it might be possible to use these data to assess any differential impact on early vs late origins.

      We agree, and will do this analysis

      Reviewer #3 (Significance (Required)):

      My expertise is in DNA replication and genome stability, particularly replication timing and replication origin function.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      __Reviewer #1 (Evidence, reproducibility and clarity (Required)):


      In this article, the authors characterize a complex formed by sec22b-stx1-Esyt2. They investigate how such interactions are involved in the modulation of dynamics of the plasma membrane in the context of neuritogenesis. They conclude that the contact sites between the ER and the plasma membrane, mediated by the afore-mentioned complex, contribute the expansion of the plasma membrane.

      **Major comments:**

      Overall, the article clearly shows that in mammalian cells there is an interaction between sec22b-stx1-Esyt2 which appears to be important for filopodia formation and possibly neuritogenesis in neurons. However, performing additional experiments to better clarify some links and assumptions made by authors could strengthen the article.

      The manuscript relies on work performed either on cell lines (HeLA, PC12) or primary neuronal cultures. Although it is clear the value of the findings obtained using cell lines, they should be seen as a complementary rather than an exclusive approach. This is particularly important as the authors often make claim about neuron-related cellular biology.

      For instance, the biochemistry-based findings on the interaction and characterization of the protein complex (Figure 1) are all derived from experiments perfomed in Hela or PC12. As the authors have the capacity to culture and manipulate primary neuronal cultures, such findings should be validates in neuronal cells. The authors could also consider performing biochemical experiments (i.e. co-ip) of the endogenous proteins in neuronal cultures or brain tissue.*

      ->Endogenous Co-IP has been tried in E18 brain tissue. One experiment using brain tissue demonstrated co-immunoprecipitation of endogenous Sec22b and E-Syt2. Unfortunately, repetitions of this experiment failed due to high background in negative control (naïve Rabbit IgG). We agree with the reviewer that this data is worth trying again. We will carry out this co-immunoprecipitation experiment from cultured neurons to answer the reviewer’s request.

      The authors do show some evidence regarding the complex in neuronal cells using PLA (proximity ligation assay, figure 2) or super resolution microscopy, however, these findings should be corroborated by stronger findings targeting interaction and not based on simple proximity.

      ->We agree with this reviewer that PLA is limited in demonstrating the occurrence of a protein complex. We would like to stress that we have used PLA complementarily to immunoprecipitation and that we already have shown STED super-resolution data (Figure 3). In order to strengthen the STED data, we will include more details in the figure, as a supplementary movie and a supplementary spreadsheet with the quantification of the distance between the E-Syt2/Sec22b clusters to the plasma membrane stained using WGA. The STED data demonstrate that 50% of the clusters are closer than 33.6nm to the plasma membrane, a distance in the range of ER-PM contact sites.

      A similar critique regards the experiments using RNA-interference of Figure 4. Performing loss-of-function experiments in neuronal cultures would strengthen and complement the results obtained via over-expression approaches shown in Figure 5.

      ->The loss-of-function experiments in neuronal cultures using siRNA were attempted unsuccessfully. The three E-Syts have largely different cDNA sequences thus three distinct siRNAs must be transfected in order to silence all three simultaneously. This is quite challenging in neuronal cultures and we were never able to get strong silencing of the three E-Syts. In the following points, we plan to carry out further experiments using expression of a fragment of Sec22b (Longin domain). We are confident that this is a better approach to demonstrate the importance of Sec22b/E-Syt interaction.


      *Given that the authors have already in place all the necessary technology for the suggested biochemical and morphological-related experiments, these could be carried out swiftly within 3-4 months.

      **Minor comments:**

      The manuscript is really technical and at times tough to follow; it could benefit from key sentences to better guide the reader, particularly if not coming from the specialist field, in the appreciation of the experiments and results.

      Authors should submit the manuscript to a severe round of proofreading. There are several inconsistencies and sometimes what looks like internal comments: i.e. in the methods "STED Missing" or the fact that "LTP" is used everywhere but not defined and considering that the targeted audience is most likely neuroscience-based could easily lead to confusion.

      *

      ->We fully agree with this reviewer and apologize for leaving behind such errors. We will carefully proofread the revised ms.

      *The experiments appear to have been repeated a sufficient number of times and the statistics seem adequate. It would be advisable to show in dot-plots the findings rather than in bar graphs all findings and not just the morphometrics-relative ones.

      *

      ->We will modify the figures according to this reviewer’s suggestion.

      Reviewer #1 (Significance (Required)):

      *This work closely follows the excellent previous work from the Galli laboratory. As such, it is mostly incremental from a technical perspective and does not present particularly novel findings. An interesting aspect would be in addressing directly the influence of the described interactions in the lipid transfer between ER and the plasma membrane but in that sense the manuscript falls short. Although it is to be appreciated the functional readouts in terms of neuritogenesis, in the present state the manuscript features findings suitable for a very specific audience.

      I believe that the appropriate audience for the present manuscript lies within the neuroscientific community interested in development, specifically neuritogenesis, and/or membrane dynamics. Additionally, it might be interesting also for researchers outside of the neuroscience community and interested in the dynamics between ER and plasma membrane.

      *

      ->We are happy to read the comments of this reviewer. Nevertheless, we would like to stress the importance of deciphering precise molecular mechanisms in any biological process. Here, we are the first to demonstrate an interaction between lipid-transfer proteins E-Syts and ER v-SNARE Sec22b. As an example, the molecular mechanism connecting synaptic SNAREs and synaptotagmin has been the topic of more than 500 publications since seminal articles in the early 1990’s. We think that the first article linking E-Syts to SNAREs cannot be considered as a mere increment from our previous work.

      The activity of E-Syts to transfer lipids in vitro has been well established __(1–3) In addition, recent work by the De Camilli lab using Origami showed that reducing the distance between liposomes enhanced the lipid transfer mediated by E-Syt2 (3). Therefore, we did not carry out experiments such as combining SNAREs and E-Syt2 in artificial membranes in vitro because we considered that there would not be much more to demonstrate than what has already been done. Furthermore, we considered the experiments in cells, particularly neurons, much more critical at this point. Demonstrating transfer of glycerophospholipid between ER and PM in cells cannot be performed like other lipids’ transfer at other membrane interfaces for the following reasons: phospholipids are very abundant (4) and they are not modified upon transfer (1)__, there are no specific dyes to detect glycerophospholipids (unlike phosphoinositides), and ER and PM are too close to distinguish if a glycerophospholipid is in one or the other membrane. Such a challenging experiment would require the ability to setup a specific biochemical assay circumventing these constraints. We think that this is out of the scope of the present study focused on the role of E-Syt/Sec22b complex.

      Nevertheless, in order to get further insights on this question, we will express WT and mutant E-Syt2, purify the PM using the protocol of Figure 4 in Saheki et al __(1)__, followed by lipidomics analysis. We hope that this approach further supports our idea that E-Syts mediate an important lipid transfer mechanism towards the PM.

      * Keywords regarding my expertise: Molecular and Cellular Neuroscience, Morphometrics, Dendrite, Neurons, Dendritogenesis, Biochemistry, Imaging, Microscopy.


      __

      Reviewer #2 (Evidence, reproducibility and clarity (Required)): *This manuscript identifies and characterises a novel interaction between E-Syts and Sec22b and demonstrates that lipid transfer between the ER and PM contributes to the development of filopodia and neuronal expansion. This interaction with E-Syt2 occurs through the Longin domain of Sec22b Sec22b association. The authors suggest a continuum with further interactions with syntaxin1, that mediates neurite outgrowth. Overall I find this study very interesting and convincing. The experimental analysis is well carried out and the claims are well aligned with their results.

      I only have minor issues:

      Figure 1. Some of the western blots have several bands and it is difficult to know which band is the relevant one. They should be indicated in the fig panel. Further panel E and F are barely readable and should be redrawn with the appropriate line and font size.*

      ->We will make the changes requested by this reviewer in Figure 1.

      • *

      Figure 2: is there a difference between the number of dots in axons and dendrites? Can the author elaborate on this aspect as it is not clear from the image presented.

      ->We could not combine PLA with further staining of MAP2 and TAU. Indeed, to perform PLA, neurons are already double labelled to detect the proteins of interest. At the stage of the neurons used in this study, both axons and dendrites are growing. Therefore, we did not invest in distinguishing between axons and dendrites. Because growth cones are known to be the major sites of membrane growth, we instead distinguished dots within neurites and in growth cones. We will make the other changes requested by this reviewer in Figure 2.

      Figure 7: statistical analysis should be indicated from the BoNT/A and BoNT/C as BoNT/A represent an appropriate control cleaving SNAP25 but not Syntaxin.

      ->We agree with this request and we will add statistical analysis as suggested, using BoNT/A as an additional control.

      On top of controlling fusion and neuronal outgrowth, syntaxin has a role in survival and its cleavage leads to neuronal death. Is this pathway mediated by E-Syts interactions?

      ->We have stated in the ms: “Since exposure to BoNT/C1 at high concentrations and for long incubation periods causes degeneration of neurons in culture __(5,6)__, various concentrations and incubation times were tested, and a 4-hour treatment of neurons with 1nM BoNTs was chosen to avoid such deleterious effects.” Accordingly, we did not see any degeneration in our experimental conditions.__ __


      Reviewer #2 (Significance (Required)): This papers identifies the molecular mechanism of neuronal outgrowth. It is highly significant. ->We are very grateful to this reviewer for pointing out the high significance of our article.


      __Reviewer #3 (Evidence, reproducibility and clarity (Required)):

      __*1. The evidence for the claim that the Sec22b/Stx1 complex and E-Syts colocalize in native cells (neurons) and bind in heterologous cells is strong (3 independent lines of evidence: co-immunoprecipitation, Proximity Ligation (PLA) and STED super-resolution microscopy) However, the current title of the paper makes a claim beyond this interaction/proximity, based on evidence that is obtained with E-Syt over-expression in wildtype cells. The physiological relevance of the effects remain elusive with over-expression in wildtype cells only.

      Furthermore, it is plausible that overexpression of membrane binding/bending C2-domains promotes neurite outgrowth and ramifications by a non-specific effect (as shown for copine C2 domains, PMID:25450385 and indirect evidence for synaptotagmins1,2,7).*

      * This issue is especially relevant in the light of the fact that loss of all 3 Extended Synaptotagmins does not affect normal mouse development and viability (PMID: 27399837)

      It would be more appropriate to choose a more descriptive title*

      • *

      ->We agree with this reviewer that the original title may be too strong and are now proposing the following, more descriptive title:

      Role of the Sec22b/E-Syt complex in neurite growth and ramification

      We are fully aware that proteins harbouring C2 domains could potentially promote non-specific effects when overexpressed. However, we do not think this is the case here because none of the morphological effects of E-Syt2 expression in neurons and HeLa cells were reproduced by mutants lacking the SMP or the membrane-anchoring domains. Based on work on Copine __(7)__, a cytosolic protein, E-Syt2 still containing 3xC2 domains but lacking the membrane-anchoring domain should have shown a morphological effect if non-specific binding to phosphoinositides was the mechanism of action. We will discuss this point in the ms.


      • The evidence for the working model that the morphological effects of E-Syt2 depends on the Sec22b/Stx1 complex is not strong. Although plausible, the positive effect on neurite outgrowth (E-Syt2 overexpression) and the negative effects (inhibition by Stx1 cleaveage, Sec22b-Longin or Sec22b extended linker expression) may in fact be independent

        The evidence could be strengthened by PLA measurements in neurons over-expressing Myc-E-Syt2 and Sec22b to assess MSC density. It is predicted that in both conditions, MCS density increases. MCS density by PLA measurements could also be performed in Sec22b-P33 and DLongin overexpressed and BoNT/C1 treated neurons. According to the model, the number of MCS should go down. This is of special interest for BoNT/C1 treatment, as it is important to show that the altered morphology is not purely caused by a pre-state of degeneration that is known to be induced by BoNT/C1. In addition, EM measurements of ER-PM distances might provide an independent line of evidence.*

      ->We agree with this reviewer that additional experiments could strengthen the description of the molecular mechanism. To this end, we will carry out the following experiments:

      1/Co-immunoprecipitation experiments of endogenous Syntaxin, Sec22b and E-Syt2 in cells expressing GFP as control or Longin-GFP to demonstrate that expression of the Longin domain perturbs the association of Sec22b with E-Syt2 and Syntaxin.

      2/PLA measuring the association between E-Syt2 and Syntaxin in cells expressing GFP as control or Longin-GFP to demonstrate that expression of the Longin domain perturbs the association between E-Syt2 and Syntaxin using a complementary approach.


      Unfortunately, membrane-associated, BoNTC1-cleaved syntaxin corresponds to a short fragment undetectable by available antibodies whereas the fragment detected by the antibody after BoNTC1 cleavage lacks the transmembrane domain (Figure 7a). Therefore, we cannot perform PLA in BoNTC1-treated neurons.


      We are confident that further exploring the mechanism of action of the Longin domain, together with the data already in the ms, will make it very clear that the morphological effects of E-Syt2 depends on the Sec22b/Stx1 complex.



        • Link between neurite outgrowth and lipid transfer is weak. The authors argue that functional E-syt/Sec22b/Stx interaction is important for neurite outgrowth by mediating lipid transfer. The only line of evidence they provide is the absence of outgrowth effects in E-syt mutants lacking SMP or membrane spanning domains. However, from the data it is unclear whether these mutants are correctly folded, expressed and/or localized. Additional ICC stainings of the mutants in neurons are necessary to drive this point home. *
      • *

      ->The mutants and siRNA have been already used and validated in Giordano et al. 2013 __(8)__, therefore we did not carry out experiments aiming at basic characterization of these reagents. To answer this request, we will show images of the subcellular localization by ICC of WT and mutant E-Syt2 in the revised Figure 6 or in a Supplementary Figure.


      In addition, the authors might make the link between neurite outgrowth and lipid transfer stronger by examining PM lipid levels and distribution in control, Myc-E-Syt2 and E-Syt2 mutant neurons.

      ->We agree with this reviewer that this question is of high relevance. In order to answer this request, we will express WT and mutant E-Syt2, purify the PM using the protocol of Figure 4 in Saheki et al __(1)__, followed by lipidomics analysis. We hope that this approach further supports our idea that E-Syts mediate an important lipid transfer mechanism towards the PM.

        • There is no clear evidence that E-syt first binds to Sec22b, after which Stx1 leaves SNAP25 and joins the interaction. This should be indicated as speculation.

        * ->We will make it clear that our model in Figure 9 is a hypothetical model.

      • An apparent discrepancy exists between the TKD E-syts effects (i.e. reduced MSC density, Fig 4) and the lack of neurite outgrowth defects in TKO E-syts. According to the proposed model, the levels of E-syt correlate with the number of MSCs and thereby neurite outgrowth. Furthermore, to knock down E-Syts, single siRNAs against the three E-syts were used in Fig4. Off-target effects are not controlled in this approach. Using multiple siRNAs and/or siRNA resistant rescues would be required for robust conclusions.

        *

      ->The mutants and siRNA have already been used and validated in Giordano et al. 2013 __(8)__, therefore we did not carry out experiments aiming at basic characterization of these reagents. In addition, we would like to stress the complexity of carrying out a rescue experiment of a triple KD of proteins.

      Statistical analysis is incomplete. It is not clear whether statistical assumptions (e.g. normal distribution) were checked before performing the tests, and whether non-parametric alternatives where used if assumptions were not met.


      ->We thank this reviewer for making this important alert. We would like to stress that we have always checked whether samples followed the normal distribution and made non-parametric tests__. We will include this comment in the methods.__

      In Fig4, a T-test is used between multiple groups. This test can only be used when comparing two groups. Number of (independent) measurements is not clear in Fig1, 2, 4

      ->In all the figure legends the number of repetitions is specified


      All figures: display all individual data points in all bar graphs (as shown in 5c)

      *

      *

      \*Minor comments:**

      1. Inconsistencies on distances in model. Syts are enlongated proteins and thought to be found in MSCs of ~20 nm (Fernandez-Busnadiego, 2015). Trans-SNARE complexes start to interact when the distance between membranes is ~8 nm (Liu, 2007). In the introduction, the authors suggest that incomplete zippering might occur between Stx and Sec22b, resulting in a distance between 10 and 20 nm, which would allow E-Syt localization. In the discussion, however, the authors suggest a model where Sec22b/Stx interaction is important to bring the membranes in ~10 nm distance to enhance LTP activity. Proof for either model is lacking. Please clarify.*

      Fig1A: Please clarify the multiple bands? for Stx3 (anti-eGFP).

      • *

      ->These additional bands are recognised by the anti-GFP antibody, the tag being N-terminal, thus they represent proteolytic fragments. We consistently observe these in our experiments.

      Fig2: There is no size marker for panels C1-C6

      • *

      ->We will make the appropriate correction.

      Fig3: Both proteins seem to show a diffuse pattern. Please specify the validity of measuring average distance. A higher magnification zoom of staining pattern in the growth cone and visualization of the calculation could benefit interpretation.

      • *

      ->We agree with this reviewer that Figure 3 was not optimal to show all the extent of our STED data. In order to strengthen this part, we will include more details in both the figure and as a supplementary movie and supplementary spreadsheet with the quantification of the distance between the E-Syt2/Sec22b clusters to the plasma membrane stained using WGA. The STED data demonstrate that 50% of the clusters are closer than 33.6nm to the plasma membrane, a distance in the range of ER-PM contact sites.

      • E-Syt2 and E-Syt3 are used interchangeably throughout the manuscript and E-Syt1 is left out completely. It would help the reader if the authors could elaborate on their interpretation on the similarities and differences in structure and functionality between the three E-Syts.
      1. Why is there a red line in Fig 7b?*

      __->We added the red line to highlight the shift of SNAP25 band in BoNTA samples. If misleading, it can be removed

      Reviewer #3 (Significance (Required)):__

      A growing body of literature recognizes the importance of close proximities between membranes, facilitating direct interaction between organelles (Scorrano et al., 2019). Membrane Contact Sites (MCSs) are shown to be important for a wide range of cellular functions, such as lipid and calcium transfer. E-Syts have been recognized as one of the key players in neuronal MCSs, mediating lipid transport (Fernández-Busnadiego et al., 2015). A study published in 2014 by the authors of the current study revealed another two proteins important for MSCs in neurons (Petkovic et al., 2014). ER protein Sec22b and PM SNARE Syntaxin1 were shown to form a non-fusogenic trans-SNARE complex, important for lipid-transfer mediated neurite outgrowth. Gallo and colleagues have now provided important new evidence that these two components (E-Syts and Stx1/Sec22b) are together and may work together at MSCs.

      ->We thank this reviewer for stressing the importance of our article and agree with the conclusion of __Fernández-Busnadiego et al. (9) on E-Syts being one of the key players in neuronal MCSs, mediating lipid transport. We think that our work is a further key piece of evidence in the demonstration of the importance of E-Syts in neuronal development.__

      Bibliography

      Saheki Y, Bian X, Schauder CM, Sawaki Y, Surma MA, Klose C, et al. Control of plasma membrane lipid homeostasis by the extended synaptotagmins. Nat Cell Biol. 2016 Apr 11;18(5):504–515. Yu H, Liu Y, Gulbranson DR, Paine A, Rathore SS, Shen J. Extended synaptotagmins are Ca2+-dependent lipid transfer proteins at membrane contact sites. Proc Natl Acad Sci USA. 2016 Apr 19;113(16):4362–4367. Bian X, Zhang Z, Xiong Q, De Camilli P, Lin C. A programmable DNA-origami platform for studying lipid transfer between bilayers. Nat Chem Biol. 2019 Jul 18;15(8):830–837. Alberts B, Johnson A, Lewis J, Raff M. The lipid bilayer. Molecular Biology of …. 2002; Osen-Sand A, Staple JK, Naldi E, Schiavo G, Rossetto O, Petitpierre S, et al. Common and distinct fusion proteins in axonal growth and transmitter release. J Comp Neurol. 1996 Apr 1;367(2):222–234. Igarashi M, Kozaki S, Terakawa S, Kawano S, Ide C, Komiya Y. Growth cone collapse and inhibition of neurite growth by Botulinum neurotoxin C1: a t-SNARE is involved in axonal growth. J Cell Biol. 1996 Jul;134(1):205–215. Park N, Yoo JC, Lee Y-S, Choi HY, Hong S-G, Hwang EM, et al. Copine1 C2 domains have a critical calcium-independent role in the neuronal differentiation of hippocampal progenitor HiB5 cells. Biochem Biophys Res Commun. 2014 Nov 7;454(1):228–233. Giordano F, Saheki Y, Idevall-Hagren O, Colombo SF. PI (4, 5) P2-dependent and Ca2+-regulated ER-PM interactions mediated by the extended synaptotagmins. Cell. 2013; Fernández-Busnadiego R, Saheki Y, De Camilli P. Three-dimensional architecture of extended synaptotagmin-mediated endoplasmic reticulum-plasma membrane contact sites. Proc Natl Acad Sci USA. 2015 Apr 21;112(16):E2004–13.

    1. Environmental: safety of where you live, quality of the programs and services available (or unavailable) to you Familial: how loving and caring your family may be, how much time and support your family offers each other Within-person: your temperament, abilities (and inabilities), skills and characteristics that make you who you are

      I think a lot of the time when we think of resilency we think of the individual person. What are they doing to impact how they approach the challenges and stretches in life? How much of it is attributed to personality?

      There are two other factors that our out of the control of the child. As educators, we can do something about these two factors. Our hands are not tied and we can be the reason that a child develops some resiliency. Obviously, connecting and collaborating between home and school is preferable. But we only have control over our classrooms and sometimes that has to be enough.

    1. Importance of Resilience

      I appreciate the way Rachel Wagner explains resiliency. I think the rubber band example is a wonderful visual to help explain how every person has different events in their life that may "stretch" them and resilience is being able to healthily cope with the those stretches.

      I also appreciate the tips that she discusses in the video. The first thing she brings up is having positive relationships. As educators, we know that building relationships is a key our and their success. I like how Rachel mentions that these positive relationships can be small moments. It does not need to be a grandiose thing but a simple interaction. Rachel also mentions the important to encourage students to figure out how to approach different challenges they may face. An important aspect of this is giving children the space to figure it out. As educators, these are important things to keep in mind.

      Rachel also brings the concept of not being able to pour from an empty cup. Before we, as adults, can help our students become more resilient we have to be in a space to give ourselves. This involves setting our own boundaries and practicing resiliency ourselves.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Authors’ response to reviewers for manuscript “Bacterial killing by complement requires direct anchoring of Membrane Attack Complex precursor C5b-7” (reference #RC-2019-00125)

      Our manuscript entitled “Bacterial killing by complement requires direct anchoring of Membrane Attack Complex precursor C5b-7” has been reviewed by Review Commons. We thank the referees for their interest in our study and are very pleased that the referees consider our findings novel, important and well-designed. Based on the comments given by the referees, we have revised our manuscript and have included two new experimental figures:

      -Experimental data validating that our gating strategy with Sytox blue correlates well with bacterial killing on plate (Fig S1-B)

      -Experimental data validating that non-bactericidal MAC complexes damage the bacterial OM (Fig. S1-C).

      In the response letter below, we respond to the comments raised by the reviewers and explain how we have revised our paper accordingly. All changes into the revised manuscript are clearly highlighted in yellow.

      POINT-TO-POINT REPLY

      Reviewer #1

      (Evidence, reproducibility and clarity (Required)): The paper by Doorduijn et al. addresses a question rarely touched upon in modern studies of the complement system, namely the stability and time-resolved functions of complement component. It extends two earlier reports from the same laboratory, however, with a clear, novel point concerning especially the function of C7. The study embodies several techniques and modes of investigation. From these experiments, the paper contributes significantly to our understanding of the MAC complex is formed and why some bacteria escape this host defense mechanism. Over all the study is very well performed and written. I have only a few major comments.

      Reviewer #1 raises 3 points:

      POINT 1. The AFM pictures shown in Fig. 6D are of outstanding quality. However, it is a disappointment that the outcome of complement incubation was shown only for a complement-resistant E. coli strain. Would it be possible to show the location on the bacterial surface of MAC complexes, or holes, on a complement-susceptible strains? Comparing the visual outcome for such bacteria with locally formed MAC versus C7 replenished would be quite interesting and perhaps important.

      ANSWER 1. Since Fig. 6D represents AFM images of MAC on complement-susceptible E. coli bacteria, we assume that the reviewer is asking why we did not perform AFM experiments on complement-resistant strains? To address this question, it is important to note that we have thus far not succeeded in robustly visualizing MAC complexes under conditions at which bacteria were not killed by MAC complexes (Heesterbeek et al., EMBO J, 2019). While non-bactericidal MAC complexes are present on the bacterial surface as demonstrated with C9 deposition by flow cytometry, we hypothesize that they are not well inserted into the membrane (demonstrated by sensitivity to trypsin) and therefore difficult to resolve by AFM. This is consistent with previous AFM experiments on related pore-forming proteins (Leung et al, 2014, 2017), in which inserted pores were readily detected on supported lipid bilayers, but mobile, non-inserted pores were harder to resolve due to the invasiveness of the AFM measurement and/or insufficient temporal resolution. In the revised manuscript we now better clarify this in line 298-301.

      POINT 2. The flow cytometric analysis of bacterial killing is somewhat simplistic. Usually, staining of BOTH live and dead bacteria is performed. This permits better gating of the relevant populations. Specifically, the gating seems to fit the population in Fig. S1 only poorly, with the gate in some cases simply dividing what otherwise appears to uniform population ("C9 at t=0")

      ANSWER 2. In the revised manuscript, we have now included additional data demonstrating that our gating strategy with Sytox blue correlates well with bacterial killing on plate (new Fig S1-B referred to in line 78-79, 92-93, 96-98 and Supplementals text line 21-24 shows cfu data for Sytox data of Fig 2D). These data correspond with our earlier findings showing that cells gated to be positive for Sytox blue are indeed the relevant population of dead cells (Heesterbeek, EMBO J, 2019). We disagree with the reviewer that the use of a ‘live’ stain is of added value here. Because the outer membrane of Gram-negative bacteria is also a permeability barrier for ‘live’ stains like Syto9, MAC-dependent outer membrane perforation also results in increase in ‘live’ stain during the process of bacterial lysis (also described in Stiefel et al, BMC Microbiol, 2015 PMID: 25881030). We have therefore chosen to only use the Sytox stain in this study as this is a very reliable marker for killing.

      POINT 3. The cited literature is, in general, pertinent and comprehensive. I was surprised, however, that none of the many contributions to field of MAC formation by AF Esser was cited. For instance, the studies over C9 conformation (PMID: 2475785) seem not far away in topic from some of the points raised in the present paper.

      ANSWER 3. The reviewer is correct that the work of AF Esser has indeed focused on the contribution of C9 and C9 polymerization to the lytic activity of the MAC pore. In the revised manuscript, we have therefore now included some of the work done by AF Esser (references 34, 36 and 37) and have discussed this in our discussion (line 305-309). However, it is important to note that much of the work on the importance of C9 polymerization by AF Esser has been performed erythrocytes and single-membrane particles (also the suggested paper by the reviewer). Translation of these studies to the role of C9 conformation and polymerization on bacterial killing is therefore limited, although it does provide clues to what differences might cause the discrepancy observed between lysis of erythrocytes and bacterial killing by MAC pores.

      Reviewer #1 (Significance (Required)): Insight into the concept of locally formed MAC complexes is lacking and the paper clearly adds novel and quantitative data to this point. The paper probably mostly reaches out to an audience interested in the complement system and researchers interested in large protein complexes with conformational changes as part of their function. My own interest lies with complement-mediated protection against bacteria with a special focus on pattern recognition and protein-bacterial surface interactions.

      Reviewer #2

      (Evidence, reproducibility and clarity (Required)): Doorduijn et al. present a study illustrating the importance of rapid C7 interaction with C5b6 for MAC-dependent killing of complement sensitive bacteria. The absence of direct C7 interaction results in a MAC which i) doesn't kill the bacteria, and ii) is sensitive to trypsin. The authors have step by step investigated this issue by using common in vitro-methods with different strains of bacteria, serum, and/or purified complement proteins. Bacterial killing is evaluated by sytox blue influx in flow cytometry. I like this work. The experimental strategy is sound, and the conclusions are convincing are based on the presented data. The data and the methods presented in such a way that they can be reproduced. I have no concerns regarding the design, execution or conclusions.

      Reviewer #2 RAISES 3 POINTS

      POINT 1. My only criticism is on the number of replicates and following statistical analysis: • Overall, the experiments are conducted only three times. With the, in general, large differenced seen between the condition, this may still be acceptable. However, the statistic testing using only N=3 is of low value.

      ANSWER 1. As the reviewer pointed out, with these in vitro studies where the experimental conditions are highly controlled it is common practice to perform three independent experiments when the differences are large.

      POINT 2. The authors have sometimes used paired testing, and sometimes unpaired. For example, Fig. 5A-B is based on paired testing, whereas data in C, which are based on A-B, is tested using unpaired testing. Why so is unclear to me.

      ANSWER 2. We thank the reviewer for this comment, as also for Fig. 5C we should have used a paired analysis, so we have done so accordingly in the revised manuscript (line 725-726).

      POINT 3. Further on in Fig. 5 A-B., ANOVA with Tukey multiple comparison tests is used, which implements testing between all conditions; still, only significance is reported for blue vs. red. If the intention was to only test red vs. blue, a t-test would be better.

      ANSWER 3. As with the previous comment, we have now performed a paired t-test since we only intended to compare C7 at t=0 vs C7 at t=60 in Fig. 5A-B (line 725-726). Moreover, for consistency in our statistical analyses we’ve also applied this to Fig. 3C (line 706-707).

      Reviewer #2 (Significance (Required)): As far as I understand, the presented data is of high significance for the conceptual understanding of the buildup of MAC for bacterial killing on Gram-negative bacteria. I work partly with complement but is not an expert on the terminal pathway.

      Reviewer #3

      (Evidence, reproducibility and clarity (Required)): The study is a follow-up on the paper the same group of scientists published in EMBO J last year. That paper showed that rapid interaction between C5b6 and C7 is necessary for effective killing of Gram negative bacteria. The follow-up this paper makes is to make that case for a series of E. coli strains, showing as part of this that strains of clinical isolate E. coli resistant to complement attack prevent the rapid C5b6-C7 interaction. The story goes that C5 convertase engagement on the surface of targeted bacteria is the necessary context for effective C5>C5b conversion and thence interaction with C6 and C7. The rapid interaction with C7 is necessary because it prevents release/shedding of C5b6 from the bacterial cell surface. Overall, the conclusions seem justified - that C5b6 interaction with C7 stabilises its interaction with the surface and is needed to prevent C5b6 shedding. But this observation needs a mechanical or biophysical framework to be understood properly.

      Reviewer #3 RAISES 5 POINTS

      POINT 1. The authors do not observe non-bactericidal MAC pores/non-lytic MAC by AFM and so I think in this study there is no evidence for their existence. Their depiction in Figure 8b is therefore misleading and I think should be deleted. Indeed, the authors do not know what the structure of the non-bactericidal MAC pores could be, so depicting them in this specific way isn't appropriate. They have no idea what they might be like, if they exist.

      ANSWER 1. We agree with the referee that we do not know the structure of a non-bactericidal MAC pore, and have therefore deleted the speculative structures in Fig. 8B (explained in line 784-785). Although we have no structural information, we do think that non-bactericidal MAC pores exist and our revised manuscript now includes new data to better explain this (Fig S1-C). While our initial manuscript showed that a delayed interaction between C5b6 and C7 results in MAC complexes that cannot perturb the bacterial inner membrane, we now show that these MAC complexes effectively damage the outer membrane (evidenced by leakage of mCherry from the periplasmic space (Fig. S1-C, explained in line 97-98 and Supplementals text line 24-31). This leads us to conclude that there are pores formed in the outer membrane that are not capable of damaging the inner membrane. We think that within this context we can name these ‘non-bactericidal MAC pores’.

      POINT 2. This brings me to another point: it is really unclear to me from this study how the authors envisage the inner bacterial membrane be damaged by MAC attack. Do MAC pores formed in the OM deliver MAC components to the IM? Or what happens - is the damage to the IM indirect? The reason why this is relevant to the possibility of non-bactericidal MAC pores is that it could be these are inserted just like bactericidal pores into the OM but the IM attack is deficient in some way.

      ANSWER 2. Although we agree with the reviewer that exact mechanism by which MAC pores perturb the inner membrane is unanswered, we think this is beyond the scope of this paper which mainly deals with the time-resolved functions of MAC assembly. However, to meet the referees’ critique, we have now more clearly addressed this question in our discussion and speculate on several mechanisms by which the MAC pore could induce bacterial inner membrane damage (line 277 - 288). In short, we hypothesize that OM damage could indirectly trigger IM damage by affecting regulation of osmosis, overall cell envelope stability and/or envelope stress.

      POINT 3. (Significance (Required)). I am intrigued by the difference between MAC assembly on erythrocytes and bacteria. What do the authors believe to be the basis of this difference? It would help understanding of the significance of their work if they could make this clear. Without this kind of attempted explanation the results seem phenomenological - an observation has been made but why this observation occurs, what the important environmental difference is between erythrocyte membranes and the outer membranes of Gram negative bacteria is not addressed. I am looking for some kind of biophysical explanation - specific lipid properties, for example.

      ANSWER 3. We agree that this is intriguing and in our revised manuscript we have included different hypotheses on why MAC assembly on erythrocytes and bacteria could be different. Although differences in composition between the erythrocyte membrane and outer membrane can definitely play a role, our data suggest that the difference is mainly a consequence of the fact that Gram-negative bacteria have two membranes (the outer and inner membrane). In the revised manuscript, the newly added figure (Fig S1-C) supports this, since this figure reveals that MAC pores generated from C5b6 that is generated in the absence of C7 can still damage the bacterial OM. However, despite observing OM damage by measuring leakage of a periplasmic protein, this does not lead to bacterial killing and IM damage. Since we here observe that rapid interaction between C5b6 and C7 is required for bacterial killing and IM damage, we think that efficient anchoring of C5b-7 is primarily relevant in damaging the bacterial IM and subsequently causing bacterial cell death. Finally, we have also mentioned this more specifically in the discussion of the revised manuscript (line 277-288).

      POINT 4. Related, at the end of the Results section the authors say "Altogether, these data indicate that complement-resistant E. coli can prevent complement-dependent killing by MAC pores by preventing efficient anchoring of C5b-234 7 and insertion of MAC pores into the bacterial cell envelope." My immediate response was: 'How? The Discussion needs to consider this.' But it doesn't.

      ANSWER 4. In the revised manuscript, we now explain this more extensively (line 322 – 326). In short, we hypothesize that the composition of the OM, mostly in terms of capsular polysaccharides and lipopolysaccharides, could affect this. We have added additional references supporting the role of these components in complement resistance in multiple Gram-negative species (reference 45-48 and 50).

      POINT 5. I was confused by the term "metastable lipophilic domain" at line 262 on page 10. Do the authors mean the MACPF domain?

      ANSWER 5. We have now more explicitly named this in our discussion as being the MACPF domain and have further elaborated what we meant by metastable (line 263-267).

    1. Emily Messer ENG 491 Bleak House Installment Eleven 02/02/2020 Bleak House Installment Eleven and its Thematic Relevance

      Installment eleven of Bleak House by Charles Dickens begins with chapter thirty-three and ends with chapter thirty-five of forty-eight chapters total. There are twenty installments which were released monthly, making Bleak House an almost two-year endeavor. Situated between a case of spontaneous combustion in installment ten and Esther learning the true identity of her mother in installment twelve, installment eleven runs along a track of eventful and emotion packed installments, just after the middle of the novel. Though it does occur more than halfway through the story, a few of the events in installment eleven set up the later events of the novel, all the way up until the ending. Esther’s illness and recovery, which is the driving force of chapter 35, influence multiple plotlines that lie at the heart Bleak House. Similarly, the confession of love for Mr. Woodcourt, which also takes place at the close of chapter 35, is integral to the ending of Bleak House and its emotional weight. Installment eleven begins with the omniscient narrator describing the court directly after Krooks dies of spontaneous combustion. We learn that Krooks was Mrs. Smallweed’s brother, and therefore the Smallweeds want to inherit Krook’s belongings. We remember that Krooks had a stack of Nemo’s letters and wonder if any may have survived. We also meet the Bagnet family and their learn connection to George Rouncewell while Mr. Tulkhinghorn attempts to collect Mr. George’s debt. Then we switch back to Esther’s narrative, where we learn of her illness and her recovery with resulting scars, her absence from Ada, and an admission of her love for Mr. Woodcourt. Esther writes, “And now I must part with a little secret I have thus far tried to keep. I had thought, sometimes, that Mr. Wood Court loved me; and that if he had been richer, he would perhaps have told me that he loved me, before he went away. I had thought, sometimes, that if he had done so, I should have been glad of it. “(pg. 570) The illness that Esther has contacted, which is decidedly smallpox, was passed down from Jo, to Charley, to her. We learn of all three of these illnesses in installment number ten, and their significance and thematic importance comes to light in installment eleven. Jo, who is poor and resides in Tom All Alone’s, a very impoverished and dirty neighborhood in London, gets the disease first. Then Charley, who is still a poor girl and one of the lower-class characters in Bleak House contracts it from caring for Jo. Then, Esther falls ill after caring for both Jo and Charley. From this, there are two thematic takeaways. First, there is the infection of disease moving its way up the social class but ends with the class just below Ada: people whose perceived birth is low ranking. The disease is not allowed to continue spreading into the upper classed members of the character list. This could be read as a social critique of the idea of birth ranks, calling out how lower classed members of society are seen as a kind of self-contained infection. Secondly, this could fit into the novel’s larger conception of charity. Esther and Charley care for Jo out of compassion: a kind of charity. However, this charitable act winds up giving them smallpox. Similar to the portrayal of Mrs. Jellyby’s neglect at the hands of charity and Mr. Jarndyce’s inability to recognize thanks for his charity, the contraction of disease as a result of charity might be another way Dickens conveys that there is no good or pure form of charity - at least not without consequence. In regard to the effects of her illness, Esther writes “” I had heard my Ada crying at the door day and night I had heard her calling to me that I was cruel and did not love her… But I had only said when I could speak, ‘Never my sweet girl never!’ And I had over and over again reminded Charley that she was to keep my darling from the room whether I lived or died. Charley had been true to me in that time of need, and with her little hand and her great heart had kept the door fast.” Beyond the illness itself, the scars that result from the illness do quite a bit of work for the overall plot going forward from installment eleven. In installment twelve, Lady Dedlock reveals to Esther that she is, in fact, her mother. However, no kind of mother-daughter relationship results from that conversation. This could, in part, be explained by Esther’s complete facial change from the scarring that comes from the illness. Esther’s familiarity to Lady Dedlock is tainted by the scarring, and therefore the scarring becomes a symbol for the years of separation and emotional trauma (especially Esther but also somewhat Lady Dedlock as well) endured. Esther’s scars also inform her decision to accept the proposal made to her by Jarndyce in installment number fourteen, for marriage. Esther believes that her beauty has completely left her as a result of the scarring, and when Jarndyce proposes to her, she feels as though that may be her only chance at marriage. Yes, Esther loves Jarndyce almost like a father, but we have never had any inkling that she is romantically interested in Jarndyce. Therefore, when Jarndyce gives Esther a letter asking her to be his wife, we almost expect, or perhaps wish Esther to say something like, “No! I’m a young and beautiful woman and should not give away a chance at a fulfilling relationship to be the pet of an old man!” However, Esther does not think she is beautiful anymore, not after the scars. When speaking of her scars, Esther writes, “I have thought of this very often. I was now certain of it. I could thank God that it was not a shock to me now. I called Charley back; and when she came – at first pretending to smile, but as she drew nearer to me looking grieved – I took her in my arms and said, ‘it matters very little Charley I hope I can do without my old face very well,’” (pg. 558) Another revelation that comes with installment eleven is the admission of love between Alan Woodcourt and Esther. This has been heavily hinted at, but never outright said until this point. We have already had hurdles to a respective relationship introduced earlier in the novel, such as Mrs. Woodcourt's assertion that Allan should not marry a woman who is not of good birth. This, of course, would not apply to Esther after she learns that she is a Deadlock, but at the time is a clear threat. There is also Mr. Woodcourt’s prolonged absence from Bleak House at the hands of his work as a physician. However, none of the other threats seem as concrete and final as the threat that Woodcourt simply could not be with Esther after she has lost her beauty. This thought leaves the reader with a sadness, which is a perfect setup for the close of the novel where Jarndyce releases Esther from her betrothment and allows her to marry Woodcourt. The emotional weight of learning that Esther, a beloved narrator, can finally be happy with a man she could truly love as a husband is only possible through the many chapters of concealment which lead to the admission at the end of instalment eleven along with the seemingly assured end of any hope with the dramatic change in Esther’s appearance. In reference to how her change in appearance will affect a potential relationship with Woodcourt, Esther writes, “What should I have suffered, if I had had to write to him, and tell him that the poor face he had known as mine was quite gone for me, and then I freely released him from his bondage to one and he had never seen!” (pg. 570) Thematically, the illness and scarring work together to draw parallels between infection and poverty, charity and consequences, emotional scars and physical markings, and loss of beauty and strength of love. The preceding events of the installment, such as the introduction of the Bagnet family and the Smallweed’s connection to Krooks have their importance in the plot of the novel, but the larger thematic overtones of those sections pale in comparison to the importance of the illness. While the illness does first appear in an earlier installment, the resulting scarring and connection to the romance between Woodcourt and Esther does not appear until installment eleven, making this thematic and symbolic groundwork anchored in the eleventh installment.

    2. Allan Woodcourt  (VWKHUEsther

      This is where the potential romantic connect between Allan Woodcourt and Esther is brought to light. The interesting part is that this is also the installment where Woodcourt leaves the country on a voyage to China and India on a ship. We haven't seen very much of him before this, but here we are saying goodbye to him. His exit is almost necessary for the future relationship between Mr. Jarndyce and Esther to even have a chance at beginning -- if Woodcourt had been there all along, through everything (like Esther's illness), Mr. Jarndyce may not have even proposed to Esther in the first place. So, moving his piece off the chessboard of this novel's narrative was significant in itself. We also have hints that Esther's relationship with Woodcourt is more significant than she's letting on.

      Her narrative voice shows she has trouble looking at Woodcourt in an unbiased way; for example, she says things like:

      "I believe -- at least I know -- that he is not rich" as well as "I think -- I mean, he told us -- that he had been in practice three or four years..." (277).

      This obvious attempt to remove herself from the narrative is consistent with her character, but it also shows that her first thought is to portray him the way she subjectively views him, and she must force herself to be more removed.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      We are very grateful to the three reviewers for their useful and constructive comments on our manuscript. All reviewers appreciated that our manuscript provides a good characterization of the KKT2/3 functional domains, especially in solving crystal structures of the KKT2 central domain and revealing the importance of KKT2/3 central domains for their centromere targeting. They also commented that additional experiments (e.g. testing DNA-binding activities using recombinant proteins and examining whether ectopically expressed KKT2 fragments localize at kinetochores transiently) would significantly strengthen the manuscript. In the revised manuscript, we are going to address their comments as follows.

      Reviewer #1:

      From the information presented, it seems like there are only two possibilities to explain the role of the zinc finger domains in directing centromere targeting. First, this could mediate a protein-protein interaction. The authors attempt to assess this using their mass spec experiments, but this does not absolutely rule this out as this interaction may not persist through their purification procedure (low affinity or requires the presence of DNA, such as for a nucleosome).

      Response: We agree with the reviewer’s comment. We will add a sentence to discuss this possibility in the revised manuscript.

      Second, this could reflect direct DNA binding by the zinc finger. Although the existing paper is solid and highlights a role for the zinc finger domains in the localization of these proteins, it would be even better if the authors were to at least assess DNA binding in vitro with their recombinant protein. Comparing its behavior to a well characterized DNA-binding zinc finger protein would be powerful for assessing whether direct DNA binding could be responsible for its centromere localization.

      Response: We have tested DNA-binding activities for the KKT2 central domain from T. brucei, Bodo saltans, and Perkinsela using a fluorescent polarization assay. We tested three different DNA probes (50 bp each) that were fluorescently-labelled: a 50 bp DNA probe from the CIR147 sequence, which is the unit sequence of centromere repeats of several chromosomes in T. brucei (36% GC content), as well as two random DNA sequences of 25% and 74% GC content. We found that the Perkinsela KKT2a central domain binds these three different DNA probes with similar affinities (Kd ~100 nM), suggesting that the Perkinsela KKT2a central domain binds DNA in a sequence-independent manner. Although we have not been able to obtain reliable results for T. brucei and Bodo saltans proteins thus far (due to quenching of fluorescent signals by these proteins), it is likely that the T. brucei KKT2 central domain also binds DNA in a sequence-independent manner given the similarity of the Znf1 structure/sequence among kinetoplastids. This is consistent with the observation that there is no DNA sequence that is commonly found in the centromere of all chromosomes in T. brucei and other kinetoplastids. We are going to add the DNA-binding assay results for the Perkinsela KKT2a central domain in the revised manuscript. We do not feel it is informative to compare the KKT2 Znf1’s behavior to a well characterized DNA-binding zinc finger protein (that binds specific DNA sequence), because Perkinsela KKT2a binds DNA in a sequence-independent manner.

      The code for KKT2 and KKT3 localization is complicated by the multiple regions that contribute to their targeting. This includes both the zinc finger domain that the authors identify here, as well as a second region that appears to act through associations with other constitutive centromere components. Due to this, it feels that there are several aspects of these proteins that are incompletely explored. First, the authors show that the Znf1 mutant in KKT2 localizes apparently normally to centromeres, but is unable to support KKT2 function in chromosome segregation. This suggests that this zinc finger domain could have a separable role in kinetochore function that is distinct from centromere targeting.

      Response: We agree with the reviewer that the mechanism of KKT2 kinetochore localization is complicated because there are at least three distinct domains that contribute to its targeting (Figure 2 in the original manuscript), but we showed that the centromere targeting of the ectopically-expressed KKT2 central domain fragment depends on Znf1 (Figure 6B in the original manuscript). Together with the finding that the Znf1-equivalent domain is essential for the localization of the full length KKT3 protein, we think that a function of the KKT2 Znf1 domain is to promote its centromere localization. In the future, it will be critical to understand the molecular mechanism of how the KKT2 central domain localizes specifically at centromeres.

      Second, although the authors identify these minimal zinc finger regions as sufficient for centromere localization, they do not test whether this behavior depends on the presence of other KKT proteins. This seems like a very important experiment to test whether recruitment of the zinc finger occurs through other factors, or whether it could act directly through binding to DNA or histones.

      Response: We do not have an experimental setup to test whether the centromere localization of KKT2/3 central domains depends on other KKT proteins (i.e. we cannot keep the expression of the central domain to a low level while inducing RNAi constructs at a high level). As an alternative approach, we have been testing the localization dependency of endogenously-tagged full-length KKT2/3 proteins using RNAi against various KKT proteins but our preliminary results have not found any kinetochore protein whose depletion affects the localization of KKT2 or KKT3 at centromeres. Although these results could be explained by inefficient protein depletion, they are consistent with the possibility that KKT2 and KKT3 central domains directly interact with centromere DNA. We could consider adding these data in the revised manuscript, although a significant amount of additional work will be necessary to confirm these results.

