10,000 Matching Annotations
  1. Oct 2025
    1. Reviewer #2 (Public review):

      Summary:

      This manuscript addresses the gap in knowledge related to the cardiac function of the S-denitrosylase SNO-CoA Reductase 2 (SCoR2; product of the Akr1a1 gene). Genetic variants in SCoR2 have been linked to cardiovascular disease, yet its exact role in heart remains unclear. This paper demonstrates that mice deficient in SCoR2 show significant protection in a myocardial infarction (MI) model. SCoR2 influenced ketolytic energy production, antioxidant levels, and polyol balance through the S-nitrosylation of crucial metabolic regulators.

      Strengths:

      Addresses a well-defined gap in knowledge related to the cardiac function of SNO-CoA Reductase 2. Besides the in-depth case for this specific player, the manuscripts sheds more light on the links between S-nytrosylation and metabolic reprogramming in heart.

      Rigorous proof of requirement through the combination of gene knockout and in vivo myocardial ischemia/reperfusion

      Identification of precise Cys residue for SNO-modification of BDH1 as SCoR2 target in cardiac ketolysis

      Weaknesses:

      The experiments with BDH1 stability were performed in mutant 293 cells. Was there a difference in BDH1 stability in myocardial tissue or primary cardiomyocytes from SCoR2-null vs -WT mice? Same question extends to PKM2.

      In the absence of tracing experiments, the cross-sectional changes in ketolysis, glycolysis or polyol intermediates presented in Figures 4 and 5 are suggestive at best. This needs to be stressed while describing and interpreting these results.

      The findings from human samples with ischemic and non-ischemic cardiomyopathy do not seem immediately or linearly in line with each other and with the model proposed from the KO mice. While the correlation holds up in the non-ischemic cardiomyopathy (increased SNO-BDH1, SNO-PKM2 with decreased SCoR2 expression), how do the Authors explain the decreased SNO-BDH1 with preserved SCoR2 expression in ischemic cardiomyopathy? This seems counterintuitive as activation of ketolysis is a quite established myocardial response to the ischemic stress. It may help the overall message clarity to focus the human data part on only NICM patients.

      (partially linked to the point above) an important proof that is lacking at present is the proof of sufficiency for SCoR2 in S-Nytrosylation of targets and cardiac remodeling. Does SCoR2 overexpression in heart or isolated cardiomyocytes reduce S-nitrosylation of BDH1 and other targets, undermining heart function at baseline or under stress?

      Comments on revisions:

      Some of my points have been addressed. However, the points related to 1) BDH1 stability effect in cardiomyocytes; 2) human relevance of SNO-BDH1; 3) SCoR2 sufficiency remain unclear. That said, this manuscript will provide useful information to the field as such.

    2. Reviewer #3 (Public review):

      Summary:

      This manuscript demonstrates that mice lacking the denitrosylase enzyme SCoR2/AKR1A1 demonstrate a robust cardioprotection resulting from reprogramming of multiple metabolic pathways, revealing<br /> widespread, coordinated metabolic regulation by SCoR2.

      Strengths:

      The extensive experimental evidence provided the use of the knockout model

      Weaknesses:

      No direct evidence for the underlying mechanism.

      The mouse model used is not a tissue-specific knock-out.

    3. Author response:

      The following is the authors’ response to the original reviews.

      Reviewer #1 (Public review): 

      Summary: 

      This study shows a novel role for SCoR2 in regulating metabolic pathways in the heart to prevent injury following ischemia/reperfusion. It combines a new multi-omics method to determine SCoR2 mediated metabolic pathways in the heart. This paper would be of interest to cardiovascular researchers working on cardioprotective strategies following ischemic injury in the heart. 

      Strengths:

      (1) Use of SCoR2KO mice subjected to I/R injury. 

      (2) Identification of multiple metabolic pathways in the heart by a novel multi-omics approach.

      We thank the Reviewer for the positive review of our manuscript.

      Weaknesses:

      (1) Use of a global SCoR2KO mice is a limitation since the effects in the heart can be a combination of global loss of SCoR2. 

      (2) Lack of a cell type specific effect. 

      We agree that global KOs limit the cell type-specific mechanistic conclusions that can be drawn. Global knockouts are nonetheless informative in their own right and serve to identify phenotypes worthy of further study.

      Reviewer #2 (Public review):

      Summary: 

      This manuscript addresses the gap in knowledge related to the cardiac function of the S-denitrosylase SNOCoA Reductase 2 (SCoR2; product of the Akr1a1 gene). Genetic variants in SCoR2 have been linked to cardiovascular disease, yet their exact role in the heart remains unclear. This paper demonstrates that mice deficient in SCoR2 show significant protection in a myocardial infarction (MI) model. SCoR2 influenced ketolytic energy production, antioxidant levels, and polyol balance through the S-nitrosylation of crucial metabolic regulators. 

      Strengths: 

      (1) Addresses a well-defined gap in knowledge related to the cardiac function of SNO-CoA Reductase 2. Besides the in-depth case for this specific player, the manuscript sheds more light on the links between Snitrosylation and metabolic reprogramming in the heart.

      (2) Rigorous proof of requirement through the combination of gene knockout and in vivo myocardial ischemia/reperfusion. 

      (3) Identification of precise Cys residue for SNO-modification of BDH1 as SCoR2 target in cardiac ketolysis 

      We thank the Reviewer for their kind words.

      Weaknesses: 

      (1) The experiments with BDH1 stability were performed in mutant 293 cells. Was there a difference in BDH1 stability in myocardial tissue or primary cardiomyocytes from SCoR2-null vs -WT mice? The same question extends to PKM2. 

      We have not assessed BDH1 stability directly in cardiomyocytes. However, S-nitrosylation increased BDH1 stability in HEK293 cells, and BDH1 expression was increased in (injured) hearts of SCoR2KO mice, together with increased SNO-BDH1. 

      For PKM2, there is a wealth of published evidence from us and others that S-nitrosylation does not regulate protein stability but rather inhibits tetramerization required for full activity.  

      (2) In the absence of tracing experiments, the cross-sectional changes in ketolysis, glycolysis, or polyol intermediates presented in Figures 4 and 5 are suggestive at best. This needs to be stressed while describing and interpreting these results. 

      We now acknowledge this limitation in the ‘Limitations’ section of the manuscript and in edits made to the text. 

      (3) The findings from human samples with ischemic and non-ischemic cardiomyopathy do not seem immediately or linearly in line with each other and with the model proposed from the KO mice. While the correlation holds up in the non-ischemic cardiomyopathy (increased SNO-BDH1, SNO-PKM2 with decreased SCoR2 expression), how do the authors explain the decreased SNO-BDH1 with preserved SCoR2 expression in ischemic cardiomyopathy? This seems counterintuitive as activation of ketolysis is a quite established myocardial response to ischemic stress. It may help the overall message clarity to focus the human data part on only NICM patients. 