      • Based on the description of kinetoplastid centromeres that the authors provide, it is actually unclear to whether these are indeed sequence independent. The authors state that "There is no specific DNA sequence that is common to all centromeres in each organism [Trypanosomes and Leishmania], suggesting that kinetoplastids also determine their kinetochore positions in a sequence-independent manner." However, it remains possible that there are features to this DNA that are responsible for defining the centromere. In principle, enriched clustering of a short motif that may elude sequence comparisons could be responsible for specifying these regions. It would be helpful to use caution with this statement, and I would also encourage the Aikyoshi lab to test this directly in future work, such as using strategies to remove a centromere or alter its position. *

      Response: We agree with the reviewer that we cannot exclude the possibility that there might be an enrichment of a short motif that promotes the localization of kinetochore proteins. We will discuss this possibility in the revised manuscript.

      • It would be helpful to provide a schematic of kinetoplastid kinetochore organization based on their studies to date (possibly in Figure 1) to provide a context for the relationships between the different KKT proteins tested in this paper.*

      Response: While we agree with the referee that a model figure would be helpful, we feel that drawing a model for the overall organization of kinetoplastid kinetochores at this stage could be misleading because we still know very little about it. In fact, our published data (e.g. the microtubule-binding kinetochore protein KKT4 localizes at centromeres throughout the cell cycle and has DNA-binding activities) and our unpublished observations suggest that the design principle of kinetoplastid kinetochores may well be fundamentally different from that of canonical kinetochores in other eukaryotes. We therefore would like to obtain more data before drawing a model of kinetoplastid kinetochores. Instead of a model, we are going to include a summary of localization patterns for kinetoplastid kinetochore proteins in Figure 1 to help orient readers.

      Reviewer #2: The experiments are in general well presented but some could be better controlled: - localization of KKT2 and KKT3 mutants is never verified to be centromeres, we have to believe the dots in the DAPI region are centromeres.

      Response: We have assumed that the KKT2 and KKT3 mutants that had dots very likely localized at centromeres because they behaved similarly to wild-type proteins (i.e. align at metaphase plate in some 2K1N cells and localize at the leading edge of separating chromosomes). We will confirm this assumption by imaging the KKT2/3 mutants with a kinetochore protein marker (e.g. tdTomato-KKT1).

      in some cases mutants are made in full-length (FL) background (viability, sometimes localization), but in other cases only in isolated domains. The former should be done for all assays. This is also important to show that central domain of KKT2 and KKT3 is necessary for localization.

      Response: It is very laborious to create point mutants in full-length background at an endogenous locus. This is why we first tested a number of mutants in our ectopic expression of truncated (for KKT2) or full-length (for KKT3) proteins to identify the most critical mutations, which were subsequently tested in the endogenous context. Although not included in the original manuscript, we have performed an ectopic expression of additional KKT2 mutants (C597A/C600A, C616A/C619A, C624A/C627A, C640A/C643A, and H656A/C660A) in the full-length protein and found that all of them had apparently normal localization pattern, which is consistent with the results we obtained in the endogenous expression experiments (C576A, D622A, and C640A/C643A: Figure 6c in the original manuscript).

      The data of F2 are interpreted to mean that PDB-like domain and middle region get to kinetochores by binding transient KT components, even though KKT2 itself is constitutive. That interpretation would really be strenghthened by showing the KKT2 fragments are now transient also. **

      Response: Our observations suggest that these KKT2 fragments indeed localize at centromeres transiently (from S phase to anaphase). We will confirm this result by imaging with a transiently-localized kinetochore protein, KKT1 tagged with tdTomato, and include in the revised manuscript.

      The paper could do with some attempts to get to this, based on the presented data. For example, does Znf1 bind centromeric DNA, does it bind nucleosomes, is it essential for recruiting the other KKTs, etc.

      Response: As we responded to Reviewer 1, we have found that Perkinsela KKT2a central domain Znf1 has DNA-binding activities. We agree that it will be important to test whether KKT2 binds nucleosomes but it will be necessary for us to reconstitute nucleosomes using recombinant T. brucei histones. It will also be important to test whether KKT2/3 are essential for recruiting other kinetochore proteins but we think that they are beyond the scope of this manuscript.

      Reviewer #3: \*Major Comments:** - No page numbers - this makes it difficult to refer to different parts of the text... *

      Response: We sincerely apologize for the lack of page numbers in the original manuscript. We will add page numbers and line numbers in the revised manuscript.

      Introduction (page 2), fourth-from bottom line: the authors refer here to "regional centromere" but have not defined this term (I assume, as opposed to point-centromeres of budding yeast?). I suggest rephrasing.

      Response: We thank the reviewer for pointing it out. We will rephrase it in the revised manuscript.

      Page 4, bottom: The discussion of KKT2 kinetochore localization brings up a lot or questions. First, can the authors use an assay like yeast two-hybrid to test for pairwise interactions between KKT2 domains and other kinetochore proteins? This could provide direct functional data on the role of these various domains in kinetochore localization.

      Response: Based on the mass spectrometry of immunoprecipitated KKT2 fragments that localized at kinetochores, we are currently trying to identify direct protein-protein interactions between the KKT2 domains and other kinetochore proteins (e.g. does KKT2-DPB directly interact with KKT1, KKT6, or KKT7 proteins?). While we agree that it is important to address these questions, we think that it is beyond the scope of this manuscript because its focus is the characterization of KKT2/3 central domains. As we mentioned in the manuscript, these central domains failed to co-purify with other kinetochore proteins, and the experiment therefore did not give us any clue about how they might localize specifically at centromeres.

      Second, if individual domains are being recruited to kinetochores by their non-constitutive binding partners, wouldn't this be evident if the authors looked at localization at different points in the cell cycle, and/or with dual localization tracking the putative binding partners? Could transient localization of some of the domains explain the intermediate localization phenotype observed for some domains in KKT2?

      Response: As we responded to Reviewer 2, our observations suggest that these KKT2 fragments indeed localize at centromeres transiently (from S phase to anaphase). We will confirm this result by imaging with a transiently-localized kinetochore protein, KKT1 tagged with tdTomato.

      Page 6: The authors note that KKT2 Znf2 bears strong similarity to DNA-binding canonical Zinc fingers, and even note the high conservation of some putative DNA-binding residues. Have the authors tested for DNA binding by this protein?

      Response: As we responded to Reviewer 1 and 2, we used a fluorescence polarization assay and found that the Perkinsela KKT2a central domain binds DNA in a sequence-independent manner.

      Can the authors at least model DNA binding and see if that would result in a clash, given the packing of Znf2 against the larger Znf1?

      Response: As suggested, we superimposed the structure of Bodo saltans KKT2 Znf2 with that of a zinc finger 268 bound to DNA (PDB:1AAY), which shows a possible mechanism by which Znf2 might bind DNA. It also revealed a clash between DNA and Znf1 (in the crystal packing of the solved structure), implying that the position of Znf2 would need to change in order to bind DNA. We will add a supplementary figure showing a hypothetical DNA-binding mechanism by Znf2 and discuss the possibility of a necessary structural change in the Znf1 position to accommodate the DNA binding by Znf2.

      \*Minor Comments:** - Page 5: I'm skeptical as to whether these zinc-binding domains, especially Znf1, should really be referred to as "fingers". *

      Response: To our knowledge, the word “zinc finger” could be used for any protein that binds one or more zinc ions. Given that we still do not understand the molecular mechanism by which this domain functions, we wanted to use a very general term, Znf1. However, we do appreciate the reviewer’s point that calling this domain as a zinc finger could be misleading, so we will refer Znf1 and Znf2 in the original manuscript as the CL domain (for centromere localizing domain) and a classic C2H2 zinc finger in the revised manuscript.

      Page 8: At the beginning of the section describing KKT3 cellular experiments, I think the authors need to make it much more explicit that T. brucei KKT3 shares both Znf1 and Znf2 with KKT2.

      Response: We will add the suggested sentence before describing the functional assay for KKT3.

      Figure S1A: The gap between lanes in the middle of the major peak is really confusing (it's not even clear that this is two different SDS-PAGE gels next to one another). I initially thought that KKT2 was in both peaks, given the labeling of this figure. I suggest labeling the lanes specifically, or cropping the picture, to avoid confusion.

      Response: As suggested, we will prepare an image that shows only those lanes (from two separate gels) that were used for loading protein samples. We also like to retain the whole gel images in the same figure because those gels have rather low background signal (even without any contrast manipulation).

    1. The discourse community I’m going to be talking about is social media. Gathering information isn’t as easy as it looks. I’m going to be doing some research online,reading articles so I have back up evidence. I want to focus more on social networking sites and how that affects our lives in everyday life. We may not realize but a lot of problems start from these sites such as facebook, instagram, snapchat and much more. 

      One of the difficulties for choosing this as a discourse community is the idea of shared goals. I think this is important so please do address it in the paper.

      I found this essay for you that might help. Please take a look. https://pdfs.semanticscholar.org/dd19/4239a42bb7989fc8b041e599113604e71dbd.pdf

    1. Do you think that depression is “fashionable?” And by criticising the sufferers you can deter others from “joining in”? Granted, we hear more about depression than we used to these days, but then we know what it is now. We see a lot more photos from Mars these days, because we have the means of doing so now, not because it’s suddenly trendy. Perhaps you are trying to deter anyone else who might read your views from considering suicide themselves? Given that statistics suggest that one in four people suffer some sort of mental health problem, this isn’t that unlikely an occurrence. But if someone is genuinely depressed and feels their life is worthless, seeing that others consider their feeling selfish can surely only emphasise their own self-loathing and bleakness? It suggests that people will hate them even in death. Maybe you know some people who have “attempted” suicide purely for attention? Fair enough; a debatable conclusion, but even if you’re right, so what? Surely someone who succeeds at committing suicide is a genuine sufferer who deserves our sympathy? Perhaps you feel that those expressing sorrow and sadness are wrong and you need to show them that you know better, no matter how upsetting they may find it? And this is unselfish behaviour how, exactly?

      Throughout the rest of the article, the tone shifts majorly. It started off as an informative piece, trying to explain how depression affects people differently and what they go through before making a life altering decision. But now, it is almost like the writer is attacking the people on the other side of the argument. They are not providing explanations of information, just questions that can be taken as offensive. Certainly this does not show professionalism.

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Author Comments:

      ­Response to Reviewers Comments

      We would like to thank all reviewers for carefully considering our manuscript and providing useful suggestions/ideas. The general consensus was that our study provides an important conceptual advance that reveals a new way of thinking about kinetochore phosphatases. However, in light of our surprising findings, it was suggested that additional experiments would be required to fully validate our conclusions. In particular, it was seen as important to test whether PLK1 can activate MPS1 from the BUB complex and to confirm that PP1 and PP2A are effectively inhibited in situations where MELT dephosphorylation can occur normally (Figure 3).

      In general, we agree with these and the other points raised by the reviewers, therefore we plan to address all comments as outlined in detail below.

      The major new additions to the final paper will be the following:

      1) Experiments to test how BUB-bound PLK1 affects MPS1 activity.

      2) Experiments to determine the efficiency of phosphatase inhibition in figure 3.

      3) Experiments to test whether maintaining PLK1 at the BUB complex causes SAC silencing defects

      4) Evolutionary analysis demonstrating that the PLK1 and PP2A-binding modules have co-evolved in the kinetochore BUB complex. This analysis, which has been performed already, strengthens our manuscript because it provides additional independent evidence for a functional relationship between PLK1 and PP2A on the BUB complex.


      Reviewer #1 **Minor comments:** 1) The authors propose that PP1-KNL1 and BUBR1-bound PP2A-B56 continuously antagonise PLK1 association with the BUB complex by dephosphorylating the CDK1 phosphorylation sites on BUBR1 (pT620) and BUB1 (pT609). It is therefore expected that converting these residues to aspartate would increase PLK1 recruitment. It would be interesting to verify if this hypothesis fits with the proposed model.

      Response: The general idea to maintain PLK1 at the BUB complex is a good one, but unfortunately polo-box domains do not bind to acidic negatively charged residues. Instead we will attempt to maintain PLK1 at the BUB complex using alternatively approaches (as suggested by reviewer 2).

      2) In Figure 1E, are the mean values for BubR1WT+BubWT and BubR1WT+Bub1T609 both normalized to 1? If so, this fails to reveal the contribution of Bub1 T609 for the recruitment of PLK1 when PP2A-B56 is allowed to localize at kinetochores.

      Response: The values will be updated and normalised to the BubR1WT+BUB1WT control. We have also performed additional experiments already and overall the results reveal a small reduction in kinetochore PLK1 following BUB1-T609A mutation and a larger reduction upon combined BUBR1-T620A mutation.

      3) What underlies the increase in Bub1 levels at unattached kinetochores of siBubR1 cells (Figure S1C?) Is this caused by an increase in Bub1 T609 phosphorylation and consequently unopposed PLK1 recruitment, which consequently increases MELT phosphorylation?

      Response: We suspect that PLK1 is not the cause of the increased BUB1 levels because PLK1 kinetochore levels are actually decreased in this situation (Figure S1A).

      4) Although the immunoblotting from Figure S1D indicates that BubR1T620A and Bub1T609A are expressed at similar levels as their respective WT counterparts, some degree of single-cell variability is expected to occur. As a complement to Figure 1B,C and Figure S1E,F could the authors plot the kinetochore intensity of BubR1 pT620 and Bub1T609 relative to the YFP-BubR1 and YFP-Bub1 signal, respectively?

      Response: There is indeed variability in the level of re-expression of BUBR1/BUB1 on a single cell level, which can at least partially explain the variation on BUBR1-pT620 and BUB1-pT609 observed within in each condition. We can upload these scatter plots at resubmission and include in the supplementary, if required.

      5) The authors nicely show that excessive PLK1 levels at the BUB complex are able to maintain MELT phosphorylation and the SAC (independently of MPS1) when KNL1-localised phosphatases are removed (Figures 2A,B). However, it should be noted that PLK1 is able to promote MPS1 activation at kinetochores and so, whether AZ-3146 at 2.5 uM efficiently inhibits MPS1 under conditions of excessive PLK1 recruitment should be confirmed. Can the authors provide a read-out for MPS1 activation status or activity (other than p-MELTs) to exclude a potential contribution of residual MPS1 activity in maintaining the p-MELTs and SAC?

      Response: This is a good point because although PLK1 can phosphorylate the MELTs it can also activate MPS1, although it is unknown whether it can do this from the BUB complex. We had left a dotted line in Figure 4B to include this possibility, but we will now test this directly with additional experiments.

      6) To examine whether PLK1 removal is the major role of PP1-KNL1 and PP2A-B56 in the SAC or whether they are additionally needed to dephosphorylate the MELTs, the authors monitored MELT dephosphorylation when MPS1 was inhibited immediately after 30-minute of BI2356. This revealed similar dephosphorylation kinetics, irrespective of compromised PP1-KNL1 or PP2A-B56 activity, thus suggesting that these pools of phosphatases are not required to dephosphorylate MELTs. To confirm this and exclude phosphatase redundancy, the authors simultaneously depleted all PP1 and B56 isoforms or treated cells with Calyculin A to inhibit all PP1 and PP2A phosphatases. In both of these situations, the kinetics of MELT dephosphorylation was indistinguishable from wild type cells if MPS1 and PLK1 were inhibited together. These observations led to the conclusion that neither PP1 or PP2A are required to dephosphorylate the MELT motifs. Instead they are needed to remove PLK1 from the BUB complex. This set of experiments is well-designed and the results support the conclusion. However, it would be of value if the authors provide evidence for the efficiency of PP1 and B56 isoforms depletion and for the efficiency of phosphatase inhibition by Calyculin A. An alternative read-out for the activity of PP1 and PP2A-B56 (other than p-MELT dephosphorylation) clearly confirming that both phosphatases are compromised when MPS1 and PLK1 are inhibited together could make a stronger case in excluding the contribution of residual PP1 or PP2A to the observed dephosphorylation of MELT motifs.

      Response: This is also a good point. We had attempted many different combinations in Figure 3 to inhibit PP1/PP2A activity as efficiently as possible. This is especially important considering the “negative” results on pMELT are very surprising. However, we will now test how efficiently we have inhibited PP1 and PP2A phosphatase function in these experiments.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)): **Major comments:** 1) In its current state I am not convinced that the key conclusions are fully supported by the experiments and alternative conclusions/interpretations can be drawn. For example the level of MELT phosphorylation will be determined by the balance of kinase and phosphatase activity and if they do not achieve 100% inhibition of Mps1 in their assays then they are not strictly monitoring dephosphorylation kinetics in their assays. If the combination of Mps1 and Plk1 inhibition then more strongly inhibits Mps1 then dephosphorylation kinetics becomes faster. Thus subtle differences in Mps1 activity under their different conditions could lead to misleading conclusions but in its present state a careful analysis of Mps1 activity is not provided. This lack of complete inhibition also applies to the phosphatases and the experiments in Figure 3E indicates that their Calyculin preparation is not really active as at steady state MELT phosphorylation levels are much less affected than in for instance BubR1 del PP2A (Figure 2A as an example). Thus they likely still have phosphatase activity in the experiment in figure 3E making it difficult to draw the conclusions they do. A more careful analysis of kinase and phosphatase activities in their different perturbations would be recommendable and should be possible within a reasonable time frame.

      Response: These are good points and we will now more carefully assess MPS1 and PP1/PP2A activities.

      2) A more stringent test of their model would also be needed. What happens if Plk1 is artificially maintained in the Bub complex? The prediction would be that SAC silencing should be severely delayed even when Mps1 is inhibited. This is a straightforward experiment to do that should not take too long. If the polobox can bind phosphoSer then one could also make BubR1 T620S to slow down dephosphorylation of this site (PPPs work slowly on Ser while Cdk1 have almost same activity for Ser and Thr).

      Response: These are good suggestions and we will try to see if maintaining PLK1 at the BUB complex produces effects on the SAC.

      3) Another issue is the relevance of Plk1 removal under normal conditions. As their quantification shows in figure 1D-E (I think there is something wrong with figure 1E - should likely be Bub1) the contribution of BubR1 T620 and Bub1 T609 to Plk1 kinetochore localisation seems minimal. Thus upon SAC satisfaction there is not really a need to remove Plk1 through dephosphorylation as it is already at wild type levels. It is only in their BubR1 and KNL1 mutants that there is this effect so one has to question the impact in a normal setting. This is consistent with the data in Figure S1D showing no phosphorylation of these sites under unperturbed conditions.

      Response: The major finding of this study is that kinetochore phosphatases are primarily needed to supress PLK1 activity on the BUB complex and thereby prevent excessive MELT phosphorylation. The relevance of this continued PLK1 removal under normal conditions is clear, because when it cannot occur (i.e. if the phosphatases are removed) then the SAC cannot be silenced unless PLK1 is inhibited. Therefore, whilst it is true that PLK1 localisation to the BUB complex is low under normal conditions, that is because the phosphatases are working to keep it that way. The relevance of that continual removal is an interesting, but in our opinion, separate question that will require a new body of work to resolve. One possibility is that PLK1 recruitment is a continual dynamic process, that is perhaps coupled to a particular stage in MCC assembly. For example, PLK1 could bind the BUB complex to recruit PP2A to BUBR1, before being immediately removed by PP2A. In this sense, PLK1 binding could still be functionally important even if it is only occurs transiently and steady state PLK1 levels are low. We will add a line to the discussion to highlight that it would be interesting to test PLK1 dynamics on the BUB complex in future.

      4) They write that in the absence of phosphatase activity Plk1 becomes capable of supporting SAC independently (of Mps1 is implied). They do not show this - only that MELT phosphorylation is maintained. As Mps1 has other targets required for SAC activity I would rephrase this.

      Response: Good point, this will be rephrased.

      Reviewer #2 (Significance (Required)): The advance is clearly conceptual and provides a new way of thinking about the kinetochore localized phosphatases. These phosphatases and the SAC have been immensely studied but this work brings in a new angle. The discussion would benefit from some evolutionary perspectives as the PP1 and PP2A-B56 binding sites are very conserved but the Plk1 docking sites on Bubs less so. This will be of interest to people in the field of cell division and researchers interested in phospho-mediated signaling.

      Response: Since the paper was submitted, we performed evolutionary analysis to examine this point. We discovered that the PLK1 docking sites are surprisingly well conserved and, in fact, they appear to have co-evolved within the same region of MAD/BUB along with the PP2A-B56 binding motif. We believe this new data strengthens our manuscript because it argues strongly for an important functional relationship between PLK1 and PP2A. A new figure containing this evolutionary analysis will be included in the final version.

      Reviewer #3 **Major comments:**

      1. An important limitation of this study is that KNL1 dephosphorylation at MELT repeats is monitored only by indirect immunofluorescence using phospho-specific antibodies. Thus, reduction of phospho-KNL1 kinetochore signals could be due to protein turnover at kinetochores, rather than to dephosphorylation. This is a serious issue that could be addressed by checking KNL1 dephosphorylation during time course experiments by western blot using phospho-specific antibodies, as previously done (Espert et al., 2014).

      Response: This is an important point that we feel is best addressed by examining total KNL1 levels at kinetochores (instead of simply total cellular levels by western blots). The reason is that KNL1 could potentially still be lost from kinetochores even if the total protein is not degraded. In all experiments involving YFP-KNL1 we observe no change in kinetochore KNL1 levels and this data will be included in the final version. We will also perform new experiments to examine total KNL1 levels in the BUBR1-WT/DPP2A situation to test whether KNL1 kinetochore levels are similarly maintained in these cells following MPS1 inhibition.

      1. For obvious technical reasons, the shortest time point at which authors compare KNL1 dephosphorylation upon MPS1-PLK1 inhibition is 5 minutes. Based on immunofluorescence data, authors conclude that kinetics of KNL1 dephosphorylation are similar when kinases are inhibited, independent of whether or not kinetochore-bound phosphatases are active. However, in most experiments (e.g. Fig. 3B, 3C, 3E) lower levels of MELT phosphorylation are detected after 5 minutes of kinase inhibition when phosphatases are present than when they are absent, suggesting that phosphatases likely do contribute to KNL1 dephosphorylation. I suspect that differences between the presence and absence of phosphatases might even be more obvious if authors were to look at shorter time points, when phosphatases conceivably accomplish their function. I would therefore suggest that the authors tone down their conclusions, as their data complement but do not disprove the previous model.

      Response: We appreciate that small differences can be seen in figure 3B and 3E at the 5-minute timepoint (between the WT and phosphatase inhibited situations). This may reflect a role for the phosphatases in dephosphorylation or in the ability of drugs such as BI-2536 (3B) or Calyculin A (3E) to fully inhibit their targets in the short timeframe. We will perform additional experiments to examine MPS1 and phosphatase activity under these conditions, in response to comments by reviewers 1 and 2. In the final version we will carefully interpret the new and existing data and, if required, modify the conclusions appropriately.

      1. In all experiments cells are kept mitotically arrested through nocodazole treatment, which is not quite a physiological condition to study SAC silencing. This could potentially mask the real contribution of phosphatases in MELT dephosphorylation. Indeed, it is possible that higher amounts of phosphatases are recruited to kinetochores during SAC silencing than during SAC signalling (e.g. during SAC signalling Aurora B phosphorylates the RVSF motif of KNL1 to keep PP1 binding at low levels; Liu et al., 2010). What would happen in a nocodazole wash-out? Would phosphatases be dispensable in these conditions for normal kinetics of MELT dephosphorylation and anaphase onset if PLK1 is inhibited?

      Response: All SAC silencing assays where performed in nocodazole for 2 main reasons: 1) PP2A-B56, PP1 or PLK1 can all regulate kinetochore-microtubule attachments, and thereby control the SAC indirectly. Therefore, performing our assays in the absence of microtubules allows us to make specific and direct conclusions about SAC regulation; 2) Previous work on pMELT regulation by PP1/PP2A in human cells was also performed following MPS1 inhibition in nocodazole (Espert et al 2014, Nijenhuis et al, 2014). Therefore, we are able to directly compare the contribution of PLK1 to the previously observed phenotypes, which allowed us to conclude that PLK1 has a major influence.

      Nevertheless, we appreciate the point that the influence of PLK1 could, in theory, be different during a normal mitosis when microtubule attachment can form. Therefore, we will attempt to address whether PLK1 inhibition can bypass a requirement for PP1/PP2A in SAC silencing during an unperturbed mitosis.

      Other data are overinterpreted. For instance, the evidence that CDK1-dependent phosphorylation sites in Bub1 and BubR1 is enhanced when PP1 and PP2A-B56 are absent at kinetochores suggests but does not "demonstrate that PP1-KNL1 and BUBR1-bound PP2A-B56 antagonise PLK1 recruitment to the BUB complex by dephosphorylating key CDK1 phosphorylation sites on BUBR1 (pT620) and BUB1 (pT609)(Figure 1F)". Similarly, the claim "when kinetochore phosphatase recruitment is inhibited, PLK1 becomes capable of supporting the SAC independently" referred to Fig. 2C-D is an overstatement, as residual MPS1 kinase could be still active in the presence of the AZ-3146 inhibitor.

      Response: These are good points and the indicated statements will be reworded.

      **Minor comments:**

      1. In many graphs (Fig. 1A-C, Fig. 2A,C) relative kinetochore intensities are quantified over "CENPC or YFP-KNL1". Authors should clarify when it is one versus the other.

      Response: This will be clarified in the axis and in the methods.

      1. The drawing in Fig. 1F depicts the action of PP1 and PP2A-B56 in antagonising PLK1 at kinetochores. Thus, the output should be SAC silencing, rather than activation.

      Response: The SAC symbol will be removed from the schematic to avoid confusion and because it is not actually the focus of figure 1 anyway.

      1. In the Discussion authors speculate that KNL1 dephosphorylation relies on a constitutive phosphatase with unregulated basal activity. Would a phosphatase be needed at all when MPS1 and PLK1 are inhibited? Could phosphorylated KNL1 be actively degraded?

      Response: We will insert total KNL1 immunofluorescence quantification so show that KNL1 KT levels are not decreased in this situation. KNL1 remains anchored at kinetochore but the MELTs must be dephosphorylated to remove the BUB complex.

      1. What happens to MPS1 when KNL1-bound PP1 and BUBR1-bound PP2A are absent? Do its kinetochore levels increase as observed for PLK1? And what about the kinetochore levels of Bub1 and BubR1?

      Response: We have demonstrated previously that BUB1/BUBR1 increase in this situation in line with the pMELTs (Nijenhuis et al 2014;l Smith et al, 2019) – these papers will be referenced in relation to this. We will also address the effect of phosphatase removal on MPS1 activity, in response to comments by reviewers 1 and 2.

  3. Feb 2020
    1. Good job, Paul. A surprisingly analytical mind for your age . I like how you incorporate ideas and arguments into your essay. And you are right.... Sometimes I think...Human is the most selfish being on the surface of the earth...Or ..is he? Aren't we animals with high intelligence and conscience ?Aren't we guided by the ancestral instinct of conservation? Like animals protecting their teritoires , we went to war from the earliest times to settle our boundaries. Like males of so many species ,men have killed each other ( literaly or only relational speaking) for women, and , of course, since human is more complex than most animals , women would kill each other as well for men. Just like in the wildest jungle, the strongest will survive .But what has consciense done to us? Killing and "jungle law" do exist in animal's world , but that world is a balanced one. Our world is a world that is constantly in contradiction with itself, for one we think , and one we say , and one we wish , but one we do..We are advocates of good and mercy but in the mean time we do so much harm...To ourselves , to each other , to the planet . What animal would kill for pleasure? What animal would destroy its own habitat ?What animals would trade the fundamental need of sex for the fundamenal need for food (which translated in human terms=money )? We admit publicly that violince and hatred are bad , but in the mean time we promote these all over the place in mass media. And , perhaps not surprinsingly , most of the times, the most popular tv programs are the ones that contain this kind of material.we keep denying the animal part in ourselves , but in the mean time we bring it to the surface , and not in just any form, but in the form of the wildest beast. What has conscience done to us? Or , better said, what have we done with conscience? We are always able to choose , but why so often this right to choose given by thought is manifested in its rather negative aspect , than its positive one? And if something can be done , than why don't we do something about it? That's why I like classical music;becaue it is not infested with any of these malicious things . Classical music usually brings to the light the other side of human , the great one , the kind and superior one.The one that is suppose to prove that we evolved from a primitive , wild stage to a more refined one. Like Shinichi Suzuki said , if we would nurture our children with more noble music , than our society would be a different kind of society. You need never apologize for speaking your heart. More often it's silence that conspires to lead a society in the wrong direction. I liked your response, but I don't like the question. There's too much polarized either/or thinking and discourse in the media already. People who survived either of the World Wars in Europe might disagree that today's wars are worse. And as a woman, I can't help but think of the changes that have made my current life possible--I mean, we're not even 100 years out from when I wouldn't have been able to vote, or go to college. I agree with you, something has to be done. But something has always had to be done. Larisa, thank you for sharing your view and comments on this. Laurie, those are two of the greatest sentences I've heard in a long time. Karen, thank you for showing me what someone with an interesting view thinks. I was going to include some things about how women are still somewhat treated unfairly but then my essay would have had another few hundred words. And that's what was hard with showing my view, and the opposition. Especially if I would have used a subject like female rights. The arguement in my opinion would be that it's gotten better, but still exists widely. Which does not change into a persuasive essay very well. And I don't think that any war is more horrible than another. If you look at the people who are killed, each death is going to affect some one on such a deep personal level. A death could be a child losing a parent or a parent losing a child. It will always be something different, yet the same. Paul, thanks for putting your essay up here. I enjoyed reading it! You pose a good argument and write much better than I ever could when I was your age. A suggestion to make your argument stronger: Your central thesis is that the world is changing for the worst, because of hate and discrimination, and how these lead to conflict. In your essay you have supplied good evidence of this and have argued it well, and on its own it stands up as an argument. But, to keep in mind: you haven't shown how this is different from the way things were in the past, and thus not completely supporting that things have changed for the worst. Hate, discrimination, and violence resulting from those two things have been around forever and forever. In fact, one could argue that the world is improving because of the increased awareness of and attempts to eradicate hate and prejudice in comparison to the past (also for example improvement in woman's rights, etc. like Karen suggested). To solidify your argument you would need to show how the hate and violence today is worse than earlier, ie. through comparisons of then/now, showing escalation of conflict, maybe something about today's technology and ease of killing, etc. But all in all, a good essay! If you write any more, will you also post them up here? Thank you so much for telling me what I need to fix and ways to do so! It is very helpful. Being able to see the faults in my writing and how to fix it is something that I really need to work on and you've just helped me in that. And yes, if it's ok with Laurie and everyone else, I'll post up more essays in the future if you'd like. I can not be more original than the others in my comments so GOOD JOB! You should send this to Obama... so that he has an idea of what is doing the young generation that is too often seen as "a buch of lazies with no heart" lol Great! Anne-Marie I think that is a beautiflly written essay, mirroring a lot of the hatred and discrimination that exist today. However, the topic assigned was whether these things are getting worse. That would be hard to say because hatred, fear, anger, aggressivity, etc. have always been around. Your essay would be stronger if you would explain why you think that things are changing for the worst. Access to weapons and to international news reports, as well as violence shown so widely on TV and video games, may make us more "violence-friendly." I am sure that there are many more reasons. I agree with Laurie. Silence gives consent. I like one of the slogans used by the Friends (Quakers): War is not the answer. Understanding and compassion can be very powerful at blocking violence. As you can tell by the discussion about your blog, your thinking is very mature. Thanks for posting your essay. Anne Marie, I started reading Obama's book The Audacity of Hope recently, and the Introduction put me very much in mind of Paul's essay here and some of the responses. I think Obama would be very sympathetic to these ideas. One of the additional themes of that book, at least in my interpretation, is that in order to move forward, we need to get away from simplistic polarized formulations like "is it better or worse?" I think it is to Paul's credit that he was able to make such an interesting essay out of a not-so-great assignment question. This entry has been archived and is no longer accepting comments.

      This is the extra stuff.

    1. First the most famous example of an indisputably (or so you would think) fake news story that has had real-world consequences.

      This type of online activity has been around since the beginning. Well maybe not the complete beginning but you understand... The anonymity and falsehoods are not only currently allowed but also sort of asked for by design. That is to say that there will always be con men and there will always be platforms for them to work within. This is just the modern equivalent of forging a check. Regardless, that is not to say that it does not make an impact. It does! But it currently only does so due to our lack of strong digital literacy. We need to teach that now more than ever but I think that in a way we already are. Younger kids these days have a great grasp on what may be real or fake and have even made a sort of entertainment game out of it with online story telling and ARGs. We just need to continue to strengthen our understanding of evolved digital literacy as a form of prevention and truth seeking.

    1. r adults to understand the languages that children may prefer, such as creative expression and play. Adults may have neglected and forgotten these languages in the course of growin

      This is so true. We can't expect children to be experts with something they have not had exposure to. Most preschools I think understand this, but as soon as they enter kindergarten this notion is lost.

    2. face

      I feel like we don't give children enough credit in the way that they think. They may not think as deep as we can as adults, but they are not incapable of thinking in a way that is abstract.

    1. Students in many fields, for example astronomy, oceanography, and genomics, are often already proficient in analyzing large, complex data sets. That’s an attractive skill to many employers.

      50% agree 50% disagree. While scientific papers are a niche, I still think there is great value in the process of learning how to write and present results. That is a skill we cannot lose as scientists. And I don't think this article is strictly suggesting we step away 100% from journal articles, but I do think journals may reach a broader audience? As a student, we read a lot of papers and those papers contribute to our learning and sometimes we just want a quick look at results or methods or simply the introduction. Personally, I don't want to run code or a software program to see results if I'm just looking to write a sentence or two for an introduction or an abstract. Again, I think maybe the shift should be to have these codes / softwares available to complement the paper. Not the other way around.

    1. PowerThe ability to have one’s will carried out despite the resistance of others. refers to the ability to have one’s will carried out despite the resistance of others.

      In addition to what is power, let's say you are at work and you run into the CEO of the company. Instantly, you might get nervous. You act different, you might walk different. The CEO represents a person of "power" so you may quickly think of something nice or professional to say as you walk closer to them. You will act a little different than you would around you other co-workers that you talk to on a daily basis. There are many other examples of this power we encounter everyday.

    1. [Note: this preprint has been peer reviewed by eLife. The decision letter after peer review, based on three reviews, follows. The decision was sent on 19 May 2019.]

      Summary

      This paper describes five cryo-EM structures of ribosomal complexes apparently representing different stages of RF2-catalyzed translation termination. The novel observations here are that the tip of domain 3 of RF2 undergoes a rearrangement from an a-helical conformation to a b-hairpin conformation during termination that likely facilitates exit of the newly synthesized protein from the ribosomal polypeptide exit tunnel and that the ribosome can undergo two thermally activated, spontaneous conformational changes, a relative rotation of the ribosomal subunits and a swiveling of the 'head' domain of the small subunit, during termination that likely facilitate dissociation of RF2 from the ribosome. These are interesting observations that significantly extend our understanding of how class I RFs and ribosome conformational changes drive important steps during termination and, as such, all three reviewers recommended publication provided the following comments are addressed adequately.

      Essential Revisions

      1) The maps provided through the eLife system seemed to be unsharpened, as they showed very little detail. However, even after sharpening them with a B-factor of -100A2, they still did not show the expected features for their respective resolutions. My suspicion is that FREALIGN has been used to overfit the data. This should be addressed in the revision. It should be indicated whether gold-standard separation of halves of the data sets were used in the final refinements, or whether those were limited to a specific spatial frequency (like was done in the classifications). If the latter, those frequencies should also be stated in the manuscript, and they should be significantly lower than the claimed resolutions.

      In addition: a lot of basic cryo-EM information is missing: the authors should include: a) at least one micrograph image b) some representative 2D class averages c) local resolution maps of the five structures. Also, because the density of important parts of the maps seems to be a lot worse than the resolution claimed, it would be good to explicitly mention the local resolution of the important features discussed in the main text. d) for each structure, some zoomed-in figures with the density on top of the molecular model. These figures should be chosen as to validate the resolution claim. For example, in structures I, II and V, the RNA bases should be well separated (they do so at 3.6A), and in structures III and IV beta-strands should be well separated, and many (larger) side chains should be visible. In addition, some panels with density for the most important features of each structure should be shown. e) FSC curves between the refined PDB models and the cryo-EM maps are missing from the manuscript. These should be included. In addition, to evaluate potential overfitting of the models in the maps, for each structure, the authors should also include the FSC curves between a model that was refined in half-map1 versus half-map1, as well as the FSC curve between _thesame model versus half-map2.

      2) There appear to be many self-citations, and there are also a few places where relevant citations are missing or are mis-cited. There are too many to list individually, but, just a few examples: Page 4: the only citation for the phrase "recent biophysical and biochemical findings suggest a highly dynamic series of termination events" is a Rodnina paper. There are many, earlier papers from Ehrenberg, Gonzalez, Puglisi, Green, Joseph, etc. that should be cited here. Page 5: The only citation for the sentence "By contrast, biochemical experiments showed..." is a Green paper. There are earlier papers from Ehrenberg characterizing the effects of the GGQ-->GAQ mutations on the ability of RF3 to accelerate the dissociation of class I RFs from termination complexes that should be cited here. Page 5: There's a sentence that refers to X-ray, cryo-EM, and smFRET studies, but only provides citations to two smFRET studies (Casy et al, 2018 and Sternberg et al, 2009); Page 5: Moazed and Noller, 1989 identified and characterized the P/E hybrid state, but they didn't report that a deacylated P-site tRNA 'samples' the P/E hybrid state 'via a spontaneous intersubunit rotation'--that was later work from Noller and Ha; etc. There are several other instances of missing citations or mis-citations. We would ask that the authors review their citations with an eye for excessive self-citations and for missing citations or mis-citations. In this context, "Ensemble-EM" is also cited as a specific method in the introduction (Abeyrathne et al., 2016; Loveland et al., 2017). However, this method is more commonly known as (3D) classification of cryo-EM images, and there are many older, more appropriate citations.

      3) The sample imaged is a model sample generated by in vitro assembly with purified components of a termination complex. In order to mimic a bona fide termination complex, a short messenger RNA with a strong Shine-Dalgarno sequence followed by a start codon and immediately after by a stop codon was used (mRNA sequence: 5'-GGC AAG GAG GUA AAA AUG UGA AAAAAA-3'). Similar constructs were used to crystallize termination complexes in the past and it has been proven by smFRET experiments that, at least regarding ribosomal inter-subunit dynamics, this model sample behaves similarly to a real termination complex with a peptide linked to the P site tRNA. However, the nature of this model sample should be apparent for the non-specialist reader, highlighting its similarities with a real termination complex but also its possible limitations, especially regarding the "artificial" nature of having a stop codon so close to the Shine-Dalgarno sequence, a situation that never happens in real mRNAs. The authors should explicitly acknowledge this and discuss its implications in the main text.

      4) The authors set up a couple of somewhat 'strawman' arguments in claiming that: (i) there are discrepancies in the X-ray, cryo-EM, and smFRET literature with regard to whether ribosomes can undergo intersubunit rotation while bound to class I RFs or whether the non-rotated conformation of the ribosome is stabilized by bound class I RFs and (ii) class I RFs are able to terminate translation and dissociate from the ribosome without the aid of RF3. In the case of (i), it is obviously possible for class I RF-bound ribosomes to undergo intersubunit rotation while still favoring the non-rotated conformation of the ribosome. Moreover, there are enough differences between the cited studies, both in terms of the experimental conditions as well as the technical limitations associated with the various experimental techniques, that it is easy to rationalize differences with regard to whether the class I RF-bound ribosomes would be expected to undergo intersubunit rotation and/or whether the researchers would have been able to capture/observe intersubunit rotation. In the case of (ii), decades of biochemistry from Buckingham, Ehrenberg, Green, and others had already demonstrated that class I RFs are able to terminate translation and dissociate from the ribosome without the aid of RF3, and that the role of RF3 in termination is to accelerate the spontaneous dissociation of the class I RFs. If the authors want to highlight discrepancies in the literature, they should frame them in the context of differences between the studies, experimental design, limitations of the approaches/techniques in the cited papers that might account for such discrepancies. Re-writing this paragraph also in the light of addressing the missing citations and mis-citations pointed out under (2) will further help in toning these arguments down, which would strengthen the manuscript's scholarship.

      5) Class I RFs are post-translationally methylated at the Q residue of the GGQ motif of domain 3 and Buckingham, Ehrenberg, and others have shown that this methylation accelerates and/or facilitates class I-catalyzed termination both in vitro and in vivo. Nonetheless, Svidritskiy et al do not report whether and to what extent their RF2 is methylated. Was RF2 overexpressed in a manner that ensured homogeneous methylation or lack of methylation? If they are overexpressing prfB and not overexpressing prmC, it is likely that they have a mix of methylated and unmethylated RF2. Assuming they are using the wt E. coli prfB gene, then the residue at position 246 is a T, rather than an A or S, and Buckingham has shown that, in the wt T246 background, a lack of methylation at Q252 is either seriously detrimental in richer media or lethal in more minimal media. It was felt that a discussion of this issue was not needed in the main text, but that it would be helpful if the authors would include the important/relevant experimental details in the Methods section, for example, did they use the T246 wt E. coli variant of RF2; and did they overexpress prmC along with prfB?

      6) Structure I is denoted and treated as a pre-termination complex, but that does not seem at all possible given that the sample was prepared by incubating a pre-termination complex for 30 min in the presence of excess RF2, conditions that Figure 1-Figure Supplement 3 suggest results in robust termination. Structure I is more likely the non-rotated conformation of a post-termination complex that is in equilibrium with its rotated counterpart, Structure V. Based on my reading of the manuscript, it is likely that the authors understand this point, but are nonetheless using this structure as a mimic/analog of a pre-termination complex. If so, I think this is fine, but the authors should explicitly state that this is what they are doing. Related to this, the authors should clarify the description of their activity assay, show the raw data, and/or report 'Released [S35]-fMet (%)' instead of 'Released [S35]-fMet, CPM' on the y-axis of Figure 1-Figure Supplement 3; as the activity assay is currently described, reported, and plotted, it is impossible to determine whether RF2 is 1% or 99% active in termination.

      7) The final sentence of the manuscript reads: "Translation termination and recycling of the release factors and the ribosome therefore rely on the spontaneous ribosome dynamics, triggered by local rearrangements of the universally conserved elements of the peptidyl-transferase and decoding centers". There are a couple of problems with this sentence as written. First, smFRET experiments by Gonzalez, Puglisi, and Rodnina have previously shown that "Translation termination and recycling of the release factors and the ribosome therefore rely on the spontaneous ribosome dynamics" and the relevant articles should therefore be cited here. Moreover, given the data are static structures solved using a sample that is at equilibrium, it is not clear how the authors determined that these spontaneous ribosome dynamics were "triggered by local rearrangements of the universally conserved elements of the peptidyl-transferase and decoding centers". Isn't it equally possible, given the data presented, that the local rearrangements were triggered by the ribosome dynamics?

    1. I do not think I would.

      I find it pretty compelling the way the speaker spends the entire poem dismissing the concept of love as something essential to life, and yet in the end she still states that she would probably not trade love for nourishment. She shows how often, we may be well aware that our emotions are not completely rational, and yet we still struggle to control them.

    1. Alternatively, by saying that researchers pursue taxpayer funding (rather than scientific funding) the author may be making the implicit assumption that researchers compete to work on projects in the taxpayers’ interest, rather than scientific interest. What do you think?

      i would not agree to this framing...

      i would put it this way... researchers, just like any other humans , are not immune to rewards and punishment, (or STRUCTURE) of their professions...

      if we (the PUBLIC) wish researchers to pursue scientific (however defined) interest, then the structure must be modified accordingly...

      who created the current structure? public and private elites... in democratic states, the public certainly have power over public elites, so they should pressure these public elites to change the structure...

      now, why is the public concerned with science and scientific advancement? to my understanding, this concern is often expressed in state's constitution, which created the public in each particular state...

      then we come to the issue what if the public interest is sometimes against scientific interest? well, this is where (democratic) negotiation takes place... scientists must convince the public that science is useful for them, in all its seeming 'uselessness'...

      many times the scientists only need to convince the public elites for this, not the public as a whole... but i think it's good if scientists are always in touch with the public as a whole with regards to their work if they use public funding...

      in conclusion, i had fun reading the comments, both at the original site and ea forum, because some commenters 'pierced the veil of ideology' behind the original article, and some of the back-and-forth were hilarious with my knowledge of 'money and the state'... would love to expand on this later when i have time... :)

    1. Look to her, Moor, if thou hast eyes to see:She has deceived her father, and may thee

      I think that this line can be described as an indirect foreshadow of future events. Othello in the end believes that Desdemona betrayed him even though we the audience know what really went on.

    1. As college students on the threshold of the academic community, many of you probably think that research is about finding answers to a question given to you by your professor. While this may have been true in high school, we would like to propose that a more meaningful research

      This is something that I always though was true, I remember there would be times were I would be so stressed because I did not know if what I was writing was correct, as I was always focusing on what the right answer was for the question being asked or prompt.

    1. This Nicholas gan mercy for to crye,                     This Nicholas began to cry for mercy, 3289         And spak so faire, and profred him so faste,                     And spoke so fair, and pressed his suit so fast, 3290         That she hir love hym graunted atte laste,                     That she granted him her love at the last, 3291         And swoor hir ooth, by Seint Thomas of Kent,                     And swore her oath, by Saint Thomas of Kent, 3292         That she wol been at his comandement,                     That she will be at his commandment, 3293         Whan that she may hir leyser wel espie.                     When she may well espy her opportunity. 3294         "Myn housbonde is so ful of jalousie                     "My husband is so full of jealousy 3295         That but ye wayte wel and been privee,                     That unless you wait patiently and are secretive, 3296         I woot right wel I nam but deed," quod she.                     I know right well I am as good as dead," said she. 3297         "Ye moste been ful deerne, as in this cas."                     "You must been very secret in this matter."

      This seems like an important piece of the work to me as it shows a major theme in British Literature. Deception is something that I have found to be predominant in many works that we have read. I also think this becomes a major turning point in the story where the plot thickens and the main conflict will occur.

    1. When redefining learning experiences, we cannot do so at the expense of human connection. The most powerful technologies known to human did more than simply minimize complexity or do something new and catchy: they enhance communication, making it easier for individuals to connect with one another

      Will technology preserve or enhance human connection in the classroom is by far a great question. Technology does make it easier to connect you leave an imprint everywhere you go online. I think as much as it enhances communication it also hinders it.

    1. Below him, in the town among the trees, Where friends of other days had honored him,

      Below him are his friends that are now dead, this supports that he is writing a poem of loneliness. BUT, what I find from this poem is that, even thought dying is undeniably depressing, NOT dying is even MORE depressing when you are of a certain age. This is almost reassuring, for no one like to think about when they are going to leave this planet, worried that we will kicking and screaming as death takes us away; but here we get a sense that this feared experience may never come. This poem is of a man that is depressed not because death is near, but because death has yet to come.

    1. Now that she was home, she meant to plant them for remembrance. 

      Artist's Statement: Their Eyes Were Watching God Project

      While there are many themes, ideas, and messages within Janie as a character and Their Eyes Were Watching God as a book but perhaps the most prevalent throughout is the focus on Janie's journey for independence and how it shapes her from the start to the beginning. Over time her character develops massively and it is often times very hard to encapsulate a development like that in a single drawing without multiple separated parts. I wanted my project to embody this idea of a journey for independence and change in both of those (the very start and the very beginning) points in the novel, with only one image, the tree.
      

      At the start of Janie's journey in Their Eyes Were Watching God she is alone, but far from independent. Her life with her grandmother is Uncomfortable to say the very least and she longs for an escape from the horrible monitnous torture that is everyday life. Eventually, her grandmother decides to marry her off to a man named Logan Killicks who she believes will be able to provide for her and give a stable living situation. This is all out of Janie's control and she has no say in it at all. After forcing herself through the relationship some time , Janie eventually just up and leaves and runs off with Jody Stark. So, if you look at the image as the first part of the book it may look like a beginning. The tree is in bloom and the serene setting begs for something to happen and for the energy of the “too good to be true” calm to be broken by a storm (woooooo foreshadowing). The background depicts an unknown sprawling landscape ready to be conquered and explored by whoever dares to do so. But the start of her adventure is only the tip of the iceberg. After going off with Jody and eventually discovering that he is nothing near the man she thought him to be and quickly she becomes unhappy. Instead of addressing this, Jody attempts to keep her in a box. As tensions build between the two they have a massive fight and Jody ends up dying as Janie is berating him. Soon after this Janie decides to move on in her life. After Jody dies she seems to be more content with herself. Standing up for herself against his abuse gave her some sense of control and this is where we start to see her mindset begin to change and she becomes more independent. Not too long after her period of mourning is over she ends up meeting Tea Cake. At this point in the story, Janie dislikes the idea of being controlled or held back by a relationship but she still longs for one. When she and Tea Cake meet she realizes that he is the one for her. Janie is liberated by the fact that even though the townspeople gossip and talk behind her back about her relationship, she feels comfortable and happy for the first time in a very long time. However, after a long calm a storm strikes. Literally. During an enormous hurricane which destroys Tea Cake and Janie’s house, Tea Cake is bitten by a rabid dog and becomes incredibly sick. They survive the hurricane but due to the Rabies, Tea Cake becomes very paranoid and begins to think that Janie is cheating on him. After a confrontation, Tea Cake becomes violent and attempts to shoot Janie, in self defense Janie kills Tea Cake and thus begins the final phase of the story. After some time of mourning Janie returns to Eatonville with a new sort of resilience. The things which Janie had endured by the end of the novel strengthened her to a point where she doesn't care what people think. As she returns to Eatonville people gossip and talk behind her back but she stands strong. She becomes content with being alone and this very new kind of independence which feels full and liberating. As opposed to being viewed as the earlier parts of the novel the tree viewed as the end of it is calm and serene in a way that symbolizes solemnity and her final independence. Looking at the drawing as the end of the book the clouds and background are less important and more so work as a backdrop to bring out the tree and show how her environment and experiences shaped her independence. Overall, the fact that the tree is the same in both images but can be extremely different depending on how it is viewed shows that her independence and comfort with being independent was within her the whole time and all she needed was to find it herself in order for it to come out. The journey which she took allowed her to find this confidence in herself.

    1. Most times I pretend I ain't there

      The Color Purple Analytic Essay “Trauma and Essence” by Bodhi Liveright

      Alice Walker wrote a story about a woman named Celie and the history of her trauma. The story is a journey from near death to a full life earned through hardships and self-discovery. Most people might easily lose themselves completely as the character Sofia almost does after her jail sentence. But even after years of hiding it to keep herself safe Celie finds her essence. The single most important thing Walker identifies for us is the idea that our essence can always be accessible. Essence is the part of every individual thing that cannot be broken, a light that always shines. Celie realizes her essence in the simple things and it’s one of the contributing factors to keeping her alive. Celie’s statement “I'm pore, I'm black, I may be ugly and can't cook, a voice say to everything listening. But I'm here.” shows her strength and the fact she is able to say something like this is proof that her inner voice had not been lost after years of traumatic experiences. She sets an example for people who struggle hearing that voice in reality. Celie’s world is horrible to imagine. As she lies in bed with Albert on top of her night after night, she is able to disassociate. Her soul escapes from the harsh reality of living with a serial rapist who had captured her to be his wife. Yet, that is the only thing she knows how to do. Even the hope that one day she can be with her beloved sister Nettie slips away as time passes.“Time moves slowly, but passes quickly.” Before Sofia get arrested for hitting a white man and is sent to jail, she was in touch with her essence. “All my life I had to fight. I had to fight my daddy. I had to fight my brothers. I had to fight my cousins and my uncles. A girl child ain't safe in a family of men. But I never thought I'd have to fight in my own house. She let out her breath. I loves Harpo, she say. God knows I do. But I'll kill him dead before I let him beat me.” Celie then advises Harpo to beat his wife Sofia and Sofia’s life begins to change. This is the life Celie knows, it’s not her fault. She’s involved in a pattern of violence. Sofia eventually leaves with her kids but eventually she falls victim to the culture of submission and racism for Black women. She is a broken person when she’s released from prison and Celie takes notice. “What will people say, you running off to Memphis like you don't have a house to look after? Shug say, Albert. Try to think like you got some sense. Why any woman give a shit what people think is a mystery to me. Well, say Grady, trying to bring light. A woman can't git a man if peoples talk. Shug look at me and us giggle. Then us sure nuff. Then Squeak start to laugh. Then Sofia. All us laugh and laugh.” Shug turns out to be a life line for Celie and she seemed to be the same for Shug. They took care of each other. Shug found redemption with her father through her voice and wouldn’t have been able to without her connection to Celie. This sisterhood became another life-line, a reason for living. Finding out Nettie was alive set everything into motion for true freedom from the hell she experienced for so many years with Albert. For Celie it often came down to simple things, by simply remembering running through the fields with her sister, she transported herself to a place of essence. Celie never lost her relationship with her imagination. Some people get stuck in the place of trauma, like Sofia did. For some reason Celie was able to avoid getting stuck, always able to rise above the awful things happening to her. This is a testament to her ability to find her way back to her essence. We learn how to live in the world based on the situation we’re born into. Celie had it rough and had to adapt to her treacherous environment. Having a father who raped her and then giving birth to two children by him is an almost unbearable story to read. Yet, what struck me the most about her story is how she survived it. Celie found essence in everything. Maybe she was luckier than most people. Maybe she was able to sit down and look at a flower and disappear into it. My dad told me this story about sitting down and watching three stalks of grass. It’s part of a poem he sent me the other day. “I watch three stalks of grass shake in the breeze. More like a shimmy shake. To the left. To the right. And then the wind stops, so they stop. And when the wind blows harder these three begin to dance!” We can overcome certain experiences and maybe change our relationship to trauma by acknowledging our essence. Sometimes it’s seeing the divine in the little things like a stalk of grass. Or a good meal. Or a great movie. Or a walk in the park with your friends. Or simply to lie down in a field of purple flowers and daydream. Humans have unique brains that can remember the past and plan for the future. Yet it occurs to me that we’re always in the present, no matter how hard we try not to. It's unclear why it’s easier for some people than others. Maybe it’s because we are all experiencing things differently from each other.

    1. There are hundreds of different images of the child.Each one of you has inside yourself an image of thechild that directs you as you begin to relate to a child.This theory within you pushes you to behave incertain ways; it orients you as you talk to the child,listen to the child, observe the child. It is verydifficult for you to act contrary to this internal image.For example, if your image is that boys and girls arevery different from one another, you will behavedifferently in your interactions with each of them.

      This thought from Loris has helped me think about my use of nicknames for children, especially non-verbal, and my tendency to use them in my practice. During an anti-bias workshop last year, we began our work by sharing our personal name stories with the group. A majority of my colleagues had described a varying level of turmoil that came with nicknames they had been given. I began to reflect on work with young children and how I had given children nicknames. As a tried to justify my why, I realized it felt like it was coming from a place of humor or joy or playfulness. But, the child couldn't advocate for themselves to accept or deny this nickname. I decided to ask the families, at home visits, about nicknames. This has allowed me to understand where I am coming from as an educator with a new lens. There is an internal image, even if it may feel joyful for you, it may evoke a different feeling for families and children.

    1. But in a few Weeks After resolv'd to run.”

      Robinson Crusoe is trying to explain his decision to disobey his father and leave home. As Crusoe reflects on this conversation, where his father begs him to stay home, he is aware that the correct choice was to obey his father, because if he had, he would not be stranded on an island. However, it is difficult for Crusoe to sympathize with his former self. Crusoe claims that he “was sincerely affected” and “resolv'd not to think of going abroad any more,” which is clearly not true as he immediately contradicts himself with his declaration to go away anyway. David Hume would have argued that Crusoe’s decision to go abroad came from an inability to sympathize his father because his imagination was set on the adventure he would have sailing abroad. Hume argues that “‘tis certain we may feel sickness and pain from the mere force of imagination,” but because the young Crusoe “would be satisfied with nothing but going to Sea,” his imaginative capacity was too occupied to sympathize with his father's fear. But now that he has experienced sailing away, his imagination is no longer occupied with the thought of leaving, allowing him to agree much more easily with his father as he reflects on himself in this passage.

    1. al­though enca ed in what seem a olid, impenetrable armor,the lobster can receive stimuli and impression from withoutas readily as ifit possessed a soft and delicate skin

      When we think of a lobster, we think of a hard shell. It is rare that we consider what is under the shell, and how it may feel for the animal to be boiled alive.

    1. d, as to the faculties of the mind, setting aside the arts grounded upon words and especially that skill of proceeding upon general and infallible rules called science, which very few have and but in few things, as being not a native faculty born with us, nor attained, as prudence, while we look after somewhat else, I find yet a greater equality amongst men than that of strength. For prudence is but experience, which equal time equally bestows on all men in those things they equally apply themselves unto. That which may perhaps make such equality incredible is but a vain conceit of one’s own wisdom, which almost all men think they have in a greater degree than the vulgar, that is, than all men but themselves, and a few others whom by fame or for concurring with themselves they approve.

      Is this what man is made up of... I’m confused

    1. Patton worries that the technology being proffered to schools may be more likely to misfire on language used by black youth, potentially causing them to experience greater scrutiny from school administrators.

      I think the dilemma is basically focus on the cultural relativism. People should consider a kind of cultural object in a general way, not just in your own background. The usage of language varies from people by people, and we should not regard this as a symbol to judge them. Apparently technology cannot do this, which is to distinguish languages with emotion and logic. It would be easily to turn to a new problem among races and geography. Casestudy

    1. Note: This rebuttal was posted by the corresponding author to Review Commons. Content has not been altered except for formatting.

      Learn more at Review Commons


      Reply to the reviewers

      Response to Reviewers Comments

      We would like to thank all reviewers for carefully considering our manuscript and providing useful suggestions/ideas. The general consensus was that our study provides an important conceptual advance that reveals a new way of thinking about kinetochore phosphatases. However, in light of our surprising findings, it was suggested that additional experiments would be required to fully validate our conclusions. In particular, it was seen as important to test whether PLK1 can activate MPS1 from the BUB complex and to confirm that PP1 and PP2A are effectively inhibited in situations where MELT dephosphorylation can occur normally (Figure 3).

      In general, we agree with these and the other points raised by the reviewers, therefore we plan to address all comments as outlined in detail below.

      The major new additions to the final paper will be the following:

      1) Experiments to test how BUB-bound PLK1 affects MPS1 activity.

      2) Experiments to determine the efficiency of phosphatase inhibition in figure 3.

      3) Experiments to test whether maintaining PLK1 at the BUB complex causes SAC silencing defects

      4) Evolutionary analysis demonstrating that the PLK1 and PP2A-binding modules have co-evolved in the kinetochore BUB complex. This analysis, which has been performed already, strengthens our manuscript because it provides additional independent evidence for a functional relationship between PLK1 and PP2A on the BUB complex.


      Reviewer #1

      Minor comments:

      1) The authors propose that PP1-KNL1 and BUBR1-bound PP2A-B56 continuously antagonise PLK1 association with the BUB complex by dephosphorylating the CDK1 phosphorylation sites on BUBR1 (pT620) and BUB1 (pT609). It is therefore expected that converting these residues to aspartate would increase PLK1 recruitment. It would be interesting to verify if this hypothesis fits with the proposed model.

      Response: The general idea to maintain PLK1 at the BUB complex is a good one, but unfortunately polo-box domains do not bind to acidic negatively charged residues. Instead we will attempt to maintain PLK1 at the BUB complex using alternatively approaches (as suggested by reviewer 2).

      2) In Figure 1E, are the mean values for BubR1WT+BubWT and BubR1WT+Bub1T609 both normalized to 1? If so, this fails to reveal the contribution of Bub1 T609 for the recruitment of PLK1 when PP2A-B56 is allowed to localize at kinetochores.

      Response: The values will be updated and normalised to the BubR1WT+BUB1WT control. We have also performed additional experiments already and overall the results reveal a small reduction in kinetochore PLK1 following BUB1-T609A mutation and a larger reduction upon combined BUBR1-T620A mutation.

      3) What underlies the increase in Bub1 levels at unattached kinetochores of siBubR1 cells (Figure S1C?) Is this caused by an increase in Bub1 T609 phosphorylation and consequently unopposed PLK1 recruitment, which consequently increases MELT phosphorylation?

      Response: We suspect that PLK1 is not the cause of the increased BUB1 levels because PLK1 kinetochore levels are actually decreased in this situation (Figure S1A).

      4) Although the immunoblotting from Figure S1D indicates that BubR1T620A and Bub1T609A are expressed at similar levels as their respective WT counterparts, some degree of single-cell variability is expected to occur. As a complement to Figure 1B,C and Figure S1E,F could the authors plot the kinetochore intensity of BubR1 pT620 and Bub1T609 relative to the YFP-BubR1 and YFP-Bub1 signal, respectively?

      Response: There is indeed variability in the level of re-expression of BUBR1/BUB1 on a single cell level, which can at least partially explain the variation on BUBR1-pT620 and BUB1-pT609 observed within in each condition. We can upload these scatter plots at resubmission and include in the supplementary, if required.

      5) The authors nicely show that excessive PLK1 levels at the BUB complex are able to maintain MELT phosphorylation and the SAC (independently of MPS1) when KNL1-localised phosphatases are removed (Figures 2A,B). However, it should be noted that PLK1 is able to promote MPS1 activation at kinetochores and so, whether AZ-3146 at 2.5 uM efficiently inhibits MPS1 under conditions of excessive PLK1 recruitment should be confirmed. Can the authors provide a read-out for MPS1 activation status or activity (other than p-MELTs) to exclude a potential contribution of residual MPS1 activity in maintaining the p-MELTs and SAC?

      Response: This is a good point because although PLK1 can phosphorylate the MELTs it can also activate MPS1, although it is unknown whether it can do this from the BUB complex. We had left a dotted line in Figure 4B to include this possibility, but we will now test this directly with additional experiments.

      6) To examine whether PLK1 removal is the major role of PP1-KNL1 and PP2A-B56 in the SAC or whether they are additionally needed to dephosphorylate the MELTs, the authors monitored MELT dephosphorylation when MPS1 was inhibited immediately after 30-minute of BI2356. This revealed similar dephosphorylation kinetics, irrespective of compromised PP1-KNL1 or PP2A-B56 activity, thus suggesting that these pools of phosphatases are not required to dephosphorylate MELTs. To confirm this and exclude phosphatase redundancy, the authors simultaneously depleted all PP1 and B56 isoforms or treated cells with Calyculin A to inhibit all PP1 and PP2A phosphatases. In both of these situations, the kinetics of MELT dephosphorylation was indistinguishable from wild type cells if MPS1 and PLK1 were inhibited together. These observations led to the conclusion that neither PP1 or PP2A are required to dephosphorylate the MELT motifs. Instead they are needed to remove PLK1 from the BUB complex. This set of experiments is well-designed and the results support the conclusion. However, it would be of value if the authors provide evidence for the efficiency of PP1 and B56 isoforms depletion and for the efficiency of phosphatase inhibition by Calyculin A. An alternative read-out for the activity of PP1 and PP2A-B56 (other than p-MELT dephosphorylation) clearly confirming that both phosphatases are compromised when MPS1 and PLK1 are inhibited together could make a stronger case in excluding the contribution of residual PP1 or PP2A to the observed dephosphorylation of MELT motifs.

      Response: This is also a good point. We had attempted many different combinations in Figure 3 to inhibit PP1/PP2A activity as efficiently as possible. This is especially important considering the “negative” results on pMELT are very surprising. However, we will now test how efficiently we have inhibited PP1 and PP2A phosphatase function in these experiments.

      Reviewer #2 (Evidence, reproducibility and clarity (Required)):

      Major comments:

      1) In its current state I am not convinced that the key conclusions are fully supported by the experiments and alternative conclusions/interpretations can be drawn. For example the level of MELT phosphorylation will be determined by the balance of kinase and phosphatase activity and if they do not achieve 100% inhibition of Mps1 in their assays then they are not strictly monitoring dephosphorylation kinetics in their assays. If the combination of Mps1 and Plk1 inhibition then more strongly inhibits Mps1 then dephosphorylation kinetics becomes faster. Thus subtle differences in Mps1 activity under their different conditions could lead to misleading conclusions but in its present state a careful analysis of Mps1 activity is not provided. This lack of complete inhibition also applies to the phosphatases and the experiments in Figure 3E indicates that their Calyculin preparation is not really active as at steady state MELT phosphorylation levels are much less affected than in for instance BubR1 del PP2A (Figure 2A as an example). Thus they likely still have phosphatase activity in the experiment in figure 3E making it difficult to draw the conclusions they do. A more careful analysis of kinase and phosphatase activities in their different perturbations would be recommendable and should be possible within a reasonable time frame.

      Response: These are good points and we will now more carefully assess MPS1 and PP1/PP2A activities.

      2) A more stringent test of their model would also be needed. What happens if Plk1 is artificially maintained in the Bub complex? The prediction would be that SAC silencing should be severely delayed even when Mps1 is inhibited. This is a straightforward experiment to do that should not take too long. If the polobox can bind phosphoSer then one could also make BubR1 T620S to slow down dephosphorylation of this site (PPPs work slowly on Ser while Cdk1 have almost same activity for Ser and Thr).

      Response: These are good suggestions and we will try to see if maintaining PLK1 at the BUB complex produces effects on the SAC.

      3) Another issue is the relevance of Plk1 removal under normal conditions. As their quantification shows in figure 1D-E (I think there is something wrong with figure 1E - should likely be Bub1) the contribution of BubR1 T620 and Bub1 T609 to Plk1 kinetochore localisation seems minimal. Thus upon SAC satisfaction there is not really a need to remove Plk1 through dephosphorylation as it is already at wild type levels. It is only in their BubR1 and KNL1 mutants that there is this effect so one has to question the impact in a normal setting. This is consistent with the data in Figure S1D showing no phosphorylation of these sites under unperturbed conditions.

      Response: The major finding of this study is that kinetochore phosphatases are primarily needed to supress PLK1 activity on the BUB complex and thereby prevent excessive MELT phosphorylation. The relevance of this continued PLK1 removal under normal conditions is clear, because when it cannot occur (i.e. if the phosphatases are removed) then the SAC cannot be silenced unless PLK1 is inhibited. Therefore, whilst it is true that PLK1 localisation to the BUB complex is low under normal conditions, that is because the phosphatases are working to keep it that way. The relevance of that continual removal is an interesting, but in our opinion, separate question that will require a new body of work to resolve. One possibility is that PLK1 recruitment is a continual dynamic process, that is perhaps coupled to a particular stage in MCC assembly. For example, PLK1 could bind the BUB complex to recruit PP2A to BUBR1, before being immediately removed by PP2A. In this sense, PLK1 binding could still be functionally important even if it is only occurs transiently and steady state PLK1 levels are low. We will add a line to the discussion to highlight that it would be interesting to test PLK1 dynamics on the BUB complex in future.

      4) They write that in the absence of phosphatase activity Plk1 becomes capable of supporting SAC independently (of Mps1 is implied). They do not show this - only that MELT phosphorylation is maintained. As Mps1 has other targets required for SAC activity I would rephrase this.

      Response: Good point, this will be rephrased.

      Reviewer #2 (Significance (Required)):

      The advance is clearly conceptual and provides a new way of thinking about the kinetochore localized phosphatases. These phosphatases and the SAC have been immensely studied but this work brings in a new angle. The discussion would benefit from some evolutionary perspectives as the PP1 and PP2A-B56 binding sites are very conserved but the Plk1 docking sites on Bubs less so. This will be of interest to people in the field of cell division and researchers interested in phospho-mediated signaling.

      Response: Since the paper was submitted, we performed evolutionary analysis to examine this point. We discovered that the PLK1 docking sites are surprisingly well conserved and, in fact, they appear to have co-evolved within the same region of MAD/BUB along with the PP2A-B56 binding motif. We believe this new data strengthens our manuscript because it argues strongly for an important functional relationship between PLK1 and PP2A. A new figure containing this evolutionary analysis will be included in the final version.

      Reviewer #3

      Major comments:

      1. An important limitation of this study is that KNL1 dephosphorylation at MELT repeats is monitored only by indirect immunofluorescence using phospho-specific antibodies. Thus, reduction of phospho-KNL1 kinetochore signals could be due to protein turnover at kinetochores, rather than to dephosphorylation. This is a serious issue that could be addressed by checking KNL1 dephosphorylation during time course experiments by western blot using phospho-specific antibodies, as previously done (Espert et al., 2014).

      Response: This is an important point that we feel is best addressed by examining total KNL1 levels at kinetochores (instead of simply total cellular levels by western blots). The reason is that KNL1 could potentially still be lost from kinetochores even if the total protein is not degraded. In all experiments involving YFP-KNL1 we observe no change in kinetochore KNL1 levels and this data will be included in the final version. We will also perform new experiments to examine total KNL1 levels in the BUBR1-WT/DPP2A situation to test whether KNL1 kinetochore levels are similarly maintained in these cells following MPS1 inhibition.

      1. For obvious technical reasons, the shortest time point at which authors compare KNL1 dephosphorylation upon MPS1-PLK1 inhibition is 5 minutes. Based on immunofluorescence data, authors conclude that kinetics of KNL1 dephosphorylation are similar when kinases are inhibited, independent of whether or not kinetochore-bound phosphatases are active. However, in most experiments (e.g. Fig. 3B, 3C, 3E) lower levels of MELT phosphorylation are detected after 5 minutes of kinase inhibition when phosphatases are present than when they are absent, suggesting that phosphatases likely do contribute to KNL1 dephosphorylation. I suspect that differences between the presence and absence of phosphatases might even be more obvious if authors were to look at shorter time points, when phosphatases conceivably accomplish their function. I would therefore suggest that the authors tone down their conclusions, as their data complement but do not disprove the previous model.

      Response: We appreciate that small differences can be seen in figure 3B and 3E at the 5-minute timepoint (between the WT and phosphatase inhibited situations). This may reflect a role for the phosphatases in dephosphorylation or in the ability of drugs such as BI-2536 (3B) or Calyculin A (3E) to fully inhibit their targets in the short timeframe. We will perform additional experiments to examine MPS1 and phosphatase activity under these conditions, in response to comments by reviewers 1 and 2. In the final version we will carefully interpret the new and existing data and, if required, modify the conclusions appropriately.

      1. In all experiments cells are kept mitotically arrested through nocodazole treatment, which is not quite a physiological condition to study SAC silencing. This could potentially mask the real contribution of phosphatases in MELT dephosphorylation. Indeed, it is possible that higher amounts of phosphatases are recruited to kinetochores during SAC silencing than during SAC signalling (e.g. during SAC signalling Aurora B phosphorylates the RVSF motif of KNL1 to keep PP1 binding at low levels; Liu et al., 2010). What would happen in a nocodazole wash-out? Would phosphatases be dispensable in these conditions for normal kinetics of MELT dephosphorylation and anaphase onset if PLK1 is inhibited?

      Response: All SAC silencing assays where performed in nocodazole for 2 main reasons: 1) PP2A-B56, PP1 or PLK1 can all regulate kinetochore-microtubule attachments, and thereby control the SAC indirectly. Therefore, performing our assays in the absence of microtubules allows us to make specific and direct conclusions about SAC regulation; 2) Previous work on pMELT regulation by PP1/PP2A in human cells was also performed following MPS1 inhibition in nocodazole (Espert et al 2014, Nijenhuis et al, 2014). Therefore, we are able to directly compare the contribution of PLK1 to the previously observed phenotypes, which allowed us to conclude that PLK1 has a major influence. Nevertheless, we appreciate the point that the influence of PLK1 could, in theory, be different during a normal mitosis when microtubule attachment can form. Therefore, we will attempt to address whether PLK1 inhibition can bypass a requirement for PP1/PP2A in SAC silencing during an unperturbed mitosis.

      Other data are overinterpreted. For instance, the evidence that CDK1-dependent phosphorylation sites in Bub1 and BubR1 is enhanced when PP1 and PP2A-B56 are absent at kinetochores suggests but does not "demonstrate that PP1-KNL1 and BUBR1-bound PP2A-B56 antagonise PLK1 recruitment to the BUB complex by dephosphorylating key CDK1 phosphorylation sites on BUBR1 (pT620) and BUB1 (pT609)(Figure 1F)". Similarly, the claim "when kinetochore phosphatase recruitment is inhibited, PLK1 becomes capable of supporting the SAC independently" referred to Fig. 2C-D is an overstatement, as residual MPS1 kinase could be still active in the presence of the AZ-3146 inhibitor.

      Response: These are good points and the indicated statements will be reworded.

      Minor comments:

      1. In many graphs (Fig. 1A-C, Fig. 2A,C) relative kinetochore intensities are quantified over "CENPC or YFP-KNL1". Authors should clarify when it is one versus the other.

      Response: This will be clarified in the axis and in the methods.

      1. The drawing in Fig. 1F depicts the action of PP1 and PP2A-B56 in antagonising PLK1 at kinetochores. Thus, the output should be SAC silencing, rather than activation.

      Response: The SAC symbol will be removed from the schematic to avoid confusion and because it is not actually the focus of figure 1 anyway.

      1. In the Discussion authors speculate that KNL1 dephosphorylation relies on a constitutive phosphatase with unregulated basal activity. Would a phosphatase be needed at all when MPS1 and PLK1 are inhibited? Could phosphorylated KNL1 be actively degraded?

      Response: We will insert total KNL1 immunofluorescence quantification so show that KNL1 KT levels are not decreased in this situation. KNL1 remains anchored at kinetochore but the MELTs must be dephosphorylated to remove the BUB complex.

      1. What happens to MPS1 when KNL1-bound PP1 and BUBR1-bound PP2A are absent? Do its kinetochore levels increase as observed for PLK1? And what about the kinetochore levels of Bub1 and BubR1?

      Response: We have demonstrated previously that BUB1/BUBR1 increase in this situation in line with the pMELTs (Nijenhuis et al 2014;l Smith et al, 2019) – these papers will be referenced in relation to this. We will also address the effect of phosphatase removal on MPS1 activity, in response to comments by reviewers 1 and 2.

    1. Michelle brings about a great point in how photography has become a book of scenes. We look back and see photographs and remember the times that we had past. We look at experiences we went through and times that have changed for the better. Michelle says, “Pieces of who we are through time. I agree with that I look through pictures and it reminds me of times in my life when I wasn't the person I wanted to be”. I agree that pictures are pieces of us that are expressed through time. As Michelle says that now in this time she does not want to hide herself anymore. That’s what pictures really are you if you think about it. They hide our true selves and she no longer wants to be that person anymore. “They want you to buy into their reality and it can be just be a facade”, Michelle says. I love this quote because people can shame you. They can act like their life might be better based on a photo. A photograph can be a false photograph. People can easily manipulate people into thinking that’s the way they live. Little do people know it can be a fantasy and not a reality. Not saying all pictures are false because I would be lying if this was true. I’m just saying that pictures can be easily a false photograph that may or may not be true. Michelle explains that a photograph explains how something did exist. This is also true because whether it is in the past or not, it is something that did happen and now is part of the past.

    1. Resources on Design Thinking in Different Industries不同行业的设计思维资源 Since we know you come from many industries, we wanted to provide some industry-specific optional readings for you. Here are some resources for design thinking in a variety of industries you may want to explore.因为我们知道你来自许多行业,我们想为你提供一些行业特定的可选读物。 这里有一些你可能想要探索的各种行业的设计思维的资源。 Education教育 "Design Thinking for Educators 教育工作者的设计思维" from IDEO 来自 IDEO "Design Thinking in Education 教育中的设计思维" from Harvard University 来自哈佛大学 "Design Thinking in Pedagogy 教育学中的设计思维" by Ineta Luka 作者: Ineta Luka "Design and Design Thinking in Business and Management Higher Education 工商管理类高等教育中的设计与设计思维" by Judy Matthews and Cara Wrigley 作者: Judy Matthews and Cara Wrigley Healthcare医疗 The Institute of Healthcare Design Thinking 医疗保健设计思维研究所 website 网站 "Design Thinking in Health Care: Ear Wax, Hemolysis, and Other Opportunities 保健中的设计思维: 耳垢、溶血和其他机会'' by Benjamin Doolittle, MD 本杰明杜利特尔医学博士 "Design Can Improve Healthcare; Can it Also Lead to New Cures? 设计可以改善医疗保健,也可以带来新疗法吗?" by David A. Shaywitz 作者: David a. Shaywitz "Design Thinking for Doctors and Nurses 医护人员的设计思维" by Amitha Kalaichandran 作者: Amitha Kalaichandran Government政府 "Design Thinking: The Answer to the Impasse Between Innovation and Regulation 设计思维: 创新与规制僵局的出路" by Alice Armitage, Andrew K. Cordova, and Rebecca Siegel 作者: Alice Armitage,Andrew k. Cordova,Rebecca Siegel "Design Thinking for Government Services: What Happens When the Past Limits our Vision of the Future? 政府服务的设计思维: 当过去限制我们对未来的展望时会发生什么?" by Arturo Muente-Kunigami 作者: Arturo Muente-Kunigami "Managers as Designers in Local Government 地方政府中的设计师管理者" by Lancing Farrell 作者: Lancing Farrell Libraries and Museums图书馆及博物馆 "Design Thinking: Librarians Are Incorporating it Into Their Practice “设计思维: 图书馆员将其融入实践" by Steven Bell 作者: Steven Bell "Critiques Help Us Think Critically about Design Thinking 批判帮助我们对设计思维进行批判性思考" by Steven Bell 作者: Steven Bell Design Thinking for Libraries 图书馆的设计思维 website 网站 Design Thinking for Museums 博物馆的设计思维 website 网站 "Human Centered Design 以人为本的设计" from Derby Museums 来自德比博物馆 Human Resources人力资源 "HR and the Modern Workplace: Using Design Thinking to Create Successful Digital Transformation 人力资源与现代工作场所: 用设计思维创造成功的数字化转型" by Caterina Sanders 作者: Caterina Sanders "How Design Thinking is Helping HR Create Engaging Employee Experiences 设计思维如何帮助人力资源创造有吸引力的员工体验" by Linda Naiman 作者: Linda Naiman "Design Thinking: Crafting the Employee Experience 设计思维: 打造员工体验" by Josh Bersin, Marc Solow, and Nicky Wakefield 作者: Josh Bersin,Marc Solow,Nicky Wakefield Management管理 "Why Managers Should Consider Adopting a Design Thinking Approach 为什么管理者应该考虑采用设计思维方法" by Nicole Ferrer 作者: Nicole Ferrer "Managers as Designers in Local Government 地方政府中的设计师管理者" by Lancing Farrell 作者: Lancing Farrell "Creating Breakthrough Innovations Through Design with Big and Small Data Analysis 利用大小数据分析进行设计创新" By Soren Petersen 作者: 索伦 · 彼得森 "An Introduction to Design Thinking for Innovation Managers 创新管理者的设计思维导论" by Paul Hobcraft 作者: Paul Hobcraft Service Design服务设计 "Service Design Thinking - The Next Frontier of a Great Workplace Experience 服务设计思维——伟大工作体验的下一个前沿" from the International Service System (ISS) Group ” ,由国际服务体系小组提供 "The Principles of Service Design Thinking - Building Better Services 服务设计思维原则——营造更好的服务" from the Interaction Design Foundation 来自交互设计基金会 "Service Design 101 服务设计101" by Sarah Gibbons 作者: Sarah Gibbons "6 Principles of Service Design to Help You Reach Your Customers 6个服务设计原则帮助你接触你的客户" by Maria Hayhow

      Design thinking 在不同领域的应用。

    1. Before the end, one began to pray to it; inherited instinct taught the natural expression of man before silent and infinite force

      This passage struck me differently because of the allusion of machinery as something that should be praised. If you think about it there is some truth to it. While we may not openly worship the technology we have, we definitely rely on it enough. Theres a resemblance of reliability that is apparent in technology that hasn't been discussed much before.

    1. information is much more widely avail-able from people who have strong political, economic, religious, or ideological stances that profoundly influence the nature of the information they present to others. As a result, we must assist students to become more critical consumers of the information they encounter

      Wow, the internet is such a powerful tool when you think about it, it can be used for many reasons, which is also a reason why its important to teach students about information they may encounter

    1. "(It) could take six months, a year, two years, I don't know, but we can't really wait that long for Chantelle," he said, fighting back tears. "We've got to get it sooner."

      This catches my attention as it is very unfortunate that a Mother and Father know that there is a solution to their daughters crisis and they are unable to get it due to the rules in Canada, I do understand all of the precautions but I could only imagine what the family is feeling. I like how the Father has brought it to social media to try and spread awareness. We are so lucky as Canadians to have free healthcare that you would think they would want to act on this fast and get it into the country. They even made a short film on Cystic-fibrosis and it blew up and received many awards, this is a very strong subject that a lot of people are diagnosed with, so the fact they may have found a cure is amazing. I would like to know if any additional personnel has been contacted based off of Chantelle's story and if anyone has reached out to the family with helpful details or assistance. I really feel this story should be shared as Chantelle is still in the hospital.

    1. We make and use a lot of stuff—and stuffmatters.

      This reminded me of the part in the podcast where Dash mentions that in his mind computers are a tool to create, not consume. This was a very interesting statement because most people see technology as a commodity that is good to get our needs met, but not all of us see technology as something used to build more things. This makes me think that some of us may appear entitled to this technology and the commodities it gives, without taking into consideration the amount of work that is put into making such technologies possible. I think when it comes to technology and ethics it is important to understand everything that goes on behind the scenes when creating new technology instead of only seeing what is obvious and right in front of us. We need to dig deeper.

  4. Jan 2020
    1. Understand is that critical piece – it’s the set of skills that help us comprehend, contextualize, and critically evaluate digital media so that we can make informed decisions about what we do and encounter online. These are the essential skills that we need to start teaching our kids as soon as they go online.

      I think this is huge because the youth for the most part knows how to navigate the web. But actually understanding and forming ideas form a post or something they may not fully understand. Everything on the web isnt true so I think it is huge for them to actually understand and recognize things on the web.

    1. This is certainly something we will need to grapple with collectively as we struggle to find the right balance between ensuring the protection and well-being of individuals while maintaining liberty and independence.

      Good conclusion, but I think you could re-write this to be more concise. Using both liberty and independence may be a little redundant.

    1. the phenomenal form

      In Fowkes, the 'form of appearance' or the Erscheinungsform.

      Exchange value is the 'form of appearance' of something contained in it, yet distinguishable from it--this 'third thing' will turn out to be 'socially necessary labor time'.

      Book Two of Hegel's Science of Logic, the Doctrine of Essence, begins with a chapter on 'Der Schein,' which appears in A.V. Miller's translation as "Illusory Being" (Hegel, Science of Logic, trans. by A.V. Miller, pp. 393-408).

      Here, Hegel describes "schein" as "reflected immediacy, that is immediacy which is only by means of its negation and which when contrasted with its mediation is nothing but the empty determination of the immediacy of negated determinate being," (p. 396).

      Hegel goes on to remark that "Schein" is "the phenomenon [Phänomen] of skepticism, and the Appearance [Erscheinung] of idealism," (p. 396).

      In describing exchange value as the 'Erscheinungsform' of 'something contained in it, yet distinguishable from it'--which will be labor--Marx is clearly flirting with the terminology surrounding "Illusory Being" in the Science of Logic, which suggests labor as the 'thing-in-itself' of the exchange value. Exchange-value is the reflected immediacy that conceals the congealed labor that it is its essence.

      The passage as a whole is suggestive of how exchange value will wend its way through Marx's demonstration, unfolding from itself determinations of itself.

      Before presenting a long, difficult quotation from Hegel, I think the most straightforward way to present this reference to Hegel is to say present the argument as follows:

      In Kantian idealism, we find that the 'thing-in-itself' cannot become an object of knowledge; consciousness only ever has immediate access to the form of appearance, the 'sensible form' of a 'thing-in-itself' which never presents itself to consciousness. In referring to the value form as the 'form of appearance' of something else which does not appear, Marx is saying that just as idealism subordinates the objectivity of the world to its appearance for consciousness, exchange-value represents immediately an essence that it suppresses, and implicitly, denies the possibility of knowledge of this essence.

      Hegel writes, "Skepticism did not permit itself to say 'It is'; modern idealism did not permit itself to regard knowledge as a knowing of the thing-in-itself; the illusory being of skepticism was supposed to lack any foundation of being, and in idealism the thing-in-itself was not supposed to enter into knowledge. But at the same time, skepticism admitted a multitude of determinations of its illusory being, or rather its illusory being had for content the entire manifold wealth of the world. In idealism, too, Appearance [Erscheinung] embraces within itself the range of these manifold determinateness. This illusory being and this Appearance are immediately thus manifoldly determined. This content, therefore, may well have no being, no thing or thing-in-itself at its base; it remains on its own account as it is; the content has only been transferred from being into an illusory being, so that the latter has within itself those manifold determinateness, which are immediate, simply affirmative, and mutually related as others. Illusory being is, therefore, itself immediately determinate. It can have this or that content; whatever content it has, illusory being does not posit this itself but has it immediately. The various forms of idealism, Leibnizian, Kantian, Fichtean, and others, have not advanced beyond being as determinateness, have not advanced beyond this immediacy, any more than skepticism did. Skepticism permits the content of its illusory being to be given to it; whatever content it is supposed to have, for skepticism it is immediate. The monad of Leibniz evolves its ideas and representations out of itself; but it is not the power that generates and binds them together, rather do they arise in the monad like bubbles; they are indifferent and immediate over against one another and the same in relation to the monad itself. Similarly, the Kantian Appearance [Erscheinung] is a given content of perception; it presupposes affections, determinations of the subject, which are immediately relatively to themselves and to the subject. It may well be that the infinite obstacle of Fichte's idealism has no underlying thing-in-itself, so that it becomes purely a determinateness in the ego; but for the ego, this determinateness which it appropriates and whose externality it sublates is at the same time immediate, a limitation of the ego, which it can transcend but which has in it an element of indifference, so that although the limitation is in the ego, it contains an immediate non-being of the ego." (p. 396-397).

      In Lenin's notebooks on Hegel's Science of Logic, these sections provoke a considerable degree of excitement. Lenin's 'Conspectus of Hegel's Science of Logic' can be accessed via Marxists.org here:

      https://www.marxists.org/archive/lenin/works/1914/cons-logic/ch02.htm

    1. Every couple of years, mainstream media hacks pretend to have just discovered libertarianism as some sort of radical, new and dynamic force in American politics. It’s a rehash that goes back decades, and hacks love it because it’s easy to write, and because it’s such a non-threatening “radical” politics (unlike radical left politics, which threatens the rich). The latest version involves a summer-long pundit debate in the pages of the New York Times, Reason magazine and elsewhere over so-called “libertarian populism.” It doesn’t really matter whose arguments prevail, so long as no one questions where libertarianism came from or why we’re defining libertarianism as anything but a big business public relations campaign, the winner in this debate is Libertarianism. Pull up libertarianism’s floorboards, look beneath the surface into the big business PR campaign’s early years, and there you’ll start to get a sense of its purpose, its funders, and the PR hucksters who brought the peculiar political strain of American libertarianism into being — beginning with the libertarian movement’s founding father, Milton Friedman. Back in 1950, the House of Representatives held hearings on illegal lobbying activities and exposed both Friedman and the earliest libertarian think-tank outfit as a front for business lobbyists. Those hearings have been largely forgotten, in part because we’re too busy arguing over the finer points of “libertarian populism.” Milton Friedman. In his early days, before millions were spent on burnishing his reputation, Friedman worked as a business lobby shill, a propagandist who would say whatever he was paid to say. That's the story we need to revisit to get to the bottom of the modern American libertarian "movement," to see what it's really all about. We need to take a trip back to the post-war years, and to the largely forgotten Buchanan Committee hearings on illegal lobbying activities, led by a pro-labor Democrat from Pennsylvania, Frank Buchanan. What the Buchanan Committee discovered was that in 1946, Milton Friedman and his U Chicago cohort George Stigler arranged an under-the-table deal with a Washington lobbying executive to pump out covert propaganda for the national real estate lobby in exchange for a hefty payout, the terms of which were never meant to be released to the public. They also discovered that a lobbying outfit which is today credited by libertarians as the movement’s first think-tank — the Foundation for Economic Education — was itself a big business PR project backed by the largest corporations and lobbying fronts in the country. It starts just after the end of World War Two, when America’s industrial and financial giants, fattened up from war profits, established a new lobbying front group called the Foundation for Economic Education (FEE) that focused on promoting a new pro-business ideology—which it called “libertarianism”— to supplement other business lobbying groups which focused on specific policies and legislation. The FEE is generally regarded as “the first libertarian think-tank” as Reason’s Brian Doherty calls it in his book “Radicals For Capitalism: A Freewheeling History of the Modern Libertarian Movement” (2007). As the Buchanan Committee discovered, the Foundation for Economic Education was the best-funded conservative lobbying outfit ever known up to that time, sponsored by a Who’s Who of US industry in 1946. A partial list of FEE’s original donors in its first four years— a list discovered by the Buchanan Committee — includes: The Big Three auto makers GM, Chrysler and Ford; top oil majors including Gulf Oil, Standard Oil, and Sun Oil; major steel producers US Steel, National Steel, Republic Steel; major retailers including Montgomery Ward, Marshall Field and Sears; chemicals majors Monsanto and DuPont; and other Fortune 500 corporations including General Electric, Merrill Lynch, Eli Lilly, BF Goodrich, ConEd, and more. The FEE was set up by a longtime US Chamber of Commerce executive named Leonard Read, together with Donaldson Brown, a director in the National Association of Manufacturers lobby group and board member at DuPont and General Motors. That is how libertarianism in America started: As an arm of big business lobbying. Before bringing back Milton Friedman into the picture, this needs to be repeated again: “Libertarianism” was a project of the corporate lobby world, launched as a big business “ideology” in 1946 by The US Chamber of Commerce and the National Association of Manufacturers. The FEE’s board included the future founder of the John Birch Society, Robert Welch; the most powerful figure in the Mormon church at that time, J Reuben Clark, a frothing racist and anti-Semite after whom BYU named its law school; and United Fruit president Herb Cornuelle. The purpose of the FEE — and libertarianism, as it was originally created — was to supplement big business lobbying with a pseudo-intellectual, pseudo-economics rationale to back up its policy and legislative attacks on labor and government regulations. This background is important in the Milton Friedman story because Friedman is a founding father of libertarianism, and because the corrupt lobbying deal he was busted playing a part in was arranged through the Foundation for Economic Education. According to Congressional hearings on illegal lobbying activities 1946 was the year that Milton Friedman and his U Chicago cohort George Stigler arranged an under-the-table deal with a Washington lobbying executive to pump out covert propaganda for the national real estate lobby in exchange for a hefty payout, the terms of which were never meant to be released to the public. The arrangement between Friedman and Stigler with the Washington real estate lobbyist was finally revealed during a congressional review of illegal lobbying activities in 1950, called the Buchanan Committee. Yes, there was something called accountability back then. I only came across the revelations about Friedman’s sordid beginnings in the footnotes of an old book on the history of lobbying by former Newsweek book editor Karl Schriftgiesser, published in 1951, shortly after the Buchanan Committee hearings ended. The actual details of Milton Friedman’s PR deal are sordid and familiar, with tentacles reaching into our ideologically rotted-out era. False, whitewashed history is as much a part of the Milton Friedman mythology as it is the libertarian movement’s own airbrushed history about its origins; the 1950 Buchanan Committee hearings expose both as creations of big business lobby groups whose purpose is to deceive and defraud the public and legislators in order to advance the cause of corporate America. The story starts like this: In 1946, Herbert Nelson was the chief lobbyist and executive vice president for the National Association of Real Estate Boards, and one of the highest paid lobbyists in the nation. Mr. Nelson’s real estate constituency was unhappy with rent control laws that Truman kept in effect after the war ended. Nelson and his real estate lobby led what House investigators discovered was the most formidable and best-funded opposition to President Truman in the post-war years, amassing some $5,000,000 for their lobby efforts—that’s $5mln in 1946 dollars, or roughly $60 million in 2012 dollars. So Herbert Nelson contracted out the PR services of the Foundation for Economic Education to concoct “third party” propaganda designed to shore up the National Real Estate lobby’s legislative drive — and the propagandists who took on the job were Milton Friedman and his U Chicago cohort, George Stigler. To understand the sort of person Herbert Nelson was, here is a letter he wrote in 1949 that Congressional investigators discovered and recorded: "I do not believe in democracy. I think it stinks. I don’t think anybody except direct taxpayers should be allowed to vote. I don’t believe women should be allowed to vote at all. Ever since they started, our public affairs have been in a worse mess than ever." It’s an old libertarian mantra, libertarianism versus democracy, libertarianism versus women’s suffrage; a position most recently repeated by billionaire libertarian Peter Thiel — who was Ron Paul’s main campaign funder in his 2012 presidential campaign. So in 1946, this same Herbert Nelson turned to the Foundation for Economic Education to manufacture some propaganda to help the National Association of Real Estate Boards fight rent control laws. Nelson chose to work with the FEE because he knew that the founder of the first libertarian think-tank, Leonard Read, agreed with him on a lot of important issues. Such as their mutual contempt for democracy, and their disdain for the American public. Leonard Read, the legendary (among libertarians) founder/head of the FEE, argued that the public should not be allowed to know which corporations donated to his libertarian front-group because, he argued, the public could not be trusted to make “sound judgments” with disclosed information: "The public reporting would present a single fact—the amount of a contributor’s donation—to casual readers, persons having only a cursory interest in the matter at issue, persons who would not and perhaps could not possess all the facts. These folks of the so-called public thus receive only oversimplifications or half-truths from which only erroneous conclusions are almost certain to be drawn. If there is a public interest in the rightness or wrongness of corporate or personal donations to charitable, religious or education institutions, and I am not at all ready to concede that there is, then that interest should be guarded by some such agency as the Bureau of Internal Revenue, an agency that is in a position to obtain all the facts, not by Mr. John Public who lacks relevant information for the forming of sound judgments…Public reporting of a half-truth is indeed a significant provocation." So in May 1946, Herbert Nelson of the Real Estate lobby, looking for backup in his drive to abolish federal rent control laws on behalf of landlords, contacted libertarian founder Leonard Read of the FEE with an order for a PR pamphlet “with some such title as ‘The Case against Federal Real Estate Control’,” according to Karl Schriftgiesser’s book The Lobbyists. What happened next, I’ll quote from Schriftgiesser: "They were now busily co-operating on the new project which the foundation had engaged Milton Friedman and George J. Stigler to write. It was to be called Roofs and Ceilings and it was to be an outright attack on rent controls. When Nelson received a copy of the manuscript he wrote Read to say, “The pamphlet…is a dandy. It is just what I wanted." The National Association of Real Estate Boards was so pleased with Milton Friedman’s made-to-order propaganda that they ordered up 500,000 pamphlets from the FEE, and distributed them throughout the real estate lobby’s vast local network of real estate brokers and agents. In libertarianism’s own airbrushed history about itself, the Foundation for Economic Education was a brave, quixotic bastion of libertarian “true believers” doomed to defeat at the all-powerful hands of the liberal Keynsian Leviathan and the collectivist mob. Here is how libertarian historian Brian Doherty describes the FEE and its chief lobbyist Leonard Read: "[Read] would never explicitly scrape for funds… He never directly asked anyone to give anything, he proudly insisted, and while FEE would sell literature to all comers, it was also free to anyone who asked. His attitude toward money was Zen, sometimes hilariously so. When asked how FEE was doing financially, his favorite reply was, “Just perfectly.”… Read wanted no endowments and frowned on any donation meant to be held in reserve for some future need." And here is what the committee’s own findings reported—findings lost in history: "It is difficult to avoid the conclusion that the Foundation for Economic Education exerts, or at least expects to exert, a considerable influence on national legislative policy….It is equally difficult to imagine that the nation’s largest corporations would subsidize the entire venture if they did not anticipate that it would pay solid, long-range legislative dividends." Or in the words of Rep. Carl Albert (D-OK): "Every bit of this literature is along propaganda lines." The manufactured history about libertarian’s origins, or its purpose, parallels the manufactured myths about one of big business’s key propaganda tools, Milton Friedman. As the author of The Lobbyists, not knowing who Milton Friedman was at the time, wrote of Friedman’s collaborative effort with Stigler: “Certainly [the FEE’s] booklet, Roofs or Ceilings, was definitely propaganda and sought to influence legislation….This booklet was printed in bulk by the foundation and half a million copies were sold at cost to the National Association of Real Estate Boards, which had them widely distributed throughout the country by its far-flung network of local member boards.” There's no idealism here. The notion that libertarian ideas have captured the political imagination of millions in this country is a root problem: if we're going to escape the corporate oligarchy that is running this country–their ideas can't possibility be the alternative solution. This movement has to be recognized for what it is.