      We find it interesting and important that SNO-BDH1 is readily detected in human heart tissue and its level is correlated to disease state. Our findings suggest conservation of this mechanism in human heart failure. However, we caution against drawing further conclusions related to NICM or ICM. Our animal model (based on a single time point) cannot faithfully recapitulate patients with chronic heart disease or differences between NICM and ICM. 

      (4) This is partially linked to the point above. An important proof that is lacking at present is the proof of sufficiency for SCoR2 in S-nitrosylation of targets and cardiac remodeling. Does SCoR2 overexpression in the heart or isolated cardiomyocytes reduce S-nitrosylation of BDH1 and other targets, undermining heart function at baseline or under stress? 

      The Reviewer proposes to test the effect of SCoR2 overexpression on cardioprotection. This is an interesting experiment for future study with the following caveats. First, it presupposes that native expression of SCoR2 is insufficient to control basal steady state S-nitrosylation of SNO-BDH1 and SNO-PKM2 (this does not seem to be the case). Second, overexpressed SCoR2 may be mislocalized within cells or associated with unnatural targets. Thank you.

      Reviewer #3 (Public review): 

      Summary: 

      This manuscript demonstrates that mice lacking the denitrosylase enzyme SCoR2/AKR1A1 demonstrate a robust cardioprotection resulting from reprogramming of multiple metabolic pathways, revealing widespread, coordinated metabolic regulation by SCoR2. 

      Strengths: 

      (1) The extensive experimental evidence. 

      (2) The use of the knockout model. 

      We thank the Reviewer for identifying strengths in our work.

      Weaknesses: 

      (1) The connection of direct evidence for the mechanism. 

      We believe we have identified a novel mechanism for cardioprotection entailing coordinate reprogramming of multiple metabolic pathways and suggesting a widescale role for SCoR2 in metabolic regulation. This is the key message we convey. While genetic dissection of individual pathways may be worthwhile, these investigations will have their own limitations. 

      (2) The mouse model used is not tissue-specific. 

      Please see our response to Reviewer 1, above. 

      Reviewer #1 (Recommendations for the authors):

      In the study, titled "The denitrosylase SCoR2 controls cardioprotective metabolic reprogramming", Grimmett ZW et al., describe a role for SNO-CoA Reductase 2 (SCoR2) in promoting cardioprotection via metabolic reprogramming in the heart after I/R injury. Authors show that loss SCoR2 coordinates multiple metabolic pathways to limit infarct size. Overall, the hypothesis is interesting, however there are some limitations as described below: 

      (1) It is unclear whether SCoR2 mice are global or cardiomyocyte specific. 

      We apologize for any confusion. These are global SCoR2<sup>-/-</sup> mice. This is now stated in the Results when first identifying the strain, as well as in the Methods.  

      (2) Can the authors clarify how divergent metabolic pathways such as Ketone oxidation, glycolysis, PPP and polyol metabolism work downstream of SCoR2 to impact cardioprotection in mice with I/R. 

      The metabolic pathways of ketone oxidation, glycolysis, PPP and polyols appear to converge to support ischemic cardioprotection in SCoR2<sup>-/-</sup> mice, as depicted in the model shown in Fig. 5L. Subsequent to SNO-PKM2 blockade of flux through glycolysis (detailed in this manuscript and in Zhou et al, 2019, PMID: 30487609, as well as by others), substrates of ketolysis and glycolysis are funneled into the PPP, producing the antioxidant NADPH and energy precursor phosphocreatine, which are well-known to be cardioprotective. This occurs more readily in SCoR2<sup>-/-</sup> mice due to elevated SNO-BDH1 (detailed in this manuscript). 

      Polyols, thought to be products of the PPP carbohydrate intermediates arabinose, ribulose, xylulose (among others), have recently been shown to be harmful to cardiovascular health in humans. These polyols are uniformly downregulated in SCoR2<sup>-/-</sup> mice. We suggest this is likely the result of S-nitrosylation of SCoR2-substrate enzymes that form polyols (SCoR2/Akr1a1 is unable to directly reduce carbohydrates to their corresponding polyols). Regulation of endogenous polyol production in humans is a new concept and the mechanisms whereby these compounds increase risk of cardiac events are a subject of active investigation. This is detailed in the final paragraph of both the Results and Discussion sections, and in Fig. 5L. 

      (3) The only functional outcome of SCoR2 loss in echocardiography and measurements for apoptosis. However, it would be important to determine whether the cardioprotective effect persists. It seems cardiac function was recorded 24hours post injury and whether the benefit remains till later time point such as 2 or 4 weeks is not shown. Without this time point, loss of SCoR2 only leads to an acute increment in function. 

      Loss of SCoR2 reduced post-MI mortality at 4 hr; cardiac functional changes (plus troponin, LDH, and apoptosis) were studied in surviving animals at 24 hr post-MI. Cardiac response to acute injury and to chronic injury (weeks post-MI) are not the same metabolically. This is well elucidated in the literature and exemplified by the role of PKM2, which is protective in the chronic response to MI (28 days post-MI; PMID: 32078387), but implicated in injury at shorter timepoints post-MI (PMID: 33288902, 28964797). All that said, functional changes at 2-4 weeks will be important to determine in the future, as the Reviewer indicates. 

      Reviewer #2 (Recommendations for the authors): 

      (1) The last paragraph of the Results section should be divided into the statement related to Table S2 in the Results section, and the rest of the paragraph should be put somewhere in the Discussion. 

      Thank you for this suggestion, which we have taken. 

      (2) The number of mice alive/dead should be reported in the histogram in Figure 1G. 

      Done.

      (3) A concise Graphical Abstract will be useful to grasp the overall logic and message of the manuscript from the beginning. 

      We thank you for this suggestion and have added a graphical abstract to the manuscript.

      Reviewer #3 (Recommendations for the authors): 

      I would suggest having more evidence on the effect of metabolic reprogramming on which cell type. The use of a global knockout is a major limitation, and probably some in vitro experiments with shRNA knockdown in endothelial cells and fibroblasts would provide more insights. 

      The reviewer suggests one direction for future study. We identify a novel mechanism for cardioprotection entailing coordinate reprogramming of multiple metabolic pathways and suggesting a widescale role for SCoR2 in metabolic regulation. This is the message we wish to convey. The role of cardiomyocytes vs contributing cell types is a thoughtful direction for future study. Thank you. 

      Editor's additional comment:

      The editors wish to highlight a critical issue concerning the characterization of the SCoR2−/− mice employed in this study. 

      In the Methods section (page 20), the manuscript states that "SCoR2+/− mice were made by Deltagen, Inc. as described previously (33)." However, reference 33 does not describe SCoR2−/− mice; instead, it refers to other genetically modified strains, including Akr1a1+/−, eNOS−/−, and PKM2−/− mice, with no mention of a SCoR2-targeted model. 

      The editors fully acknowledge that the authors may be using the term "SCoR2" as a functional synonym for Akr1a1, based on its described role as a mammalian homologue of yeast SCoR. If this is the case, such equivalence should be explicitly stated in the manuscript to prevent potential confusion. Moreover, considering that the genetic deletion of Akr1a1 (i.e., SCoR2) underlies the key mechanistic findings presented, it is essential that the manuscript include a clear and comprehensive description of the generation and validation of the mouse model used. 