      Standard smear piece from a subhuman lefty that want to control people. They'll never be taken seriously since their ideology is dependent on violence and being an entitled little shit.

    1. Essential questions about our humanity, even questions of meaning, once mostly the province of the humanities, are now part of scientific research.

      While I understand the appeal of ring someone who can both do the research and discover the questions that need to be asked, I can't help but question the logic of eliminating the people who may be able to ask better questions. I don't think we should spread people so thin.

      When I was in Chemistry 1 alongside people who would one day graduate as engineers and scientists, the running joke was "it doesn't matter how bad my report is, everyone knows engineers can't write." The professors did their best to encourage good writing habits, but their lectures fell on deaf ears, and some of their misguided attempts to instruct me on writing led to an awful habit of passive-voice that I still struggle to eliminate. The idea of eradicating humanities majors in favor of these students, without proper instruction, makes me shudder.

    2. We define ourselves through our cell phones and think of scenarios where we will be different, part human part machine, with some scientists even speculating that a singularity point will be reached when machines will become smarter than we are.

      The humanities aspect of this is extremely important to have alongside science because as the world reaches this singularity point, we have to ask ourselves what makes us inherently human. Why and how are we different from machines, and what is the importance of the human soul? If the conversation strays too far away from the human aspect of the human condition, we can lose ourselves in these technological advances. Machines may become smarter than we are, but what about emotional intelligence?

    1. Within the "Frequently Asked Questions" section on gojo.com, the agency noted the company says that "Purell Healthcare Advanced Hand Sanitizers, which are formulated with ethyl alcohol, may be effective against viruses such as the Ebola virus, norovirus, and influenza."

      "...may be effective against viruses such as the Ebola virus, norovirus, and influenza." I automatically think that if this stuff was that good we would be rubbing it everywhere! Heck, ship out boxes of the stuff to countries who do not have as good a healthcare system as we do. It will cure all! lol

    1. He demonstrated that persons may have power and high position and yet be deeply confused and irrational. He established the importance of asking deep questions that probe profoundly into thinking before we accept ideas as worthy of belief.

      I believe that many people demonstrate this type of critical thinking. Sometimes when you have authority over a company you can be completely confused and irrational and that can be caused by many things. By asking himself deep question can be a method of him trying to think more critically.

  5. student.masteryconnect.com student.masteryconnect.com
    1. annoyances; irritationsmysteries; secreciesproblems; sicknessessymptoms; signsWhich sentence states a central idea of paragraphs 17-20?California almond farmers rotate their crops between almonds and grasslands in order to utilize rented bee colonies to pollinate their plants and almonds.Scientists at the USGS studied summertime land use in North Dakota, South Dakota, and Minnesota to determine whether or not rented apiaries were beneficial to California almonds.Scientists have found that land converted from grasslands to row crops resulted in smaller and less profitable bee colonies, which in turn affected the almond crop in California.The profitability of the beekeeping industry is a direct result of careful observation by local scientists, the results of which affect state and federal land-use laws and practices.How does the author use structure to support the idea that bees require specific diets?by providing the cause and effect process of how bees are nourished by apiariesby using description and analogy to show how a limited human diet has health consequencesby comparing and contrasting the specific nutritional makeup of different types of available plants and pollen by explaining the problems associated with certain types of plants and solutions for how to plant more nutritious grasses for beesWhich claim lacks evidence in the passage to support it?“…critical honey bee and wild bee populations in the United States have been declining in recent years, creating concern about the future security of pollination services for agricultural crops.” (paragraph 3)“Originally imported from Europe in the 17th century, honey bees are essential to maintaining food production in North America today.” (paragraph 5)“Honey bees in the Northern Great Plains are of critical importance to the commercial beekeeping industry and to the diversity of U.S. crops.” (paragraph 10)“While the importance of a healthy pollinator population to agriculture is clear, pollinators are just as important to sustaining functioning ecosystems and food supplies for wildlife.” (paragraph 21)What is the meaning of the word jeeringly as it is used in paragraph 3? with ignorance; unknowinglywith embarrassment; quietlywith ease; simplywith disdain; insultinglyPart A What is a theme of the passage? Participating in team sports is an important part of childhood.One should not judge another by his or her outer appearance.New students should be treated with kindness and respect.Sometimes friends disagree about important matters.Part B Which quotation from the passage supports the answer in Part A? “‘Plenty of fellows, apparently,’ answered the third member of the group, Wall Clausen, hurrying to prevent the threatening quarrel.” (paragraph 11)“Some sixty boys, varying in age from fifteen to nineteen, some clothed in full football pads, some wearing the ordinary dress…all laughing or talking with high spirits were standing around the field.” (paragraph 19)“He stepped back, balancing the ball in his right hand, took a long stride forward, swung his right leg in a wide arc, dropped the ball, and sent it sailing down the field toward the distant goal. A murmur of applause took the place of sarcastic laughter…” (paragraph 33)“‘Yes, that’s pretty fair. Some day with hard practice you may make a kicker. What class are you in?’” (paragraph 34)Read the sentences from paragraphs 4 and 30.The subject of their mocking remarks, although standing a short distance away, apparently heard none of them. (paragraph 4) Several audible remarks were made, none of them at all flattering to the subject of them; but if the boy heard them he made no sign but accepted the ball from Blair without fumbling it, much to the surprise of the onlookers. (paragraph 30)Based on the sentences, which words describe Joel March?dismayed; hurtfocused; composedthoughtful; reflectiveunfriendly; detachedHow does paragraph 19 contribute to the plot?It suggests that some of the boys were more suited to trying out than others.It explains the importance of preparedness when playing an activity such as football.It develops the contrast between the crowd of excited boys and the isolated and quiet new student. It illustrates the idea that Bart Cloud wants to exclude Otto West from tryouts just as he wants to exclude the new student.How does Joel March respond to football tryouts?He is nervous and afraid to join the group.He is calm and wants to show off his skills.He is arrogant and embarrasses the others.He is comfortable and makes friends easily.Read paragraph 23. Blair, suppressing a smile of amusement as he looked the applicant over, asked: “Ever played football?” How does the paragraph convey Wesley Blair’s feelings?  Wesley Blair is excited to have such a tall player try out for football.Wesley Blair feels pleased and honored to have a player ask for help.Wesley Blair is surprised and entertained by Joel March’s appearance.Wesley Blair feels Joel March is tricking him by pretending to know how to play football.How does the contrast between lines 49-52 and lines 69-72 contribute to the poem’s theme?The contrast suggests that being happy is a matter of priorities.The contrast suggests that one must find happiness in others.The contrast suggests that there are many paths to happiness.The contrast suggests that happiness is found in tasks accomplished.What does the poet mean by saying “the sad panorama of human woes/Passed daily under his eyes” in lines 63-64?The king looked down upon his miserable subjects.The king saw beggars passing by on the street. The king heard an overview of the sorrows of his people.The king was upset that his couriers found no happy men.In lines 65-66, how do the words “ashamed,” “useless,” and “maladies hatched in gloom” impact the tone of the poem?by ending the poem with a serious toneby continuing the poem’s foolish toneby supporting the poem’s apologetic toneby transitioning to a critical tone to end the poemPart A How does the poet develop the narrator’s point of view? by contrasting the narrator’s thoughts with the king’s thoughtsby stating the narrator’s objective observationsby using figurative language to convey the narrator’s attitudeby using the narrator’s inner dialogue to propel the plotPart B Which set of lines from the poem supports the answer in Part A? “But he said he was sick, and a king should know, And doctors came by the score.” (lines 5-6)“The old sage said, ‘You’re as sound as a nut.’ ‘Lock him up,’ roared the King in a gale, —” (lines 21-22)“The King will be well, if he sleeps one night In the Shirt of a Happy Man.” (lines 27-28)“‘I would do it, kind sir’ and he roared with the fun, ‘But I haven’t a shirt to my back.’” (lines 59-60)For this item, select the answer from the drop-down menu. Read the sentence from paragraph 4. This treacherous stretch of river would later be known for wrecking boats and taking lives of unskilled pilots. Use the drop-down menu to choose the word that best replaces the word treacherous in the sentence This freezingperilousscenicuncharted stretch of river would later be known for wrecking boats and taking lives of unskilled pilots. Which two statements show how the direct quotations in paragraphs 4 and 6 impact the passage? They reveal Emma Kelly’s adventurous and fearless nature.They convey the importance of safety during Emma Kelly’s trips through dangerous waters.They illustrate Emma Kelly’s desire to participate in activities from which women were historically excluded. They explain why Emma Kelly needed help in her journey to the Klondike.They describe the threats and hazards with which Emma Kelly and her partners dealt on a daily basis.Read the sentence from paragraph 10.The newspapers in Kansas and Missouri were all abuzz about her return.What does the author mean by the phrase “all abuzz”?using loud machineryunconcerned and lightheartedsharing exciting informationangered or annoyedPart A Which statement summarizes the central idea of the passage? With the backing of wealthy financiers, Emma Kelly moved to the Klondike to help set up a mining operation during the Gold Rush.Emma Kelly’s dog, Klondike, rescued her after she fell from a cliff by barking and jumping to alert the men in her traveling group.Emma Kelly’s bold and daring personality helped her find success during the Klondike Gold Rush as a journalist and mine owner.With her background knowledge and skill on rapid waters, Emma Kelly proved to be an asset to her traveling group as they made their way to the Klondike.Part BHow does the author convey the central idea selected in Part A?by providing historic and current statistics and data to show Emma Kelly’s profits as a business womanby using anecdotes from other members of the traveling group to reveal Emma Kelly’s impressive rescueby using detailed descriptions and firsthand accounts to illustrate Emma Kelly’s experiencesby providing a list of Emma Kelly’s accomplishments on her journey northBased on the information in the passage, what is the meaning of headstrong in paragraph 11 to describe Emma Kelly? dependent; anxioushealthy; toughirresponsible; hastywillful; determinedIn paragraph 11, what does the author mean by the figurative language “break the mold of society”?disobey rules and lawsleave one’s hometown on an adventurestart doing things in a new waytake dangerous risks despite being warnedRead the paragraph. Miles was having trouble with a math homework problem, so he asked his dad for help. His dad could not figure it out, so they found a math video online. Luckily, he explained clearly how to solve the problem. Which underlined pronoun has an unclear or ambiguous antecedent? “his”“it”“they”“he”A student is writing an essay on audiobooks, which are recordings of books being read aloud. Read the claim.  Listening to audiobooks helps children become strong readers. Which source is least likely to agree with the claim?  a nonprofit organization that creates free audiobooks of classic children’s literaturea principal who writes a blog called Back to the Basics: Learning to Read by Readinga salesperson who sells audiobook downloads to school librariesa technology company that makes an educational application called ListenReadRead the sentence. The musicians ___________ greeted audience members at the door. Which word fits best in the blank?  himselfitselfthemselvesyourselfChoose two sentences in which pronouns are used correctly. Her and I plan to wear matching shirts tomorrow.We decided to throw a surprise party for he and his friend.Omar forgot him backpack at home this morning.My dad’s car was parked outside with its trunk open.I cannot tell your sisters apart because they look so much alike.Read the sentence. Many things are forbidden on this beach; _______________________. Which can be placed after the semicolon to complete the sentence? campfires, glass bottles, and petsthe restrictions are unpopular with residentswhich makes it a frustrating place to visitbut the lifeguards rarely enforce the rulesA student is writing an essay on eating sushi. Read the paragraph. Eating sushi is a healthy choice. Sushi is a Japanese dish made with rice mixed with vinegar and a variety of natural ingredients, such as vegetables and uncooked fish. The components of sushi offer many health benefits. Omega-3 fatty acids, which are found in sushi and other seafood, play an important role in brain function. The student has found information from different sources. Which piece of information supports the claim in the paragraph? Sauces are often used to mask the true taste of the sushi, especially when the fish is not fresh.Sushi is usually served with sides such as soy sauce, wasabi, and gari, which is sweet, pickled ginger root.Nutritionists advise avoiding the “spicy” versions of sushi rolls, which usually contain mayonnaise.Nori, the seaweed often used to wrap sushi rolls, is high in key nutrients, such as vitamin A and iodine.A student is writing a research paper. Read the research question. Research Question: Are field trips worthwhile in middle school? Which source is least likely to have a strong bias?  a pamphlet published by the education department of an art museuma webpage titled “A Focus on Academics: How to Reduce Wasted Instructional Time”a study by an educational research group about the effects of field trips on student learninga newspaper article titled “Field Trip Gives Students Hands-on Learning Experiences”Part A A student is writing a research report on honey and maple syrup. The student has learned that the difference between honey and maple syrup is that honey is made by bees that collect nectar from flowering plants. Maple syrup, on the other hand, is made by humans who boil down the sap of maple trees. Read the student’s introductory sentence. Honey is very different from maple syrup, and it is made by a completely different process. Which sentence revision uses precise language to explain the difference between honey and maple syrup most effectively? Two types of sweeteners, honey and maple syrup, are made by plants and animals and can be used to add sweetness to foods.Honey and maple syrup can be used to replace granulated sugar in baking, and both offer health benefits when compared to sugar.Bees make honey from the nectar of flowering plants, but people make maple syrup from the sap of maple trees.Honey is sweeter than maple syrup, but both work well to sweeten cereal, baked goods, or granola.Part B A student is writing a research report on honey and maple syrup. The student has learned that the difference between honey and maple syrup is that honey is made by bees that collect nectar from flowering plants. Maple syrup, on the other hand, is made by humans who boil down the sap of maple trees. Read the student’s introductory sentence. Honey is very different from maple syrup, and it is made by a completely different process. Which is the most credible source for the answer to Part A? My Questions (myquestions.com)—This is a website that has general answers to questions about a wide range of topics including food.Charley’s Corner (charleyscorner.com)—This is a website created by a retired school teacher who wanted to blog about topics that interested him.Where Food Comes From (foodnutrition.gov)—This is a government website that gives information about common foods.Val’s Baking Project (valsbakingproject.net)—This is a website created by a student who tested recipes with different sweeteners.Choose the sentence in which commas should be added.The customers were so pleased with the service that they left extra money for a tip.The Biltmore House the largest privately owned house in the U.S. is located in North Carolina.The streets were filled with people cheering for the runners in the annual city marathon.The referees making the call were unsure if the player’s foot had stepped over the line.Read the paragraph. While Marcia practiced her clarinet, her father accompanied her on the piano. When she made a mistake, ___ would slow down, patiently waiting for her to catch up and find her place in the music. Which pronoun belongs in the blank? heherhistheirRead the paragraph. The anglerfish is one of many ocean animals to use bioluminescence, which is an organism’s ability to produce its own light. Anglerfish live on the ocean’s floor, so their glow lights up the otherwise lightless abyss. Only the female anglerfish uses bioluminescence; the glow comes from a fishing rod-like extension that protrudes from its forehead. Choose the most logical question based on evidence from the paragraph.  What advantages does its glowing extension provide to an anglerfish?When and how did scientists first discover the anglerfish?How many different species of anglerfish live in the ocean?Do scientists think that anglerfish will be affected by climate change?A student is writing a research paper on lobster. Read the evidence. Until the late 1800s, lobster was fed to prisoners as a way to save money. In fact, lobsters were often called the “cockroaches of the sea.” By World War II, lobster had earned a reputation as a food for the wealthy. It was featured at expensive restaurants in New York City and Boston. Today, lobster is among the most expensive protein sources on the market. A single pound of lobster meat can cost $50 or more. Based on the evidence gathered, choose the most logical research question the student can use to frame the inquiry.  How does the nutrition of lobster compare to that of other foods?How did lobster come to be considered a delicacy?What animals are the closest relatives to lobsters?What techniques do people use to catch lobsters?Read the paragraph. Megan wanted to keep her favorite shirt, but it was missing two buttons. Her grandfather stopped her from throwing it into the garbage can, assuring her that it could be fixed. _____ repaired the shirt together by sewing on two new buttons. Which pronoun belongs in the blank? HeItTheyWePart A Read the paragraph. Three-dimensional (3-D) televisions peaked in popularity between 2010 and 2013. Experts believe the main reason for the technology’s decline was its cost; 3-D televisions were more expensive than their two-dimensional counterparts, and the equipment needed to experience 3-D television, such as 3-D glasses and a 3-Denabled Blu-ray disc player, only added to the cost. Consumers simply were not willing to spend the extra money. ___________, most 3-D television sets and services are no longer available. Which transitional phrase best  fits in the blank?  As a resultFor instanceIn particularOn the contraryPart B Which text structure is indicated by the transitional phrase chosen in Part A? cause/effectclassificationcompare/contrastdefinitionRead the paragraph. Fred Rogers was the host and creator of the children’s television program Mister Rogers’ Neighborhood. A character on Rogers’ show, Officer Clemmons, was among the first African American characters on children’s television. In one episode, Mister Rogers and Officer Clemmons conversed while soaking their feet in a shared kiddie pool. At the time this episode aired in 1969, some people in the country were fighting to keep public swimming pools segregated by race. Based on the paragraph, what conclusion can be drawn about Fred Rogers? Fred Rogers’ gentle voice and kind spirit led to his success in children’s television.Fred Rogers used his television program to share his beliefs about the world.Fred Rogers’ television program aired on public television for 31 seasons.Fred Rogers disliked television advertising that targeted children.PauseSaved:08:13 amGraham, TheronID: 722136of45Sort by:Needs GradingNumerical OrderStandardsAnswers6-RI.5.11 ptQuestion 110620201011010Multiple Choice Question6-RI.8.11 ptQuestion 210620201021010Multiple Choice Question6-RI.5.11 ptQuestion 310620201041110Multiple Choice Question6-RI.9.11 ptQuestion 410620201052310Cloze Dropdown6-RI.8.21 ptQuestion 510620201061012Multiple Choice Question6-RI.9.11 ptQuestion 610620201071010Multiple Choice Question6-RI.6.11 ptQuestion 710620201101010Multiple Choice QuestionNS6-RI.11.11 ptQuestion 810620201111012Multiple Choice QuestionNS6-RI.11.21 ptQuestion 910620201131010Multiple Choice QuestionNS6-RL.10.61 ptQuestion 1010620202011010Multiple Choice QuestionNS6-RL.6.11 ptQuestion 1110620202022410Multiple Choice QuestionNS6-RL.5.11 ptQuestion 1210620202022710Multiple Choice QuestionNS6-RL.9.21 ptQuestion 1310620202041010Multiple Choice QuestionNS6-RL.12.11 ptQuestion 1410620202061010Multiple Choice QuestionNS6-RL.8.11 ptQuestion 1510620202101010Multiple Choice QuestionNS6-RL.11.11 ptQuestion 1610620202111010Multiple Choice QuestionNS6-RL.12.11 ptQuestion 1710620203071010Multiple Choice QuestionNS6-RL.9.11 ptQuestion 1810620203091010Multiple Choice QuestionNS6-RL.9.21 ptQuestion 1910620203081010Multiple Choice QuestionNS6-RL.11.11 ptQuestion 2010620203102410Multiple Choice QuestionNS6-RL.5.11 ptQuestion 2110620203102710Multiple Choice QuestionNS6-RI.9.11 ptQuestion 2210620204012310Cloze DropdownNS6-RI.8.21 ptQuestion 2310620204021110Multiple Choice QuestionNS6-RI.8.11 ptQuestion 2410620204031010Multiple Choice QuestionNS6-RI.6.11 ptQuestion 2510620204052410Multiple Choice QuestionNS6-RI.11.11 ptQuestion 2610620204052710Multiple Choice QuestionNS6-RI.9.11 ptQuestion 2710620204061010Multiple Choice QuestionNS6-RI.8.11 ptQuestion 2810620204041010Multiple Choice QuestionNS6-W.4.1.d1 ptQuestion 2910620200011010Multiple Choice QuestionNS6-I.3.31 ptQuestion 3010620200021010Multiple Choice QuestionNS6-W.4.11 ptQuestion 3110620200031010Multiple Choice QuestionNS6-W.4.1.a1 ptQuestion 3210620200041110Multiple Choice QuestionNS6-W.5.21 ptQuestion 3310620200051010Multiple Choice QuestionNS6-I.3.41 ptQuestion 3410620200061010Multiple Choice QuestionNS6-I.3.31 ptQuestion 3510620200081010Multiple Choice QuestionNS6-W.2.11 ptQuestion 3610620100082410Multiple Choice QuestionNS6-W.2.11 ptQuestion 3710620100082710Multiple Choice QuestionNS6-W.5.21 ptQuestion 3810620200091010Multiple Choice QuestionNS6-W.4.1.c1 ptQuestion 3910620200101010Multiple Choice QuestionNS6-I.2.11 ptQuestion 4010620200111010Multiple Choice QuestionNS6-I.1.11 ptQuestion 4110620200121010Multiple Choice QuestionNS6-W.4.1.c1 ptQuestion 4210620200141010Multiple Choice QuestionNS6-W.2.1.j1 ptQuestion 4310620200132410Multiple Choice QuestionNS6-W.2.1.c1 ptQuestion 4410620200132710Multiple Choice QuestionNS6-I.2.11 ptQuestion 4510620200151010Multiple Choice QuestionNSFinishedDiscardFinishedDiscardSubmitting Answers…Hang tight while we submit your answers.StudentYou’re Finished! DoneLaunching Respondus…Launching Respondus Your browser isn’t wide enough for the assessment.If you’re on a mobile device, try switching to landscape.OKCancel 000000

      DISEASES?

    1. When we think of others as right-holders it is, of course, true that we no longer think of them as mere sub-jects, who plead abjectly for better treatment. We think of right-holdersas full persons, as citizens or citizens-to-be. Yet when claimants point toothers’ duties (which others’ duties?), they do not have to take muchaction, and may even wrap themselves passively in a cloak of grievanceor of resentment. They do not need to work out who will have to do whatfor whom at what cost, let alone what they themselves will have to do atwhat costs to themselves. In short, the rhetoric of rights, although moreactive than a rhetoric of dependent pleading, of mere subjects, is still arhetoric of recipience rather than of action. It still takes the perspectiveof the claimant rather than of the contributor, of the consumer ratherthan of the producer, of the passive rather than of the active citizen.

      Aufgrund handlungstheoretischer Überlegungen könnte man O'Neill entgegenhalten, dass die Personen, denen die korrespondierenden Pflichten zufielen, und auch die konkreten Pflichten, sehr wohl erkennbar sein könnten, insofern man die moralischen Rechte voraussetzt. Man könnte argumentieren, dass O'Neill, als Mitglied des hohen "house of Lords", durch die Reichweite ihrer Handlungen im legislativen Zusammenhang als moralisch zu verpflichtende Person in Frage kommt, wenn es um die Realisierung bestimmter moralischer Rechte geht. Je höher Einer am Schalthebel sitzt, desto eher kann Dieser auch moralisch in die Pflicht genommen werden.

    1. individually or collaboratively

      It's worth doing both! Annotate individually, interact with the text yourself, get down your ideas and thoughts, first impressions. Annotations are almost like participating in a conversation with the text. The text is written but now you get to respond and use it as a springboard to expand the conversation beyond the page (text to self and text to world).

      Responding to others also furthers that dialogue, whether it be raising questions that act as fodder for your own thinking, or even clarifying bits of the text you may have found confusing. In one of my own classes, I've had to make annotations and then respond to others. That active conversation beyond the text also pushes us to think about how we can apply what we've learned beyond the text.

    1. Annotation extends that power to a web made not only of linked resources, but also of linked segments within them. If the web is a loom on which applications are woven, then annotation increases the thread count of the fabric. Annotation-powered applications exploit the denser weave by defining segments and attaching data or behavior to them.

      I remember the first time I truly understood what Jon meant when he said this. One web page can have an unlimited number of specific addresses pointing into its parts--and through annotation these parts can be connected to an unlimited number of parts of other things. Jon called it: Exploding the web! How far we've come from Vannevar Bush's musings...

    1. The idea of a system enabling a multiplicity of independent individuals to create lightweight value-added "trails" through a document space was envisaged most prominently by Vannevar Bush as early as 1945 [BUSH]. ComMentor can be thought of as a tool which such "trail blazers" use to add value to contents, and which other people use to find guidance based on these human-created super-structures. The overall architecture can be seen as a platform where value-added providers can provide their services (as a third player next to content providers and end users).

      I'd heard of ComMentor before, but I hadn't noticed that Terry and Martin cited Vannevar and mentioned the notion of trails here. https://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/

  6. Dec 2019
    1. I'm not sure if it's blogging's fault, or journalism's fault or even Google's fault — but I do think the focus on recency as the biggest defining value of content is an error, and if we continue too far down that path, we'll regret it.

      Some of the addiction to recency may be related to Mihaly Csikszentmihalyi's idea of "flow". It takes way more work to find good stuff that's older and if this breaks one's flow, then one may be more likely to be addicted to the faster speed of something like Twitter or Facebook that will algorithmicly serve up things you're more prone to like and say within tighter flow boundaries, right?

    1. Finally, languages may also affect how individuals experience the world. According to the linguistic relativity hypothesis (Whorf, 1956), which is illustrated in Figure 3, individuals in an ethnolinguistic group are led by their shared language experiences to acquire shared, habitual ways of thinking, which influence cognition in a general way

      The idea that people who speak the same languages also have the same cognitive functions can have even more advantages for those who speak more than one language or are bilingual. Our textbook talks about how many studies have found that those who are bilingual can selectively attend to stimuli better and suppress interference from competing stimuli in attention. In addition to that, when they think in a second language it reduces biases when making decisions. Early exposure to a multilingual environment may also promote more effective communication. A reason for this may be that it impacts the white matter that is in out brain. While I am not bilingual I wonder how/why speaking in a second language makes someone almost become a "superhero" allowing for then to escape the negative aspects of our brain, such as having biases and mind-wondering? As we have learned in many other chapters, just because a concept doesn't exist exactly like it might in Westernized culture does not mean that it doesn't exist, it just might exist in a different way. Our textbook says that there have been many other studies done on this subject that pushes back on these ideas and I think that I would like to know more about these ideas as well.

    1. First, her tippet made of tulle, easily lifted off her shoulders and laid on the back of a wooden chair.

      Tulle = not only is it a romanticized fabric used in ballerina skirts and bridal wear (most commonly in veils), the ethereal and transparent qualities of this lightweight, fine netting have come to serve as a symbol of the contradictions associated with womanhood: delicate yet strong, pure but sexy.

      It's a very feminine type of fabric that has made comeback on the runway and in the high fashion industry as a reaction to athletic wear. Also, it's a traditionally feminine fabric that made it's resurgence during the #metoo movement, which a very far reach but it can be also coincidental.

      in today's fashion represents a woman's ability to choose what to conceal and what to reveal.

      Think of what we're doing here as like peeling layers off onions, ultimately our goal is too understand Dickinson's mind or get to the center and each layer we peel off is pieces we have come to understand

      This layer is more of the duality, I think, of Emily Dickinson. She lived in seclusion but instead of stumping her growth, it did the opposite and allowed her to become more productive. You can also say, with regards to the tippet, that her outward appearance may be plain looking but she has a very complex and creative mind or maybe even extended metaphors

      The tippet made of tulle is also a reference to one Dickinson's poems called Because I Could Not Stop For Death. I felt as if the two poems are connected (that poem is about death and immortality taking her on a carriage ride to death's house. At first she was comfortable with both of them but then she realizes that she has made a mistake) and that this poem is when she is in the house itself or tomb.

      Another thing is the wooden chair which I found interesting. Michelle also pointed it out when I asked her about it and mentioned the carriage. So what I did was compare the two: a carriage has wheels which used to transport you from one place to another. In Dickinson's poem this was birth to death, and the wheels themselves also symbolize a cyclical nature between life and death. A chair is stationary. It's not moving in one place to another, it is one spot - death

    1. Culture-sensitive healthcommunication will help to reduce disparities inhealth outcomes by making messages equally under-standable, meaningful, and effective.

      I think we can export this idea to sex ed in schools. In some well-funded schools in progressive areas, students may receive a comprehensive sex ed program while a struggling school in a rural area may not convey quality health and sex ed information to students. These sex ed programs need to be culturally informed so that students from different backgrounds receive the message in a way relevant to their experience. By ensuring that all students are taught health and sex ed curriculum sensitive to their culture, we can reduce disparities in outcomes such as teen pregnancy, STD transmission, etc.

    1. This is not a new idea. It is based on the vision expounded by Vannevar Bush in his 1945 essay “As We May Think,” which conjured up a “memex” machine that would remember and connect information for us mere mortals. The concept was refined in the early 1960s by the Internet pioneer J. C. R. Licklider, who wrote a paper titled “Man-Computer Symbiosis,” and the computer designer Douglas Engelbart, who wrote “Augmenting Human Intellect.” They often found themselves in opposition to their colleagues, like Marvin Minsky and John McCarthy, who stressed the goal of pursuing artificial intelligence machines that left humans out of the loop.

      Seymour Papert, had an approach that provides a nice synthesis between these two camps, buy leveraging early childhood development to provide insights on the creation of AI.

    1. how to approach the use of technology in learning environments to maximize opportunities for learning and minimize the risk of doing harm to students.

      As technology is something that is being used a lot more in the world, i think it is beneficial that is used a lot in the classroom. However, we need to understand that some students work differently and technology may not be the way that they learn.

    1. Powerful knowledge exerts its control not only over what it chooses to represent as real, but also in its repression of what it chooses to exclude.

      It is quite crazy to think that the information we receive from this powerful knowledge may never fully contain the truth. Those who control this knowledge have an insane amount of power.

    Annotators

    1. They are happy, after all. The negro, situated as yours are, is not aware that he is deprived of any just rights." "Yes, yes," answered Georgiana: "you may place the slave where you please; you may dry up to your utmost the fountains of his feelings, the springs of his thought; you may yoke him to your labour, as an ox which liveth only to work, and worketh only to live; you may put him under any process which, without destroying his value as a slave, will debase and crush him as a rational being; you may do this, and the idea that he was born to be free will survive it all. It is allied to his hope of immortality; it is the ethereal part of his nature, which oppression cannot reach; it is a torch lit up in his soul by the hand of Deity, and never meant to be extinguished by the hand of man."         On reaching the drawing-room, they found Sam snuffing the candles, and looking as solemn and as dignified as if he had never sung a song or laughed in his life. "Will Miss Georgy have de supper got up now?" asked the negro. "Yes," she replied. "Well," remarked Carlton, "that beats anything I ever met with. Do you think that was Sam we heard singing?" "I am sure of it," was the answer. "I could not have believed that that fellow was capable of so much deception," continued Page 152 he. "Our system of slavery is one of deception; and Sam, you see, has only been a good scholar. However, he is as honest a fellow as you will find among the slave population here. If we would have them more honest, we should give them their liberty, and then the inducement to be dishonest would be gone. I have resolved that these creatures shall all be free." "Indeed!" exclaimed Carlton. "Yes, I shall let them all go free, and set an example to those about me." "I honour your judgment," said he. "But will the state permit them to remain?" "If not, they can go where they can live in freedom. I will not be unjust because the state is."

      G frees the enslaved.

    1. ome evidence suggests that suppression can even be beneficial for interdependent individuals. During a negative emotion induction, a stronger preference to regulate emotions led to a more adaptive pattern of physiological responding in Asian-American cultural contexts, while a stronger preference to regulate emotions led to a maladaptive pattern of physiological responding in European-American cultural contexts

      It is interesting to consider that suppression is not a universally bad thing. In this culture, we think of suppression as "bottling up emotions", a negative act that ends in an explosion. But in some cultures, suppression is an adaptive method to handling a negative emotional experience. When Americans think of the way other cultures suppress and hide their emotions, we often believe they are not handling the situation in the best way, as we are examining the situation through our cultural lens. While suppression does not have the best goodness of fit to our culture and how we operate, it can be an effective mechanism for some other cultures, just as some of our norms regarding emotion display may be considered toxic in other cultures.

  7. Nov 2019
    1. The Buddha, who lived probably during the sixth centurybcin Nepal,began life as an aristocrat. After renouncing his palace and its haremand luxuries, he achieved through meditation an illumination in whichhe realized the great principle of the wheel of the law or the wheel of theBuddha. This may be defined as a theory of the “dependent origination”of life: that everything is conditioned by something else in a closed se-quence, so that in effect the misery of life is dependent upon certainconditions, and by eliminating these conditions it is possible to eliminatethe misery itself. Thus desire—which ultimately leads to misery—origi-nates in dependence upon sensation, which in turn originates in depen-dence upon contact and the six senses, and so on. The Buddhist objec-tive therefore becomes to cut the chain of conditions that bind one into

      A rather poor and inaccurate summation of both Buddha's life (there was no harem according to what we know - he had a wife and child) and of his teachings. The actual teaching I think they are referring to is codependent arising which is very different.

    Tags

    Annotators

  8. www.astro.physik.uni-goettingen.de www.astro.physik.uni-goettingen.de
    1. Young orphans need good upbringings, balanced diets,education, and technical training everywhere in the world; but unfortunately thereare many places where these goods are in such short supply that it is impossible toprovision all who need them. If we persist, nevertheless, in speaking of these needsas constituting rights and not merely claims, we are committed to the conception ofa right which is an entitlement to some good, but not a valid claim against anyparticular individual; for in conditions of scarcity there may be no determinateindividuals who can plausibly be said to have a duty to provide the missing goodsto those in need. J. E. S. Fawcett therefore prefers to keep the distinction betweenclaims, and rights firmly in mind. "Claims," he writes, "are needs and demands inmovement, and there is a continuous transformation, as a society advances [towardsgreater abundance] of economic and social claims into civil and political rights.. .and not all countries or all claims are by any means at the same stage in theprocess."8 The manifesto writers on the other side who seem to identify needs, orat least basic needs, with what they call "human rights," are more properly de-scribed, I think, as urging upon the world community the moral principle that allbasic human needs ought to be recognized as claims (in the customary prima faciesense) worthy of sympathy and serious consideration right now, even though, inmany cases, they cannot yet plausibly be treated as valid cla.ims, that is, as groundsof any other people's duties. This way of talking avoids the anomaly of ascribingto all human beings now, even those in pre-industrial societies, such "economicand social rights" as "periodic holidays with pay."9

      Hier verstehe ich nicht, warum Feinberg die Menschenrechte zu bloßen „claims“ herabsetzt. Sollten sie ihrem Anspruch nach nicht als Rechte (also gerechtfertigte „claims“) verstanden werden (wenn auch als moralische Rechte, die nicht überall juristisch berücksichtigt werden)? Ich sehe hier zwei Argumente von Feinberg:

      Erstens wendet er ein, dass oft nicht klar sei, wem genau die korrelierende Pflicht zukommt, ein bestimmtes Recht zu sichern: Wer hat z.B. die Pflicht, das Recht auf genügend Nahrung zu sichern in einer Gesellschaft, in der kaum Nahrung vorhanden ist? Aber selbst, wenn hier keiner Einzelperson diese Pflicht zukommen sollte, könnte doch der jeweilige Staat (und ggf. auch andere Staaten) als moralisch verpflichtet angesehen werden.

      Zweitens möchte Feinberg vermeiden, dass Menschen z.B. ein Recht auf bezahlten Urlaub zukommt, obwohl sie in einer Gesellschaft ohne Arbeitsverhältnisse leben. Aber vielleicht müsste man diese Rechte konditional verstehen: Wenn jemand in ein Arbeitsverhältnis eintritt, dann steht ihm auch dieses Recht zu. Außerdem scheint Feinbergs Vorschlag, diese Rechte als bloße „claims“ zu verstehen, das Problem gar nicht zu lösen.

    1. We point out that dark-energy perturbations may become unstable in the presence ofa gravitational wave of sufficiently large amplitude. We study this effect for the cubicHorndeski operator (braiding), proportional toαB.

      As a non-specialist of Horndeski theories, I tried my best to understand the physics of this destabilization mechanism, but I ended up quite puzzled. Thus, I would like to ask the authors a few questions; hopefully, this dialogue will be useful for other members of the community.

      Let me first try to summarize what I think is the origin of the instability – again, to the best of my understanding, which may be incorrect. The important term seems to be the last one of Eq. (3.2), which is quadratic in \(\Gamma_{\mu\nu}\). If this term is large enough, the perturbations of the scalar field, denoted \(\delta\pi\) feature a ghost. This appears quite clearly in Eqs. (3.19) and (3.30), where the second-order differential operator of the equation of motion for \(\delta\pi\) becomes elliptical in that case.

      Since \(\Gamma_{\mu\nu}\propto\dot{h}_{ij}\), the time derivative of the GW amplitude, \(\Gamma^{\mu\nu}\Gamma_{\mu\nu}\) may be understood as the energy density of the GW. Whatever its interpretation, it is a space-time curvature term, because it is the square of Christoffel symbols. However, what surprises me is that the cubic Galileon \(\pi\) does not directly couple to curvature. Thus, how can curvature appear in its effective Lagrangian, Eq. (3.2)?

      I guess that the reason is the following. While \(\pi\) is not directly coupled to curvature, the gravitational potentials \(\Phi\) and \(\Psi\) are. However, in the sub-Hubble regime, \(\pi\propto\Phi=\Psi\) according to Eq. (2.5) of the article. Replacing \(\Phi\) and \(\Psi\) by \(\pi\) would then lead to \(\pi\) being effectively coupled to curvature.

      Is the above sound or erroneous?

    1. Rising CO2’s effect on crops could also harm human health. “We know unequivocally that when you grow food at elevated CO2 levels in fields, it becomes less nutritious,” notes Samuel Myers, principal research scientist in environmental health at Harvard University. “[Food crops] lose significant amounts of iron and zinc—and grains [also] lose protein.” Myers and other researchers have found atmospheric CO2 levels predicted for mid-century—around 550 parts per million—could make food crops lose enough of those key nutrients to cause a protein deficiency in an estimated 150 million people and a zinc deficit in an additional 150 million to 200 million. (Both of those figures are in addition to the number of people who already have such a shortfall.) A total of 1.4 billion women of child-bearing age and young children who live in countries with a high prevalence of anemia would lose more than 3.8 percent of their dietary iron at such CO2 levels, according to Meyers.dfp.loadAds("right2","MPU3","dfp-right2-article-2")Advertisement Researchers do not yet know why higher atmospheric CO2 alters crops’ nutritional content. But, Myers says, “the bottom line is, we know that rising CO2 reduces the concentration of critical nutrients around the world,” adding that these kinds of nutritional deficiencies are already significant public health threats, and will only worsen as CO2 levels go up.

      This is the enormously misleading "nutrient scare."

      The absurdity of the nutrient scare nonsense should be obvious if you think about a simple fact: food grown in greenhouses at 1500 ppmv CO2 is every bit as nutritious as food grown outdoors at ambient CO2 levels (which currently average about 411 ppmv).

      If elevating CO2 by nearly 1100 ppmv doesn't cause crops to be less nutritious, then elevating CO2 by only 140 ppmv wouldn't, either.

      (However, the article's claim that CO2 levels will reach 550 ppmv by mid-century is also false. They're on track to reach only about 490-500 ppmv by 2050.)

      The nutrient scare is an attempt to put a negative "spin" on an enormous benefit of eCO2: that it improves crop yields.

      Faster-growing, more productive crops require more nutrients per acre, though not more nutrients per unit of output. Inadequate nitrogen fertilization reduces protein production relative to carbohydrate production, because proteins contain nitrogen and carbohydrates don't. Likewise, low levels of iron or zinc in soils will result in lower levels of those minerals in some crops. These facts are well-known, and unremarkable.

      So, it is possible, by flouting well-established best agricultural practices, to contrive circumstances under which eCO2, or any other factor that improves crop yields, reduces levels of protein or micronutrients in crops.

      Farmers know that the more productive crops are, the more nutrients they need, and competent farmers fertilize accordingly. (Or, for nitrogen, they may plant nitrogen-fixing legumes — which, fortunately, benefit greatly from extra CO2.)

      If you don’t fertilize according to the needs of your crops, the negative consequences may include reductions in protein and/or micronutrient levels in the resulting crops. The cause of such reductions is not higher CO2 levels, the cause is poor agricultural practices.

      Dr. Myers and mathematician Irakli Loladze are the two most prominent promoters of the nutrition scare, and Dr. Loladze admitted to me that food grown in greenhouses with dramatically elevated CO2 levels is as nutritious as food grown outdoors at low CO2 levels, because adequate fertilization mitigates the potential problem.

    1. Rooted and Roadblocked

      Although this group is relatively small, I think there is an easy solution that libraries can take to reach this population. We can bring the library to them. I learned this from the Eau Claire public library which has a home-delivery system where patrons can checkout books and have them delivered to their homes, and picked up from their homes when they're ready to check in. In order for libraries to remain relevant, I think home-delivery services would have to be a main-stay program of most libraries. With this rising popularity of apps and services that deliver food and shopping items right to your door, home-delivery may also appeal to younger audiences as well.

    1. s I say, if we bring up religion, we’ll have differences, we’ll have arguments, and we’ll never be able to get together

      I agree with Sadie's comment below. Because the only way to truly make a change is if everyone sets their differences beside. I think it is interesting that Malcolm X brings this up about religion. Because he is obviously very religious and realizes others may not agree with him. I think as a nationalist it is only necessary to know that people will disagree and have different opinions from time to time.

    1. “Rise and shine, my dear!” Patricia exclaimed.There was no movement in the bed.“Honey, are you alright?”Moans of sickness reach Patricia’s ears.“Oh no, this doesn’t sound good. Susan, how are you feeling? What hurts?”“I feel sick, like I can’t get up. Where am I?”“Oh no honey, okay. I will be right back.” Patricia ran out of the room and dialed 911. She explained the emergency to the operator, and they said they would send an ambulance for Susan right away. Susan would have to go to the hospital by herself, as human travel was only for those experiencing the emergency. Patricia then found Timothy and explained her symptoms to Timothy. “It seems like she has carbon monoxide poisoning, but I have no idea how she would have gotten it if she did not go outside.”The concerned parents then rushed into Susan’s room to monitor her.“The ambulance is on their way, Susan, everything is going to be okay.” Timothy assured Susan.Susan moaned to signal she understood and reached for her father’s hand.“Well, you were correct in your diagnosis of carbon monoxide poisoning. Miss Martin had high levels of carboxyhemoglobin in her blood. We are currently giving her pure oxygen to breathe in to increase oxygen levels in the blood and help to remove carbon monoxide from the blood. The concentration in her blood was not high enough to kill her, but it was elevated enough to produce undesirable effects to her health. We will keep her on the oxygen for at leave four hours and reevaluate her condition then. We will call you with the update at 1 o’clock.” Susan’s doctor explained on the phone with Patricia.“Thank you, Doctor, we will eagerly await your phone call. Talk with you soon, bye.” Patricia replied.“Well, Dear, how did this happen? We know that carbon monoxide fills the air outside, but our home should be sealed shut and oxygen should be pumping into our home.” Timothy stated.“I really don’t know, Tim. We will have to do some investigating. Let’s check out her room.” Patricia replied.Timothy and Patricia then moved from where they had been sitting since Susan left for the hospital that morning to Susan’s room.“Well, if this room has a leak somewhere, you would think that we would have some symptoms too.” Timothy suggested.“You’re right, Tim. But maybe there is just a low concentration of it in our blood now because we haven’t been in her room as long as she had, so we do not have any symptoms yet.” Patricia proposed.“Very true, Patricia. If that is so, where would the leak be?”They began to search the room for any suspicious or damaged aspects of the room. They searched up and down, left and right. Nothing could be found. They resorted to moving Susan’s bed and looking behind all other furniture just to be sure. Again, nothing.“You don’t think she did, do you?” Patricia asked timidly.“What? Oh, no, no honey, Susan would never.” Timothy assured her.Patricia was wondering if Susan may have left the house for a period of time, perhaps long enough to poison her. The possibility seemed impossible, so they disregarded it and agreed that carbon monoxide had to be leaking into Susan’s room. Therefore, with no source of leakage found, they took measures to seal off their own daughter’s bedroom so that no carbon monoxide would contaminate the oxygen that filled the remainder of their home. 1 o’clock would be there sooner than they knew, so they decided to eat some lunch first to get some food on their stomachs.

      I appreciate the dialogue! It allows me to follow along :)

    1. such as a student’s sleeping environment and de-stressing techniques if the student has troubles falling asleep. It would help the aspiring student become aware of more specific ways they may be able to utilize their sleep habits in the hopes of improving their grades.

      "Such as a student's sleeping environment and de-stressing techniques if the student has troubles falling asleep" (18). I think we could expand on our topic by talking about ways to resolve this sleep deprivation issue in terms of how to reduce insomnia rather than how to maximize the hours of sleep a college student gets per night. Realistically, most nights that we get less sleep are caused by insomnia rather than just choosing to go to sleep late and waking up early.

    1. True. But as they say Dreams are rough copies of the waking soul Yet uncorrected of the higher Will, So that men sometimes in their dreams confess An unsuspected, or forgotten, self; One must beware to check—ay, if one may, Stifle ere born, such passion in ourselves As makes, we see, such havoc with our sleep, And ill reacts upon the waking day. And, by the bye, for one test, Segismund, Between such swearable realities— Since Dreaming, Madness, Passion, are akin In missing each that salutary rein Of reason, and the guiding will of man: One test, I think, of waking sanity Shall be that conscious power of self-control, To curb all passion, but much most of all That evil and vindictive, that ill squares With human, and with holy canon less, Which bids us pardon ev’n our enemies, And much more those who, out of no ill will, Mistakenly have taken up the rod Which heaven, they think, has put into their hands.

      This powerful monologue about the turn and uncorrected self found in dreams, pretty clearly addresses the audience just as much as it addresses the Prince, with a call to action. This was a great play for the Spanish government to condone- asking its citizens to adjust one’s self to the strongly encouraged Bible and to look deeper before one acts. As the Crash Course video stated, the Bible was not the only interpretation of plays in this time. However, keeping time period in mind, it was strongly insinuated that it was the key guiding path.

      Despite government control of theatre and other circumstances such as the Spanish Inquisition, Spain still seemed to be lightyears ahead of other countries when it came to the idea of free will. I’m interested in learning more about the governments encouragement and limitations on free will and self-expression during the Renaissance.