      We therefore ask the authors to (1) clarify the nomenclature and relationship between "SCoR2" and Akr1a1, and (2) provide full details on the generation of the knockout mice, including the targeting strategy and the genotyping procedures. This information is necessary not only to ensure transparency and reproducibility but also to allow readers to fully appreciate the biological relevance of the findings.

      Thank you for identifying this inconsistency. We have adjusted the manuscript text accordingly to clearly state that SCoR2 is a functional name for the product of the Akr1a1 gene and that these SCoR2<sup>-/-</sup> mice are the same as Akr1a1<sup>-/-</sup> mice described in Ref 33. We have augmented the Methods text to describe the generation and genotyping of these SCoR2/Akr1a1 knockout mice.

    1. How should companies be selected for the AGF, given the focus on generating incrementalemissions reductions? Given the available data on company emissions and stated goals, whatwere some ways to identify different categories of firms with the potential for incrementalemissions improve

      We can analyze key data tabs ('2022 Final S1 S2', 'Targeted % Reduction S1+2', and '2022 Final S3') and categorize companies into strategic profiles like 'beginners', 'leaders', and 'influencers'. Then we choose those who are willing to work with us and have good financial viability.

    1. eLife Assessment

      Using high-throughput small-molecule screening, this study discloses novel modulators of the mitochondrial transcription factor A (TFAM), a key regulator of mitochondrial function. Reviewers viewed the targeting of TFAM as innovative and the study's conclusions as potentially important (especially the effects on inflammation). However, the lack of evidence for a direct effect of the compounds on TFAM activity weakens the paper's key conclusion and renders the study incomplete.

    2. Reviewer #1 (Public review):

      Summary:

      The authors identify small-molecule compounds modulating the stability of the mitochondrial transcription factor A (TFAM) using a high-throughput CETSA screen and subsequent secondary assays. The identified compounds increased the protein levels of TFAM without affecting its RNA levels and led to an increase in mtDNA levels. As a read-out for dose-dependent action of the identified compounds, the authors investigated cGAS-STING and ISG activation in cellular inflammation models in the presence or absence of their compounds. The addition of TFAM modulators led to a decrease in cGAS-STING/ISG activation and decreased mtDNA release. Furthermore, beneficial effects could be determined in models of mtDNA disease (rescue of ATP rates), sclerotic fibroblasts (decreased fibrosis), and regulatory T cells (decreased activation of effector T cells). The study thus proposes novel first-in-class regulators of TFAM as a therapeutic option in conditions of mitochondrial dysfunction.

      Strengths:

      The authors identified TFAM as a promising target in conditions of mitochondrial dysfunction, as it is a key regulator of mitochondrial function, serving both as a transcription and packaging factor of mtDNA. Importantly, TFAM is a key regulator of mtDNA copy number, and a moderate increase in TFAM/mtDNA levels has been shown to be beneficial in a number of pathological conditions. Furthermore, mtDNA release leading to activation of inflammatory responses has been linked to a variety of pathological conditions in the last decade. Thus, the identification of small molecule modulators of TFAM that have the potential to increase mtDNA copy number and decrease inflammatory signaling is of great importance. Furthermore, the authors highlight potential applications in the field of mitochondrial disease, fibrosis, and autoimmune disease.

      Weaknesses:

      The central weakness of the study is the fact that the authors propose compounds as modulators or even activators of TFAM without sufficiently proving a direct effect on TFAM itself. There are no data indicating a direct effect on TFAM activity (e.g., mtDNA transcription, replication, packaging), and it is not sufficiently ruled out that other proteins (e.g., LONP1) mediate the effect. Additionally, important information on the performed screen is not provided. Thus, the data presented is currently incomplete to support the described findings. Furthermore, the introduction and discussion are lacking key references.

    3. Reviewer #2 (Public review):

      Summary:

      The present paper aims to identify small molecules that could possibly affect mitochondrial DNA (mtDNA) stability, limiting cytosolic mtDNA abundance and activation of interferon signaling. The authors developed a high-throughput screen incorporating HiBiT technology to identify possible target compounds affecting mitochondrial transcription factor A (TFAM) content, a compound known to impact mtDNA stability. Cells were subsequently exposed to target compounds to investigate the impact on TNFα-stimulated interferon signaling, a process activated by cytosolic mtDNA abundance. Compound 2, an analog of arylsulfonamide, was highlighted as a possible mitochondrial transcription factor A (TFAM)-activator, and emphasized as a small molecule that could stabilize mtDNA and prevent stress-induced interferon signaling.

      Strengths:

      Identifying compounds that positively affect mitochondrial biology has diverse implications. The combination of high-throughput screening and assay development to connect identified compounds with cellular interferon signalling events is a strength of the current approach, and the authors should be commended for identifying compounds that broadly impact interferon signalling. The authors have incorporated diverse measurements, including TFAM content, mtDNA content, interferon signaling, and ATP content, as well as verified the necessity of TFAM in mediating the beneficial effects of the emphasized small molecule (Compound 2).

      Weaknesses:

      (1) While the identified compound clearly works through TFAM, Compound 2 was identified as an arylsulfonamide, which would be expected to affect voltage-gated sodium channels (e.g. PMID: 31316182). Alterations in cellular sodium content and membrane polarization could affect metabolism to indirectly influence mtDNA and TFAM content. It remains unclear if this compound directly or indirectly affects TFAM content, especially as the authors have utilized various cancer cell lines, which could have aberrant sodium channels.

      (2) TFAM is nuclear encoded - if this compound directly functions to 'activate TFAM', why/how would TFAM content increase independent of nuclear transcription?

      (3) While a listed strength is the incorporation of diverse readouts, this is also a weakness, as there is a lack of consistency between approaches. For instance, data is not provided to show compound 2 increases TFAM or mtDNA content following TNFα stimulation, and extrapolating between cell lines may not be appropriate. The authors are encouraged to directly report TFAM and mtDNA for target compounds 2 and 15 to support their data reported in Figure 2. Ideally, the authors would also report for compound 1 as a control.

      (4) While the authors indicate compound 11 displayed the strongest effect on ISRE activity, this appears not to be identified in Figure 1B as a compound affecting TFAM content? Can the authors identify various Compounds in Figure 1B to better highlight the relationship between compounds and TFAM content?

      (5) The authors suggest Compound 2 increases cellular ATP - but they are encouraged to normalize luminescence to cellular protein and OXPHOS content to better interpret this data. Additionally, the authors are encouraged to report cellular ATP content following TNFα stimulation/stress (the key emphasis of the present data) and test compound 11, which the authors have implicated as a more sensitive compound.

      The discussion is really a perspective, theorizing the diverse implications of small molecule activation of TFAM. The authors are encouraged to provide a balanced discussion, including a critical evaluation of their own work, including an acknowledgement that evidence is not provided that Compound 2 directly activates TFAM or decreases mtDNA cytosolic leakage.