    1. Food production systems such as organic agriculture and grass-fed beef have been proposed as potential ways to reduce agriculture's environmental impacts (e.g. Ponisio et al 2014). Organic agriculture, for example, is often promoted as having lower environmental impacts relative to high-input conventional systems because it replaces agrochemical inputs with natural inputs such as manure or with ecosystem services such as pest control (Azadi et al 2011).

      I must say that I also think (thought..?..) that organic or grass-fed agriculture was better for our environment because less chemicals are used. But I do see there are many other factors that come into play after reading this article. Personally, my main drive in buying organic or grass fed, or pasture raised, etc is for personal health reasons as well. In my household I am a stickler when it comes to food quality. I try to buy in season, local and organic. We purchase minimal meat...but if we do we always go to a market where we can get the best quality. I have to admit, my thought process on that hasn't been for environmental reasons it has definitely been for health reasons. It may be more expensive to purchase, but to me it is one of the most important factors in life where I can "put my money where my mouth is" for the most important asset in life, my health.

    1. In the United States, women typically score somewhat higher than men on both N and A, as well as some specific facets of E and O (e.g., Warmth, Openness to Aesthetics). Men usually score higher on other facets of E and O, namely, Assertiveness and Openness to Ideas. There are few gender differences in C.

      I think it is very interesting that we see gender differences when it comes to the big 5 personality traits across all cultures. Later on in the article, these differences are said to be a result of biological differences. However, thinking back to our text book, our book highlights the Five Factor Theory which states that everyone is born with the biological bases of the five personality traits, neuroticism, extraversion, conscientiousness, agreeableness, and openness to experience. then our cultural gives us characteristic adaptations that turn certain personality traits up or down. This then impacts how we think about ourselves. Our textbook also notes that while the five universal traits may be correct the theory for how they develop may be wrong. So does this claim that certain levels of personality traits have a biological basis in terms of gender, disprove the five factor theory? Should researchers start studying the differences in gender? How does culture influence how someone of a specific gender identity is treated or for example shape the expectations of being a female? or a male? or trans? How does this influence the development of personality traits in cultures and individuals?

    1. We may as well assert that because a child has thrived upon milk, that it is never to have meat, or that the first twenty years of our lives is to become a precedent for the next twenty.

      This is very interesting as he is using metaphors that were then considered to be drastic that are now things that people actually believe. The idea that a child should drink milk, but never eat meat is actually an argument held by vegetarians. After taking some time to think about this argument that he made I realize that when he is talking about children never having meat he means is the kids were able to grow and thrive just on milk so that is all they should eat is an absurd way of thinking. Paine uses metaphors as a way to help any common person understand his writing to get his point across.

    1. . Itscloutresidesinidea,not inforce.

      I think that this single line represents most of what we are talking about when we look at leadership and working collectively. It is never about the force we may pose as a group or individual, but instead what we do together with our thoughts and ideas. Especially when you combine many different view points for one collective cause and projects. Also, using sheer force to get what you want no longer is effective purely because everyone else will not understand why you forced your way onto them, only creating more tension amongst individuals.

    1. We may know, for example, that television exaggerates the scale of violent crime for dramatic purposes; nevertheless, studies show that the more television we watch, the more violent we assume the world to be.

      I think we covered this in a previous unit, but television is another world that creators have tried to make as close to the real world as possible. While the events that happen in them are fictional, they are (most of the time) realistic and relates to the viewer even more. With all the violence, crimes and dangers that these shows present, it isn't too surprising that even though we know these aren't part of our world, we feel like they easily can be, In this case, some viewers start to believe that this is true in our own world as well.

    Annotators

  9. Oct 2019
    1. While Allen’s work is largely framed as a way todirect the meaningful support of educators to encourage the civic participa-tion of young people, we instead take student letters as evidence of, ratherthan an intervention on behalf of, youth’s verbal empowerment, democraticknowledge, and participatory readiness.

      I think this is a key aspect of this research project, that they see the LTNP as an expression of a already-occurring activity (you engagement of issues) and not as a novel activity. If we can harness what students are already doing, and give them platforms and support for these interests that tie into academic endeavors then we have connected their learning experience to real life. This project may increase the students voice, but it really is just a guided magnification and evolution of what they already do on their own.

    1. 7-Eleven CDO And CIO Creates Experiences Of The Future For Customers Peter High Contributor Opinions expressed by Forbes Contributors are their own. Enterprise & Cloud Share to facebook Share to twitter Share to linkedin 7-Eleven is a big retailer. It operates 65,000 stores in 18 countries, has 55 million customers in stores on a daily basis, and conducts 20 billion transactions annually. Like most retailers, it is in need of transformation. Enter Gurmeet Singh. With a Ph.D. in Engineering from Rice, and stints with leading companies like FedEx, Intuit, and Capital One, Singh joined 7-Eleven in August of 2016 as the chief digital officer. He would add the chief information officer title in November 2017.  Singh joined the company with a mandate from 7-Eleven CEO Joseph DePinto to make the company a digital leader. Singh embarked on a multi-year journey to become a digitally-enabled organization, including a “full stack transformation” approach which encompasses consumer-facing technology, back-end technology, infrastructure, and the organizational stack. He also expanded the company's loyalty program from its initial focus on beverages to a full-fledged loyalty offering that is available on mobile, web, digital loyalty card, and even through chatbots. Singh notes that "the closest store to a customer today is in the palm of [his or her] hand," and he wanted to go beyond pushing customers from mobile into stores and allowing customers to interact with 7-Eleven on their terms, through the interface of their choice. To foster this, Singh's team helps the rest of the organization understand the art of the possible through constant experimentation with new technology. He describes his path to innovation in great detail herein.  (To listen to an unabridged audio version of this interview, please visit this link. This is the 38th interview in the CIO-plus series. To read the prior interviews with CIO-pluses from companies such as Intel, P&G, Biogen, Kroger, and Cardinal Health, please click this link. To read future articles in this series, please follow me on Twitter @PeterAHigh.) Peter High: You are the Chief Digital and Chief Information Officer of 7-Eleven. Could you describe your role? Today In: Tech Gurmeet Singh, Chief Digital and Chief Information Officer of 7-Eleven Credit: 7-Eleven Singh: I started at 7-Eleven as the Chief Digital Officer, with my primary responsibility being driving digital transformation. This company founded convenience at a global scale, with 65,000 stores in 18 countries, 55 million customers visiting the stores every day, and 20 billion transactions on an annual basis. You take that, and you overlay the consumer trends and the new technology trends like big data and digital payments, and you have the perfect formula for redefining convenience. PROMOTED Forbes Insights Deloitte BrandVoice  | Paid Program When It Comes To Readiness, The Fundamentals Still Matter .str-more-from-forbes .thumbnail-wrapper{margin:0 !important;}.str-more-from-forbes .str-opt-out{height:12px !important;width:12px !important;background-size:12px 12px !important;min-height:12px !important;max-height:12px !important;min-width:12px !important;max-width:12px !important;}.str-more-from-forbes.str-editorial-true .str-voice{display:none !important;}.str-more-from-forbes.str-insights-true .str-voice{display:none !important;}.str-more-from-forbes.str-insights-true .str-insights{display:inline-block !important;}.str-more-from-forbes h3.headline{font-size:0.7em;line-height:1.6em;color:#333;letter-spacing:0;margin:0.3em 0;color:#333;letter-spacing:0;}.str-more-from-forbes .str-bv{font-size:.9em;letter-spacing:0;margin-bottom:2px;} (function(){ var el = document.getElementsByClassName("ntv-ad")[0]; el.style.display = 'block'; })(); Forbes Insights Forbes BrandVoice  | Paid Program The Vizio D Is On Sale For $480 At Walmart .str-more-from-forbes .thumbnail-wrapper{margin:0 !important;}.str-more-from-forbes .str-opt-out{height:12px !important;width:12px !important;background-size:12px 12px !important;min-height:12px !important;max-height:12px !important;min-width:12px !important;max-width:12px !important;}.str-more-from-forbes.str-editorial-true .str-voice{display:none !important;}.str-more-from-forbes.str-insights-true .str-voice{display:none !important;}.str-more-from-forbes.str-insights-true .str-insights{display:inline-block !important;}.str-more-from-forbes h3.headline{font-size:0.7em;line-height:1.6em;color:#333;letter-spacing:0;margin:0.3em 0;color:#333;letter-spacing:0;}.str-more-from-forbes .str-bv{font-size:.9em;letter-spacing:0;margin-bottom:2px;} (function(){ var el = document.getElementsByClassName("ntv-ad")[0]; el.style.display = 'block'; })(); Forbes Insights Grads of Life BrandVoice  | Paid Program More Than What’s On Paper: Dedication Has Its Rewards .str-more-from-forbes .thumbnail-wrapper{margin:0 !important;}.str-more-from-forbes .str-opt-out{height:12px !important;width:12px !important;background-size:12px 12px !important;min-height:12px !important;max-height:12px !important;min-width:12px !important;max-width:12px !important;}.str-more-from-forbes.str-editorial-true .str-voice{display:none !important;}.str-more-from-forbes.str-insights-true .str-voice{display:none !important;}.str-more-from-forbes.str-insights-true .str-insights{display:inline-block !important;}.str-more-from-forbes h3.headline{font-size:0.7em;line-height:1.6em;color:#333;letter-spacing:0;margin:0.3em 0;color:#333;letter-spacing:0;}.str-more-from-forbes .str-bv{font-size:.9em;letter-spacing:0;margin-bottom:2px;} (function(){ var el = document.getElementsByClassName("ntv-ad")[0]; el.style.display = 'block'; })(); My role as the Chief Digital Officer is to make this happen for our customers, our franchisees, our store associates, and our employees. One of our strategic pillars is to become a digitally-enabled organization. In my role as the CDO, I set the strategy and the vision. We are developing new business models and new digital product experiences, which also includes establishing a product management discipline, user experience design, data scientists, digital marketers, and digital technologists. Technology is a key element of a digital transformation and it is also key to becoming a digitally-enabled company. Initially, we started off with what most companies have been doing and what most consulting companies have been citing as a strategic approach, which is building a two-tier architectural model. A two-tier architectural model means you have digital technology capabilities that are being developed at a higher speed, and then decoupled from that, you have your legacy enterprise systems which have longer release cycles at slower speeds. Additionally, enterprise and legacy work was being managed in long cycle processes as projects, not as products. Old models in any company are always changing, and they should be changing. They are a function of maturity of the company, the need of the hour, and the market factor. As we evaluated the speed of our transformation, we felt that we were not getting to the speed we needed. To get there, we needed what I call a full stack transformation. When I say full stack transformation, I am talking all the way from the consumer-facing technology to back-end technologies, all the way to infrastructure and cloud. It even goes beyond that to encompass the organizational stack. To bring more efficiency and effectiveness to our decisions, our prioritization, while driving the productization of IT, we decided to combine the CDO role and the CIO role. This allows us to drive vertical product slices while working on horizontal capabilities. If you are doing one after the other, you are taking too much time to get the business transformed. If you do not do a vertical slice, you do not know what customer problem you are trying to solve. Combining the functions gets us there faster. It is harder, but you end up driving more synergies. We drive higher team engagement. You speed up your transformation journey, and you end up creating a stronger pool of talent as one team. What we did was then combine digital and IT, which we call DIGIT, which is very much digital. High: You are clearly thinking multiple years out. The changes require hard work to be done in the near term to make the organization nimbler for the long term. How difficult was the process of selling this internally? Was it difficult in having your peers among the executive leadership understand the rationale behind all the hard work to be done in the near term for a better outcome for the long term? Singh: It was not that difficult, which is the great part of being at 7-Eleven. Our entire executive team meets regularly, and we often share our progress with each other. The key here was Joe DePinto, our CEO, and his vision and his desire to become a digitally-enabled organization and make it a strategic pillar. Joe is fully supportive of our full stack transformation. Once we realized that the change must be beyond our borders and immediate sphere of influence, it did not take long to gain executive buy-in. For us to move fast and drive the transformation we need, we can do both things together. It is all about talent. If we can get the right talent and the right people, we can make it happen. High: With so much technology change, people often focus on the technology. However, it is the people that are ultimately needed to drive that change. The skills necessary for this type of transformation are in great demand, and I am wondering how you attract top talent. How do you get top technical talent to come work for 7-Eleven? Singh: The talent needed to drive this kind of transformation is in high demand. However, based on my background at FedEx, Intuit, and Capital One, I am able to tell these talented individuals my story and show them what I can achieve at scale. Additionally, we have a great story and it is an incredible opportunity for anyone seeking out a problem who wants to be part of the solution. This story helped sell me on the organization, as I saw the company was sitting on such a strong infrastructure, and I knew we could do great things if we combined it with digital. Up until now, the success of 7-Eleven has been based on a strong operations team and a strong merchandising team. The success of the future is operations, plus merchandising, plus geeks. That is why we are looking for talent. We have been able to attract great talent, and as you start building momentum, it gets easier to attract more talent. That is why it is critical for us to go out and build stuff in the market and share the success. We want people to know what a huge opportunity we have. High: You have also set a goal to, "Redefine convenience with software." Can you describe what you mean by that and the methods of doing so? Singh: We have been a global leader in convenience, but just being physically convenient and having a store physically available, conveniently accessible, and open 24/7 is not enough for the future. The closest store to a customer today is in the palm of their hand. It is in their voices assistant, or their connected car, or their connected home. That is why I believe most retailers have struggled. Most of them do not think out of the box. They focus on creating the store of the future and driving traffic to the stores. At 7-Eleven we are focused on creating what I call “experiences of the future,” which are convenient and delightful. Our stores play an important role, but they are not the whole equation. When I talk about redefining convenience, I am talking about how we can be in the consumer's ecosystem of mobile devices and voice assistants and maps. We want to be wherever our customer is spending their time. When we bring the store to them, how will we bring it to them? We will bring it to them through partnerships, through delivery, and through APIs. To create these delightful experiences and in-store experiences, we require technology. We need to be acting like a software company, an API company, a big data company, and truly become a technology first company. For example, Airbnb, Amazon, and Uber are software companies at their core. Uber redefined convenience in the taxi business through software and ended up creating a new market. Another key element to redefining convenience with software is talent. We need to bring in the product management mindset to how we work, how we are agile, the design thinking, the technology to solve customer problems, and create a maker culture. High: You are also rethinking loyalty. You have the Seven Rewards programs. Could you talk about the evolution of that and the role that it plays in combination with some of the themes you have already discussed? Singh: At 7-Eleven, we want every customer interaction to be valuable and delightful. We can do this by building personalized connections with our customers. Loyalty becomes a key element of building those personalized connections. We have expanded our already successful loyalty program which is focused on what we call the cups program. When customers would buy six cups of our proprietary beverages, they will get the seventh one free. We have extended that in many ways. We give customers more ways to participate in the program. Before, it was only through the mobile app. We have since added mobile web, we added a loyalty card, and we added a digital loyalty card through our Facebook Messenger chatbot. That gives our customers more ways to engage with the program. We also give them more ways to earn and drive more engagement. Customers can earn points on most items they purchase and get bonus points. It creates this gamification aspect because they can earn points here and then they can earn more points when they buy more. It gets our customers more engaged with our program. They can choose to redeem these points through a menu of products in the store, which is something we have expanded as well. Think about the program going from only a cups program to more ways to engage, more ways to join, more ways to earn, and more ways to get value out of the program. We have 12 million users of our app, and our App Store ratings have increased substantially. We went from an iOS rating of 1.5 to 4.8. On the food and drink category in the App Store, we were as high as number four. If you look across all apps, we were at number 57 very recently. That speaks to the new user experience we provided in the app and all the new capabilities we are offering our customers. High: Customers have evolved to the point where they now expect mobile and digital technology to complement the physical experiences of traditional retail. Can you talk about the methods that you use to keep up with these evolving desires? Singh: Being usable is not good enough. You must create experiences that delight the customer and drive emotion. Users are expecting things to just happen for them. Customers expect recommendations, frictionless experiences, and for things to just happen. You have to put yourself in the customer’s shoes and be conscious of the customer journey. This includes not just the journey of today’s customer but the potential journey of the customer tomorrow. Additionally, being able to provide the customer more than what they expected, what I like to call innovating the customer, is critical. An example I like to use is the combination of user interfaces and new technologies. Specifically, voice search and voice technology is something I find quite interesting because it can really drive new user experiences. Data tells us that 50% of all future searches will be voice searches. This is an example of a frictionless experience because while a typical person can only type 40 words per minute, they can speak 150 per minute, which drives the new user experience. Technology has become part of the equation, but the number one thing is we want to look at what the journey is, where the pain points are, and what problems we are trying to solve. All that goes back to the methodology of design thinking, journey mapping, and the whole product management mindset. We do A/B testing and build minimal viable products. Doing this continuous learning helps you evolve. These are the types of combinations we are looking at when we think about the customer journey and friction points. We are focused on delighting them and anticipating what they want even if they did not ask for it. First, we think through the experience, and then we think about what technologies can drive that experience. These are the technologies we continuously test and make improvements on. High: You mentioned machine learning and voice-enabled technology. These are a couple of examples of a broader panoply of emerging technologies that you and your team are experimenting with. Could you talk about your thought process on engaging with some of these newer technologies? Do you have a portion of your team that is focused on the art of the possible or an innovation lab? Singh: To become a full stack technology organization and provide these experiences to the customers, a lot of the back-end technologies have to move from batch oriented to real time. Hence, the combination of transformation cannot be only on one layer. It must cut across all the layers. We are putting together an R&D center, but we already test new technologies. We have a CTO function that reports to me. Part of the purview of that CTO function is to test new technologies and conduct proof of concepts. The way we think about them is in two categories. One is technologies that are already proven and are ready to scale. Number two is what we call emerging technologies. We are building capabilities with production-ready technologies even beyond things like serverless microservices-based architectures, chatbots, big data, and AI. These are areas where we are looking to scale as we drive the business benefits back to our customers, back to our store associates, back to our franchisees, and even back to our internal stakeholders like merchandising and operations. For the emerging technology, what we do is closely watch and actively experiment. Today, a lot of software libraries are open-sourced, such as TensorFlow from Google. They allow others to experiment because they want companies creating proof of concepts (POCs) with them. Facebook Messenger is one example where we leveraged the chatbot for loyalty signup. That has not been done before. We were able to take the physical card and convert that into a digital card on Facebook Messenger. We are continuously trying to experiment with technologies like blockchain, and we are building POCs to validate and test in the market. We are going to formalize a full R&D group into an innovation lab, but while that is going on, that is not stopping us from testing these things. From an emerging technology and testing approach, the fact that we have a global scale and presence is a huge benefit. Not long ago, I wrote a blog post on LinkedIn titled “Thinking Glocally” which means think globally and act locally. The customer trends and technology trends that we are encountering today are global. I have visited Korea and China, and I see that all these countries are facing the same customer and technology trends. Of course, they may be at different stages of maturity, and some are leaping ahead. When I was in China, I saw the massive adoption of digital payments. I was surprised that the US is so behind with digital payments compared to what I saw in China, which is primarily driven by WeChat and AliPay. When I visited our South Korea team, they had introduced an interesting concept of biometrics and unmanned stores with pay-by-hand. What I learned was the veins in your palm are better for biometric authentication than your fingerprints. They are more secure and more sanitary. You end up registering your palm, link it to a payment method, and off you go. Our stores in Thailand just announced the launch of facial recognition. Beyond our labs, these stores give us a presence in the world and provide an opportunity to test. We do not have to prioritize them here, we can test them outside, bring them back, and vice versa. That has helped us in multiple ways on experimenting with emerging technologies and testing new concepts. All of this is in service to the customer experience and the store experience. Peter High is President of Metis Strategy, a business and IT advisory firm. His latest book is Implementing World Class IT Strategy. He is also the author of World Class IT: Why Businesses Succeed When IT Triumphs. Peter moderates the Forum on World Class IT podcast series. He speaks at conferences around the world. Follow him on Twitter @PeterAHigh.
    1. Global emissions are still rising, hitting a record last year. Meanwhile, the world’s population is growing.

      This is the most ambitious P1 path from the IPCC report in 2018

      Note that the IPCC also have the graph rising for the first few years, through to around 2020. It’s just not realistic to have it suddenly ramp down right away.

      That's mainly because of the rapid industrialization of China and other countries and though China is rapidly increasing its renewables it takes a while for that industry to grow large enough to offset the increases in CO2 emissions due to coal. But renewables are growing as fast as any fuel in recorded history and it is well feasible for China to transition to mostly renewables as this continues.

      For more on this:

      We seem to be on track for the most rapid adoption of a new form of energy ever. So far it is tracking the early days of nuclear power, but that leveled off, while renewables is set to continue to grow. This is from the BP Energy Outlook 2019 edition, so is a forecast by a fossil fuel company:

      Their RT or "Rapid Transition" is a 45% fall in emissions by 2040, while for the 1.5 C path without overshoot, we need to achieve this by around 2030, so is a faster transition than they show there.

      But if we target 1.5 C then the transition will be faster than their Rapid Transition.

      For more on this see my answer to:

      Meanwhile, yes the population is still rising. However this is because we are living longer. We actually have almost the same number of children in the world as we had a decade ago and many countries have populations that are leveling off, and in the case of Japan and a few others, already decreasing. This is not because of any issues of fertility and not because of shortages of resources. It is because of prosperity and because worldwide in countries of all political and religious persuasions, as they become healthier, with more resources and as child mortality goes down, wealthy people are choosing to have fewer children, and a fair number are not having children at all.

      The world population is expected to level off some time between 2050 (on the most optimistic projections) and 2100, with Africa the key. The World Population Division with estimate of 11 billion by 2100 project an increase of Nigeria’s population from 0.2 billion to not far off 0.8 billion, two thirds of the population of India in less than a third of its area. A population density much higher even than India. The upper limit of their projection for Nigeria here has more than the population of India into less than a third of its area. How likely is that?

      There are signs already of the younger population having lower birth rates. If you factor in changes due to higher levels of education, the result can be anywhere between 6.9 and 12.6 billion by 2100 according to another study. See The human core of the shared socioeconomic pathways: Population scenarios by age, sex and level of education for all countries to 2100 Their summary is:

      • Future fertility and hence [population growth] (https://www.sciencedirect.com/topics/social-sciences/population-increase) will depend on female education.
      • In the median assumptions scenario (SSP2) world population will peak around 2070.
      • By 2100 world population ranges from 6.9 (SSP1) to 12.6 billion (SSP3). Either way, things are actually looking brighter than one might think. Which isn't to say it will be easy, but there is no reason why we have to ruin ecosystems on Earth.

      Then, it may surprise you to know that we actually produce more than enough food to feed the world. We have starvation for political reasons at present. It's an income and distribution problem. As an example, the world had a food surplus of 510 kcal / cap / day in 2010 increased from 310 kcal / cap / day in 1965. All the indications are that we should be able to feed 10 billion people.

      For more details and cites see my

    2. Many climate scientists think the IPCC’s backward-looking, consensus-based estimates are too optimistic,

      This is just one climate scientist, Oppenheimer, a specialist in Geosciences, and his co-authors are a philosopher Dale Jamieson and a historian Naomi Oreskes. Their writings on this topic have lead to vigorous discussion amongst other climate scientists.

      They haven't convinced many. In this discussion, most other climate scientists responded saying that their published papers just follow the science wherever it goes.

      The IPCC don't do any research of their own. They do a systematic review of all the literature,. a technique developed from medicine. As with medicine, this is needed because so many papers are published every year that it is humanly impossible for an individual expert to read them all. Instead, hundreds of scientists meet together to undertake this systematic review, co-ordinated by the co-chairs.

      The aim is to include all the well supported research on the topic.

      Yes they do work to a consensus but only a consensus on whether the well supported findings are included and summarized adequately. They summarize their findings here with words such as “low confidence” or “medium confidence” where these terms have precise scientific meanings. They come to a consensus on, say, whether a particular finding is low confidence, or medium or high confidence.

      They don't attempt any kind of consensus about what the effects of climate change are.

      If there is a wide variety of results in the literature they will say that it is low confidence and will discuss the range of findings. The climate reports often remark on particular studies that come to different conclusions from the others.

      Sometimes the IPCC do underestimate. When this happens, it is because all the well supported published papers on the topic have underestimated, as happened with the Arctic sea ice. However, that wasn’t because of any tendency to conservatism. That was because of systematic issues with the models everyone used, with scientific issues modeling the detailed processes correctly. If all the studies say one thing, then a review of them will of course do the same.

      They sometimes over estimate too. The climate sensitivity - a very important parameter - varies a lot and there are plenty of outliers in the direction of overestimating the amount of climate sensitivity.

      graph from Explainer: How scientists estimate ‘climate sensitivity’

      They summarize the complete range of values there. Indeed current models are currently showing a sensitivity higher than expected. These are likely to be inaccurate just as the climate models for Arctic ice were inaccurate in the other direction, because the combined paleo, studies and instrumental observations don't support such a high sensitiivity.

      Do not adjust your set :) - why we shouldn't adjust the Equilibrium Climate Sensitivity yet despite the new research - it may well still be 3 C

      See my

      *No the IPCC does not err on the side of least drama, just follows scientific method

    1. The practical things in religion are those whose universals are in practical philosophy. That is because the practical things in religion are those universals made determinate by stipulations restricting them, and what is restricted by stipulations is more particular than what is pronounced unqualifiedly without stipulations: for instance, our saying “the human being who is writing” is more particular than our saying “the human being.” Therefore, all virtuous laws are subordinate to the universals of practical philosophy. The theoretical opinions that are in religion have their demonstrative proofs in theoretical philosophy and are taken in religion without demonstrative proofs.

      Though this quote is somewhat challenging to understand, it seems to me that Al-Farabi is trying to say that most norms within religion are “justified” through the practical stipulations made in philosophy. In other words, if a religion claims certain acts to be “good,” then practical philosophy provides much-needed reasons for why those actions are good. Without practical philosophy, religion lacks any means of proving the merit behind its ideals. By this logic, it is easy to see why Al-Farabi would believe that religion is inferior to philosophy.

      Assuming my understanding of Al-Farabi’s ideals are accurate, then I most certainly agree with his conclusions on philosophy’s superiority over religion. While I myself may be a relatively religious individual, I nevertheless believe that without philosophy, religion would be devoid of much of its meaning and purpose. For example, without having a good grasp on philosophy, it is difficult to understand why Christ’s ideals were so revolutionary, or why his assertion that “all who draw the sword will die by the sword” was so significant. It takes a degree of knowledge of philosophy to not only understand these words, but also to truly appreciate their wisdom. Many religious texts contain much philosophical wisdom for those who seek it; but for those who do not seek it, religion becomes a gathering point for blind followers and memorizers. Beyond this, I also agree with Al-Farabi’s assertations about practical philosophy providing the justifications for religious morality. Indeed, religions tend to forge certain guidelines of how to live a “moral” life (ex. Ten Commandments); but without philosophy we could never understand why these commandments are important to adhere to. In some respects, religion gives us moral commandments only after people reach a philosophical consensus on what defines moral action. In actuality, it is rather easy to blindly follow established rules and guidelines. It is notably harder to think on the wisdom behind rules; to use your intellect, human awareness, and imagination.

      However, I do not necessarily agree with all of Al-Farabi’s claims. If the core purpose of religion and philosophy were exactly the same, I would say that philosophy is superior in every way. But I do not believe the goals of religion are entirely the same as philosophy’s goals. Religion has much to do with tradition, and culture. Especially if one were to observe historically “conservative” societies, they may realize that religion has many aspects tied to their cultures, in a way that philosophy simply isn’t. Religions have many aspects connected to community building and the establishment of pleasure-bringing traditions which are of value as well. For example, many holidays in Greece that are often associated with Greece’s culture (such as Greek Easter) are undeniably religious in origin. Another example could come from Turkey, where some traditions have roots in Turkic Shamanism or Zoroastrianism. The point I am trying to make, is that religion has many aspects that have positive social impact that differ from philosophy, which is why I believe it would be wrong to claim that philosophy is superior in every way.

    1. As the all is larger than the part double the large which was considered as absolute /would be larger than the large which is considered as the absolute large. However by “the absolute large”  is meant simply that than which nothing is larger, and therefore the absolute large would not be an absolute large. Either, then, there will be no (absolute) large whatsoever, or there will be a relatively large since the large is not predicated other than absolutely or relatively.        /If the absolute large were not large absolutely) it would be an existant non-existent and this is an impossible contradiction; while if the absolute large were the relatively large, absolute and relative would be synonymous terms for the same thing, vis., that another thing is smaller than it; since it has been explained that there can never bee a thing which does not have something larger than it, either in potentiality or in actuality.        In this manner, it may be explained that there cannot be an absolute small and that the small also occurs only relatively.While the large and small are predicated of all quantitative things, the long and short are predicated of all quantitative things which are continuous, and they are specific to the continuous and not to the other kinds of quantity. /They also are predicated relatively only, and not as an absolute predicate

      Instead of stepping back and looking again at how he arrived at this contradiction, Al-Kindi concludes that there is no way the absolute large can be explicitly defined. The same can be said for all aforementioned measurements, including thee small long and short. Instead, these limits can be understood as sitting relatively larger than what is known to be the largest. Al-Kindi does not explain how much larger the absolute large is to what we know or how much smaller the absolute small is, but this conclusion brings up another concept which is that the absolute large and absolute small sit completely outside of our frame of reference. If we understand them this way, then there would be no way of ever defining these terms, as they would always be something larger than what we could imagine or perceive. This brings into question again whether the Absolute large is fixed or not. For example, if it were possible for an object to increase its own size exponentially, would it ever reach the absolute large? would it be hindered by the position of the absolute large? or would the absolute large continue growing exponentially with this object so that the absolute could remain larger by a certain amount? And on the other hand, will wee as humans ever bee able to discover the smallest particle in existence? or will it always sit smaller than what we can perceive with new technologies? In other words is are the absolute limits our existence actively engaging with changes in the universe, or with changes in what is understood by the beings inside of it? and if God is eternal, then what does that mean for the absolutes? do they exist eternally with God, in different capacities, or does the notion that the absolutes are not Infinite mean that they will someday end, just as they were created with the universe.

      This passage interests me very much because it leaves so many questions unanswered. After this section Al-Kindi goes on to speak about the one and how it exists numerically and does not look any further into this idea of absolutes. This passage is also impressive because it explores the same ideas of relativity that scholars like Einstein looked at many centuries later. The notion that we have no real idea of the size of anything, and only understand things relative to other things really puts into perspective how little we know about the universe we live in. This must have been revolutionary in the 9th century, and it was work like this that was important for paving the way for other scholars such as Ibn Sina and Al-Farabi.

      In conclusion, I think that more exploration of these ideas would have been very interesting, but it is easy to understand why Al-Kindi didn't dwell on this subject for too long. While the discussion was interesting while it lasted, th absolute large, small, long and short are definitely not the main focus of this discussion, and the ideas are so difficult to grasp that it quickly becomes apparent how difficult it is to understand what these sizes would be, with very little knowledge of our own size, and no points of reference.

    1. We live in an age of paradox. Systems using artificial intelligence match or surpass human level performance in more and more domains, leveraging rapid advances in other technologies and driving soaring stock prices. Yet measured productivity growth has fallen in half over the past decade, and real income has stagnated since the late 1990s for a majority of Americans. Brynjolfsson, Rock, and Syverson describe four potential explanations for this clash of expectations and statistics: false hopes, mismeasurement, redistribution, and implementation lags. While a case can be made for each explanation, the researchers argue that lags are likely to be the biggest reason for paradox. The most impressive capabilities of AI, particularly those based on machine learning, have not yet diffused widely. More importantly, like other general purpose technologies, their full effects won't be realized until waves of complementary innovations are developed and implemented. The adjustment costs, organizational changes and new skills needed for successful AI can be modeled as a kind of intangible capital. A portion of the value of this intangible capital is already reflected in the market value of firms. However, most national statistics will fail to capture the full benefits of the new technologies and some may even have the wrong sign

      This is for anyone who is looking deep in economics of artificial intelligence or is doing a project on AI with respect to economics. This paper entails how AI might effect our economy and change the way we think about work. the predictions and facts which are stated here are really impressive like how people 30 years from now will be lively with government employment where everyone will get equal amount of payment.

    1. Adolescents in different cultures spend different amount of time with their peers

      When you think about American culture and how children develop we often think of this time period as being characterized by "risky behavior". This may be attributed to the underdevelopment of the prefrontal cortex which plays a role in children regulating their behavior. Many articles that I have read in many of my psych classes often contribute risky behavior of adolescents to the underdevelopment of the prefrontal cortex but also to the influence of peers. However, this information that we believe to be true is based on a population of WEIRDOS. Since other cultures differ on the amount of exposure they have to their peers, what other social agents might influence risky behaviors the most in other cultures?