    1. eLife Assessment

      This study presents a useful inventory of genes that are up- and down-regulated in the mouse small intestine (duodenum and ileum) during the first postnatal month; the data were collected and analyzed using solid and validated methodology and can be used as a starting point for additional validation of specific markers and for follow-up functional studies. Some aspects of the study were incomplete, with claims being only partially supported by the data, and it is suggested that additional validation be performed. The authors attempted to correlate gene expression changes with periods of high and low NEC susceptibility, but these correlations are speculative and not supported by functional follow-up studies. Discussion of gene expression changes with NEC susceptibility would be more appropriate to include in the Discussion section and to be tempered in the results section.

    2. Reviewer #1 (Public review):

      Summary:

      In this manuscript, the authors aimed to clarify the transcriptional changes across murine postnatal small intestinal development (0 days to 1 month) in both the duodenum and ileum, a period that shows morphological similarity to 20-30 week old fetal humans. This is an especially critical stage in human intestinal development, as necrotizing enterocolitis (NEC) usually manifests during these stages.

      Strengths:

      The authors assessed numerous timepoints between 0 days and 1 month in the postnatal mouse duodenum and ileum using bulk RNA transcriptomics of bulk-isolated tissues. Cellular deconvolution, based on relative marker expression, was used to clarify immune cell proportions in the bulk RNA sequencing data. They confirmed some transcriptional targets found in vivo primarily in mouse via qrtPCR and immunohistochemistry, but also in human fetal tissues and isolated organoids, and are of decent quality.

      Weaknesses:

      The overall weakness of this study, as mentioned by the authors themselves, is that the bulk transcriptomic data generated for the study were isolated from non-fractionated bulk intestinal tissue. This makes it difficult to interpret much of this data regarding cellular fractions found across developmental time. It is difficult to rationalize the approach here, as even isolation protocols of epithelial-only or mesenchyme-only tissues for bulk RNA sequencing are well established. The authors address some of these concerns using cellular deconvolution for immune cell populations, which I think might be helpful if they expanded this analysis to other cell types (mesenchyme, endothelium, glia). However, I would assume that bulk isolations across developmental time are going to be influenced primarily by the bulk of tissue-type found at each time point - primarily epithelium. But this is also confirmed by the immune transcripts becoming more apparent later in their time series, as this system becomes more established during weaning. This study might also be strengthened by comparison with data that is publicly available for early fetal stage development in humans. Comparisons between the duodenum and ileum could be strengthened by what we already know from adult data, from both epithelial- and mesenchyme-isolated fractions. The rationale of using the postnatal mouse as a comparison to NEC is also a little unclear- perhaps some of the developmental processes are similar, however, the environments are completely different. For example, even in early postnatal mouse development, you would find microbial activity and milk.

    3. Reviewer #2 (Public review):

      Summary:

      This work presents a valuable resource by generating a comprehensive bulk RNA sequencing catalogue of gene expression in the mouse duodenum and ileum during the first postnatal month. The central findings of this work are based on an analysis of this dataset. Specifically, the authors characterized molecular shifts that occur as the intestine matures from an immature to an adult-like state, investigating both temporal changes and regional differences between the proximal and distal small intestine. A key objective was to identify gene expression patterns relevant to understanding the region-specific susceptibility and resistance to necrotizing enterocolitis (NEC) observed in humans during the postnatal period. They also sought to validate key findings through complementary methods and to provide comparative context with human intestinal samples. This study will provide a solid reference dataset for the community of researchers studying postnatal gastrointestinal development and diseases that arise during these stages. However, the study lacks functional validation of the interpretations.

      Strengths:

      (1) The inclusion of numerous time points (day 0 through 4 weeks) and comparative analyses throughout the first postnatal month.

      (2) Validation of key interpretations of RNA-seq data by other methods.

      (3) Linking mouse postnatal development to human premature infant development, enhancing its clinical relevance, particularly for NEC research. The inclusion of human intestinal biopsy and organoid data for comparison further strengthens this link.

      (4) The investigation covers a wide array of developmental gene categories with known significance, including epithelial differentiation markers (e.g., Vil1, Muc2, Lyz1), intestinal stem cell markers (e.g., Lgr5, Olfm4, Ascl2), mesenchymal markers (e.g., Pdgfra, Vim), Wnt signaling components (e.g., Wnt3, Wnt5a, Ctnnb1), and various immune genes (e.g., defensins, T cell, B cell, ILC, macrophage markers).

      Weaknesses:

      (1) The primary limitation is that there is no functional validation. The study primarily focuses on the interpretation of RNA expression. This is a common limitation of transcriptomic "atlas" studies, but the functional and mechanistic relevance of these interpretations remains to be determined.

      (2) The data are derived from bulk RNA-Seq of full-thickness intestinal tissue. While this approach helps capture rare cell types and both epithelial and mesenchymal components simultaneously, it does not provide cell-type-specific gene expression profiles, which might obscure important nuances. Future investigations using single-cell sequencing would be a logical follow-up.

      (3) The day 4 samples were omitted due to quality issues, which might have led to missing some dynamic changes, especially given that some ISC genes show dynamic changes around day 6.

    4. Reviewer #3 (Public review):

      Summary:

      This study uses bulk mRNA sequencing to profile transcriptional changes in intestinal cells during the early postnatal period in mice - a developmental window that has received relatively little attention despite its importance. This developmental stage is particularly significant because it parallels late gestation in humans, a time when premature infants are highly vulnerable to necrotizing enterocolitis (NEC). By sampling closely spaced timepoints from birth through postnatal week four, the authors generate a resource that helps define transcriptional trajectories during this phase. Although the primary focus is on murine tissue, the authors also present limited data from human fetal intestinal biopsy samples and organoids. In addition, they discuss potential links between observed gene expression changes and factors that may contribute to NEC.

      Strengths:

      The close temporal sampling in mice offers a detailed view of dynamic transcriptional changes across the first four weeks after birth. The authors leverage these close timepoints to perform hierarchical clustering to define relationships between developmental stages. This is a useful approach, as it highlights when transcriptional states shift most dramatically and allows for functional predictions about classes of genes that vary over time. This high-level analysis provides an effective entry point into the dataset and will be useful for future investigations. The inclusion of human fetal intestinal samples, although limited, is especially notable given the scarcity of data from late fetal timepoints. The authors are generally careful in their presentation of results, acknowledging the limitations of their approach and avoiding over-interpretation. As they note, this dataset is intended as a foundation for their lab and others, with secondary approaches required to more fully explore the biological questions raised.

      Weaknesses:

      One limitation of the study is the use of bulk mRNA sequencing to draw conclusions about individual cell types. It has been documented that a few genes are exclusively expressed in single cell types. For instance, markers such as Lgr5 and Olfm4 are enriched in intestinal stem cells (ISCs), but they are also expressed at lower levels in other lineages and in differentiating cells. Using these markers as proxies for specific cell populations lowers confidence in the conclusions, particularly without complementary validation to confirm cell type-specific dynamics.

      Validation of the sequencing data was itself limited, relying primarily on qPCR, which measures expression at the same modality rather than providing orthogonal support. It is unclear how the authors selected the subset of genes for validation; many key genes highlighted in the sequencing data were not assessed. Moreover, the regional differences reported in Lgr5, Olfm4, and Ascl2, appearing much higher in proximal samples than in distal ones, were not recapitulated by qPCR validation of Olfm4, and this discrepancy was not addressed. Resolving such inconsistencies will be important for interpreting the dataset.

      The basis for linking particular gene sets to NEC susceptibility rests largely on their spatial restriction to the distal intestine and their temporal regulation between early (day 0-14) and later (weeks 3-4) developmental stages. While this is a reasonable approach for generating hypotheses, the correlations have limited interpretive power without experimental validation, which is not provided here. Many factors beyond NEC may drive regional and temporal differences in intestinal development.

      Finally, the contribution of human fetal biopsy samples is minimal. The central figure presenting these data (Figure 4A) shows immunofluorescence for LGR5, a single stem cell marker. The staining at day 35 is not convincing, and the conclusions that can be drawn are limited to confirming the localization of LGR5-positive cells to crypts as early as 26 weeks.

    1. eLife Assessment

      This valuable study examined the roles of the posterior parietal cortex in rats performing an auditory change-detection decision task. It provided solid evidence for two subpopulations with opposing modulation patterns during decision formation and for a correspondence between neural and behavioral measures of the short timescale used for evidence evaluation.

    2. Joint Public Review:

      In this study, the authors sought to characterize the relationship between the timescales of evidence integration in an auditory change detection task and neural activity dynamics in the rat posterior parietal cortex (PPC), an area that has been implicated in the accumulation of sensory evidence. Using the state-of-the-art Neuropixel recording techniques, they identified two subpopulations of neurons whose firing rates were positively and negatively modulated by auditory clicks. The timescale of click-related response was similar to the behaviorally measured timescale for evidence evaluation. The click-related response of positively modulated neurons also depended on when the clicks were presented, which the authors hypothesized to reflect a time-dependent gain change to implement an urgency signal. Using muscimol injections to inactivate the PPC, they showed that PPC inactivation affected the rats' choices and reaction times.

      There are several strengths of this study, including:

      (1) Compelling evidence for short temporal integration in behavioral and neural data for this task.

      (2) Well-executed and interpretable comparisons of psychophysical reverse correlation with single-trial, click-triggered neuronal analyses to relate behavior and neural activity.

      (3) Inactivation experiments to test for causality.

      (4) Characterization of neural subpopulations that allows for complex relationships between a brain region and behavior.

      (5) Experimental evidence for an interesting way to use sensory gain change to implement urgency signals.

      There are also some concerns, including:

      (1) The work could be better contextualized. From a normative Bayesian perspective, the observed adaptation of timescales and gain aligns closely with optimal strategies for change detection in noisy streams: placing greater weight on recent sensory samples and lowering evidence requirements as decision urgency grows. However, the manuscript could go further in explicitly connecting the experimental findings to normative models, such as leaky accumulator or dynamic belief-updating frameworks. This would strengthen the broader impact of the work by making clear how the observed PPC dynamics instantiate computationally optimal strategies.

      (2) It is unclear how the rats are performing the task, both in terms of the quality of performance (they only show hit rates, but the rats also seem to have high false alarm rates), and in terms of the underlying strategy that they seem to be using.

      (3) A major conceptual weakness lies in the claim that PPC "dynamically modulates evidence evaluation in a time-adaptive manner to suit the behavioral demands of a free-response change detection task." To support this claim, it would require direct comparison of neural activity between two task demands, either in two tasks or in one task with manipulations that promote the adoption of different timescales.

      (4) Some analyses of neural data are lacking or seem incomplete, without considering alternative interpretations.

      (5) The muscimol inactivation results did not provide a clear interpretation about the link between PPC activity and decision performance.

    1. eLife Assessment

      This study presents valuable findings regardingg a rare mode of reproduction called hybridogenesis in a species pair of frogs. While parts of the study provide solid support for the claim of hybridogenesis, other parts are incomplete with certain claims being only partially supported, as alternative modes of reproduction cannot be fully ruled out.

    2. Reviewer #1 (Public review):

      Summary:

      (1) Introduction Hybridogenesis involves one genome being clonally transmitted while the other is replaced by backcrossing. It results in high heterozygosity and balanced ancestry proportions in hybrids. Distinguishing it from other hybrid systems requires a combination of nuclear, mitochondrial, and population-genetic evidence. Hybridogenesis has been identified in only a few taxa (e.g., some fish, frogs, and stick insects), but no new cases have been reported in over a decade. Advancements in high-throughput sequencing now allow for the detection of high individual heterozygosity, which can indicate hybridization, but it is difficult to distinguish hybridogenesis from other similar asexual systems based solely on genome-wide data. To differentiate these systems, researchers look at several key indicators: Presence of pure-species offspring from hybrids (possible only in hybridogenesis); sex ratio (male presence in hybridogenetic systems); nuclear and mitochondrial haplotype sharing with co-distributed parental species; geographic distribution patterns, especially the lack of both parental species in hybrid populations.

      (2) What the authors were trying to achieve The paper studies Quasipaa Frogs. Q. robertingeri (narrowly endemic) and Q. boulengeri (widespread), which are morphologically similar and found sympatrically in parts of China. Preliminary RAD-seq data revealed bimodal heterozygosity in Q. boulengeri samples. Some individuals had extremely high heterozygosity, consistent across loci and suggestive of F1 hybrids. These high-heterozygosity individuals had one haplotype from each species. The study investigates the high heterozygosity observed in Quasipaa frogs, particularly in individuals morphologically resembling Q. boulengeri but genetically appearing to be F1 hybrids with Q. robertingeri. The goal is to determine whether these patterns are consistent with hybridogenesis, rather than other atypical reproductive modes. The authors also suggest the hypothesis that hybridogenesis could enable range expansion of an endemic species through hybridization with a widespread relative.