    1. As a prototype it hits a sweet spot: it's challenging - it's no small feat to recognize handwritten digits - but it's not so difficult as to require an extremely complicated solution, or tremendous computational power. Furthermore, it's a great way to develop more advanced techniques, such as deep learning. And so throughout the book we'll return repeatedly to the problem of handwriting recognition. Later in the book, we'll discuss how these ideas may be applied to other problems in computer vision, and also in speech, natural language processing, and other domains.Of course, if the point of the chapter was only to write a computer program to recognize handwritten digits, then the chapter would be much shorter! But along the way we'll develop many key ideas about neural networks, including two important types of artificial neuron (the perceptron and the sigmoid neuron), and the standard learning algorithm for neural networks, known as stochastic gradient descent. Throughout, I focus on explaining why things are done the way they are, and on building your neural networks intuition. That requires a lengthier discussion than if I just presented the basic mechanics of what's going on, but it's worth it for the deeper understanding you'll attain. Amongst the payoffs, by the end of the chapter we'll be in position to understand what deep learning is, and why it matters.PerceptronsWhat is a neural network? To get started, I'll explain a type of artificial neuron called a perceptron. Perceptrons were developed in the 1950s and 1960s by the scientist Frank Rosenblatt, inspired by earlier work by Warren McCulloch and Walter Pitts. Today, it's more common to use other models of artificial neurons - in this book, and in much modern work on neural networks, the main neuron model used is one called the sigmoid neuron. We'll get to sigmoid neurons shortly. But to understand why sigmoid neurons are defined the way they are, it's worth taking the time to first understand perceptrons.So how do perceptrons work? A perceptron takes several binary inputs, x1,x2,…x1,x2,…x_1, x_2, \ldots, and produces a single binary output: In the example shown the perceptron has three inputs, x1,x2,x3x1,x2,x3x_1, x_2, x_3. In general it could have more or fewer inputs. Rosenblatt proposed a simple rule to compute the output. He introduced weights, w1,w2,…w1,w2,…w_1,w_2,\ldots, real numbers expressing the importance of the respective inputs to the output. The neuron's output, 000 or 111, is determined by whether the weighted sum ∑jwjxj∑jwjxj\sum_j w_j x_j is less than or greater than some threshold value. Just like the weights, the threshold is a real number which is a parameter of the neuron. To put it in more precise algebraic terms: output={01if ∑jwjxj≤ thresholdif ∑jwjxj> threshold(1)(1)output={0if ∑jwjxj≤ threshold1if ∑jwjxj> threshold\begin{eqnarray} \mbox{output} & = & \left\{ \begin{array}{ll} 0 & \mbox{if } \sum_j w_j x_j \leq \mbox{ threshold} \\ 1 & \mbox{if } \sum_j w_j x_j > \mbox{ threshold} \end{array} \right. \tag{1}\end{eqnarray} That's all there is to how a perceptron works!That's the basic mathematical model. A way you can think about the perceptron is that it's a device that makes decisions by weighing up evidence. Let me give an example. It's not a very realistic example, but it's easy to understand, and we'll soon get to more realistic examples. Suppose the weekend is coming up, and you've heard that there's going to be a cheese festival in your city. You like cheese, and are trying to decide whether or not to go to the festival. You might make your decision by weighing up three factors: Is the weather good? Does your boyfriend or girlfriend want to accompany you? Is the festival near public transit? (You don't own a car). We can represent these three factors by corresponding binary variables x1,x2x1,x2x_1, x_2, and x3x3x_3. For instance, we'd have x1=1x1=1x_1 = 1 if the weather is good, and x1=0x1=0x_1 = 0 if the weather is bad. Similarly, x2=1x2=1x_2 = 1 if your boyfriend or girlfriend wants to go, and x2=0x2=0x_2 = 0 if not. And similarly again for x3x3x_3 and public transit.Now, suppose you absolutely adore cheese, so much so that you're happy to go to the festival even if your boyfriend or girlfriend is uninterested and the festival is hard to get to. But perhaps you really loathe bad weather, and there's no way you'd go to the festival if the weather is bad. You can use perceptrons to model this kind of decision-making. One way to do this is to choose a weight w1=6w1=6w_1 = 6 for the weather, and w2=2w2=2w_2 = 2 and w3=2w3=2w_3 = 2 for the other conditions. The larger value of w1w1w_1 indicates that the weather matters a lot to you, much more than whether your boyfriend or girlfriend joins you, or the nearness of public transit. Finally, suppose you choose a threshold of 555 for the perceptron. With these choices, the perceptron implements the desired decision-making model, outputting 111 whenever the weather is good, and 000 whenever the weather is bad. It makes no difference to the output whether your boyfriend or girlfriend wants to go, or whether public transit is nearby.By varying the weights and the threshold, we can get different models of decision-making. For example, suppose we instead chose a threshold of 333. Then the perceptron would decide that you should go to the festival whenever the weather was good or when both the festival was near public transit and your boyfriend or girlfriend was willing to join you. In other words, it'd be a different model of decision-making. Dropping the threshold means you're more willing to go to the festival.Obviously, the perceptron isn't a complete model of human decision-making! But what the example illustrates is how a perceptron can weigh up different kinds of evidence in order to make decisions. And it should seem plausible that a complex network of perceptrons could make quite subtle decisions: In this network, the first column of perceptrons - what we'll call the first layer of perceptrons - is making three very simple decisions, by weighing the input evidence. What about the perceptrons in the second layer? Each of those perceptrons is making a decision by weighing up the results from the first layer of decision-making. In this way a perceptron in the second layer can make a decision at a more complex and more abstract level than perceptrons in the first layer. And even more complex decisions can be made by the perceptron in the third layer. In this way, a many-layer network of perceptrons can engage in sophisticated decision making.Incidentally, when I defined perceptrons I said that a perceptron has just a single output. In the network above the perceptrons look like they have multiple outputs. In fact, they're still single output. The multiple output arrows are merely a useful way of indicating that the output from a perceptron is being used as the input to several other perceptrons. It's less unwieldy than drawing a single output line which then splits.Let's simplify the way we describe perceptrons. The condition ∑jwjxj>threshold∑jwjxj>threshold\sum_j w_j x_j > \mbox{threshold} is cumbersome, and we can make two notational changes to simplify it. The first change is to write ∑jwjxj∑jwjxj\sum_j w_j x_j as a dot product, w⋅x≡∑jwjxjw⋅x≡∑jwjxjw \cdot x \equiv \sum_j w_j x_j, where www and xxx are vectors whose components are the weights and inputs, respectively. The second change is to move the threshold to the other side of the inequality, and to replace it by what's known as the perceptron's bias, b≡−thresholdb≡−thresholdb \equiv -\mbox{threshold}. Using the bias instead of the threshold, the perceptron rule can be rewritten: output={01if w⋅x+b≤0if w⋅x+b>0(2)(2)output={0if w⋅x+b≤01if w⋅x+b>0\begin{eqnarray} \mbox{output} = \left\{ \begin{array}{ll} 0 & \mbox{if } w\cdot x + b \leq 0 \\ 1 & \mbox{if } w\cdot x + b > 0 \end{array} \right. \tag{2}\end{eqnarray} You can think of the bias as a measure of how easy it is to get the perceptron to output a 111. Or to put it in more biological terms, the bias is a measure of how easy it is to get the perceptron to fire. For a perceptron with a really big bias, it's extremely easy for the perceptron to output a 111. But if the bias is very negative, then it's difficult for the perceptron to output a 111. Obviously, introducing the bias is only a small change in how we describe perceptrons, but we'll see later that it leads to further notational simplifications. Because of this, in the remainder of the book we won't use the threshold, we'll always use the bias.I've described perceptrons as a method for weighing evidence to make decisions. Another way perceptrons can be used is to compute the elementary logical functions we usually think of as underlying computation, functions such as AND, OR, and NAND. For example, suppose we have a perceptron with two inputs, each with weight −2−2-2, and an overall bias of 333. Here's our perceptron: Then we see that input 000000 produces output 111, since (−2)∗0+(−2)∗0+3=3(−2)∗0+(−2)∗0+3=3(-2)*0+(-2)*0+3 = 3 is positive. Here, I've introduced the ∗∗* symbol to make the multiplications explicit. Similar calculations show that the inputs 010101 and 101010 produce output 111. But the input 111111 produces output 000, since (−2)∗1+(−2)∗1+3=−1(−2)∗1+(−2)∗1+3=−1(-2)*1+(-2)*1+3 = -1 is negative. And so our perceptron implements a NAND gate!The NAND example shows that we can use perceptrons to compute simple logical functions. In fact, we can use networks of perceptrons to compute any logical function at all. The reason is that the NAND gate is universal for computation, that is, we can build any computation up out of NAND gates. For example, we can use NAND gates to build a circuit which adds two bits, x1x1x_1 and x2x2x_2. This requires computing the bitwise sum, x1⊕x2x1⊕x2x_1 \oplus x_2, as well as a carry bit which is set to 111 when both x1x1x_1 and x2x2x_2 are 111, i.e., the carry bit is just the bitwise product x1x2x1x2x_1 x_2: To get an equivalent network of perceptrons we replace all the NAND gates by perceptrons with two inputs, each with weight −2−2-2, and an overall bias of 333. Here's the resulting network. Note that I've moved the perceptron corresponding to the bottom right NAND gate a little, just to make it easier to draw the arrows on the diagram: One notable aspect of this network of perceptrons is that the output from the leftmost perceptron is used twice as input to the bottommost perceptron. When I defined the perceptron model I didn't say whether this kind of double-output-to-the-same-place was allowed. Actually, it doesn't much matter. If we don't want to allow this kind of thing, then it's possible to simply merge the two lines, into a single connection with a weight of -4 instead of two connections with -2 weights. (If you don't find this obvious, you should stop and prove to yourself that this is equivalent.) With that change, the network looks as follows, with all unmarked weights equal to -2, all biases equal to 3, and a single weight of -4, as marked: Up to now I've been drawing inputs like x1x1x_1 and x2x2x_2 as variables floating to the left of the network of perceptrons. In fact, it's conventional to draw an extra layer of perceptrons - the input layer - to encode the inputs: This notation for input perceptrons, in which we have an output, but no inputs, is a shorthand. It doesn't actually mean a perceptron with no inputs. To see this, suppose we did have a perceptron with no inputs. Then the weighted sum ∑jwjxj∑jwjxj\sum_j w_j x_j would always be zero, and so the perceptron would output 111 if b>0b>0b > 0, and 000 if b≤0b≤0b \leq 0. That is, the perceptron would simply output a fixed value, not the desired value (x1x1x_1, in the example above). It's better to think of the input perceptrons as not really being perceptrons at all, but rather special units which are simply defined to output the desired values, x1,x2,…x1,x2,…x_1, x_2,\ldots.The adder example demonstrates how a network of perceptrons can be used to simulate a circuit containing many NAND gates. And because NAND gates are universal for computation, it follows that perceptrons are also universal for computation.The computational universality of perceptrons is simultaneously reassuring and disappointing. It's reassuring because it tells us that networks of perceptrons can be as powerful as any other computing device. But it's also disappointing, because it makes it seem as though perceptrons are merely a new type of NAND gate. That's hardly big news!However, the situation is better than this view suggests. It turns out that we can devise learning algorithms which can automatically tune the weights and biases of a network of artificial neurons. This tuning happens in response to external stimuli, without direct intervention by a programmer. These learning algorithms enable us to use artificial neurons in a way which is radically different to conventional logic gates. Instead of explicitly laying out a circuit of NAND and other gates, our neural networks can simply learn to solve problems, sometimes problems where it would be extremely difficult to directly design a conventional circuit.Sigmoid neuronsLearning algorithms sound terrific. But how can we devise such algorithms for a neural network? Suppose we have a network of perceptrons that we'd like to use to learn to solve some problem. For example, the inputs to the network might be the raw pixel data from a scanned, handwritten image of a digit. And we'd like the network to learn weights and biases so that the output from the network correctly classifies the digit. To see how learning might work, suppose we make a small change in some weight (or bias) in the network. What we'd like is for this small change in weight to cause only a small corresponding change in the output from the network. As we'll see in a moment, this property will make learning possible. Schematically, here's what we want (obviously this network is too simple to do handwriting recognition!): If it were true that a small change in a weight (or bias) causes only a small change in output, then we could use this fact to modify the weights and biases to get our network to behave more in the manner we want. For example, suppose the network was mistakenly classifying an image as an "8" when it should be a "9". We could figure out how to make a small change in the weights and biases so the network gets a little closer to classifying the image as a "9". And then we'd repeat this, changing the weights and biases over and over to produce better and better output. The network would be learning.The problem is that this isn't what happens when our network contains perceptrons. In fact, a small change in the weights or bias of any single perceptron in the network can sometimes cause the output of that perceptron to completely flip, say from 000 to 111. That flip may then cause the behaviour of the rest of the network to completely change in some very complicated way. So while your "9" might now be classified correctly, the behaviour of the network on all the other images is likely to have completely changed in some hard-to-control way. That makes it difficult to see how to gradually modify the weights and biases so that the network gets closer to the desired behaviour. Perhaps there's some clever way of getting around this problem. But it's not immediately obvious how we can get a network of perceptrons to learn.We can overcome this problem by introducing a new type of artificial neuron called a sigmoid neuron. Sigmoid neurons are similar to perceptrons, but modified so that small changes in their weights and bias cause only a small change in their output. That's the crucial fact which will allow a network of sigmoid neurons to learn.Okay, let me describe the sigmoid neuron. We'll depict sigmoid neurons in the same way we depicted perceptrons: Just like a perceptron, the sigmoid neuron has inputs, x1,x2,…x1,x2,…x_1, x_2, \ldots. But instead of being just 000 or 111, these inputs can also take on any values between 000 and 111. So, for instance, 0.638…0.638…0.638\ldots is a valid input for a sigmoid neuron. Also just like a perceptron, the sigmoid neuron has weights for each input, w1,w2,…w1,w2,…w_1, w_2, \ldots, and an overall bias, bbb. But the output is not 000 or 111. Instead, it's σ(w⋅x+b)σ(w⋅x+b)\sigma(w \cdot x+b), where σσ\sigma is called the sigmoid function* *Incidentally, σσ\sigma is sometimes called the logistic function, and this new class of neurons called logistic neurons. It's useful to remember this terminology, since these terms are used by many people working with neural nets. However, we'll stick with the sigmoid terminology., and is defined by: σ(z)≡11+e−z.(3)(3)σ(z)≡11+e−z.\begin{eqnarray} \sigma(z) \equiv \frac{1}{1+e^{-z}}. \tag{3}\end{eqnarray} To put it all a little more explicitly, the output of a sigmoid neuron with inputs x1,x2,…x1,x2,…x_1,x_2,\ldots, weights w1,w2,…w1,w2,…w_1,w_2,\ldots, and bias bbb is 11+exp(−∑jwjxj−b).(4)(4)11+exp⁡(−∑jwjxj−b).\begin{eqnarray} \frac{1}{1+\exp(-\sum_j w_j x_j-b)}. \tag{4}\end{eqnarray}At first sight, sigmoid neurons appear very different to perceptrons. The algebraic form of the sigmoid function may seem opaque and forbidding if you're not already familiar with it. In fact, there are many similarities between perceptrons and sigmoid neurons, and the algebraic form of the sigmoid function turns out to be more of a technical detail than a true barrier to understanding.To understand the similarity to the perceptron model, suppose z≡w⋅x+bz≡w⋅x+bz \equiv w \cdot x + b is a large positive number. Then e−z≈0e−z≈0e^{-z} \approx 0 and so σ(z)≈1σ(z)≈1\sigma(z) \approx 1. In other words, when z=w⋅x+bz=w⋅x+bz = w \cdot x+b is large and positive, the output from the sigmoid neuron is approximately 111, just as it would have been for a perceptron. Suppose on the other hand that z=w⋅x+bz=w⋅x+bz = w \cdot x+b is very negative. Then e−z→∞e−z→∞e^{-z} \rightarrow \infty, and σ(z)≈0σ(z)≈0\sigma(z) \approx 0. So when z=w⋅x+bz=w⋅x+bz = w \cdot x +b is very negative, the behaviour of a sigmoid neuron also closely approximates a perceptron. It's only when w⋅x+bw⋅x+bw \cdot x+b is of modest size that there's much deviation from the perceptron model.What about the algebraic form of σσ\sigma? How can we understand that? In fact, the exact form of σσ\sigma isn't so important - what really matters is the shape of the function when plotted. Here's the shape: -4-3-2-1012340.00.20.40.60.81.0zsigmoid function function s(x) {return 1/(1+Math.exp(-x));} var m = [40, 120, 50, 120]; var height = 290 - m[0] - m[2]; var width = 600 - m[1] - m[3]; var xmin = -5; var xmax = 5; var sample = 400; var x1 = d3.scale.linear().domain([0, sample]).range([xmin, xmax]); var data = d3.range(sample).map(function(d){ return { x: x1(d), y: s(x1(d))}; }); var x = d3.scale.linear().domain([xmin, xmax]).range([0, width]); var y = d3.scale.linear() .domain([0, 1]) .range([height, 0]); var line = d3.svg.line() .x(function(d) { return x(d.x); }) .y(function(d) { return y(d.y); }) var graph = d3.select("#sigmoid_graph") .append("svg") .attr("width", width + m[1] + m[3]) .attr("height", height + m[0] + m[2]) .append("g") .attr("transform", "translate(" + m[3] + "," + m[0] + ")"); var xAxis = d3.svg.axis() .scale(x) .tickValues(d3.range(-4, 5, 1)) .orient("bottom") graph.append("g") .attr("class", "x axis") .attr("transform", "translate(0, " + height + ")") .call(xAxis); var yAxis = d3.svg.axis() .scale(y) .tickValues(d3.range(0, 1.01, 0.2)) .orient("left") .ticks(5) graph.append("g") .attr("class", "y axis") .call(yAxis); graph.append("path").attr("d", line(data)); graph.append("text") .attr("class", "x label") .attr("text-anchor", "end") .attr("x", width/2) .attr("y", height+35) .text("z"); graph.append("text") .attr("x", (width / 2)) .attr("y", -10) .attr("text-anchor", "middle") .style("font-size", "16px") .text("sigmoid function"); This shape is a smoothed out version of a step function: -4-3-2-1012340.00.20.40.60.81.0zstep function function s(x) {return x < 0 ? 0 : 1;} var m = [40, 120, 50, 120]; var height = 290 - m[0] - m[2]; var width = 600 - m[1] - m[3]; var xmin = -5; var xmax = 5; var sample = 400; var x1 = d3.scale.linear().domain([0, sample]).range([xmin, xmax]); var data = d3.range(sample).map(function(d){ return { x: x1(d), y: s(x1(d))}; }); var x = d3.scale.linear().domain([xmin, xmax]).range([0, width]); var y = d3.scale.linear() .domain([0,1]) .range([height, 0]); var line = d3.svg.line() .x(function(d) { return x(d.x); }) .y(function(d) { return y(d.y); }) var graph = d3.select("#step_graph") .append("svg") .attr("width", width + m[1] + m[3]) .attr("height", height + m[0] + m[2]) .append("g") .attr("transform", "translate(" + m[3] + "," + m[0] + ")"); var xAxis = d3.svg.axis() .scale(x) .tickValues(d3.range(-4, 5, 1)) .orient("bottom") graph.append("g") .attr("class", "x axis") .attr("transform", "translate(0, " + height + ")") .call(xAxis); var yAxis = d3.svg.axis() .scale(y) .tickValues(d3.range(0, 1.01, 0.2)) .orient("left") .ticks(5) graph.append("g") .attr("class", "y axis") .call(yAxis); graph.append("path").attr("d", line(data)); graph.append("text") .attr("class", "x label") .attr("text-anchor", "end") .attr("x", width/2) .attr("y", height+35) .text("z"); graph.append("text") .attr("x", (width / 2)) .attr("y", -10) .attr("text-anchor", "middle") .style("font-size", "16px") .text("step function"); If σσ\sigma had in fact been a step function, then the sigmoid neuron would be a perceptron, since the output would be 111 or 000 depending on whether w⋅x+bw⋅x+bw\cdot x+b was positive or negative* *Actually, when w⋅x+b=0w⋅x+b=0w \cdot x +b = 0 the perceptron outputs 000, while the step function outputs 111. So, strictly speaking, we'd need to modify the step function at that one point. But you get the idea.. By using the actual σσ\sigma function we get, as already implied above, a smoothed out perceptron. Indeed, it's the smoothness of the σσ\sigma function that is the crucial fact, not its detailed form. The smoothness of σσ\sigma means that small changes ΔwjΔwj\Delta w_j in the weights and ΔbΔb\Delta b in the bias will produce a small change ΔoutputΔoutput\Delta \mbox{output} in the output from the neuron. In fact, calculus tells us that ΔoutputΔoutput\Delta \mbox{output} is well approximated by Δoutput≈∑j∂output∂wjΔwj+∂output∂bΔb,(5)(5)Δoutput≈∑j∂output∂wjΔwj+∂output∂bΔb,\begin{eqnarray} \Delta \mbox{output} \approx \sum_j \frac{\partial \, \mbox{output}}{\partial w_j} \Delta w_j + \frac{\partial \, \mbox{output}}{\partial b} \Delta b, \tag{5}\end{eqnarray} where the sum is over all the weights, wjwjw_j, and ∂output/∂wj∂output/∂wj\partial \, \mbox{output} / \partial w_j and ∂output/∂b∂output/∂b\partial \, \mbox{output} /\partial b denote partial derivatives of the outputoutput\mbox{output} with respect to wjwjw_j and bbb, respectively. Don't panic if you're not comfortable with partial derivatives! While the expression above looks complicated, with all the partial derivatives, it's actually saying something very simple (and which is very good news): ΔoutputΔoutput\Delta \mbox{output} is a linear function of the changes ΔwjΔwj\Delta w_j and ΔbΔb\Delta b in the weights and bias. This linearity makes it easy to choose small changes in the weights and biases to achieve any desired small change in the output. So while sigmoid neurons have much of the same qualitative behaviour as perceptrons, they make it much easier to figure out how changing the weights and biases will change the output.If it's the shape of σσ\sigma which really matters, and not its exact form, then why use the particular form used for σσ\sigma in Equation (3)σ(z)≡11+e−zσ(z)≡11+e−z\begin{eqnarray} \sigma(z) \equiv \frac{1}{1+e^{-z}} \nonumber\end{eqnarray}$('#margin_387419264610_reveal').click(function() {$('#margin_387419264610').toggle('slow', function() {});});? In fact, later in the book we will occasionally consider neurons where the output is f(w⋅x+b)f(w⋅x+b)f(w \cdot x + b) for some other activation function f(⋅)f(⋅)f(\cdot). The main thing that changes when we use a different activation function is that the particular values for the partial derivatives in Equation (5)Δoutput≈∑j∂output∂wjΔwj+∂output∂bΔbΔoutput≈∑j∂output∂wjΔwj+∂output∂bΔb\begin{eqnarray} \Delta \mbox{output} \approx \sum_j \frac{\partial \, \mbox{output}}{\partial w_j} \Delta w_j + \frac{\partial \, \mbox{output}}{\partial b} \Delta b \nonumber\end{eqnarray}$('#margin_727997094331_reveal').click(function() {$('#margin_727997094331').toggle('slow', function() {});}); change. It turns out that when we compute those partial derivatives later, using σσ\sigma will simplify the algebra, simply because exponentials have lovely properties when differentiated. In any case, σσ\sigma is commonly-used in work on neural nets, and is the activation function we'll use most often in this book.How should we interpret the output from a sigmoid neuron? Obviously, one big difference between perceptrons and sigmoid neurons is that sigmoid neurons don't just output 000 or 111. They can have as output any real number between 000 and 111, so values such as 0.173…0.173…0.173\ldots and 0.689…0.689…0.689\ldots are legitimate outputs. This can be useful, for example, if we want to use the output value to represent the average intensity of the pixels in an image input to a neural network. But sometimes it can be a nuisance. Suppose we want the output from the network to indicate either "the input image is a 9" or "the input image is not a 9". Obviously, it'd be easiest to do this if the output was a 000 or a 111, as in a perceptron. But in practice we can set up a convention to deal with this, for example, by deciding to interpret any output of at least 0.50.50.5 as indicating a "9", and any output less than 0.50.50.5 as indicating "not a 9". I'll always explicitly state when we're using such a convention, so it shouldn't cause any confusion. Exercises Sigmoid neurons simulating perceptrons, part I \mbox{} Suppose we take all the weights and biases in a network of perceptrons, and multiply them by a positive constant, c>0c>0c > 0. Show that the behaviour of the network doesn't change.Sigmoid neurons simulating perceptrons, part II \mbox{} Suppose we have the same setup as the last problem - a network of perceptrons. Suppose also that the overall input to the network of perceptrons has been chosen. We won't need the actual input value, we just need the input to have been fixed. Suppose the weights and biases are such that w⋅x+b≠0w⋅x+b≠0w \cdot x + b \neq 0 for the input xxx to any particular perceptron in the network. Now replace all the perceptrons in the network by sigmoid neurons, and multiply the weights and biases by a positive constant c>0c>0c > 0. Show that in the limit as c→∞c→∞c \rightarrow \infty the behaviour of this network of sigmoid neurons is exactly the same as the network of perceptrons. How can this fail when w⋅x+b=0w⋅x+b=0w \cdot x + b = 0 for one of the perceptrons? The architecture of neural networksIn the next section I'll introduce a neural network that can do a pretty good job classifying handwritten digits. In preparation for that, it helps to explain some terminology that lets us name different parts of a network. Suppose we have the network: As mentioned earlier, the leftmost layer in this network is called the input layer, and the neurons within the layer are called input neurons. The rightmost or output layer contains the output neurons, or, as in this case, a single output neuron. The middle layer is called a hidden layer, since the neurons in this layer are neither inputs nor outputs. The term "hidden" perhaps sounds a little mysterious - the first time I heard the term I thought it must have some deep philosophical or mathematical significance - but it really means nothing more than "not an input or an output". The network above has just a single hidden layer, but some networks have multiple hidden layers. For example, the following four-layer network has two hidden layers: Somewhat confusingly, and for historical reasons, such multiple layer networks are sometimes called multilayer perceptrons or MLPs, despite being made up of sigmoid neurons, not perceptrons. I'm not going to use the MLP terminology in this book, since I think it's confusing, but wanted to warn you of its existence.The design of the input and output layers in a network is often straightforward. For example, suppose we're trying to determine whether a handwritten image depicts a "9" or not. A natural way to design the network is to encode the intensities of the image pixels into the input neurons. If the image is a 646464 by 646464 greyscale image, then we'd have 4,096=64×644,096=64×644,096 = 64 \times 64 input neurons, with the intensities scaled appropriately between 000 and 111. The output layer will contain just a single neuron, with output values of less than 0.50.50.5 indicating "input image is not a 9", and values greater than 0.50.50.5 indicating "input image is a 9 ". While the design of the input and output layers of a neural network is often straightforward, there can be quite an art to the design of the hidden layers. In particular, it's not possible to sum up the design process for the hidden layers with a few simple rules of thumb. Instead, neural networks researchers have developed many design heuristics for the hidden layers, which help people get the behaviour they want out of their nets. For example, such heuristics can be used to help determine how to trade off the number of hidden layers against the time required to train the network. We'll meet several such design heuristics later in this book. Up to now, we've been discussing neural networks where the output from one layer is used as input to the next layer. Such networks are called feedforward neural networks. This means there are no loops in the network - information is always fed forward, never fed back. If we did have loops, we'd end up with situations where the input to the σσ\sigma function depended on the output. That'd be hard to make sense of, and so we don't allow such loops.However, there are other models of artificial neural networks in which feedback loops are possible. These models are called recurrent neural networks. The idea in these models is to have neurons which fire for some limited duration of time, before becoming quiescent. That firing can stimulate other neurons, which may fire a little while later, also for a limited duration. That causes still more neurons to fire, and so over time we get a cascade of neurons firing. Loops don't cause problems in such a model, since a neuron's output only affects its input at some later time, not instantaneously.Recurrent neural nets have been less influential than feedforward networks, in part because the learning algorithms for recurrent nets are (at least to date) less powerful. But recurrent networks are still extremely interesting. They're much closer in spirit to how our brains work than feedforward networks. And it's possible that recurrent networks can solve important problems which can only be solved with great difficulty by feedforward networks. However, to limit our scope, in this book we're going to concentrate on the more widely-used feedforward networks.A simple network to classify handwritten digitsHaving defined neural networks, let's return to handwriting recognition. We can split the problem of recognizing handwritten digits into two sub-problems. First, we'd like a way of breaking an image containing many digits into a sequence of separate images, each containing a single digit. For example, we'd like to break the imageinto six separate images, We humans solve this segmentation problem with ease, but it's challenging for a computer program to correctly break up the image. Once the image has been segmented, the program then needs to classify each individual digit. So, for instance, we'd like our program to recognize that the first digit above,is a 5.We'll focus on writing a program to solve the second problem, that is, classifying individual digits. We do this because it turns out that the segmentation problem is not so difficult to solve, once you have a good way of classifying individual digits. There are many approaches to solving the segmentation problem. One approach is to trial many different ways of segmenting the image, using the individual digit classifier to score each trial segmentation. A trial segmentation gets a high score if the individual digit classifier is confident of its classification in all segments, and a low score if the classifier is having a lot of trouble in one or more segments. The idea is that if the classifier is having trouble somewhere, then it's probably having trouble because the segmentation has been chosen incorrectly. This idea and other variations can be used to solve the segmentation problem quite well. So instead of worrying about segmentation we'll concentrate on developing a neural network which can solve the more interesting and difficult problem, namely, recognizing individual handwritten digits.To recognize individual digits we will use a three-layer neural network: The input layer of the network contains neurons encoding the values of the input pixels. As discussed in the next section, our training data for the network will consist of many 282828 by 282828 pixel images of scanned handwritten digits, and so the input layer contains 784=28×28784=28×28784 = 28 \times 28 neurons. For simplicity I've omitted most of the 784784784 input neurons in the diagram above. The input pixels are greyscale, with a value of 0.00.00.0 representing white, a value of 1.01.01.0 representing black, and in between values representing gradually darkening shades of grey.The second layer of the network is a hidden layer. We denote the number of neurons in this hidden layer by nnn, and we'll experiment with different values for nnn. The example shown illustrates a small hidden layer, containing just n=15n=15n = 15 neurons.The output layer of the network contains 10 neurons. If the first neuron fires, i.e., has an output ≈1≈1\approx 1, then that will indicate that the network thinks the digit is a 000. If the second neuron fires then that will indicate that the network thinks the digit is a 111. And so on. A little more precisely, we number the output neurons from 000 through 999, and figure out which neuron has the highest activation value. If that neuron is, say, neuron number 666, then our network will guess that the input digit was a 666. And so on for the other output neurons.You might wonder why we use 101010 output neurons. After all, the goal of the network is to tell us which digit (0,1,2,…,90,1,2,…,90, 1, 2, \ldots, 9) corresponds to the input image. A seemingly natural way of doing that is to use just 444 output neurons, treating each neuron as taking on a binary value, depending on whether the neuron's output is closer to 000 or to 111. Four neurons are enough to encode the answer, since 24=1624=162^4 = 16 is more than the 10 possible values for the input digit. Why should our network use 101010 neurons instead? Isn't that inefficient? The ultimate justification is empirical: we can try out both network designs, and it turns out that, for this particular problem, the network with 101010 output neurons learns to recognize digits better than the network with 444 output neurons. But that leaves us wondering why using 101010 output neurons works better. Is there some heuristic that would tell us in advance that we should use the 101010-output encoding instead of the 444-output encoding?To understand why we do this, it helps to think about what the neural network is doing from first principles. Consider first the case where we use 101010 output neurons. Let's concentrate on the first output neuron, the one that's trying to decide whether or not the digit is a 000. It does this by weighing up evidence from the hidden layer of neurons. What are those hidden neurons doing? Well, just suppose for the sake of argument that the first neuron in the hidden layer detects whether or not an image like the following is present:It can do this by heavily weighting input pixels which overlap with the image, and only lightly weighting the other inputs. In a similar way, let's suppose for the sake of argument that the second, third, and fourth neurons in the hidden layer detect whether or not the following images are present:As you may have guessed, these four images together make up the 000 image that we saw in the line of digits shown earlier:So if all four of these hidden neurons are firing then we can conclude that the digit is a 000. Of course, that's not the only sort of evidence we can use to conclude that the image was a 000 - we could legitimately get a 000 in many other ways (say, through translations of the above images, or slight distortions). But it seems safe to say that at least in this case we'd conclude that the input was a 000.Supposing the neural network functions in this way, we can give a plausible explanation for why it's better to have 101010 outputs from the network, rather than 444. If we had 444 outputs, then the first output neuron would be trying to decide what the most significant bit of the digit was. And there's no easy way to relate that most significant bit to simple shapes like those shown above. It's hard to imagine that there's any good historical reason the component shapes of the digit will be closely related to (say) the most significant bit in the output.Now, with all that said, this is all just a heuristic. Nothing says that the three-layer neural network has to operate in the way I described, with the hidden neurons detecting simple component shapes. Maybe a clever learning algorithm will find some assignment of weights that lets us use only 444 output neurons. But as a heuristic the way of thinking I've described works pretty well, and can save you a lot of time in designing good neural network architectures.Exercise There is a way of determining the bitwise representation of a digit by adding an extra layer to the three-layer network above. The extra layer converts the output from the previous layer into a binary representation, as illustrated in the figure below. Find a set of weights and biases for the new output layer. Assume that the first 333 layers of neurons are such that the correct output in the third layer (i.e., the old output layer) has activation at least 0.990.990.99, and incorrect outputs have activation less than 0.010.010.01. Learning with gradient descentNow that we have a design for our neural network, how can it learn to recognize digits? The first thing we'll need is a data set to learn from - a so-called training data set. We'll use the MNIST data set, which contains tens of thousands of scanned images of handwritten digits, together with their correct classifications. MNIST's name comes from the fact that it is a modified subset of two data sets collected by NIST, the United States' National Institute of Standards and Technology. Here's a few images from MNIST: As you can see, these digits are, in fact, the same as those shown at the beginning of this chapter as a challenge to recognize. Of course, when testing our network we'll ask it to recognize images which aren't in the training set!The MNIST data comes in two parts. The first part contains 60,000 images to be used as training data. These images are scanned handwriting samples from 250 people, half of whom were US Census Bureau employees, and half of whom were high school students. The images are greyscale and 28 by 28 pixels in size. The second part of the MNIST data set is 10,000 images to be used as test data. Again, these are 28 by 28 greyscale images. We'll use the test data to evaluate how well our neural network has learned to recognize digits. To make this a good test of performance, the test data was taken from a different set of 250 people than the original training data (albeit still a group split between Census Bureau employees and high school students). This helps give us confidence that our system can recognize digits from people whose writing it didn't see during training.We'll use the notation xxx to denote a training input. It'll be convenient to regard each training input xxx as a 28×28=78428×28=78428 \times 28 = 784-dimensional vector. Each entry in the vector represents the grey value for a single pixel in the image. We'll denote the corresponding desired output by y=y(x)y=y(x)y = y(x), where yyy is a 101010-dimensional vector. For example, if a particular training image, xxx, depicts a 666, then y(x)=(0,0,0,0,0,0,1,0,0,0)Ty(x)=(0,0,0,0,0,0,1,0,0,0)Ty(x) = (0, 0, 0, 0, 0, 0, 1, 0, 0, 0)^T is the desired output from the network. Note that TTT here is the transpose operation, turning a row vector into an ordinary (column) vector.What we'd like is an algorithm which lets us find weights and biases so that the output from the network approximates y(x)y(x)y(x) for all training inputs xxx. To quantify how well we're achieving this goal we define a cost function* *Sometimes referred to as a loss or objective function. We use the term cost function throughout this book, but you should note the other terminology, since it's often used in research papers and other discussions of neural networks. : C(w,b)≡12n∑x∥y(x)−a∥2.(6)(6)C(w,b)≡12n∑x‖y(x)−a‖2.\begin{eqnarray} C(w,b) \equiv \frac{1}{2n} \sum_x \| y(x) - a\|^2. \tag{6}\end{eqnarray} Here, www denotes the collection of all weights in the network, bbb all the biases, nnn is the total number of training inputs, aaa is the vector of outputs from the network when xxx is input, and the sum is over all training inputs, xxx. Of course, the output aaa depends on xxx, www and bbb, but to keep the notation simple I haven't explicitly indicated this dependence. The notation ∥v∥‖v‖\| v \| just denotes the usual length function for a vector vvv. We'll call CCC the quadratic cost function; it's also sometimes known as the mean squared error or just MSE. Inspecting the form of the quadratic cost function, we see that C(w,b)C(w,b)C(w,b) is non-negative, since every term in the sum is non-negative. Furthermore, the cost C(w,b)C(w,b)C(w,b) becomes small, i.e., C(w,b)≈0C(w,b)≈0C(w,b) \approx 0, precisely when y(x)y(x)y(x) is approximately equal to the output, aaa, for all training inputs, xxx. So our training algorithm has done a good job if it can find weights and biases so that C(w,b)≈0C(w,b)≈0C(w,b) \approx 0. By contrast, it's not doing so well when C(w,b)C(w,b)C(w,b) is large - that would mean that y(x)y(x)y(x) is not close to the output aaa for a large number of inputs. So the aim of our training algorithm will be to minimize the cost C(w,b)C(w,b)C(w,b) as a function of the weights and biases. In other words, we want to find a set of weights and biases which make the cost as small as possible. We'll do that using an algorithm known as gradient descent. Why introduce the quadratic cost? After all, aren't we primarily interested in the number of images correctly classified by the network? Why not try to maximize that number directly, rather than minimizing a proxy measure like the quadratic cost? The problem with that is that the number of images correctly classified is not a smooth function of the weights and biases in the network. For the most part, making small changes to the weights and biases won't cause any change at all in the number of training images classified correctly. That makes it difficult to figure out how to change the weights and biases to get improved performance. If we instead use a smooth cost function like the quadratic cost it turns out to be easy to figure out how to make small changes in the weights and biases so as to get an improvement in the cost. That's why we focus first on minimizing the quadratic cost, and only after that will we examine the classification accuracy.Even given that we want to use a smooth cost function, you may still wonder why we choose the quadratic function used in Equation (6)C(w,b)≡12n∑x∥y(x)−a∥2C(w,b)≡12n∑x‖y(x)−a‖2\begin{eqnarray} C(w,b) \equiv \frac{1}{2n} \sum_x \| y(x) - a\|^2 \nonumber\end{eqnarray}$('#margin_501822820305_reveal').click(function() {$('#margin_501822820305').toggle('slow', function() {});});. Isn't this a rather ad hoc choice? Perhaps if we chose a different cost function we'd get a totally different set of minimizing weights and biases? This is a valid concern, and later we'll revisit the cost function, and make some modifications. However, the quadratic cost function of Equation (6)C(w,b)≡12n∑x∥y(x)−a∥2C(w,b)≡12n∑x‖y(x)−a‖2\begin{eqnarray} C(w,b) \equiv \frac{1}{2n} \sum_x \| y(x) - a\|^2 \nonumber\end{eqnarray}$('#margin_555483302348_reveal').click(function() {$('#margin_555483302348').toggle('slow', function() {});}); works perfectly well for understanding the basics of learning in neural networks, so we'll stick with it for now.Recapping, our goal in training a neural network is to find weights and biases which minimize the quadratic cost function C(w,b)C(w,b)C(w, b). This is a well-posed problem, but it's got a lot of distracting structure as currently posed - the interpretation of www and bbb as weights and biases, the σσ\sigma function lurking in the background, the choice of network architecture, MNIST, and so on. It turns out that we can understand a tremendous amount by ignoring most of that structure, and just concentrating on the minimization aspect. So for now we're going to forget all about the specific form of the cost function, the connection to neural networks, and so on. Instead, we're going to imagine that we've simply been given a function of many variables and we want to minimize that function. We're going to develop a technique called gradient descent which can be used to solve such minimization problems. Then we'll come back to the specific function we want to minimize for neural networks.Okay, let's suppose we're trying to minimize some function, C(v)C(v)C(v). This could be any real-valued function of many variables, v=v1,v2,…v=v1,v2,…v = v_1, v_2, \ldots. Note that I've replaced the www and bbb notation by vvv to emphasize that this could be any function - we're not specifically thinking in the neural networks context any more. To minimize C(v)C(v)C(v) it helps to imagine CCC as a function of just two variables, which we'll call v1v1v_1 and v2v2v_2:What we'd like is to find where CCC achieves its global minimum. Now, of course, for the function plotted above, we can eyeball the graph and find the minimum. In that sense, I've perhaps shown slightly too simple a function! A general function, CCC, may be a complicated function of many variables, and it won't usually be possible to just eyeball the graph to find the minimum.One way of attacking the problem is to use calculus to try to find the minimum analytically. We could compute derivatives and then try using them to find places where CCC is an extremum. With some luck that might work when CCC is a function of just one or a few variables. But it'll turn into a nightmare when we have many more variables. And for neural networks we'll often want far more variables - the biggest neural networks have cost functions which depend on billions of weights and biases in an extremely complicated way. Using calculus to minimize that just won't work!(After asserting that we'll gain insight by imagining CCC as a function of just two variables, I've turned around twice in two paragraphs and said, "hey, but what if it's a function of many more than two variables?" Sorry about that. Please believe me when I say that it really does help to imagine CCC as a function of two variables. It just happens that sometimes that picture breaks down, and the last two paragraphs were dealing with such breakdowns. Good thinking about mathematics often involves juggling multiple intuitive pictures, learning when it's appropriate to use each picture, and when it's not.)Okay, so calculus doesn't work. Fortunately, there is a beautiful analogy which suggests an algorithm which works pretty well. We start by thinking of our function as a kind of a valley. If you squint just a little at the plot above, that shouldn't be too hard. And we imagine a ball rolling down the slope of the valley. Our everyday experience tells us that the ball will eventually roll to the bottom of the valley. Perhaps we can use this idea as a way to find a minimum for the function? We'd randomly choose a starting point for an (imaginary) ball, and then simulate the motion of the ball as it rolled down to the bottom of the valley. We could do this simulation simply by computing derivatives (and perhaps some second derivatives) of CCC - those derivatives would tell us everything we need to know about the local "shape" of the valley, and therefore how our ball should roll.Based on what I've just written, you might suppose that we'll be trying to write down Newton's equations of motion for the ball, considering the effects of friction and gravity, and so on. Actually, we're not going to take the ball-rolling analogy quite that seriously - we're devising an algorithm to minimize CCC, not developing an accurate simulation of the laws of physics! The ball's-eye view is meant to stimulate our imagination, not constrain our thinking. So rather than get into all the messy details of physics, let's simply ask ourselves: if we were declared God for a day, and could make up our own laws of physics, dictating to the ball how it should roll, what law or laws of motion could we pick that would make it so the ball always rolled to the bottom of the valley?To make this question more precise, let's think about what happens when we move the ball a small amount Δv1Δv1\Delta v_1 in the v1v1v_1 direction, and a small amount Δv2Δv2\Delta v_2 in the v2v2v_2 direction. Calculus tells us that CCC changes as follows: ΔC≈∂C∂v1Δv1+∂C∂v2Δv2.(7)(7)ΔC≈∂C∂v1Δv1+∂C∂v2Δv2.\begin{eqnarray} \Delta C \approx \frac{\partial C}{\partial v_1} \Delta v_1 + \frac{\partial C}{\partial v_2} \Delta v_2. \tag{7}\end{eqnarray} We're going to find a way of choosing Δv1Δv1\Delta v_1 and Δv2Δv2\Delta v_2 so as to make ΔCΔC\Delta C negative; i.e., we'll choose them so the ball is rolling down into the valley. To figure out how to make such a choice it helps to define ΔvΔv\Delta v to be the vector of changes in vvv, Δv≡(Δv1,Δv2)TΔv≡(Δv1,Δv2)T\Delta v \equiv (\Delta v_1, \Delta v_2)^T, where TTT is again the transpose operation, turning row vectors into column vectors. We'll also define the gradient of CCC to be the vector of partial derivatives, (∂C∂v1,∂C∂v2)T(∂C∂v1,∂C∂v2)T\left(\frac{\partial C}{\partial v_1}, \frac{\partial C}{\partial v_2}\right)^T. We denote the gradient vector by ∇C∇C\nabla C, i.e.: ∇C≡(∂C∂v1,∂C∂v2)T.(8)(8)∇C≡(∂C∂v1,∂C∂v2)T.\begin{eqnarray} \nabla C \equiv \left( \frac{\partial C}{\partial v_1}, \frac{\partial C}{\partial v_2} \right)^T. \tag{8}\end{eqnarray} In a moment we'll rewrite the change ΔCΔC\Delta C in terms of ΔvΔv\Delta v and the gradient, ∇C∇C\nabla C. Before getting to that, though, I want to clarify something that sometimes gets people hung up on the gradient. When meeting the ∇C∇C\nabla C notation for the first time, people sometimes wonder how they should think about the ∇∇\nabla symbol. What, exactly, does ∇∇\nabla mean? In fact, it's perfectly fine to think of ∇C∇C\nabla C as a single mathematical object - the vector defined above - which happens to be written using two symbols. In this point of view, ∇∇\nabla is just a piece of notational flag-waving, telling you "hey, ∇C∇C\nabla C is a gradient vector". There are more advanced points of view where ∇∇\nabla can be viewed as an independent mathematical entity in its own right (for example, as a differential operator), but we won't need such points of view.With these definitions, the expression (7)ΔC≈∂C∂v1Δv1+∂C∂v2Δv2ΔC≈∂C∂v1Δv1+∂C∂v2Δv2\begin{eqnarray} \Delta C \approx \frac{\partial C}{\partial v_1} \Delta v_1 + \frac{\partial C}{\partial v_2} \Delta v_2 \nonumber\end{eqnarray}$('#margin_512380394946_reveal').click(function() {$('#margin_512380394946').toggle('slow', function() {});}); for ΔCΔC\Delta C can be rewritten as ΔC≈∇C⋅Δv.(9)(9)ΔC≈∇C⋅Δv.\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v. \tag{9}\end{eqnarray} This equation helps explain why ∇C∇C\nabla C is called the gradient vector: ∇C∇C\nabla C relates changes in vvv to changes in CCC, just as we'd expect something called a gradient to do. But what's really exciting about the equation is that it lets us see how to choose ΔvΔv\Delta v so as to make ΔCΔC\Delta C negative. In particular, suppose we choose Δv=−η∇C,(10)(10)Δv=−η∇C,\begin{eqnarray} \Delta v = -\eta \nabla C, \tag{10}\end{eqnarray} where ηη\eta is a small, positive parameter (known as the learning rate). Then Equation (9)ΔC≈∇C⋅ΔvΔC≈∇C⋅Δv\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v \nonumber\end{eqnarray}$('#margin_31741254841_reveal').click(function() {$('#margin_31741254841').toggle('slow', function() {});}); tells us that ΔC≈−η∇C⋅∇C=−η∥∇C∥2ΔC≈−η∇C⋅∇C=−η‖∇C‖2\Delta C \approx -\eta \nabla C \cdot \nabla C = -\eta \|\nabla C\|^2. Because ∥∇C∥2≥0‖∇C‖2≥0\| \nabla C \|^2 \geq 0, this guarantees that ΔC≤0ΔC≤0\Delta C \leq 0, i.e., CCC will always decrease, never increase, if we change vvv according to the prescription in (10)Δv=−η∇CΔv=−η∇C\begin{eqnarray} \Delta v = -\eta \nabla C \nonumber\end{eqnarray}$('#margin_48762573303_reveal').click(function() {$('#margin_48762573303').toggle('slow', function() {});});. (Within, of course, the limits of the approximation in Equation (9)ΔC≈∇C⋅ΔvΔC≈∇C⋅Δv\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v \nonumber\end{eqnarray}$('#margin_919658643545_reveal').click(function() {$('#margin_919658643545').toggle('slow', function() {});});). This is exactly the property we wanted! And so we'll take Equation (10)Δv=−η∇CΔv=−η∇C\begin{eqnarray} \Delta v = -\eta \nabla C \nonumber\end{eqnarray}$('#margin_287729255111_reveal').click(function() {$('#margin_287729255111').toggle('slow', function() {});}); to define the "law of motion" for the ball in our gradient descent algorithm. That is, we'll use Equation (10)Δv=−η∇CΔv=−η∇C\begin{eqnarray} \Delta v = -\eta \nabla C \nonumber\end{eqnarray}$('#margin_718723868298_reveal').click(function() {$('#margin_718723868298').toggle('slow', function() {});}); to compute a value for ΔvΔv\Delta v, then move the ball's position vvv by that amount: v→v′=v−η∇C.(11)(11)v→v′=v−η∇C.\begin{eqnarray} v \rightarrow v' = v -\eta \nabla C. \tag{11}\end{eqnarray} Then we'll use this update rule again, to make another move. If we keep doing this, over and over, we'll keep decreasing CCC until - we hope - we reach a global minimum.Summing up, the way the gradient descent algorithm works is to repeatedly compute the gradient ∇C∇C\nabla C, and then to move in the opposite direction, "falling down" the slope of the valley. We can visualize it like this:Notice that with this rule gradient descent doesn't reproduce real physical motion. In real life a ball has momentum, and that momentum may allow it to roll across the slope, or even (momentarily) roll uphill. It's only after the effects of friction set in that the ball is guaranteed to roll down into the valley. By contrast, our rule for choosing ΔvΔv\Delta v just says "go down, right now". That's still a pretty good rule for finding the minimum!To make gradient descent work correctly, we need to choose the learning rate ηη\eta to be small enough that Equation (9)ΔC≈∇C⋅ΔvΔC≈∇C⋅Δv\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v \nonumber\end{eqnarray}$('#margin_560455937071_reveal').click(function() {$('#margin_560455937071').toggle('slow', function() {});}); is a good approximation. If we don't, we might end up with ΔC>0ΔC>0\Delta C > 0, which obviously would not be good! At the same time, we don't want ηη\eta to be too small, since that will make the changes ΔvΔv\Delta v tiny, and thus the gradient descent algorithm will work very slowly. In practical implementations, ηη\eta is often varied so that Equation (9)ΔC≈∇C⋅ΔvΔC≈∇C⋅Δv\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v \nonumber\end{eqnarray}$('#margin_157848846275_reveal').click(function() {$('#margin_157848846275').toggle('slow', function() {});}); remains a good approximation, but the algorithm isn't too slow. We'll see later how this works. I've explained gradient descent when CCC is a function of just two variables. But, in fact, everything works just as well even when CCC is a function of many more variables. Suppose in particular that CCC is a function of mmm variables, v1,…,vmv1,…,vmv_1,\ldots,v_m. Then the change ΔCΔC\Delta C in CCC produced by a small change Δv=(Δv1,…,Δvm)TΔv=(Δv1,…,Δvm)T\Delta v = (\Delta v_1, \ldots, \Delta v_m)^T is ΔC≈∇C⋅Δv,(12)(12)ΔC≈∇C⋅Δv,\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v, \tag{12}\end{eqnarray} where the gradient ∇C∇C\nabla C is the vector ∇C≡(∂C∂v1,…,∂C∂vm)T.(13)(13)∇C≡(∂C∂v1,…,∂C∂vm)T.\begin{eqnarray} \nabla C \equiv \left(\frac{\partial C}{\partial v_1}, \ldots, \frac{\partial C}{\partial v_m}\right)^T. \tag{13}\end{eqnarray} Just as for the two variable case, we can choose Δv=−η∇C,(14)(14)Δv=−η∇C,\begin{eqnarray} \Delta v = -\eta \nabla C, \tag{14}\end{eqnarray} and we're guaranteed that our (approximate) expression (12)ΔC≈∇C⋅ΔvΔC≈∇C⋅Δv\begin{eqnarray} \Delta C \approx \nabla C \cdot \Delta v \nonumber\end{eqnarray}$('#margin_869505431896_reveal').click(function() {$('#margin_869505431896').toggle('slow', function() {});}); for ΔCΔC\Delta C will be negative. This gives us a way of following the gradient to a minimum, even when CCC is a function of many variables, by repeatedly applying the update rule v→v′=v−η∇C.(15)(15)v→v′=v−η∇C.\begin{eqnarray} v \rightarrow v' = v-\eta \nabla C. \tag{15}\end{eqnarray} You can think of this update rule as defining the gradient descent algorithm. It gives us a way of repeatedly changing the position vvv in order to find a minimum of the function CCC. The rule doesn't always work - several things can go wrong and prevent gradient descent from finding the global minimum of CCC, a point we'll return to explore in later chapters. But, in practice gradient descent often works extremely well, and in neural networks we'll find that it's a powerful way of minimizing the cost function, and so helping the net learn.Indeed, there's even a sense in which gradient descent is the optimal strategy for searching for a minimum. Let's suppose that we're trying to make a move ΔvΔv\Delta v in position so as to decrease CCC as much as possible. This is equivalent to minimizing ΔC≈∇C⋅ΔvΔC≈∇C⋅Δv\Delta C \approx \nabla C \cdot \Delta v. We'll constrain the size of the move so that ∥Δv∥=ϵ‖Δv‖=ϵ\| \Delta v \| = \epsilon for some small fixed ϵ>0ϵ>0\epsilon > 0. In other words, we want a move that is a small step of a fixed size, and we're trying to find the movement direction which decreases CCC as much as possible. It can be proved that the choice of ΔvΔv\Delta v which minimizes ∇C⋅Δv∇C⋅Δv\nabla C \cdot \Delta v is Δv=−η∇CΔv=−η∇C\Delta v = - \eta \nabla C, where η=ϵ/∥∇C∥η=ϵ/‖∇C‖\eta = \epsilon / \|\nabla C\| is determined by the size constraint ∥Δv∥=ϵ‖Δv‖=ϵ\|\Delta v\| = \epsilon. So gradient descent can be viewed as a way of taking small steps in the direction which does the most to immediately decrease CCC.Exercises Prove the assertion of the last paragraph. Hint: If you're not already familiar with the Cauchy-Schwarz inequality, you may find it helpful to familiarize yourself with it. I explained gradient descent when CCC is a function of two variables, and when it's a function of more than two variables. What happens when CCC is a function of just one variable? Can you provide a geometric interpretation of what gradient descent is doing in the one-dimensional case? People have investigated many variations of gradient descent, including variations that more closely mimic a real physical ball. These ball-mimicking variations have some advantages, but also have a major disadvantage: it turns out to be necessary to compute second partial derivatives of CCC, and this can be quite costly. To see why it's costly, suppose we want to compute all the second partial derivatives ∂2C/∂vj∂vk∂2C/∂vj∂vk\partial^2 C/ \partial v_j \partial v_k. If there are a million such vjvjv_j variables then we'd need to compute something like a trillion (i.e., a million squared) second partial derivatives* *Actually, more like half a trillion, since ∂2C/∂vj∂vk=∂2C/∂vk∂vj∂2C/∂vj∂vk=∂2C/∂vk∂vj\partial^2 C/ \partial v_j \partial v_k = \partial^2 C/ \partial v_k \partial v_j. Still, you get the point.! That's going to be computationally costly. With that said, there are tricks for avoiding this kind of problem, and finding alternatives to gradient descent is an active area of investigation. But in this book we'll use gradient descent (and variations) as our main approach to learning in neural networks.How can we apply gradient descent to learn in a neural network? The idea is to use gradient descent to find the weights wkwkw_k and biases blblb_l which minimize the cost in Equation (6)C(w,b)≡12n∑x∥y(x)−a∥2C(w,b)≡12n∑x‖y(x)−a‖2\begin{eqnarray} C(w,b) \equiv \frac{1}{2n} \sum_x \| y(x) - a\|^2 \nonumber\end{eqnarray}$('#margin_1246306310_reveal').click(function() {$('#margin_1246306310').toggle('slow', function() {});});. To see how this works, let's restate the gradient descent update rule, with the weights and biases replacing the variables vjvjv_j. In other words, our "position" now has components wkwkw_k and blblb_l, and the gradient vector ∇C∇C\nabla C has corresponding components ∂C/∂wk∂C/∂wk\partial C / \partial w_k and ∂C/∂bl∂C/∂bl\partial C / \partial b_l. Writing out the gradient descent update rule in terms of components, we have wkbl→→w′k=wk−η∂C∂wkb′l=bl−η∂C∂bl.(16)(17)(16)wk→wk′=wk−η∂C∂wk(17)bl→bl′=bl−η∂C∂bl.\begin{eqnarray} w_k & \rightarrow & w_k' = w_k-\eta \frac{\partial C}{\partial w_k} \tag{16}\\ b_l & \rightarrow & b_l' = b_l-\eta \frac{\partial C}{\partial b_l}. \tag{17}\end{eqnarray} By repeatedly applying this update rule we can "roll down the hill", and hopefully find a minimum of the cost function. In other words, this is a rule which can be used to learn in a neural network.There are a number of challenges in applying the gradient descent rule. We'll look into those in depth in later chapters. But for now I just want to mention one problem. To understand what the problem is, let's look back at the quadratic cost in Equation (6)C(w,b)≡12n∑x∥y(x)−a∥2C(w,b)≡12n∑x‖y(x)−a‖2\begin{eqnarray} C(w,b) \equiv \frac{1}{2n} \sum_x \| y(x) - a\|^2 \nonumber\end{eqnarray}$('#margin_214093216664_reveal').click(function() {$('#margin_214093216664').toggle('slow', function() {});});. Notice that this cost function has the form C=1n∑xCxC=1n∑xCxC = \frac{1}{n} \sum_x C_x, that is, it's an average over costs Cx≡∥y(x)−a∥22Cx≡‖y(x)−a‖22C_x \equiv \frac{\|y(x)-a\|^2}{2} for individual training examples. In practice, to compute the gradient ∇C∇C\nabla C we need to compute the gradients ∇Cx∇Cx\nabla C_x separately for each training input, xxx, and then average them, ∇C=1n∑x∇Cx∇C=1n∑x∇Cx\nabla C = \frac{1}{n} \sum_x \nabla C_x. Unfortunately, when the number of training inputs is very large this can take a long time, and learning thus occurs slowly.An idea called stochastic gradient descent can be used to speed up learning. The idea is to estimate the gradient ∇C∇C\nabla C by computing ∇Cx∇Cx\nabla C_x for a small sample of randomly chosen training inputs. By averaging over this small sample it turns out that we can quickly get a good estimate of the true gradient ∇C∇C\nabla C, and this helps speed up gradient descent, and thus learning.To make these ideas more precise, stochastic gradient descent works by randomly picking out a small number mmm of randomly chosen training inputs. We'll label those random training inputs X1,X2,…,XmX1,X2,…,XmX_1, X_2, \ldots, X_m, and refer to them as a mini-batch. Provided the sample size mmm is large enough we expect that the average value of the ∇CXj∇CXj\nabla C_{X_j} will be roughly equal to the average over all ∇Cx∇Cx\nabla C_x, that is, ∑mj=1∇CXjm≈∑x∇Cxn=∇C,(18)(18)∑j=1m∇CXjm≈∑x∇Cxn=∇C,\begin{eqnarray} \frac{\sum_{j=1}^m \nabla C_{X_{j}}}{m} \approx \frac{\sum_x \nabla C_x}{n} = \nabla C, \tag{18}\end{eqnarray} where the second sum is over the entire set of training data. Swapping sides we get ∇C≈1m∑j=1m∇CXj,(19)(19)∇C≈1m∑j=1m∇CXj,\begin{eqnarray} \nabla C \approx \frac{1}{m} \sum_{j=1}^m \nabla C_{X_{j}}, \tag{19}\end{eqnarray} confirming that we can estimate the overall gradient by computing gradients just for the randomly chosen mini-batch. To connect this explicitly to learning in neural networks, suppose wkwkw_k and blblb_l denote the weights and biases in our neural network. Then stochastic gradient descent works by picking out a randomly chosen mini-batch of training inputs, and training with those, wkbl→→w′k=wk−ηm∑j∂CXj∂wkb′l=bl−ηm∑j∂CXj∂bl,(20)(21)(20)wk→wk′=wk−ηm∑j∂CXj∂wk(21)bl→bl′=bl−ηm∑j∂CXj∂bl,\begin{eqnarray} w_k & \rightarrow & w_k' = w_k-\frac{\eta}{m} \sum_j \frac{\partial C_{X_j}}{\partial w_k} \tag{20}\\ b_l & \rightarrow & b_l' = b_l-\frac{\eta}{m} \sum_j \frac{\partial C_{X_j}}{\partial b_l}, \tag{21}\end{eqnarray} where the sums are over all the training examples XjXjX_j in the current mini-batch. Then we pick out another randomly chosen mini-batch and train with those. And so on, until we've exhausted the training inputs, which is said to complete an epoch of training. At that point we start over with a new training epoch.Incidentally, it's worth noting that conventions vary about scaling of the cost function and of mini-batch updates to the weights and biases. In Equation (6)C(w,b)≡12n∑x∥y(x)−a∥2C(w,b)≡12n∑x‖y(x)−a‖2\begin{eqnarray} C(w,b) \equiv \frac{1}{2n} \sum_x \| y(x) - a\|^2 \nonumber\end{eqnarray}$('#margin_85851492824_reveal').click(function() {$('#margin_85851492824').toggle('slow', function() {});}); we scaled the overall cost function by a factor 1n1n\frac{1}{n}. People sometimes omit the 1n1n\frac{1}{n}, summing over the costs of individual training examples instead of averaging. This is particularly useful when the total number of training examples isn't known in advance. This can occur if more training data is being generated in real time, for instance. And, in a similar way, the mini-batch update rules (20)wk→w′k=wk−ηm∑j∂CXj∂wkwk→wk′=wk−ηm∑j∂CXj∂wk\begin{eqnarray} w_k & \rightarrow & w_k' = w_k-\frac{\eta}{m} \sum_j \frac{\partial C_{X_j}}{\partial w_k} \nonumber\end{eqnarray}$('#margin_801900730537_reveal').click(function() {$('#margin_801900730537').toggle('slow', function() {});}); and (21)bl→b′l=bl−ηm∑j∂CXj∂blbl→bl′=bl−ηm∑j∂CXj∂bl\begin{eqnarray} b_l & \rightarrow & b_l' = b_l-\frac{\eta}{m} \sum_j \frac{\partial C_{X_j}}{\partial b_l} \nonumber\end{eqnarray}$('#margin_985072620111_reveal').click(function() {$('#margin_985072620111').toggle('slow', function() {});}); sometimes omit the 1m1m\frac{1}{m} term out the front of the sums. Conceptually this makes little difference, since it's equivalent to rescaling the learning rate ηη\eta. But when doing detailed comparisons of different work it's worth watching out for.We can think of stochastic gradient descent as being like political polling: it's much easier to sample a small mini-batch than it is to apply gradient descent to the full batch, just as carrying out a poll is easier than running a full election. For example, if we have a training set of size n=60,000n=60,000n = 60,000, as in MNIST, and choose a mini-batch size of (say) m=10m=10m = 10, this means we'll get a factor of 6,0006,0006,000 speedup in estimating the gradient! Of course, the estimate won't be perfect - there will be statistical fluctuations - but it doesn't need to be perfect: all we really care about is moving in a general direction that will help decrease CCC, and that means we don't need an exact computation of the gradient. In practice, stochastic gradient descent is a commonly used and powerful technique for learning in neural networks, and it's the basis for most of the learning techniques we'll develop in this book.Exercise An extreme version of gradient descent is to use a mini-batch size of just 1. That is, given a training input, xxx, we update our weights and biases according to the rules wk→w′k=wk−η∂Cx/∂wkwk→wk′=wk−η∂Cx/∂wkw_k \rightarrow w_k' = w_k - \eta \partial C_x / \partial w_k and bl→b′l=bl−η∂Cx/∂blbl→bl′=bl−η∂Cx/∂blb_l \rightarrow b_l' = b_l - \eta \partial C_x / \partial b_l. Then we choose another training input, and update the weights and biases again. And so on, repeatedly. This procedure is known as online, on-line, or incremental learning. In online learning, a neural network learns from just one training input at a time (just as human beings do). Name one advantage and one disadvantage of online learning, compared to stochastic gradient descent with a mini-batch size of, say, 202020. Let me conclude this section by discussing a point that sometimes bugs people new to gradient descent. In neural networks the cost CCC is, of course, a function of many variables - all the weights and biases - and so in some sense defines a surface in a very high-dimensional space. Some people get hung up thinking: "Hey, I have to be able to visualize all these extra dimensions". And they may start to worry: "I can't think in four dimensions, let alone five (or five million)". Is there some special ability they're missing, some ability that "real" supermathematicians have? Of course, the answer is no. Even most professional mathematicians can't visualize four dimensions especially well, if at all. The trick they use, instead, is to develop other ways of representing what's going on. That's exactly what we did above: we used an algebraic (rather than visual) representation of ΔCΔC\Delta C to figure out how to move so as to decrease CCC. People who are good at thinking in high dimensions have a mental library containing many different techniques along these lines; our algebraic trick is just one example. Those techniques may not have the simplicity we're accustomed to when visualizing three dimensions, but once you build up a library of such techniques, you can get pretty good at thinking in high dimensions. I won't go into more detail here, but if you're interested then you may enjoy reading this discussion of some of the techniques professional mathematicians use to think in high dimensions. While some of the techniques discussed are quite complex, much of the best content is intuitive and accessible, and could be mastered by anyone. Implementing our network to classify digitsAlright, let's write a program that learns how to recognize handwritten digits, using stochastic gradient descent and the MNIST training data. We'll do this with a short Python (2.7) program, just 74 lines of code! The first thing we need is to get the MNIST data. If you're a git user then you can obtain the data by cloning the code repository for this book,git clone https://github.com/mnielsen/neural-networks-and-deep-learning.git If you don't use git then you can download the data and code here.Incidentally, when I described the MNIST data earlier, I said it was

      @fuelpress

    1. Older spouses may be more mature, but later marriage has its own challenges.

      If you think about it, do older spouses last longer? I have heard and read so many articles about spouses divorcing because they've learned what they wanted in their life because of how open minded we are now. Some older couples even come out as gay/lesbian! I feel like marriages have their hits or misses.