      (3) Methods A total of 107 individuals from 53 localities were collected for the study. This sample included 58 sexed adults-27 males and 31 females-as well as a majority of tadpoles. Of these individuals, 31 had previously determined karyotypes. DNA was extracted and sequenced. Individual heterozygosity and ancestry were estimated using bioinformatics tools. F1 hybrids were compared to one of the parental species to examine patterns of fixed heterozygous loci. Mitochondrial DNA was also extracted from sequencing data, and phylogenetic trees were constructed

      (4) Results Two groups of individuals were detected based on heterozygosity: one group exhibited high heterozygosity and consisted of F1 hybrids, while the other group showed low heterozygosity, representing pure-species types. The F1 hybrids demonstrated approximately equal ancestry from Q. robertingeri and Q. boulengeri, consistently maintaining a high proportion of heterozygous loci at around 16.7%. In contrast, pure individuals had much lower heterozygosity, approximately 2.9%. F1 hybrids were found across 21 different sites, including both male and female individuals. The presence of numerous fixed heterozygous loci in F1 hybrids confirmed their hybrid origin, and these loci were absent in pure Q. boulengeri samples. F1 individuals typically carried one haplotype from each parental species. There was minimal haplotype sharing between the two pure species, but extensive sharing was observed between F1 hybrids and co-occurring pure-species individuals. In fact, F1 types shared haplotypes with local Q. boulengeri in over 90% of cases, which supports the occurrence of local backcrossing and parental contribution. In terms of mitochondrial DNA, F1 hybrids possessed mitochondrial haplotypes that clustered with Q. boulengeri and often shared these haplotypes directly. Genetic structure and phylogenetic analyses, revealed three distinct genetic clusters corresponding to F1 hybrids, Q. boulengeri, and Q. robertingeri. The F1 hybrids positioned themselves intermediate between the two pure species. Neighbor-joining trees and TreeMix analyses confirmed a strong separation between pure-species types, with F1 hybrids clustering alongside local Q. boulengeri subpopulations, indicating local formation of hybrids.

      (5) Discussion In summary, the study reveals hybridogenesis (a reproductive system where hybrids clonally transmit one parental genome) in Quasipaa boulengeri and Q. robertingeri. Hybrids show high genetic heterozygosity and coexist with parental species, ruling out other reproductive modes like parthenogenesis or kleptogenesis. Evidence suggests hybridogenesis enables Q. robertingeri genomes to appear far outside their normal range, possibly aiding range expansion. Chromosomal abnormalities are linked to hybrid hybrids, supporting clonal genome transmission. The genetic divergence between parental species fits patterns seen in other hybridogenetic systems, highlighting a unique, understudied case in East Asia.

      Strengths:

      Overall, the authors carefully interpret their genetic data to support hybridogenesis as the reproductive mode in this system and propose that this mechanism may aid range expansion. They also appropriately acknowledge the need for further cytogenetic and ecological studies, demonstrating scientific caution. In summary, the discussion reasonably follows from the results, offering cautious interpretation where necessary.

      Weaknesses:

      Direct reproductive or cytological evidence is still lacking. While alternative reproductive modes are discussed and mostly ruled out logically, some require further empirical testing. The authors maintain a cautious interpretation, appropriately suggesting further research. Some outstanding questions remain.

      (1) The elevated heterozygosity and presence of fixed heterozygous loci in hybrids compared to parental species strongly indicate hybridogenesis. However, alternative explanations such as repeated F1 hybridization or some form of balanced polymorphism, while less likely, are not fully excluded.

      (2) The coexistence of hybrids and parental species, along with high nuclear and mitochondrial haplotype sharing between hybrids and Q. boulengeri, argues against reproductive modes like parthenogenesis, gynogenesis, or kleptogenesis. However, the assumption that hybrid sterility or multiple local hybrid origins are unlikely could be challenged if undetected local variation or cryptic reproductive strategies exist.

      (3) The presence of Q. robertingeri nuclear genomes far outside their known geographic range, genetically linked to nearby populations, fits a hybridogenetic-mediated dispersal model. Although the authors dismiss human-mediated or accidental transport as explanations, these scenarios are not necessarily unlikley.

    3. Reviewer #2 (Public review):

      This study describes F1 hybrid frog lineages that use an "unusual" form of reproduction, perhaps hybridogenesis. Identifying such species is important for understanding the biodiversity of reproduction in animals, and animals that do not reproduce via "canonical" sex can be useful model systems in ecology and evolution. The conclusion of the study are based on reduced representation sequencing (RAD-seq with a de-novo assembly of loci) of 107 wild-caught individuals from 53 localities (plus 4 outgroup individuals), including 27 males, 31 females, and 49 juveniles of unknown sex. Conclusive inferences of unusual forms of reproduction typically require breeding studies and parent-offspring genotype comparisons but such information is not available (and perhaps impossible to generate) for the focal frog lineages.

      (1) Conclusion 1: there are two pure species and F1 hybrids

      The authors infer that there are two lineages RR and BB (corresponding to two named species), and F1 interspecific hybrids RB. This inference is based on the results presented in Figure 1 (PCA, admixture, and heterozygosity analyses) as well as analyses of fixed SNP differences between R and B. I think that this conclusion is well supported; my only comment on this part is that it would be useful to have the admixture plots & cross-validation for the 107 samples with other k values (not only k=2) as a supplemental figure. The plots in the supplemental file S1 are for the subset of 55 inds inferred to be BB only.

      (2) Conclusion 2: F1 hybrids most likely reproduce via hybridogenesis

      This conclusion is based on the sex ratio of hybrids and haplotype sharing between species and lineages at different, ~150 bp long loci. Parthenogenesis (including sperm-dependent parthenogenesis) is unlikely to generate males, yet sexed F1 hybrid individuals include 18 females and 10 males which prompts the exclusion of parthenogenesis in the present paper. Specific haplotype-sharing patterns are also discussed in the study and used as further support, but these arguments (and the related main and supplementary figures) are difficult to read/interpret. To clarify the arguments related to haplotype sharing and haplotype diversities, I suggest that the authors phase the R and B haplotypes from all their hybrids by using their pure (RR and BB individuals) as references. The concatenated lineage-specific haplotypes can then be used to reconstruct a single phylogenetic tree for all loci (easier to visualize and interpret that the separate haplotype networks for the loci). The authors can then draw cartoon phylogenies for what would be the expected pattern for haplotype clustering and diversity for different reproductive modes, and discuss their observed phylogenies in this regard. Similarly, the migration weights (represented in Figure 4) can then also be computed for separate haplotypes in the hybrids.

      However, independently of the outcome of the phasing, it is important to note that there is no a priori reason why all F1 hybrid individuals would reproduce via the same reproductive mode. Notably, work by Barbara Mantovani and Valerio Scali on stick insects has shown that different F1 hybrid lineages involving the same parental species reproduce via hybridogenesis or parthenogenesis. I don't see how the presented data can allow excluding that some F1 hybrid frogs are parthenogenetic while others are hybridogenetic for example.

      (3) Conclusion 3: Crosses between hybridogenetic RB males and hybridogenetic RB females gave rise to a new population of RR individuals outside of the RR species range (this new population would correspond to location 30 from Figure 1).

      It is not entirely clear to me which data this conclusion is based on, I believe it is the combination of known species ranges for the species R (location 30 being outside of this) and the relatively low heterozygosity of RR individuals at location 30.

      However, as the authors point out, the study focuses on an understudied geographic range. Isolated or rare populations of the R species may easily have been overlooked in the past, especially since the R and B species are morphologically difficult to distinguish. Furthermore, an isolated, perhaps vestigial population may also likely be inbred/feature low diversity. It seems most appropriate to discuss different (equally likely) scenarios for the RR population at location 30 rather than implying a hybridogenetic origin of RR individuals. I would also choose a title that does not directly imply this scenario but reflects the solid (not speculative) findings of the study.