    1. When school administra-tors take away students’ phones or tell them to put them away during class time, they are teaching implicit lessons about the kind of work environments these students are expected to en-ter. In this light, digital literacies are a matter of social justice

      I can see it from this perspective, but reading this also made me wonder... adolescents generally have rules and structures around them because while they look mature, their brains aren't yet fully formed. While I'm all for young people making their own mistakes and learning their own lessons, I also believe it's important to guide them with their decision making. Perhaps guidelines rather than rules would be more appropriate here. When I think of a classroom where phones are allowed to be used out in the open as much as students like, I fear that many students may lack the self-discipline or possibly even the value for education or respect for a teacher enough to know they should temper their usage of devices in the classroom.

    1. But while the urban tribe helps us survive, it does not help us thrive. The urban tribe may bring us soup when we are sick, but it is the people we hardly know—those who never make it into our tribe—who will swiftly and dramatically change our lives for the better.

      I never found my "urban tribe" Maybe because I don't get stuck with the same thing for years. Meeting different people make me see other things that are out there. Once in a while its good to hang out with the group who have same interest in the music you listen or the movies and TV shows. Whatever the case may be, it can get boring in time with the same thing and just get stuck there in the same loop. I think this Urban tribes really are just for young people as there maturing their figuring out who they are.

    1. Each time we are handed any piece of literature, we are given a story made up of different features. This may include elements like genre, audience, and purpose. Genre provides the reader with an idea about what will happen as they read. It will also provide some sort of background, timeline, and even give into the storyline just on the basis of what the author has chosen the genre of their piece to be. There are many different types of genre including romance, mystery, and even thriller. The audience is the group of people that the author is trying to convey their message to, or in general just the people who they want to reach. The message is specific to the audience and I think genre plays a part in who your audience will be. If you’re writing a fantasy novel, those who enjoy reading fantasy will be more likely to read it. However, if you’re writing a non-fiction piece, your audience will most likely be different. And the list continues, as many people enjoy reading different types of literature. So as I mentioned, genre and even purpose may play a role in who your audience will be, but the message is what exactly and who exactly will make up your “audience”. Purpose is the point you are trying to make, it is one’s way of expression and or presentation of information. This is the author’s way of communicating with their audience.

      I wonder if you can streamline this long opening

    1. Our primary priority should neither be minimizing cost nor maximizing pedagogical flexibility. Our primary priority should be increasing student learning, and our efforts to reduce costs and increase pedagogical flexibility must always be subservient to that end. When we fail to put student learning first, we can become zealots who confuse the means with the ends.

      This is tortured. The only difference I can see between priority 1 and preferred priority 2 seems to be an opportunity to sneak something in that adds cost (profit) under the claim that it's better for student learning. As if the top priority of OER or ZTC "fanatic" educators isn't student success.

      I think it's easier to find common ground than the author suggests. And I suspect much of the ZTC and OER fanaticism may be coming from outside the ranks of educators, via political focus that ignores nuance.

  10. Sep 2019
    1. Express.co.uk

      Hello, I am the Citerpress bot :) I think this sentence is mentioning a news article without an explicit link. I looked in my news database and here is what I found:

      Hit #1 (score of 51.9)

      Hit #2 (score of 50.7)

      Hit #3 (score of 48.1)

      Hit #4 (score of 47.6)

      Hit #5 (score of 47.5)

      I did my best! My annotations will get better and better with time, as I index new pages every day.

    2. Express.co.uk

      Hello, I am the Citerpress bot :) I think this sentence is mentioning a news article without an explicit link. I looked in my news database and here is what I found:

      Hit #1 (score of 45.3)

      Hit #2 (score of 45.1)

      Hit #3 (score of 42.0)

      Hit #4 (score of 41.6)

      Hit #5 (score of 41.0)

      I did my best! My annotations will get better and better with time, as I index new pages every day.

    3. Express.co.uk

      Hello, I am the Citerpress bot :) I think this sentence is mentioning a news article without an explicit link. I looked in my news database and here is what I found:

      Hit #1 (score of 51.9)

      Hit #2 (score of 50.7)

      Hit #3 (score of 48.1)

      Hit #4 (score of 47.6)

      Hit #5 (score of 47.5)

      I did my best! My annotations will get better and better with time, as I index new pages every day.

    4. Express.co.uk

      Hello, I am the Citerpress bot :) I think this sentence is mentioning a news article without an explicit link. I looked in my news database and here is what I found:

      Hit #1 (score of 45.3)

      Hit #2 (score of 45.1)

      Hit #3 (score of 42.0)

      Hit #4 (score of 41.6)

      Hit #5 (score of 41.0)

      I did my best! My annotations will get better and better with time, as I index new pages every day.

    1. Note: The peer reviews in Peerage of Science are judged and scored for accuracy and fairness by other reviewers. The Weight -value indicates that, relative to the best review (Weight=1.00)


      Review by Peer 1755 (Weight = 1.00)

      Introduction: This paper presents a Bayesian model of mating in a fish, that combines behavioural data on encounters and matings with genetic parentage data. It contrasts this model with classical analyses that use only particular facets of these data.

      Merits: In my opinion, this paper's most important merits are:

      That the model makes conceptual sense, and is presented in a way that is fairly easy to follow.

      That the authors share the model code and data. This will make the model a lot more useful for other researchers.

      That the paper is well written.

      Critique: Despite this, I think there are things that could be clarified or improved:

      1. There seems to be a considerable skew in the reproduction data. This is expected, but this comes with a risk violating the assumptions of common statistical models. Does the models used adequately capture this? In particular, the correlation coefficients (Figure 1) must be largely driven by single influential data points.

      2. Given the above skew and structure of the data and that the model results extrapolates quite a bit from what was observed, it would be nice to see more through checks and discussion about the validitiy of the model. How well the model can reproduce features of the data? The posterior predictions in Figure 4 seem to indicate that the model fits data rather poorly? But I may be mistaken, and the manuscript does not interpret these results much.

      3. I got the JAGS model to run with only minor editing (that is, moving the data generating code to its own file). However, I can't, using the data in the script, recover the scatterplots and Pearson correlations displayed in Figure 1. I assume my analysis (see attached Sweave pdf output) is wrong somehow, suggesting a need for better documentation so that readers such as myself can understand the data. It may help to clarify what variables are what, which samples have been omitted (from what analyses and for what reasons), and store the data in tabular format in addition to the JAGS input format. It would also be a nice addition to have the code used for running the model and summarising the results -- it would save a user quite a bit of effort without much work on behalf of the authors.

      4. The sample sizes for data on releasing of gametes are particularly small. One wonders how much information they contribute? Similarly, both observations (line 248) and modelling (line 305-307) suggest that many encounters were not observed. How does this affect conclusions? This ability to deal with incomplete data is highlighted as a feature of the model. Is there arguments or data that show that it is successful?

      5. In the Introdution and Abstract, one of the motivations for this approach is to capture effects of interactions of the phenotypes within a pair. But then, "Unfortunately our dataset is too small to properly infer the effect of interaction" (line 428-429). First, previous the focus on this unused feature of the model seems misplaced. Second, it is not clear when a dataset is too small and how you know that (presumably by trying a model not shown?).

      6. I think this paper would benefit from more illustration. Figures 1 and 3 are hard to read with small differently shaped symbols, line patterns, and overplotting. I would suggesting making separate plots for males and females to alleviate some of the clutter. Figure 1 b is particularly unreadable. The plots of posteriors are fine, and probably should be in the paper, but I think they should be supplemented with some descriptive graphics that give a feel for the structure of the data and the behaviour of the fish. I would even love to see some visuals of fish mating, maybe stills from the video recordings (or even a supplementary video). Of course, this may be limited by space requirements of the target journal, or nor to the author's taste. But I think you underestimate how cool some of these things are, especially if you aim for a wide audience not well versed in fish mating research.

      Discussion: This is likely beyond the scope of this paper, but I feel that a lot of the questions about the model -- does it work on small datasets; does it successfully account for unobserved encounters; how does its parameters relate to the "classical" measures of sexual selection -- could better be answered with simulated than with real data. I sympathise the use of real data: a good biological example is a lot more convincing to biologists than simulations. However, I feel that there are often too many uncertainties in comparing methods on real data. Results of different methods differ, like the "classical" and the new analyses in this study. But which are right?

      Additional Comments for Authors

      1. The paper would benefit from a two sentence explanation of opportunity for selection, what it measures, and the distinction between opportunity for selection and opportunity for sexual selection.

      2. L8-10: The opening of the abstract sets up the paper to be rather technical, jumping directly into marginal sums of matrices. I think you may want to rethink that approach if the goal is too reach, as the author message said, "a wide audience of ecologists and evolutionary biologists".

      3. For the same reason, I'd advice against the introduction of a 3-dimensional array on line 34. Even if that is mathematically correct, it is immediately going to be summed to the a parental table. Therefore, the 3-dimensional structure doesn't really contribute much, except act as an obstacle to mathematically less savvy readers.

      4. L48-49: "strong link" could be made more precise.

      5. Line 123-124: "The experimental setup is the one used in the "constant environment" treatment in Gauthey et al. (2016)." What is the relationship between this work and Guthey et al 2016? Can this be made clearer?

      6. Lines 226: "po" is not defined in this section. I think the manuscript would benefit from being checked an extra time for mathematical symbols, when they are defined, how they are referred to, and if they can be spelled out in text to help the reader.

      7. Line 270: "Model output" is not a very informative subtitle. I'd suggest dividing the Results into one subsection on the data set, one on the "classical" analyses of sexual selection, and one on the model.

      8. Some of the chocies about model structure (specifically, use of informative priors) is discussed in comments in the model code, but not in the Methods. They should be in the Methods too.


      Review by Peer 1765 (Weight = 0.88)

      Introduction: This paper aims to solve a long-standing issue in sexual selection studies in natural populations: that genetic and behavioural data tell us different things about separate stages of sexuals selection and, therefore, often focus on different processes in sexual selection. While behavioural data tend to focus on mate sampling and mate choice, genetic data provide evidence on the resulting mating/reproductive success. This paper makes an important step in trying to combine both types of data in order to analyse the complete process of sexual selection. Such a tool could substantially advance the field of sexual selection in natural populations. I was very enthousiastic about this approach, until I arrived at Figure 4, which shows that the predictions from model the authors suggest does not correlate at all with the observed data from their case study, suggesting the model is possibly very well thought through, but does not represent the data well. Without empirical evidence, I do not see any reason to put the results of the model above those of the classical methods.

      Merits: The paper describes the model used in a way that is mostly very clearly understandable for non-modelers, which is important for the general use of the proposed method. Moreover they include a case-study which very nicely links the theory to experimental data.

      Critique: The suggested model provides different results from more classical methods of analysing the data. The authors then go on to defend the model as a better way to analyse the data, because they find different results. However, they do not provide evidence that the results from the model fit the data better than the results from the classical analyses. In fact, Figure 4 shows that the model is actually rather bad in predicting observed encounter rates, gamete releases and offspring numbers, because there seems to be no correlation whatsoever between observed and predicted data. For example, many females that did sire large numbers offspring were not predicted to have any offspring according to the model (Fig. 4c). This is not discussed in the paper. I do commend the authors for testing their model on a case study, and combine a theorethical appraoch with an experimental one, but the difference between predicted and observed data should be discussed. The authors could compare the model predictions to the predictions from the classical analyses and see which analyses fit best with the observed data.

      Terminology: Encounter rate is a term that is generally reserved for random events depending on population density and sex ratio. However, the way it is used in the case study (which is certainly the most practical for field observations) includes a certain effect of attraction. In most species, males and females do not generally end up close to a spawning ground/ nest without being attracted by some aspect of the individual or this particular nest. The authors are likely aware of this, because they test for an effect of female size on encounter-rate. The fact that they do not find such an effect does not exclude that their may have been attraction to other characteristics of the female or the nest-site. Therefore, I would suggest to use another word for encounter (for example inspection or visit) to avoid confusion between an event where individuals have likely already been attracted to each other (as used in the case study) and a random "encounter". The latter is, however, impossible to quantify in the field, because it is generally impossible to spot whether two individuals have noticed each other and I see no reason to include it in the model.

      Discussion: The paper addresses a very important issue in the study of sexual selection: how to combine behavioural and genetic data to study the strength of sexual selection. As the authors rightly argue, both types of data omit important processes in sexual selection and very few studies manage to get both types of data for all (or even most) mating events. The model they suggest would make use of incomplete behavioural and genetic data to explain the underlying processess. Such a model could provide an important tool for sexual selection studies. However, the case study the authors provide suggests that the model is not very good at predicting real case scenarios. Therefore, the autors should investigate how the model could be changed to reflect their experimental data. Doing so would provide an important paper that would be very valuable to the field.


      Review by Peer 1758 (Weight = 0.85)

      Introduction: This manuscript offers a statistical alternative to classical sexual selection gradient analysis by using Bayesian inference that allows accounting for male and female effects simultaneously. Furthermore, the authors highlight that mating success is generally underestimated because it is based on the genetic assignment of offspring. The authors use their own data on the mating behaviour and reproductive output of brown trout to compare the results from classical selection analysis with their Bayesian model and find differences between the two.

      Merits: This manuscript is relevant because it highlights limitations of classical sexual selection gradient analysis, and offers a statistical alternative to empiricist with suitable data. I have the following suggestions, which I hope will be useful in revising the authors' original contribution. Also, I welcome that the authors made their research transparent by adding their data and code. However, I want to make clear that I could not review their code because of incompatibilities with JAGS and my software. ​

      Critique: The authors statistical alternative is motivated by two shortcomings to (a) account for the interdependence of females and males in sexually reproducing species and (b) getting a grip on the copulatory behaviour instead of inferring it from offspring data. Whilst I agree that (b) is pressing, (a) depends on the mating systems, e.g. in strictly monogamous species, male and female identity overlap and fitting both would not be informative or appropriate for the analysis of sexually selected individual phenotypic traits. Hence, the applicability of the authors' model would profit from information on its suitability for different mating systems, i.e. expand on "a variety of biological systems", l24, in the discussion. Also, the authors approach also relies on empirical data. In other words, the best model does not change that if mating success lacks behavioural observations, and it usually does, we can only make incomplete inferences. In my view, the main contribution of this manuscript is thus to serve as an important reminder of the complexities at play and the importance of comprehensive data collection, rather than a new tool for measuring sexual selection. Also, the pitfalls and shortcomings, (e.g. bias in stochasticity, what is the null model, operational sex ratio) when measuring sexual selection have been comprehensively illustrated here (Klug, Heuschele, Jennions, & Kokko, 2010) and here (Jennions, Kokko, & Klug, 2012). So, I recommend a more inclusive portrait of the matter and attuning with published jargon (e.g. Table 1 in (Klug, Heuschele, Jennions, & Kokko, 2010).

      • I advocate that the full results of the linear regression analyses as well as the alternative JAGS model are presented in table format in the main text. Results in the supporting information get missed easily, and plots cannot substitute full estimates.

      • The authors could expand more on discussing their most interesting finding, which is the discrepancy between their results using classical regression analyses and Bayesian analysis.

      Discussion: This manuscript is motivated by two shortcomings of the classical sexual selection gradient analysis. I agree with the relevance of one of them (i.e. measuring mating success) and yet argue that the relevance of accounting for the additive effects of the sexes for reproductive success is highly dependent on the species mating system, which the authors should address. I also think that the authors should make clearer that their analysis still depends on empiricists collecting data on mating success. I welcome the authors approach to use their own data to compare whether body size of male and female brown trout might be sexually selected. If the authors revise the current version, their manuscript will serve as an important reminder of what to look out for when analysing potentially sexually selected traits.

      References Jennions, M. D., Kokko, H., & Klug, H. (2012). The opportunity to be misled in studies of sexual selection. Journal of Evolutionary Biology. http://doi.org/10.1111/j.1420-9101.2011.02451.x

      Klug, H., Heuschele, J., Jennions, M. D., & Kokko, H. (2010). The mismeasurement of sexual selection. Journal of Evolutionary Biology. http://doi.org/10.1111/j.1420-9101.2009.01921.x

      Schlicht, E., & Kempenaers, B. (2013). Effects of social and extra-pair mating on sexual selection in blue tits (Cyanistes caeruleus). Evolution, 67(5), 1420-1434. http://doi.org/10.1111/evo.12073

      Additional Comments for Authors l14: be clearer on "costly" or delete because costs were not measured

      l27: add or consider selection gradient, see Table 1 in Klug et al 2010

      l44: ambiguous "to do so". Which of the indices exactly?

      l52 infertile not unfertile

      l53 reference "cost of reproduction"

      l64 reference costs

      l65 back up the claim of "are essential to understand..."

      l68 better name the "fourth definition"

      l88-89 reference

      l93 define "a pair", e.g. socially monogamous? This could be an opportunity to introduce the mating system you want to target

      l109-111 reference?

      l113-115 reference?

      l116 in brown trout? Please add citation

      l120 "a" semi-natural...

      l120-123 split into two sentences to improve readability, e.g. This period represents the trout...

      l124: chemically communicated?

      l129: highly female biased, which might be biological meaningful or a catching bias, please explain. Plus this skew in adult sex ratio will affect the variance in mating success, i.e. "chance variation in mating success is higher when there are fewer potential mates per individual of the focal sex" (Jennions et al 2012), this affects both your statistical approaches but it nowhere mentioned

      l132 how did you sex? Molecularly?

      l145: one or multiple observers? also "taken" not "took"

      l148 any proof? repeatability tests? references for the claim?

      l149 say how you dealt with the 30% for analyses

      l150 rephrase "the zone", e.g. female nesting/egg release site, etc.

      l156 consider "spawning" or gamete release instead of copulating

      l159 "degree day" reads misplaced, only use estimate of time after spawning

      l172 its

      l186 consider making clearer that zero's were included

      l247 depending on where you want to submit avoid fish jargon: "redd"

      l249 give output of all linear regression analyses in table

      l271 I suggest moving these to the main text

      l278 why not report Credible Intervals instead of SDs? Also, SDs show high uncertainty in estimates, which should be addressed in the discussion

      l333-4 reference

      l336 rephrase "to account for..."

      l335 give time unit, e.g. over the course of the experiment

      l336 Comment: I disagree because sexual selection is commonly referred to as the opportunity for evolutionary change, which is the variance in relative fitness and should consider all reproductively mature adults, hence should be measured among individuals that do and do not interact/mate. Especially the latter is usually omitted, but ignoring unmated individuals in a population will automatically inflate the variance of the successful subset (see also (Schlicht & Kempenaers, 2013)).

      l418-19 rephrase, unclear

      Plots: General comment: It might be the pdfs but the quality of plots is low and generally offsetting the raw data a bit, e.g. jittering would help viewing individual data points


      Review by Peer 1761 (Weight = 0.67)

      Introduction: The authors point out how the study of mating systems only using behavioural observations or genetic data usually fails to explain accurately the breeding processes and reproductive outcomes, as well as their relationship with sexual selection features.

      They propose a model that combines both behavioural and genetic data, and a phenotypic trait linked to sexual selection, using brown trout as model species.

      Their model includes several breeding variables behavioural and genetic, and it very adaptable as is able to incorporate other environmental or biological variables if needed.

      They show how genetic and behavioural results analyzed separately may differ. Also, how the results from their model and the classic regression analyses to analyse this data also differ, and so, they aim to explain why.

      Merits: The model they have built seems flexible enough to be adapted to multiple taxa and systems.

      Critique: There is no reference at all about ethics permissions to perform the described experiment. I am quite shocked about this since high numbers of individuals from a wild population were killed.

      There is no mention on the conservation status of the species, the permits obtained to carry out the capture and experiment, the effect of the capture system on the ecosystem, or the explanation/justification for the use of lethal methods.

      For example, I find electrofishing highly non-targeted and I wonder how was its impact on other non-target fish (and non-fish) species. I believe that assembling a team of fishermen to get the same number of adult specimens would be easy enough to arrange.

      My point is not whether the methods were ethically acceptable or not (that is for the journals' ethics committees to decide) but to, at least, justify and explain their use.

      Model testing: I understand that in ecology studies usually researchers don't get all behavioural or all genetic data, and that is what the models try to compensate for. However, when testing models in a biological system the ideal situation is to work in a system where almost all information can be collected (ussualy under lab conditions), build a model with all that information, and then subsample the data (as to simulate a real ecological study) to test the model performance.

      In this study, however, the initial sampling for the data is quite small, specially for behavioural observations (30min/day). Then, the results from the model are quite different from the results obtained from more classic approaches. The authors offer some hypotheses to explain these differences, but they can't be really tested to see whether the authors' model results are better in explaining the system or not.

      All that said, I have to admit that I lack the mathematical background to fully understand and evaluate the model design and performance, and a more qualified researcher should do that.

      Discussion: Although the experimental approach to test the validity of the model predictions could have been better, their attempt to combine behavioural and genetic data in mating system studies and relate it to sexual selection is an important step forward in the behavioural field.

      Hopefully, more efforts like this will be made to reconcile both aspects of the study of mating systems that rapidly changed from behavioural observations only to genetic analyses only.


      Review by Peer 1773 (Weight = 0.51)

      Introduction: In accordance with traditional approach to estimate the effect of sexual selection on phenotypic trait the number of mates should be regressed on a target phenotypic trait in a separate model for each sex. Such analysis ignores common investment of the sexes into mating success. The authors propose a new approach, which allow combining behavioral and genetic data, thereby enabling to gather information through the successive processes of encounter, gamete release and offspring production.

      Merits: The new approach accounted for the three-dimensional structure of the data: males, females and mating occasions. This allowed a qualified definition of mating success and disentangling the joint effects of male and female phenotypes on the different components of reproductive success. Three important features that lack in the traditional approach characterize the authors' model:

      1) conditioning of each process (encounter, gamete release and offspring production) on the preceding one,

      2) simultaneous estimation of the effect of male and female phenotype,

      3) random individual effects.

      ​The authors tested their model on a brown trout and obtained quite different results for the two approaches.

      ​The model can be used for a variety of biological systems where behavioral and genetic data are available.

      Critique: The model should be tested on a larger sample.

      The title of the manuscript is not very successful.

      ​There is a couple of misprints: p. 7 l. 139 and p. 8 l. 159.

      Discussion: This is very important when new algorythms allow to obtain more information from the same set of data. Hopefully, it would be of great importance if the model can be developed to account for real behavior traits in species presenting complex courtship behavior like Drosophila for instance.

    1. Like the national debt, the homeless population, gun ownership, and job insecurity, television grew prodigiously in the 1980s.

      I find it very interesting that this article put television in the same category as big issues like gun ownership and the homeless population. We may not think of it as a huge deal now but years ago it was a big topic.

    Annotators

    1. However, the artists of West Meets East do not possess institutional power, and are instead most likely more suppressed by institutional norms of boundary and difference that often accompany immigration.

      This is an important thing to bring up. That the artists (Bengali Girls) themselves did not have power. It was interesting to tie this to agitator/constructor as we usually talk about the "main" artist(s) in a work as having influence and in this case, the girls themselves did not. It brings up the point that creating change/making an impact is quite difficult to do outside of art anyway and even harder when we take into social identities (of artists) and the protection or support afforded to them. On the other hand, I wish there was the inclusion of Loraine Leeson and the group/organization she worked for it. Leeson or the group may have had some institutional social power, financial support (independent, donor, etc.) even if it was small in order to put it up in a public like a billboard or to get the materials maybe?? Like you shared, it is unlikely that the Bengali Girls themselves, or just anyone in general could have the power to hang their work of that size in a public space with an encased description ( I think). Also, I am not sure, but maybe there were protections put on the work from the city to make sure it was in condition or no harm came to it??? These may be interesting hidden components of the exhibition to consider

    1. Since I weeded out the folks that don’t teach their kids logic in the first two paragraphs, as representatives of the real world it’s up to the rest of us to spread the knowledge. It won’t be easy. The best thing we can do is teach these thought processes to our children, so that they may look at other children with looks of bewilderment when other children are unable to solve simple tasks. Hopefully, they will not simply do the task for them, but teach them to think. I’m not saying we need to build a whole new generation of project managers and analysts, but it would be better than a generation of task-oriented mindless office drones with untied shoelaces, shoving on a door at the Midvale School for the Gifted.

      As the author mentioned in the first two and last paragraphs about children, I think he is trying to compare children then and now and to tell us that we should raise our kids the same way as we are raised, so they can fully develop their critical thinking skills to help others.

    1. to countries without regard to the recipients’ needs or capacity.

      <br>

      Source Excerpt (Source 1): Letter to Louis F. Medeiros, June 23, 1959, about "military assistance to Iraq and other similar nations ... [para break] ... It has been discussed in relation to arms shipments to Iraq, jet shipments to Ethiopia, and the program of assistance which we are carrying out in Pakistan and also in South American countries. It is quite clear that many of our arms shipments have no relation to strategic requirements and in fact are often unusable by nationals of the state to which they are sent."

      Source Excerpt (Source 2): Second: "What about the balance between military and economic aid?" Answer: "This is another question in this field of foreign aid which has become blurred by discussion. It seems to me that one first has to decide whether the exigencies of the international situation really demand the kind of forces which we support throughout the world. My own view is that we have tended to follow military aid program patterns which were designed to fit situations which have now changed drastically from the standpoint of our over-all military strategy. I feel that we may be the victims of the same kind of administrative and policy lag in the area of planning military aid as I think we were faced with in connection with missile development. I don't think this problem boils down to a question of military aid versus economic and technical assistance. There are many situations where we need both. But because military programs can impose such a dreadful burden on any economy, particularly that of a less industrially developed country, I think we should be very careful in terms of both their assets and liabilities, both to us and the country concerned."

      Data Sources:<br> Source 1: https://doi.org/10.5064/F68G8HMM/F9FWOA <br> Source 2: https://doi.org/10.5064/F68G8HMM/UYLXQE

      Full Citation (Source 1): JFK to Louis F. Medeiros, June 23, 1959, Pre-presidential Papers-Senate Files, Box 716, JFK Library.

      Full Citation (Source 2): JFK, Draft, N.D.(titled "What about the Balance between Military and Economic Aid?"), Pre-presidential Papers-Senate Files, Box 561, JFK Library.

    2. to maintain a status-quo wherever we find existing regimes anti-communistic.”

      <br>

      Source Excerpt: "We in America are apt to think of Asia in terms of teeming millions who live in squalor and who are deemed to no better fate. Poverty, lack of medical care and illiteracy are indeed the first to meet the eye of the new-comer, to that area. But the future of Asia may be made bright if we will only study its potential, and the alliance of Asia and democracy can be made steadfast if we heed the warning. [para break] The rough bottom of Asia's problem is landlordism. Who shall own the land. For centiries [sic] it has been in the hands of the powerful and wealthy few. The peasant has concluded that he has no escape but revolution itself from the crushing yoke of tenancy. [para break] We send technical experts abroad to help in seed selection, soil conservation, malaria control and the like. But we never raise or voices to better the economic lot under a land system where increased production merely enriches the few. We seem to forget that health programs and the like merely increase the number of people among whom the existing poverty must be rationed[.] [para break] We put billions of dollars behind corrupt and reactionary governments which exempt the rich from income taxes and fasten the hold of oligarchy tighter and tighter on the nation. [para break] The fact is that America has been so engrossed in providing a defense against Communism that we have lost the initiative. Our great weakness has been our negative attitude. We have been anti-communist. We have been "Pro" nothing. [para break] No matter how feverish our efforts, the red tide of Communism seems to spread abroad. We are seized with panic as the water laps on feeble dikes. So, we rush to the support of every group which opposes Soviet Communism. That puts us in partnership with the corrupt and reactionary groups whose policies breed the discontent on which Soviet Communism feeds and prospers--groups which might have long ago collapsed if it had not been for our assistance. In short we even support and sustain corruption and tyranny to maintain a status-quo wherever we find existing regimes anti-communistic." [end of page]

      Data Source: https://doi.org/10.5064/F68G8HMM/GALQ86

      Full Citation: JFK, Speech to Massachusetts Federation of Taxpayers Associations, April 21, 1951, Pre-presidential Papers-House Files, Box 95, JFK Library. (p. 6)

    3. “Uncle Sugar is as dangerous a role for us to play as Uncle Shylock.”

      <br>

      Source Excerpt: "There is not time today to fill in further details of this journey. But there is and must be time for all of us to try and understand the meaning of these events, to bring some order out of our confusion and what we ought to do about them. I say advisedly 'all of us', for just as I remarked the other night -- 'Our Foreign Policy is too important a thing to be left to the experts and the diplomats alone'. [para break] We must, I suggest, try and think in terms of three categories of things -- the things we cannot and must not do, the things we are doing that we should not be doing, and the things we are not doing that we should be doing. [para break] Let me first list the things we cannot and must not do. They are: [para break] FIRST: We cannot reform the world. We cannot and should not impose upon this Eastern world our values, our institutions or our customs. True, there is a basic sameness in all men, the desire to be free from want, from illness, from tyranny. But, however much we may value our conceptions of suffrage, our mechanical well-being, even our bathtubs, the East may think little or nothing of them. [para break] SECOND: We cannot abolish the poverty and want that for centuries has characterized this area. There is just not enough money in the world to relieve the poverty of all the millions of this world who may be threatened by Communism. We cannot and should not attempt to buy their freedom from this threat; all we can do is help them achieve that freedom if they really wish to do so. Our resources are not limitless. The vision of a bottle of milk for every Hottentot is a nice one, but it is not only beyond our grasp; it is far beyond our reach. Moreover, we ought to know now that more expenditures bring no lasting results. People who are with us merely because of the things they get from us are weak reeds to lean upon. And we do these peoples no good by such uncontrollable expenditures, for we tend by our very generosity to create a spirit of dependency that... destroys their will to rely upon their own strength. The thirty billions that we are spending in Europe since the war have yet to prove that they have made for the self-reliance of that area and will make those nations worthy bastions of defense. But whatever may be true there, to repeat such a procedure in Asia or in the South Pacific is impossible. We must make this plain not only to our people at home but plain beyond any peradventure of doubt to our Asiatic friends. There must be no misunderstanding on this score. Uncle Sugar is as dangerous a role for us to play as Uncle Shylock. [para break] Now let one turn to my second group of the things we are doing that we should not be doing. [para break] FIRST: Our representatives abroad should be not merely citizens of the United States but Americans dedicated to the principles that we live by. We have no need to apologize that is American, from the merchants of Boston, to the backwoodsmen of Tennessee or the loggers of the great Northwest. All this is America. We want no aping of foreign customs or the personal arrogation to our representatives of privileges given to them because they come from a powerful country. With some notable exceptions who are doing a real job for us under difficult circumstances, our representatives abroad seem to be a breed of their own, moving mainly in their own limited circles not knowing too much of the people to whom they are accredited, unconscious of the fact that their role is not tennis and cocktails but the interpretation to a foreign country of the meaning of American life and the interpretation to us of that country's aspirations and aims. [para break] SECOND: We must make no broad, unlimited grant, to any government. Aid and help in the matter of techniques is a different thing. It is concrete and business-like to tender help along these lines. But as some of our recent experience demonstrates, more grants of money are debilitating and wasteful. More than this, they favor the 'ins' as contrasted from the 'outs'. Techniques, however, favor neither; Service and 'know-how' are neutral. [para break] THIRD: Our propaganda must reach all levels and all types of men. Nothing seemed quite so futile to me as the current practices of the Voice of America. Fashioned to short-wave radio sets that only the rich can afford, often transmitted in languages that only the rich have been...

      Data Source: https://doi.org/10.5064/F68G8HMM/C5SL2T

      Full Citation: JFK, Speech to Boston Chamber of Commerce, November 19, 1951, Pre-presidential Papers, Campaign Files, Box 102, JFK Library. (pp. 7-8)

    4. the East may think little or nothing of them.”

      <br>

      Source Excerpt: "There is not time today to fill in further details of this journey. But there is and must be time for all of us to try and understand the meaning of these events, to bring some order out of our confusion and what we ought to do about them. I say advisedly 'all of us', for just as I remarked the other night -- 'Our Foreign Policy is too important a thing to be left to the experts and the diplomats alone'. [para break] We must, I suggest, try and think in terms of three categories of things -- the things we cannot and must not do, the things we are doing that we should not be doing, and the things we are not doing that we should be doing. [para break] Let me first list the things we cannot and must not do. They are: [para break] FIRST: We cannot reform the world. We cannot and should not impose upon this Eastern world our values, our institutions or our customs. True, there is a basic sameness in all men, the desire to be free from want, from illness, from tyranny. But, however much we may value our conceptions of suffrage, our mechanical well-being, even our bathtubs, the East may think little or nothing of them. [para break] SECOND: We cannot abolish the poverty and want that for centuries has characterized this area. There is just not enough money in the world to relieve the poverty of all the millions of this world who may be threatened by Communism. We cannot and should not attempt to buy their freedom from this threat; all we can do is help them achieve that freedom if they really wish to do so. Our resources are not limitless. The vision of a bottle of milk for every Hottentot is a nice one, but it is not only beyond our grasp; it is far beyond our reach. Moreover, we ought to know now that more expenditures bring no lasting results. People who are with us merely because of the things they get from us are weak reeds to lean upon. And we do these peoples no good by such uncontrollable expenditures, for we tend by our very generosity to create a spirit of dependency that..."

      Data Source: https://doi.org/10.5064/F68G8HMM/C8DNYB

      Full Citation: JFK, Speech to Boston Chamber of Commerce, November 19, 1951, Pre-presidential Papers, Campaign Files, Box 102, JFK Library. (p. 7)

    1. [Note: this preprint has been peer reviewed by eLife. The decision letter after peer review, based on three reviews, follows. The decision was sent on 17 June 2019.]

      Summary

      Natural Killer (NK) and the ILC1 subset of innate lymphoid cells share related functions in host defense but have been argued to arise from distinct pathways. Park et al present new evidence challenging this concept. They show that murine Toxoplasma gondii infection promotes the differentiation of NK cells into an ILC1-like cell population which is stable and long-lasting, even after the infection has been cleared. These T. gondii induced cells, unlike Eomes+CD49a- NK cells, are Eomes-CD49a+T-bet+ and therefore resemble ILC1 cells. The authors additionally show that their differentiation involves Eomes down regulation and is STAT-4 dependent, However, in common with NK cells and distinct from ILC1 the T. gondii induced "ILC-like" population circulates to blood and lungs. Finally, the authors employ single cell RNAseq to examine the heterogeneity of the major T. gondii induced innate lymphocyte populations and their NK vs ILC relatedness as assessed by gene expression. Together, their observations establish a previously unappreciated developmental link between NK and ILC1cells in the context of infection.

      The 3 reviewers and editor agree that this is an important contribution that sheds new light on the developmental relationship of NK and ILC1 cells, a scientific issue that has received considerable attention in the innate immunity field. Although extensive, most of the criticisms raised can be addressed by revisions to the manuscript. One additional experiment is requested to provide a missing control.

      Essential Revisions

      All reviewers had a major concern about how this new population of T. gondii induced innate cells should be referred to in the manuscript. Based on the single cell RNAseq data, these cells (cluster 10) are still closer to NK cells than to ILC1s (Figure 5f and Suppl Fig 4e) despite their loss in Eomes expression and acquisition of CD49a expression. Thus, one could easily think of them as "Eomes negative NK" or "ex-NK" cells rather than ILC1s, and to simply refer to them as Eomes-CD49a+ ILC1 cells may be misleading . For this reason, the authors should modify the title of the paper and change their designation throughout the manuscript. We suggest "ILC1-like" as a good descriptor. In addition, although it is clear that the "Eomes negative NK" cells that are generated during T. gondii infection are transcriptionally and epigenetically distinct from the NK cells in the steady state and NK cells after infection (Figure 7 and suppl Figure 6), these "Eomes negative NK" cells referred to as "T. gondii-induced ILC1s" were not directly compared with classical ILC1s. Based on the single cell RNAseq data, these cells may not express many of the ILC1-related signature genes. Therefore, again, the authors need to be cautious in referring to them as ILC1 cells.

      A second concern was that the NK 1.1 depletion shown in Supplemental figure 1 was performed with a PBS rather than isotope matched immunoglobulin control which is considered unacceptable. The authors should repeat at least once with proper control Ig to make sure this is not issue. It is not necessary to repeat entire survival curve just experiments shown in A and B and initial survival to make sure there is no death in controls vs. antibody treated.

    1. Can you show that the test error is an unbiased estimate of the generalization error? That is, that the expected value of the test error is equal to the generalization error.

      I think I may have a solution for this one, but I want to share to validate if anyone else reaches a similar way to solve the problem.

      First, we start with the definition of the expectation of the Average Test Error:

      $$\mathbb{E}_{p(\vec{x}, y)}[\text{Average Test Error}]$$

      $$=\mathbb{E}_{p(\vec{x}, y)}[\frac{1}{M}\sum_{m=1}^M L(y^{(m)}, f(\vec{x}^{(m)}))] \quad \vec{x}^{(m)}, y^{(m)}\sim p(\vec{x}, y) $$

      Since the expectation is a linear operator as seen in this note, we move the expectation operator inside the summation:

      $$\frac{1}{M}\sum_{m=1}^M \mathbb{E}_{p(\vec{x}, y)}[L(y^{(m)}, f(\vec{x}^{(m)}))] \quad \vec{x}^{(m)}, y^{(m)}\sim p(\vec{x}, y)$$

      From the definition of expectation, we have: $$\mathbb{E}{p(\vec{x}, y)}[L(y^{(m)}, f(\vec{x}^{(m)}))] \quad \vec{x}^{(m)}, y^{(m)}\sim p(\vec{x}, y)$$ $$=\int\limits{\vec{x}}\int\limits_{y}L(y, f(\vec{x}))p(\vec{x},y) \, dy \, d\vec{x}$$

      Therefore our expectation becomes:

      $$\frac{1}{M}\sum_{m=1}^M \int\limits_{\vec{x}}\int\limits_{y}L(y, f(\vec{x}))p(\vec{x},y) \, dy \, d\vec{x}$$

      Which is simply an average over a constant, thus we have:

      $$\mathbb{E}_{p(\vec{x}, y)}[\text{Average Test Error}]$$

      $$ = \int\limits_{\vec{x}}\int\limits_{y}L(y, f(\vec{x}))p(\vec{x},y) \, dy \, d\vec{x}$$

      Which is our generalization error.

    1. First, the self may be seen as a social actor, who enacts roles and displays traits by performing behaviors in the presence of others.

      I think the word choice here is so interesting. I love the way he compares "self" as an actor (i.e. life as a movie, others as the audience.) It helps us see that the characteristics we display to others as what our "self" is, are similar to those of a movie script.

    2. What is your story? What kind of a narrative are you working on? As you look to the past and imagine the future, what threads of continuity, change, and meaning do you discern? For many people, the most dramatic and fulfilling efforts to change the self happen

      This passage is very interesting because as humans we always think about what happen next. Some of us don't focus on the present but focus on the past that cannot be change and also focus on the future that not even there but want to pictures in our mind about what our future would be like . when it can be drastically different from what we expected. I believe what the author is trying to say is your story is what you make of which means you can use your story as a positive aspects , that can help others related to your experience or you can warn others to not repeat the same cycle that you have experiences. or you can use you story as a negative aspects that won't be helpful but instead feel regrets or blame yourself for something you probably may or may not have any control of. But made a decision not to take control of you own story that can turn into a. positive to be a inspirational to others. I also believe that the choices we make reflects who we are as a person and along with the story is the experience that we have whether good or bad is how we react to everything that happening around us and the lesson within ourselves that the story have taught us

    3. , the self may be seen as a social actor, who enacts roles and displays traits by performing behaviors in the presence of others

      I think that although it is important to stay true to yourself, being a "social actor" isn't always a bad thing. I think that this could also be interpreted as 'code switching' in different social situations. For example, it is almost necessary that we act differently around our teacher than we do around our friends, or our parents, or our doctors, etc.

    1. I am writing this review for the Drummond and Sauer comment on Mathur and VanderWeele (2019). To note, I am familiar with the original meta-analyses considered (one of which I wrote), the Mathur and VanderWeele (henceforth MV2019) article, and I’ve read both Drummond and Sauer’s comment on MV2019 and Mathur’s review of Drummond and Sauer’s comment on MV2019 (hopefully that wasn’t confusing). On balance, I think Drummond and Sauer’s (henceforth DSComment) comment under review here is a very important contribution to this debate. I tended to find DSComment to be convincing and was comparatively less convinced by Mathur’s review or, indeed, MV2019. I hope my thoughts below are constructive.

      It’s worth noting that MV2019 suffered from several primary weaknesses. Namely:

      1. On one hand, it didn’t really tell us anything we didn’t already know, namely that near-zero effect sizes are common for meta-analyses in violent video game research.
      2. MV2019, aside from one brief statement as DSComment notes, neglected the well-known methodological issues that tend to spuriously increase effect sizes (unstandardized aggression measures, self-ratings of violent game content, identified QRPs in some studies such as the Singapore dataset, etc.) This resulted in a misuse of meta-analytic procedures.
      3. MV2019 naïvely interprets (as does Mathur’s review of DSComment) near-zero effect sizes as meaningful, despite numerous reasons not to do so given concerns of false positives.
      4. MV2019, for an ostensible compilation of meta-analyses, curiously neglect other meta-analyses, such as those by John Sherry or Furuyama-Kanamori & Doi (2016).

      At this juncture, publication bias, particularly for experimental studies, has been demonstrated pretty clearly (e.g. Hilgard et al., 2017). I have two comments here. MV2019 offered a novel and not well-tested alternative approach (highlighted again by Mathur’s review) for bias, however, I did not find the arguments convincing as this approach appears extrapolative and produces results that simply aren’t true. For instance, the argument that 100% of effect sizes in Anderson 2010 are above 0, is quickly falsified merely by looking at the reported effect sizes in the studies included, at least some of which are below .00. Therefore, this would appear to clearly indicate some error in the procedure of MV2019.

      Further, we don't need statistics to speculate about publication bias in Anderson et al. (2010) as there are actual specific examples of published null studies missed by Anderson et al. (see Ferguson & Kilburn, 2010). Further, the publication of null studies in the years immediately following (e.g. von Salisch et al., 2011) indicate that Anderson's search for unpublished studies was clearly biased (indeed, I had unpublished data at that time but was not asked by Anderson and colleagues for it). So there's no need at all for speculation given we have actual examples of missed studies and a fair number of them.

      It might help to highlight also that traditional publication bias techniques probably are only effective with small sample experimental studies. For large sample correlational/longitudinal studies, effect sizes tend to be a bit more homogeneous, hovering closely to zero. In such studies the accumulation of p-values near .05 is unlikely given the power of small studies. Relatively simple QRPs can make p-values jump rapidly from non-significance to something well below.05. Thus, traditional publication bias procedures may return null results for this pool of studies, despite QRPs, and thus, publication bias having taken place.

      It might also help to note that meta-analyses with weak effects are very fragile to unreported null studies, which probably exist in greater numbers (particularly for large n studies) that would be indicated by publication bias techniques.

      I agree with Mathur’s comment about experiments not always offering the best evidence, given lack of generalizability to real-world aggression (indeed, that’s been a long-standing concern). However, it might help DSComment to note that, by this point, probably the pool of evidence least likely to find effects are longitudinal studies. I’ve got two preregistered longitudinal analyses of existing datasets myself (here I want to make clear that citing my work is by no means necessary for my positive evaluation of any revisions on DSComment), and there are other fine studies (such as Lobel et al., 2017, Breuer et al., 2015, Kuhn et al., 2018; von Salisch et al., 2011, etc.) The authors may also want to note Przybylski and Weinstein (2019) which offer an excellent example of a preregistered correlational study.

      Indeed, in a larger sense, as far as evidence goes, DSComment could highlight recent preregistered evidence from multiple sources (McCarthy et al., 2016; Hilgard et al., 2019, Przybylski & Weinstein, 2019, Ferguson & Wang, 2019, etc.) This would seem to be the most crucial evidence and, aside from one excellent correlational study (Ivory et al.) all of the preregistered results have been null. Even if we think the tiny effect sizes in existing metas provide evidence in support of hypotheses (and we shouldn’t), these preregistered studies suggest we shouldn’t trust even those tiny effects to be “true.”

      The weakest aspect of MV2019 was the decision to interpret near-zero effects as meaningful. Mathur, argues that tiny effects can be important once spread over a population. However, this is merely speculation, and there’s no data to support it. It’s kind of a truthy thing scholars tend to say defensively when confronted by the possibility that effect sizes don’t support their hypotheses. By making this argument, Mathur invites an examination of population data where convincing evidence (Markey, Markey & French, 2015; Cunningham et al., 2016; Beerthuizen, Weijters & van der Laan, 2017) shows that violent game consumption is associated with reduced violence in society. Granted, some may express caution about looking at societal-level data, but here is where scholars can’t have it both ways: One can’t make claims about societal-level effects, and then not want to look at the societal data. Such arguments make unfalsifiable claims and are unscientific in nature.

      The other issue is that this line of argument makes effect sizes irrelevant. If we’re going to interpret effect sizes no matter how near to zero as hypothesis supportive, so long as they are “statistically significant” (which, given the power of meta-analyses, they almost always are), then we needn’t bother reporting effect sizes at all. We’re still basically slaves to NHST, just using effect sizes as a kind of fig leaf for the naked bias of how we interpret weak results.

      Also, that’s just not how effect sizes work. They can’t be sprinkled like pixie dust over a population to make them meaningful.

      As DSComment points out, effect sizes that are this small have high potential for Type 1 error. Funder and Ozer (2019) recent contributed to this discussion in a way I think was less than helpful (to be very clear I respect Funder and Ozer greatly, but disagree with many of their comments on this specific issue). Yet, as they note, interpretation of tiny effects is based on such effects being “reliable”, a condition clearly not in evidence for violent game research given the now extensive literature on the systematic methodological flaws in that literature.

      In her comment Dr. Mathur dismisses the comparison with ESP research, but I disagree with (or dismiss?) this dismissal. The fact that effect sizes in meta-analyses for violent game research are identical to those for “magic” is exactly why we should be wary of interpreting such effect sizes as hypothesis supportive. Saying violent game effects are more plausible is irrelevant (and presumably the ESP people would disagree). However, the authors of DSComment might strengthen their argument by noting that some articles have begun examining nonsense outcomes within datasets. For example, in Ferguson and Wang (2019) we show that the (weak and in that case non-significant) effects for violent game playing are no different in predicting aggression than nonsense variables (indeed, the strongest effect was for the age at which one had moved to a new city). Orben and Przybylski (2019) do something similar and very effective with screen time. Point being, we have an expanding literature to suggest that the interpretation of such weak effects is likely to lead us to numerous false positive errors.

      The authors of DSComment might also note that MV2019 commit a fundamental error of meta-analysis, namely assuming that the “average effect size wins!” When effect sizes are heterogeneous (as Mathur appears to acknowledge unless I misunderstood) the pooled average effect size is not a meaningful estimator of the population effect size. That’s particularly true given GIGO (garbage in, garbage out). Where QRPs have been clearly demonstrated for some studies in this realm (see Przybylski & Weinstein, 2019 for some specific examples of documentation involving the Singapore dataset), the pooled average effect size, however it is calculated, is almost certainly a spuriously high estimate of true effects.

      DSComment could note that other issues such as citation bias are known to be associated with spuriously high effect sizes (Ferguson, 2015), another indication that researcher behaviors are likely pulling effect sizes above the actual population effect size.

      Overall, I don’t think MV2019 were very familiar with this field and, appearing unaware of the serious methodological errors endemic in much of the literature which pull effect sizes spuriously high. In the end, they really didn’t say anything we didn’t already know (the effect sizes across metas tend to be near zero), and their interpretation of these near-zero effect sizes was incorrect.

      With that in mind, I do think DSComment is an important part of this debate and is well worth publishing. I hope my comments here are constructive.

      Signed, Chris Ferguson

    1. e students may learn that compliance is important and that certain behaviors will be academically rewarded and allowed to compensate for learning deficiencies. On the other hand, instructional strategies such as project-based learning or community-based learning, to name just two of many possible options, may communicate specific messages

      I don't know how I feel about this. I feel like every aspect of school is just compliance and learning how to make good grades. I think that yeah, project and community based learning help with our social skills and all the aspects mentioned below but I feel like we do all of that just to still get a good grade. As a student, I love doing group projects more than just sitting and hearing a lecture but at the same time I feel more productive listening to a lecture.

    1. However, many of us are not fully aware of our values, and as a result can at times think, say and do things that are not in alignment.

      Possibly we do something out of alignment with our values, or possibly we don't fully understand our values and that we may have a value, such as self-protection, that we don't wish to acknowledge.

    1. It represents the smallest complete television picture umt. Bu~ images already are combinations of several different signs at once and mvolve a complex set of denotations and connotations. Further-more, if we use the frame as the smallest unit of meaning, we ignore the soundtrack, where ½o second would not necessarily capture a meaning-~l sound and where speech, sound effects, and music may be occurring simultaneously.

      Television is complicated! There are so many variables to break down at any given moment. I think this offers us a sort of break. That to any one person one frame is packed with information. And then when you add all of the frames with even one 20 minute show you have a mound of information to digest now. Analysis of tv is hard but so worth it.

    Annotators

    1. Extrapolating our results to the general population, we estimate that asking about citizenship would reduce the share of Hispanics recorded by the Census by approximately 6.07 million, or around 12.03 percent of the 2010 Hispanic population – a sizable reduction in the share of the U.S. population that would be recorded as Hispanic.

      This sentence which I think may suitable to represent the independent and dependent variables.

    1. We think what they want is flexibility, but actually what they need is structure

      this is true for me, I do want flexibility to take as many classes as possible because I have seen a lot of interesting classes that is not related to my major

    1. One would think that if there's play in the joints, that that would include the concept that States are free to say we don't want to spend money from the public FIs on houses of worship. Now, you say this affects free exercise. We seem to be confusing money with religious practice.

      Justice Sotomayor would be my second guess for the two justices that dissented themselves from the decision. I think this statement here validates her thoughts by saying "we". Now this may just be her generalizing who believes this, but to me it came across as part of her duties do not include the concepts of funding houses of worship.

    1. The authors make the point in ch4 that annotation is not really conversation. I think Miranda is correct here, that annotation is a work-around for the fact that texts are not interactive. Ultimately, are we just fooling ourselves by annotating a text?

      “Older” annotations (those before the digital age) may have commonly been seen by an audience of one, but this thread of annotations here is a good example of the beginning of a conversation developing.

      Of course there are also examples as seen in Owen Gingerich’s The Book Nobody Read in which professors and students actively copied down annotations from one copy of a book into their own copies. In these cases, there may have been active verbal discussions as these changes were made and learning of the subject progressed.

      Many textbook publishers also issue either paper or digital errata which in some sense are a continuing dialogue between the broader reading public and the otherwise static text. These are just examples of “slow conversation” if that makes sense.

    1. This intangible nar-rating presence need not be thought of as a person, but rather as an agency, that which chooses, orders, presents, and thus tells the narrative before us.

      Another important thing to think about when looking at television as a whole. It brings to mind the need to be critical when taking in. This line here shows that there is not always a person but a larger agency calling the shots. They are who is in charge of what we are seeing, hearing. Therefore, it can be implied that our thoughts regarding what we see may not inherently be our own but thoughts constructed for us. Quite scary when you look at it in those terms.

    Annotators

    1. how do we get students to move beyond civil attention to true engagement in the classroom?

      Understand that not every student is the same. These examples are for more introverted students while the ones who are extroverts, or even both, may not want to engage as much. Some people do learn better on their own, it just comes down to knowing the students well and how they think.

    1. writeandanalyzeavarietyoftypesof

      I love analyzation, but I think younger students may be scared away by words like "rhetorical knowledge." We have to teach them that it is not as scary as it sounds.

    1. How do we define a composing practice that is in-terlaced and interwoven with email, text-messaging, and web-browsing?

      We have to meet kids where they are. I really think we should incorporate more social media writing. For instance, there may be good reason to want to speak eloquently online. Just because the writing may be done on sites such as Facebook or Twitter doesn't change the fact that it is still writing. And it's the mode students are using most often and being most impacted by. Students are debating and learning in these places. I think that realistic writing activities could be put together on the premise of a social media status update or response to one.

  11. Aug 2019
    1. Husmann thinks the students had fallen into certain study habits, which, once formed, were too hard to break. Students seemed to be interested in their learning styles, but not enough to actually change their studying behavior based on them. And even if they had, it wouldn’t have mattered.

      This appeals to me because I think as a whole their is much research showing on more effective ways to study, and there is still more research being done, however what confuses me, and this article also connects to it is that as students and learners we are already accustomed and indoctronated more so out of habit the way we study, the way we take notes, knowing subconsciously that it may not be the most helpful for us. I can personally relate to trying, and wanting to make study groups with my friends but we all learn differently, and sometimes although can seem like a good idea, it is not always for the benefit of all of us since we may all learn differently. However, I think what the author is ultimately trying to get to is saying as a whole we must change the social norm of studying and how we learn, in order to normalize other study habits, and develop other behaviors of learning.

    1. Be it further enacted, that every civil officer shall, and every person may, arrest and carry back to his or her legal employer any freedman, free Negro, or mulatto who shall have quit the service of his or her employer before the expiration of his or her term of service without good cause, and said officer and person shall be entitled to receive for arresting and carrying back every deserting employee aforesaid the sum of $5, and 10 cents per mile from the place of arrest to the place of delivery, and the same shall be paid by the employer, and held as a setoff for so much against the wages of said deserting employee: Provided, that said arrested party, after being so returned, may appeal to a justice of the peace or member of the board of police of the county, who, on notice to the alleged employer, shall try summarily whether said appellant is legally employed by the alleged employer and his good cause to quit said employer; either party shall have the right of appeal to the county court, pending which the alleged deserter shall be remanded to the alleged employer or otherwise disposed of as shall be right and just, and the decision of the county court shall be final.

      When reading about most of the laws written during this time it makes me think did most of the freedmen understand what this meant when it was first passed. Or were they just told that they were about giving them the right to own things. To me its like the saying "Polishing a turd" its still a well you know. This section 7 in particular, this is slavery, you can not leave and if you do you will be dragged back, oh what there is more and we are going to make you pay for the inconvenience you caused. The statement about "without good cause" is one of those subjective statements, once again the fate of these men and women are in the hands of the people who enslaved them. I highly doubt that their idea of "without good cause" would be fair and just in any way shape of form.

  12. professordanongrades.files.wordpress.com professordanongrades.files.wordpress.com
    1. facts toward insight or complex ideas rarely take place” in many classrooms.By the same token, if we’re still using tests (Kohn, 2015) rather than authentic assessments of theirunderstanding, we’re giving them a gift of meaningful questions with one hand only to take it awaywith the other (by evaluating them on the number of facts they’ve crammed into short-termmemory).Deep questions help kids to stay curious, grow increasingly resourceful at figuring things out, andbecome active meaning makers. To structure learning around such questions is to take the first steptoward creating an environment that is not merely academic but genuinely intellectual.2. WHOSE QUESTIONS?It makes good sense to create thoughtful questions for students, but it’s even more important toelicit their questions — a possibility missing from many resources on the subject. Teaching, likeparenting and managing, is greatly improved by following a four-word admonition: Talk less, askmore. And better than asking subject-matter questions is the process of encouraging kids to come upwith the questions that matter to them. If this is more the exception than the rule in our classrooms,it may be because it requires us to give up some control.There is a purely practical justification for asking students what they’re curious about: Even amarvelously gifted teacher can’t always figure out the right question to ask a given student at justthe right time, as Duckworth (1987, p. 5) pointed out. Thus, she added, it’s fortunate that “childrencan raise the right question for themselves if the setting is right.” As a result, “they are moved to taxthemselves to the fullest to find an answer.” By inviting their questions, we unleash the power ofintrinsic motivation because all of us tend to develop more enthusiasm for, and ultimately becomemore skillful at, pursuing questions about which we’re genuinely curious than those handed to us bysomeone else.This may explain the National Research Council’s (1996, p. 31) declaration that “inquiry intoauthentic questions generated from student experiences is the central strategy for teachingscience.” (By “is,” we can assume they meant “should be.”) And their conclusion is by no meanslimited to science.In more traditional classrooms, students are rarely asked what they’ve been wondering abou

      Now a days students are thinking based on what the teachers want them to think.

    1. Cognitive–Behavioral Therapy: A problem-focused intervention that seeks to teach chil-dren who manifest socioemotional challengesand maladaptive behaviors to become theirown therapist.

      I think these EBI's can be very helpful based on the disproportionality (demographic groups) we see in the special education classrooms. Specifically the cognitive-behavior therapy intervention helps with controlling emotions and behaviors. I know in the classroom as a teacher you want to focus on teaching them but emotions may sometimes get in the way of a student succeeding in a lesson. For the child going through this intervention, they will be more successful academically by being able to overcome their emotions when dealing with a difficult lesson.

    Annotators

    1. that will empower you to advocate for yourself, make smart choices for your own learning, and get the most out of your experience at SF State and the culture we collectively create here.

      This class and what we gain from it can be much more than what we may think as we'll be able to input what we learn from it into our personal lives and even the world around us.

  13. www.kurtstuke.com www.kurtstuke.com
    1. After completing the SDU, the character I most aligned with was Aristotle. My moral purposes most aligned with virtue, followed by duty, with no alignment in utility (fitting, since I never cared for the Utilitarian writings of Mill). I do agree with the findings of the SDU. The strengths listed in Virtue (the moral purpose I most align with) included, “going far beyond compliance, giving 100%, and being a trustworthy person and have been in a leadership role” (SDU, Virtue description, 2019). I do believe these descriptors lend themselves to my experience in leadership thus far. A weakness that stood out to me in the Virtue description was “you may find it frustrating that everyone is not a moral perfectionist” (SDU, Virtue description, 2019). I will be the first to say that I am not a moral perfectionist, but I do try to weigh the best options in decisions, especially those affecting other people.

      In the Duty description, the strengths were, “being a natural team player, devising rules and sticking to them, and being the definition of trustworthy and dependable” (SDU, Duty description, 2019). Again, these strengths do speak to by experience as a leader thus far. My wife will be the first to say that I am rules follower through and through. One weakness that was accurate was, “you may take it personally when others are not fair” (SDU, Duty description, 2019). I think this sentence makes me sound a bit childish but I agree with the premise that rules and guidelines are created for a reason, therefore it is understood that everyone should rightfully follow them to ensure equality. Now I am not naïve; I know that most people bend rules (as do I), but I think the idea of clarity and fairness is and essential one.

      In the article titled “First Know Yourself Then Your Team” by Manfred Kets de Vries, the author dives into what he titles as the “Psychodynamic approach” (para. 5). Basically, the author explains that “we are all complex, unique and often paradoxical beings. Our everyday lives consist of webs of constantly shifting and irrational forces that underlie ‘rational behavior and choices” (para. 5). Knowing this parable to be mostly true, I tend to leverage my moral purposes of virtue and duty to combat these external and irrational forces. Being virtuous, as described by the SDU, allows to be a trustworthy person, one that others can come to when those irrational forces try to take shape. Duty allows me to seamlessly fit into the grooves of rules and guidelines in order to avoid the distractions of the irrational forces, while once again being a trustworthy and dependable person for others on my team.

      References: Kets de Vries, Manfred (19 August, 2014). First Know Yourself Then Your Team, Forbes. https://www.forbes.com/sites/insead/2014/08/19/first-know-yourself-then-your-team/#7745c99f5144

    1. does not exist in this province.

      As author/journalist Joan Baxter, who spent many years living and working in West Africa, told The Nova Scotia Advocate recently:

      "I’ve...written so many cheques for Freedom of Information requests, and I have so many that are under appeal. That’s been the biggest shock to me, how little access we have to information. I’ve been really railing against it, as you may have noticed, in recent articles, because it’s something Canadians should be very upset about."

    1. Express.co.uk

      Hello, I am the Citerpress bot :) I think this sentence is mentioning a news article without an explicit link. I looked in my news database and here is what I found:

      Hit #1 (score of 34.0)

      Hit #2 (score of 32.9)

      Hit #3 (score of 32.3)

      Hit #4 (score of 32.0)

      Hit #5 (score of 31.0)

      I did my best! My annotations will get better and better with time, as I index new pages every day.

    1. The question posed at the beginning of this paragraph is a good place to begin.

      It may be helpful to reiterate or rephrase "the question posed at the beginning of this paragraph." Perhaps we can add a sentence like:

      "Think about the reasons for selecting a qualitative approach, as well as your ultimate purpose for conducting your research."

    1. We are usually relatively unfamiliar with our participants, at least on a personal level. This can make sitting down for an interview where we might be asking some deep questions a bit awkward and uncomfortable, at least at first. Because of this, we want to craft our questions in such a way that they are not off-putting, inadvertently accusatory or judgmental, or culturally insensitive.  To accomplish this we want to make sure we phrase questions in a neutral tone (e.g. “Tell me what that was like”, as opposed to, “That sounds horrible, what was that like”). To accomplish this we can shift perspectives and think about what it would be like for us to be asked these questions (especially by a stranger), and we can pilot test our questions to see how they ‘feel’ to others. Also, if we are conducting interviews on topics that may be particularly hard for people to talk about, we likely will want to start out with some questions that are easier to address prior to getting into the heavier topics. Make them relatable Unlike surveys, where researchers may not be able to explain the meaning of question, when conducting interviews, we are present to help further explain questions if there is some confusion. However, ideally our questions are as clear as possible from the beginning. This means that we avoid jargon or technical terms, we anticipate areas that might be hard to explain and try to provide some examples or a metaphor that might help to get the point across, and we do our homework to relay our questions in a cultural context that is appropriate. Like the discussion above, pilot testing our questions can be very helpful for ensuring the relatability of our questions, especially with community representatives. What sounds good in our heads as a question, might make little sense to our intended audience. Make them individually distinct, but collectively comprehensive Just like when we are developing survey questions, you don’t want to ask more than one question at the same time. This is confusing and hard to respond to for the participant, so make sure you are only asking about one idea in each question.  However, when you are thinking about your list of questions, or your whole interview guide collectively, ensure that you have comprehensively included all the ideas related to your topic. It’s extremely disheartening as a qualitative researcher that has concluded their interviews and realized there was a really important area that you failed to include in your guide. To avoid this, make sure to know the literature in your area well and talk to other people who study this area to get there perspective on what topics need to be included.

      This table is a great review resource for student readers. However, perhaps the text can be formatted differently or broken up to facilitate quick review. Can we organize important points as bullet points rather than complete sentences? This may make for easier reader review.

    2. you may choose to meet at your office

      I remember reading in my Group Practice MSW class text that office settings may involve inherent power imbalances, and that the physical office layout can emphasize or de-emphasize such imbalances. Because this and other chapters remind students to think about power dynamics of researcher-participant interactions, perhaps we can add something about striving toward power-balanced physical office layouts if and when interviews are conducted in office settings. (As an example: The actions required to ease power imbalances in this environment are relatively straightforward: Instead of a researcher sitting behind a desk and having the participant sit opposite in a different sized/styled chair, arrange the chairs across from each other, with no person behind a desk.)

    3. It is a resource that participants own that they choose to share with us.

      Again - interesting and helpful way to conceptualize intellectual ownership and sharing. To emphasize and clearly illustrate this point, perhaps we can include a brief example, which might read something like this:

      "It is a resource that participants own that they choose to share with us. Think about it: When a smart phone app or computer program wants your personal data, you're usually asked to read a privacy statement and agree to certain terms. Companies are legally required to notify you about their intentions to use the data you may share. And many companies certainly recognize that your data is a valuable resource. As researchers, we have similar responsibilities."

    4. As we are thinking about going out in the world to gather data, I think it can be helpful to think about the data that is shared with us a resource.

      Great point about conceptualizing shared data as a resource. This is an important and helpful way for researchers to think about the information they get from participants. However - the repetitive use of the word "think" in this sentence threw me off a bit. Perhaps revise to something like:

      "As we're thinking about going out into the world to gather data, it may be helpful to conceptualize the data that is shared with us as a resource."

    1. Emergent design is the idea that some decision in our design will be dynamic and change as our understanding of the research question evolves as we go through the research process.

      May want to revise this sentence a bit for clarity. Perhaps revise to something like:

      "Emergent design is the idea that our initial research design is dynamic, and may change as we go through the research process and our understanding of the research question evolves."

      (I think what threw me off a bit was the phrase "...some decision in our design" - this is the main part I would suggest tweaking for clarity.)

    2. The researcher who schedules interviews with public assistance recipients to capture their experience after a legislation drastically changes their requirements for receiving benefits relies on the verbal data shared with them.

      I think this important point could perhaps be more clearly explained/worded. I think that if we separately identify the researcher's topic of interest and research approach, we'll bring some added clarity to this hypothetical scenario. Here's how I might revise this sentence to clarify core concepts and explain links between ideas:

      "Let's say, for example, that a researcher wants to learn about the experiences of public assistance recipients after federal legislation drastically changes the requirements for receiving benefits. This researcher might schedule interviews to capture verbal data shared by participants. The researcher relies on the data he or she may capture as participants talk about their personal stories, experiences, and reactions to the federal legislation."

      *The above revision suggestion references the "personal stories" of participants - which could be a good way to naturally reiterate this chapter's earlier points about qualitative research focusing in part on the stories of research subjects.

    3. As such, as you go about recruiting for your qualitative studies, remember that people are made of multiple stories, of intersectional identities.

      (I have not perused every chapter, so please take this comment with a grain of salt - I recognize that perhaps additional material is elsewhere included in the text)

      This part of the paragraph about intersectionality lacks context and clarity, I think, because there aren't concrete links between fairly abstract ideas and real-world examples. Perhaps we can add a Student Example box here that gives a couple/few examples of how researchers or students may encounter issues of intersectionality in the field/in their work)

    4. Because of this, I think we need to take special care to treat these stories as sacred and we go about asking for people to share them, we need to do so humbly.

      May want to break this sentence into 2 separate statements to emphasize this important point. Could perhaps revise to something like "Because of this, we need to take special care to treat these stories as sacred. As we go about asking for people to share their stories, we need to do so humbly."

    5. assure there is fair distribution of risks and benefits related to our research, be conscientious in our recruitment efforts to support equitable representation, and that we ensure special protections to vulnerable groups involved in research activities. As you plan your qualitative research study sampling plan, make sure to consider who is invited and able to participate and who is not.

      While this is certainly useful information, I think the sentence/paragraph structure may be a bit too dense to allow for adequate reader concept absorption. Is there a way to break down these 3 concepts into a more reader-friendly bulleted or numbered list? For example, instead of the current format/structure, we might present these topics in the following way:

      "Within this context, we need to:

      (1) Assure there is a fair distribution of risks and benefits related to our research;

      (2) Be conscientious in our recruitment efforts to support equitable representation; and

      (3) Ensure special protections for vulnerable groups involved in research activities."

      Then, perhaps we could begin a new paragraph with the sentence "As you plan your qualitative research study sampling method, make sure to consider..."

      I think the above might be helpful for readers who are better able to absorb content in smaller, more visually bite-sized chunks. Anyway, just a thought!

    6. [2.20]

      just an observation - we may want to round the estimated reading times to the nearest half-minute. I think there's some potential for confusion among readers interpreting an estimated reading time such as "6.57" - this estimate is so specific that it might not seem at first glance like an estimated reading time. Rounding that number and changing the format - i,e., "6.57" [current] to "7 mins" [suggested] - might help students clearly understand what we are trying to communicate. I do think the estimated reading times are potentially very helpful for readers, though.

    1. Section 2 then begins the real ball game, namely everyone has the following fundamental freedom. The one difficulty we had, as a committee, is with Section 2(b). What do we do with freedom of thought when you have got legislation dealing with have propaganda? How far is it possible to retain such articles as Section 281(1) of the Criminal Code and Section 281(2)? Moreover, you will see we have quoted from Article 20 of the United National Covenant of Civil and Political Rights where propaganda of this kind is regarded as inconsistent with freedom of speech. [Page 87] So we raised the question which seemed to me to be necessary to raise with you, that caution must be exercised, we hope, by the courts in due course, or by you, as draftsmen on how far you are prepared to push the concept of free speech consistent with our experience of hate propaganda. One suggestion we make here-and I do not wish to do anything more than to drop it as a hint, but you may want to have some language that some of the modern constitutions have, which state very starkly and flatly that the advocacy of genocide or group libel is forbidden. But I had the honour to be the chairman of the special committee on hate propaganda in 1965. At that time we came to the flat conclusion that the advocacy of group hatred and genocide was totally inconsistent with the democratic process and no democratic state could tolerate it. Now, whether you want to put that flatly in a constitution is for you to consider; but I think it is for us to bring it to your attention, because it is of importance.

      §[2] (https://primarydocuments.ca/canada-act-1982/#Fundamental) (2(b)more specifically) of the Charter of Rights and Freedoms. Referenced in Adam Dodek, The Charter Debates (Toronto: University of Toronto Press, 2018), pp. 132.

    1. Is Eugenics Happening Today? As research continues to uncover new disease-causing mutations, it becomes increasingly possible to stop the transmission of certain heritable diseases.  In the long term, this may lead to complete eradication of diseases like Down Syndrome, cystic fibrosis, and hemophilia. However, some wonder if modern day attempts to eradicate hereditary disorders equate to eugenics. One complication of genetic testing for the purpose of disease eradication is that, in practice, a particular ethnic group will likely be involved due to shared ancestry.  For instance, Tay-Sachs disease is significantly more common in certain Jewish communities.  Tay-Sachs is a genetic disease that causes a deterioration of mental and physical abilities and results in death by age four. Eradicating Tay-Sachs will require screening all individuals in the affected population. However, a public campaign to test all individuals of Jewish descent for Tay-Sachs carrier status may for some recall the racist motivations of eugenicists in the early 20th century, particularly those associated with Nazi Germany. Also, racial stereotypes or biases may be reinforced if genetic testing performed on individuals of an ethnic group reveals a predisposition to a particular disease or condition. Using modern genetic technology, prospective parents can be prescreened to determine their carrier status for certain diseases. Preimplantation genetic diagnosis following in vitro fertilization allows parents to select embryos that are free of disease. Additionally, prenatal genetic testing can provide a lot of information to parents about their unborn child.  These technologies make more informed decision-making possible, but some are concerned about a shift in the way we view family and parenting.  Parents who want to have a child without pursuing genetic testing may feel guilty if the child is born with any health problems. Additionally, some are concerned about what an overemphasis on eliminating disabilities in unborn children will mean for people who already have the disability. The most significant difference between modern genetic technologies, that some view as eugenic, and the historical use of eugenics is consent.  Today, individuals pursue genetic testing by choice.  An individual can never be forced into testing or be required to take action, such as sterilization, based on the results of a genetic test.  Individuals differ in their views on genetic testing in relation to reproductive decision-making and possible eugenic motivations, but at least today parents have the choice to use the technology or not.

      This source was important as it answered my last FQ question of to what extent has eugenics made an impact on today's society. this is an article made by the know genetics website and the website contains information of genetic and biology information this website is created by pre-health students and their professors to share their knowledge into the health communities,as this source contains information on how eugenics has "evolved" into modern day and how with proper science and technology society can use eugenics but in a much civilized way. I think this source is reliable as it's written by either a pretty knowledge student or a professor.

  14. Jul 2019
    1. I want to refer you to Section 2 of the resolution which is a Section on fundamental freedoms. It says: Everyone has the following fundamental freedoms: (a) freedom of conscience and religion, (b) freedom of thought, belief, opinion expression, including freedom of the press and other media of information What I want to ask you is, how do you think the word “everyone” would be interpreted as it pertains to everyone has the following freedoms, the freedom of the press, freedom of other media of information. I want to take you back in this country about four of five years when the government across the way introduced legislation, which I supported, concerning Time magazine and Reader’s Digest, to try and Canadianize the magazine industry in this country. I am wondering whether or not if we were to enshrine Section 2 in the constitution as written, Time magazine or Reader’s Digest could have gone to the courts and said: “We have a consitutional right in this country of freedom of expression and freedom of the press and freedom of information, freedom of the media; therefore, the government of Canada [Page 12] and the Parliament of Canada do not have the right to legislate restrictively against our two organizations.” Could it be interpreted in that way? Ms. Crandall: Mr. Nystrom, I think that is the kind of question which an expert should be asked to answer. This is what we are saying now, We have not had an opportunity to look at all sides of these questions to give you any kind of an answer. Again, I am not trying to be difficult. But that is one of the questions which we would like to ask someone who is knowledgeable. Mr. Nystrom: I appreciate the answer. The reason why I ask the question is that the words “everyone” and “citizens of Canada” are used throughout the resolution. I am not a lawyer myself, but it would seem to imply that these could be given a fairly wide interpretation, and I am concerned that we might have in a constitution something that is restrictive where we could not increase Canadian content. Let me ask you the same question again about the electronic media. There is growing concern that we Canadianize radio, television—and the CRTC is concerned about this, about television programs coming in from the United States. There is talk now about a second CBC network in this country. Again, I want to ask you a similar question pertaining to the electronic media. If everybody has the freedom of expression and freedom of the press and other media of information, in your opinion, or perhaps in the opinion of your colleague, do you think we would be able to do this as a Parliament, where the constitution says we are denying a fundamental right to everyone, perhaps NBC, New York, or ABC somewhere in the United States? Ms. Hardy: I think, Mr. Nystrom, that it is very important. I have served abroad for Canada in the Department of External Affairs, in the public affairs field, and I feel that it is very important that we develop a Canadian culture, that we develop an interest in things Canadian and a pride, and I grant that there are very good programs produced by the electronic media of other countries but I think we should be proud of our own heritage and be proud of what we can do. I have just been at a briefing on plans for CBC 2, Tele Deux, and I am very pleased that this is what may be coming along shortly and I would hope that we would not refuse all foreign media offers to assist us in our cultural development, but I think we should certainly give ourselves the chance to be first in the field and to welcome the opportunity and the pride in our own country and in what we can develop ourselves. This is a continuing subject of interest financially as well as culturally, naturally, and I would hope that the media club, which now covers the electronic media representatives as well as the press, would be in the forefront of assisting in developments if possible. Thank you. [Page 13] Mr. Nystrom: I wonder if you could possibly, if you have time to do a written brief to the Committee, to try and seek some advice on those questions, because I agree fully with you that we have to develop a Canadian culture and of course we need some input from other countries around the world because we are part of the global village, we have to have a Canadian identity and it is very important, and I would be very concerned if the way Section 2 is written that perhaps we could be denied through our constitution the right to develop fully the Canadian culture and pehaps you could look at that. I also wanted to ask your interpretation of a couple of other words in Section 2. I wanted to ask you what you think the interpretation in your opinion would be of other media of information. We have singled out here freedom of belief, opinion, expression, including the freedom of the press. I know what the press is, I think, but what would be the interpretation legally, in your opinion, of other media of information, what would that include? Ms. Hardy: I would expect that that would include the electronic journalism. The press is usually referred to as print media. Media is a very broad term that has had to be used because you cannot just refer to the press now because it covers a number of other representatives who inform, through one source or another, and I think the electronic media has an important place now in our culture because communications in this country is an aspect of helping unify the country, I think, by letting us get to know each other, not only through print but through electronic means.

      §[2] (https://primarydocuments.ca/canada-act-1982/#Fundamental) (2(b)more specifically) of the Charter of Rights and Freedoms. Referenced in Adam Dodek, The Charter Debates (Toronto: University of Toronto Press, 2018), pp. 128-130.

    1. and the more pseudonymity is available

      Technology is a double-edged sword in that it may advance civilizations, yet it's just a conduit to amplify what people already feel. The internet so dangerous because it can normalize racism in ways we don't even think of.

    1. Yet the body intervenes constantly, whether one is ill or not. It is the mode of intervention that conditions how well, or unwell, we feel. A state of wellbeing is one in which we do not need to think about our embodied organism in any way other than the sensorial pleasures it affords, where we are immersed within our environment, engaged in an activity, involved with others. But one of physical or emotional pain affects the very foundation on which the sense of self we otherwise take for granted rests: what we feel ourselves to be can be upended. When this happens, we may realise that what we feel ourselves to be is in fact constructed. How we exist as embodied selves is a highly complex business involving the brain and body engaged in constant interaction.

      Understanding ourselves through upending moments of intervention. I wonder about this with experiences on the web. How aware am I of my own being when I clack on this keyboard? What kind of self do I build when I am here?

      When I am away from the web there is a different sense of self. A contrast of being. What of that? Can the contrast ever be rectified? Can I make them more harmonious? Or is it an impenetrable gap - one nobody can breach?

    1. How will this class, with its focus on biological organic chemistry, be different from a class in biochemistry? You should not make the mistake of thinking that a course built around biological examples is going to be more biochemistry than organic chemistry. Although there will inevitably be some overlap with the biochemistry course you may take later in your career (just as there is overlap between courses in general chemistry and organic chemistry, between physical chemistry and physics, etc.), this is very much an organic chemistry text – it follows essentially the same outline and covers essentially the same topics as most other organic chemistry texts, and is fundamentally distinct from most biochemistry texts. In organic chemistry, we think about individual chemical reactions at the atomic level – concentrating on the 'how and why' details of what is happening with the organic molecule(s) in question. In a biochemistry course, you will see many of the same compounds and reactions that you saw in this text. In biochemistry, however, you will see them mainly from the perspective of complete biochemical pathways: you will spend much of your time studying how these pathways are interconnected and regulated. Biochemistry, then, is a 'bigger picture' course where we study the forest, while in organic chemistry we study the trees.

      This is immensely helpful for self-learners. Thanks!

    1. Our greatest danger is that in the great leap from slavery to freedom we may overlook the fact that the masses of us are to live by the productions of our hands, and fail to keep in mind that we shall prosper in proportion as we learn to dignify and glorify common labour, and put brains and skill into the common occupations of life;

      I agree with my classmates that this is an important piece of the article. I think that is their way of saying that they deserve the freedom, and will not take it for granted. They have worked hard in the past for their country, but the hard work is not stopping for them. I feel they are asking for more opportunities to better themselves to make a better fit as citizens. Would yall agree with this as well?

    1. This triple paradox in Mr. Washington's position is the object of criticism by two classes of colored Americans. One class is spiritually descended from Toussaint the Savior, through Gabriel, Vesey, and Turner, and they represent the attitude of revolt and revenge; they hate the white South blindly and distrust the white race generally, and so far as they agree on definite action, think that the Negro's only hope lies in emigration beyond the borders of the United States. And yet, by the irony of fate, nothing has more effectually made this programme seem hopeless than the recent course of the United States toward weaker and darker peoples in the West Indies, Hawaii, and the Philippines,—for where in the world may we go and be safe from lying and brute force?

      I think what this means is that even though black people would like to leave U.S they will be subject of persecution because U.S is conquering other countries like Hawaii and the Philippines.

    1. reets; for if we take the ages into our account, may there not be a civilization going on among brutes as well as men? They seemed to me to be rudimental, burrowing men, still standing on their defence, awaiting their transformation.

      Thoreau uses personification here again, and he talks about the history of human evolution. Thoreau saw beasts as creatures with their own histories and civilizations. They just like humans, waiting to evolve. I think it also shows Thoreau's respect for animal life. In his eyes, humans and animals are equal.

    1. I wonder, though, why it was thought that the appropriate location for a limitations clause was right at the very beginning of the proposed Charter of Fundamental Rights and Freedoms, and whether you would be prepared to look at the possibility of moving the limitations clause in whatever form we may finally end up with—and naturally, there may be complications, because if there is a preamble in it it would be inappropriate to do this; but if there is no preamble, on the proposed Clause 1, moving the limitations clause to the end of the proposed Charter? In other words, I believe it would be important symbolically, if nothing else, to start out with the list of fundamental freedoms, the mobility rights and a positive statement of what the rights are, and then at the conclusion of the proposed Charter to indicate what limitations might exist on those [Page 26] rights, rather than starting out with limitations and then a statement of rights. Mr. Kaplan: Well, before directly answering the question, I would like to understand that you are suggesting that the difference is symbolic, and that it does not make any real difference. Mr. Robinson: Certainly, I would not argue that there was any difference in substance in the way this will be interpreted, and I am sure your advisers could confirm that. Mr. Kaplan: I do not think there any real difference either. I think it is purely a matter of style. Our view of the matter was that it was more realistic and useful to the reader to see at once that the rights were not absolute, but that they were constrained. That would be made immediately clear to a person consulting the statute without having to read the first 30 sections to find that what was contained in the proposed Clause 1 was 0really not the whole story. It seems to be more honest. Mr. Robinson: Mr. Minister, if it is agreed that there is no difference in substance—and we are talking about a document, a Charter of Rights which, hopefully, would be widely distributed to school children, to Canadians right across the country, and I would suggest there is a certain symbolic value in setting out those rights and then at the conclusion of those rights indicating what the limitations, if any, may exist in respect of them, as is done in the Diefenbaker Bill of Rights, where the rights were enumerated and at the conclusion of the Bill of Rights, there are references, for example to the War Measures Act and to other limiting provisions.

      §1 of the Charter of Rights and Freedoms. Referenced in Adam Dodek, The Charter Debates (Toronto: University of Toronto Press, 2018), pp. 108-109..

    1. Mr. Roger Tassé, (Q.C., Deputy Minister, Department of Justice): I think that is an important question you have raised, Mr. Fraser. In effect when you look at the meaning of law, it may mean a number of things and in this context it could mean an Act of Parliament, for example, and we did not want it to be restricted to an Act of Parliament for some of the reasons that have been expressed, and also for another reason that has not been mentioned so far, and that is in effect we wanted also to cover rules of the common law. For example, in the area of libel, defamation. And in many provinces this has not been clarified. There are rules that have just been expressed over time by the courts and we did not want to upset all of this legislation so that is why in effect in French we have used an expression that would embody as well rules of common law that have been established by courts and it could be in the civil law field or in the common law, most probably in the common law, but also would include the statute and include a regulation enacted under an appropriately passed or enacted legislation. Mr. Fraser: So what you are saying, then, is that … Mr. Tassé: Perhaps if I may just expand on what I have just said. For example, if you look at the freedom of expression, the law of defamation, the law of libel imposes some limits on that so we wanted these to continue to have application and we think that they would fit in effect the tests that are set out in Section 1. Mr. Fraser: Well, then, by the same token, so does the law of master and servant, the law of contract and the law of partnership, and a number of other common law notions. [Page 50] Could you foresee a situation where, on the basis of the rights set out in here, you could have a conflict between what are considered laws which stem from the body of case law that has come down over the centuries which could be in conflict with the right that has been set out in the Charter? Mr. Tassé: Well, Mr. Fraser, we do not see these rights or these prescriptions of the Charter to have application in terms of a relationship between individuals. We see them as applying in terms of a relationship between the state and individuals, so I am not sure that in terms of contract laws, unless we were looking at the situation where in fact we are talking of contracts passed between the state, the government, and that might offend a constitutional limitation on some of these rights, then the Charter might be called upon for assistance but if we are just looking at in effect relationships, contractural relationships between individuals, I do not see how the Charter itself could be called upon to assist in resolution of conflicts that may arise. Mr. Fraser: Well, I do not want to take this too far into the realm of theory but individual contracts are constantly formed as a result of discrimination between certain options and certain individuals, and that has always been, within some limitations, an accepted freedom to enter into contract unless there is a specific piece of legislation which forbids it. You can take, for instance, the codes in some of the provinces which now constrain absolute freedom of contract in hiring policies. But I take it that what you are saying is that in the English version when you say “prescribed by law”, that is not just statute law, but is also the common law? Mr. Tassé: Yes. Mr. Fraser: As decided by the cases? Mr. Tassé: Yes. Mr. Fraser: But they could still be challenged if somebody could take the issue to a court and say that that law can no longer be demonstrably justified in a free and democratic society? Mr. Tassé: That is correct. Mr. Fraser: Thank you.

      §1 of the Charter of Rights and Freedoms. Referenced in Adam Dodek, The Charter Debates (Toronto: University of Toronto Press, 2018), pp. 107-108.

    1. Mr. Irwin: Is that not the whole raison d’être of this discussion, how much power are we as legislators going to give up by way of entrenched rights to the courts, to not be touched forever. The Joint Chairman (Mr. Joyal): Mr. Tarnopolsky. [Page 27] Professor Tarnopolsky: Mr. Chairman, if I may answer that. I think our position is that you should either fish or cut bait. If you are going to have a bill of rights, make it a bill of rights which cannot be just over-ridden any time that a court is convinced, which we are suggesting would be relatively easy, that the limits are those which are generally acceptable. It would not just be in legislation, because, again, if I could use the Hogan case, I think that it would not be very difficult to convince a court that the practice of the police, namely, how can a lawyer help the chap, let him take the breathalizer, it is probably generally accepted, So that I think the fear of those of our members who support a bill of rights would be that it would be disillusioning, that it would be disappointing for the populace to think that they have a bill of rights which really over-rode inconsistent legislative administrative action to find out it is not. We think that rather than promoting that kind of cynicism, the Parliament should face up to either creating a bill of rights which over-rides or stay with the one which we now have, which we have got some jurisprudence on and there are more cases than just a Drybones case which have been applied with some effect.

      §1 of the Charter of Rights and Freedoms. Referenced in Adam Dodek, The Charter Debates (Toronto: University of Toronto Press, 2018), p. 91.

    1. Mr. Fairweather, what I would like to do from looking at materials that you have provided earlier, is take you to your concern of Section I of the proposed resolution. At the bottom of your presentation as well as in the accompanying documents you stress your concern about Section l. I would like to ask you from your perspective if the clause remains essentially in the form it now appears what are the technical consequences of that clause in relation to the protection of rights and freedoms? Mr. Fairweather: They are so serious that I could not imagine this Committee letting Section l go unamended, That section as drafted would challenge, in my opinion, the rest of the charter, and I suspect somebody is going to be getting an amendment. It is, as I said, turning our backs on the international and national jurisprudence, and it is very broadly drafted. Why we do not use the language that is well accepted now and has been ratified by Canada, for the life of me I have no idea. This is a strong statement but I have strong feelings. I am absolutely committed to the entrenchment and the patriation and the goals. They are wonderful goals for this country at last but why not go for something better. Mr. Epp: From your experience as a Commissioner of the Human Rights Commission, could you give us examples of if this proposed resolution had in fact been in effect with the prohibitions in Section 1, can you give us some specific examples of the restrictions it would have given or caused both to rights and freedoms and also to the Commission? Mr. Fairweather: Yes. One was given last night, if I know correctly, by the Minister of Justice for Canada. It might be that generally accepted standards in this country for mandatory retirement, the anti-discrimination part having to do with age, could be challenged and rendered meaningless as a reform mechanism, because the generally accepted standards now are quite illiberal, if I may use that word in this place. [Page 12] The generally accepted standards for Canada are to push people out at certain ages, I greeted this charter with excitement when I saw that the Government of Canada had included age, but when I see the language of Section 1, I wonder. Another message that surely cannot be forgotten is that the generally accepted standards in Canada in 1940 and 1941 were to take Canadians whose offence was that they were of Japanese origin. In the Wellington Street Archives last night while you were doing something else I went to the festival of the 100th anniversary of the Chinese in Canada. They came to build the railway and I am as shocked as I know senators and members are to remember that people who are enshrined and rightly, in our history were perpetrators of the Chinese Exclusion Act, the Chinese $50 a head tax act. The Chinese people in this country were not allowed to vote in a province I think until after the Second World War. It was Mr. Diefenbaker who gave the Native peoples the right to vote in the late 1950s. I am not saying that a government that follows this one would, but it could, because those were I guess until reform came the accepted standards. This document is to be entrenched, enshrined, as a statement to the people who have their loyalty to Canada. Mr. Epp: Do I understand you correctly, sir, that if the document before us were to be enshrined, entrenched, that an incident like Canadians of Japanese origin and the removal of these people from various parts of Canada, their prohibition of freedoms at that time, that in fact that kind of action would still be possible under the charter in its present form. Mr. Fairweather: I think, Mr. Epp, my duty is to warn you, and I have given some examples, age and these other offensive matters could be put in jeopardy. I am not saying they will but they could. I think most of this charter is really a superb piece of work, but I cannot see why Canada wants to turn its back on accepted international standards and language that has been adjudicated. That is why I am being a bit fussy. It clouds the rest of a noble document.

      §1 of the Charter of Rights and Freedoms. Referenced in Adam Dodek, The Charter Debates (Toronto: University of Toronto Press, 2018), pp. 89-90.

    1. in May, an Australian think tank called climate change "a near- to mid-term existential threat to human civilization."

      This had no scientific credibility. written by a couple of businessmen, with no scientific peer review.

      Michael Mann, respected climate scientist at Pennsylvannia State University, calls their report

      "overblown rhetoric, exaggeration, and unsupportable doomist framing":

      Richard Betts, Professor, Met Office Hadley Centre & University of Exeter, put it like this:

      The “report” is not a peer-reviewed scientific paper. It’s from some sort of “think tank” who can basically write what they like. The report itself misunderstands / misrepresents science, and does not provide traceable links to the science it is based on so it cannot easily be checked (although someone familiar with the literature can work it out, and hence see where the report’s conclusions are ramped-up from the original research).

      One of their central points was that they took an analysis of heat waves which lead to 1 in 10,000 to be at risk of dying if they do not take precautions such as the old and infants, and said it meant that

      "Thirty-five percent of the global land area, and 55 percent of the global population, are subject to more than 20 days a year of lethal heat conditions, beyond the threshold of human survivability,"

      The paper was calibrated to 30% of us facing "deadly heat" in 2000. We didn't get death of 30% of the world population in 2000. They totally misunderstood the paper.

      Another example, they read a figure of 1 billion people at risk of sea level rise of 20 meters, way beyond anything possible this century or centuries into the future, and said this was the number of people who would be climate migrants by 2050. With sea level rise you can stay where you are if you build sea walls and the rise at even the highest level with "business as usual" and worst case scenario is 2.5 meters.

      Many mistakes like this - they weren't scientists, were clearly not used to reading science papers, and can't have run it past anyone who understands climate science to check it.

      Climate Change Will NOT End Human Civilization By 2050, 'Overblown Rhetoric And Unsupportable Doomist Framing' Says Michael Mann

      https://www.science20.com/print/238557

    1. Response to SDM's question: I have certain students who like to get right to work. They seem intrinsically motivated to do the work. Sometimes they are quite interested and other times they aren't, but still have good motivation to finish the work. Perhaps they want to chat with friends or read on their own. I think their reasons may vary, but they always get to work right away and work until finished. If the work interests them, they will often ask for more work to complete - I usually have extra pages with different and more challenging work available. If it is not an area that really interests them, they will go on to read or do something else that is an option. I have some students who like to try and get other children to do their work for them. Like Brenna noticed, they display some learned helplessness. I work diligently to remind students to help their friends without giving them the answers. We also do growth mindset activities and have growth mindset discussions frequently to help students increase their intrinsic motivation. I frequently model how to help our friends without giving them the answer. We discuss how it will help our friends to help them work through something and really understand it as opposed to what happens if you just give them the answer. I also have students who finish quickly and then eagerly ask to help friends. They love to be peer teachers and help. I have had a few students who shut down when work is challenging. It took a lot of coaching and one on one work to help them learn how to persevere through challenging tasks. Reminding students that I don't expect their work to be perfect has helped. Setting up lessons where we work independently but then collaborate and edit our work has helped. When students realize that work can be ongoing and that it is a process they relax and are more able to keep at challenging tasks. Also just listening to how they are feeling helped. One little girl would just start to cry. When I would sit with her and ask her questions about how she felt and what was going on, she seemed to relax. We used breathing techniques, structured grouping and different work spaces to allow her some space and a bit more quiet. By the end of the year she was working independently on challenging tasks without shutting down. She needed to build her self-confidence. When her self-efficacy strengthened, she took off.