    4. Reviewer #3 (Public review):

      Summary:

      This work reports a new case of hybridogenetic reproduction in the frog genus Quasipaa. Only one other example of this peculiar reproductive mode is known in amphibians, and fewer than a dozen across the tree of life. Interestingly, a population of one of the parental species (Q. robertingeri) was found away from the core of its distribution, within the distribution of the hybridogens. This range expansion might have been mediated by hybridogenesis, whereby two copies of the same parental genome came together again after many generations of hybridogenesis.

      Strengths:

      Evidence for hybridogenesis is solid. The state of the art would be to genotype parents and offspring, but other known alternative scenarios have been considered carefully and can be ruled out convincingly. In addition, the authors are very careful in their phrasing and made sure to never overinterpret their data.

      The explicit predictions under different reproductive modes (and Table 1) are a useful resource for future studies and could inspire new findings of unusual reproductive modes in other taxa.

      The sampling is very impressive, with over 50 populations sampled across a very large area.

      The comparison of p-distances between pairs of species involved in hybridogenesis is interesting.

      Weaknesses:

      The current phylogenetic reconstruction with the F1s does not enable to infer the number of origins of hybridogenesis, nor whether the population of Q. robertingeri that was found far from the core of the species' distribution indeed derives from hybridogenesis. This is because some of the signal is driven by the Q. boulengeri haplome, which is replaced every generation and therefore does not reflect the evolutionary history of the lineage.

      All known reproductive modes except hybridogenesis can be excluded, but without genotyping parents and offspring, it is impossible to rule out another, yet undescribed reproductive mode.

    1. share via guest@cryptpad

      Start the conversation over there

      <svg viewBox="0 0 1100 500" width="670" height="370" version="1.1" xmlns="http://www.w3.org/2000/svg"><rect width="2000" height="1000" fill="#FFFFFF"></rect><g transform="translate(304,295)"><text text-anchor="middle" transform="translate(-88, -106)" style="font-size: 70px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 150, 210);">hyperpost</text><text text-anchor="middle" transform="translate(133, -91)" style="font-size: 70px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 150, 210);">link</text><text text-anchor="middle" transform="translate(7, 18)" style="font-size: 70px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 150, 210);">peergos</text><text text-anchor="middle" transform="translate(-26, 73)" style="font-size: 56.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 150, 210);">add</text><text text-anchor="middle" transform="translate(94, -41)" style="font-size: 56.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 150, 210);">path</text><text text-anchor="middle" transform="translate(97, 138)" style="font-size: 43px; user-select: none; cursor: default; font-family: Lato; fill: rgb(76, 40, 130);">gyuri</text><text text-anchor="middle" transform="translate(-122, 62)" style="font-size: 43px; user-select: none; cursor: default; font-family: Lato; fill: rgb(76, 40, 130);">view</text><text text-anchor="middle" transform="translate(-43, -154)" style="font-size: 43px; user-select: none; cursor: default; font-family: Lato; fill: rgb(76, 40, 130);">sandbox</text><text text-anchor="middle" transform="translate(-8, -41)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(76, 40, 130);">week</text><text text-anchor="middle" transform="translate(-120, -68)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 236, 183);">hypothes</text><text text-anchor="middle" transform="translate(15, 98)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 236, 183);">copy</text><text text-anchor="middle" transform="translate(-127, -33)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 236, 183);">appropriate</text><text text-anchor="middle" transform="translate(-13, -75)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(0, 236, 183);">net</text><text text-anchor="middle" transform="translate(-160, -159)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(231, 33, 153);">url</text><text text-anchor="middle" transform="translate(-149, 9)" style="font-size: 29.5px; user-select: none; cursor: default; font-family: Lato; fill: rgb(231, 33, 153);">web</text><text text-anchor="middle" transform="translate(-53, 94)" style="user-select: none; cursor: default; font-family: Lato; fill: rgb(231, 33, 153);">antate</text><text text-anchor="middle" transform="translate(13, -191)" style="user-select: none; cursor: default; font-family: Lato; fill: rgb(231, 33, 153);">created</text><text text-anchor="middle" transform="translate(-101, -193)" style="user-select: none; cursor: default; font-family: Lato; fill: rgb(135, 105, 214);">methodology</text><text text-anchor="middle" transform="translate(169, -18)" style="user-select: none; cursor: default; font-family: Lato; fill: rgb(135, 105, 214);">human</text><text text-anchor="middle" transform="translate(-202, -67)" style="user-select: none; cursor: default; font-family: Lato; fill: rgb(135, 105, 214);">sis</text><text text-anchor="middle" transform="translate(79, -152)" style="user-select: none; cursor: default; font-family: Lato; fill: rgb(135, 105, 214);">one</text></g></svg>

    1. Emma Bowman. After Data Breach Exposes 530 Million, Facebook Says It Will Not Notify Users. NPR, April 2021. URL: https://www.npr.org/2021/04/09/986005820/after-data-breach-exposes-530-million-facebook-says-it-will-not-notify-users (visited on 2023-12-06).

      I found the inclusion of Bowman’s article about the 530 million-user breach striking — it grounds the discussion of privacy in real, large-scale harm rather than abstract theory. From my experience, seeing such breaches makes the “privacy isn’t just about secrets, it’s about control and trust” line hit home.

    2. Private message. November 2023. Page Version ID: 1185376021. URL: https://en.wikipedia.org/w/index.php?title=Private_message&oldid=1185376021 (visited on 2023-12-05).

      This article outlines how direct messaging systems have evolved across social media platforms, but what stood out to me is few of these systems are truly private. Even when messages are labeled as direct or personal, they are still stored on centralized servers that companies can access for moderation, data analysis, or even advertising purposes. This connects directly to 9.1's discussion of privacy illusions. How private online communication is often just a matter of perception. It makes me question whether privacy online is ever absolute, or if it's always conditional on the platform's policies and profit motives.

    3. General Data Protection Regulation. November 2023. Page Version ID: 1187294017. URL: https://en.wikipedia.org/w/index.php?title=General_Data_Protection_Regulation&oldid=1187294017 (visited on 2023-12-05).

      Using the GDPR Wikipedia page is fine for a quick overview, but it’s shaky for details—pages change and legal wording is picky. If the chapter is arguing about privacy “rules” being unclear, it would be stronger to cite the actual text of GDPR (esp. Article 5 on purpose-limitation/data-minimization and Article 6 on lawful basis) and maybe an EDPB guideline. Quick win: keep the Wikipedia link for context, but add primary sources to back any claims about what GDPR requires.

    4. The article is about Facebook admitted it stored millions of passwords, making them accessible to thousands of employees. It did lead to a security problem. Facebook notified affected users but didn’t force them to change passwords. This led to a crisis confidence for people who are using this.

    5. Steven Spielberg. Catch Me If You Can. December 2002. URL: https://www.imdb.com/title/tt0264464/.

      This link sends you to an imdb page of the movie "Catch Me If You Can." This is one of my favorite movies that stars Tom Hanks and Leonardo DiCaprio that tells a true story of a person named Frank William Abagnale who stole the identity of multiple careers and made top of the line counterfeited checks. He posed as a pilot, then a doctor, then a lawyer, even got married, and eventually was caught. Then instead of jailtime, the FBI gave him a job to defraud counterfeit checks. This is a link to this chapter because it talks about privacy and security, whereas there are people who find ways around these rules/laws to gain something in return. It shows that while advancements in technology rapidly increase, it leads to more consequences and opportunities for others to act negatively.

    1. This has great practical value as well; the ability to debug a full manipulation stack with repeatable deterministic simulations (even if they include randomness) is surprisingly rare in the field but hugely valuable.

      Having worked with gazebo and ros, I can vouch for this! deterministic simulation is such an underrated feature until you've lost days to Heisenbugs

  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. When we use social media platforms though, we at least partially give up some of our privacy.

      I found how users often feel they’ve lost control over their data interesting — it reminds me of the moments when I accept a “Cookie/Privacy” pop-up without really reading it, then later wonder how much the platform knows about my interests.

    2. For example, a social media application might offer us a way of “Private Messaging” [i1] (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly.

      I find this section very relatable because it captures how fragile our sense of privacy really online. The example of private messaging makes me think about how I often assume my DMs are confidential, even though they are stored and possibly analyzes by the platform itself. What feels private to users is often just conveniently invisible. I think this blurring between private and public spaces is what makes digital privacy so psychologically complex. It's not only about hiding information but about controlling context and audience. The idea that company can read what I write to a friend reminds me that privacy online is less of a right and more of a temporary permission.

    1. Analyse du "Bon Pays" : Mondialisation, Coopération et Intérêt National

      https://hyp.is/go?url=https%3A%2F%2Findex.goodcountry.org%2F&group=world

      Résumé

      Ce document de synthèse analyse les thèses centrales présentées par Simon Anholt concernant les défis de la mondialisation et la nécessité d'une nouvelle approche de la gouvernance mondiale.

      Le problème fondamental identifié est un décalage critique : alors que les problèmes les plus urgents de l'humanité (changement climatique, pandémies, crises économiques) sont mondialisés, les systèmes de gouvernance restent ancrés dans des cadres nationaux égoïstes.

      Trois obstacles majeurs à la coopération internationale sont identifiés : la demande des électeurs pour des politiques nationalistes, une forme de "psychopathie culturelle" qui limite l'empathie envers les étrangers, et la fausse croyance des dirigeants que les agendas nationaux et internationaux sont incompatibles.

      La solution proposée repose sur une découverte issue d'une analyse de données à grande échelle sur la perception des pays (l'Indice des Marques Nationales). Cette recherche révèle que les pays les plus admirés ne sont pas les plus riches ou les plus puissants, mais ceux perçus comme "bons" – c'est-à-dire ceux qui contribuent de manière significative au bien commun de l'humanité.

      Cette découverte lie directement la "bonté" d'un pays à son "intérêt personnel", car une réputation positive attire investissements, tourisme et talents, rendant la collaboration internationale un levier de compétitivité nationale.

      Pour matérialiser ce concept, Anholt a créé "l'Indice des Bons Pays", qui mesure la contribution de chaque nation à l'humanité.

      L'Irlande se classe au premier rang, démontrant qu'un pays peut honorer ses devoirs internationaux tout en gérant ses propres défis économiques.

      L'appel à l'action final est d'intégrer le terme "bon" (défini comme le contraire d'égoïste) dans le discours public et politique, afin de créer une pression citoyenne pour que les gouvernements adoptent des politiques plus collaboratives et tournées vers l'extérieur.

      1. Le Paradoxe de la Mondialisation : Problèmes Mondiaux, Solutions Nationales

      La mondialisation a profondément interconnecté le monde, créant un système où des événements locaux peuvent avoir des répercussions mondiales quasi instantanées. Des exemples frappants illustrent cette réalité :

      Sanitaire : "Il y a 20 ou 30 ans, si un poulet attrapait froid, éternuait et mourait dans un petit village d'Extrême-Orient, c'était tragique pour le poulet [...] mais c'était peu probable qu'on ait peur d'une pandémie mondiale".

      Économique : "si une banque américaine prêtait trop d'argent à des clients non solvables et que la banque faisait faillite, c'était néfaste [...] mais nous ne pensions pas que ça amènerait un effondrement du système économique pendant presque dix ans."

      Cette interconnexion a apporté des bénéfices, comme le succès des Objectifs du Millénaire, prouvant que "l'espèce humaine peut arriver à d'extraordinaires progrès en se montrant unie et persévérante".

      Cependant, la mondialisation a également amplifié les problèmes : réchauffement climatique, terrorisme, épidémies, trafic de drogue, et bien d'autres.

      Le problème central est que l'humanité n'a pas adapté ses structures de gouvernance à cette nouvelle réalité.

      L'organisation mondiale est toujours fragmentée en environ 200 États-nations dont les gouvernements sont programmés pour se concentrer quasi exclusivement sur leurs intérêts nationaux.

      Citation clé : "Il faut que nous arrivions à nous reprendre et trouver comment améliorer la mondialisation des solutions pour éviter de devenir une espèce victime de la mondialisation des problèmes."

      2. Les Obstacles à la Coopération Internationale

      Simon Anholt identifie trois raisons principales qui expliquent la lenteur des progrès sur les enjeux mondiaux et la persistance de l'approche nationaliste.

      2.1 La Demande des Électeurs

      La première raison est que les citoyens eux-mêmes exigent de leurs gouvernements une focalisation interne.

      En élisant ou en tolérant des gouvernements, le message envoyé est clair : la priorité est la prospérité, la croissance, la compétitivité et la justice à l'intérieur des frontières nationales.

      Les politiciens, en regardant "dans un microscope" plutôt que "dans un télescope", ne font que répondre à cette demande.

      2.2 La "Psychopathie Culturelle"

      Le deuxième obstacle est un biais psychologique collectif qu'Anholt nomme la "psychopathie culturelle".

      Il s'agit d'un manque de capacité à ressentir une véritable empathie pour les personnes qui sont culturellement différentes.

      • L'empathie fonctionne bien avec ceux qui "nous ressemblent, marchent, parlent, mangent, prient et s'habillent comme nous".

      • En revanche, les autres, ceux qui sont différents, sont souvent perçus comme des "personnages en carton", des figures bidimensionnelles plutôt que des êtres humains complexes.

      Ce manque d'empathie à grande échelle empêche une véritable solidarité mondiale.

      2.3 La Fausse Dichotomie des Agendas

      Le troisième obstacle est la croyance, particulièrement ancrée chez les dirigeants, que les agendas nationaux et internationaux sont mutuellement exclusifs. Anholt qualifie cette idée de "grand n'importe quoi".

      Fort de son expérience de conseiller politique auprès de nombreux gouvernements, il affirme n'avoir jamais vu "un seul problème national qui ne pouvait être résolu de façon plus inventive, plus efficace et plus rapide qu'en le traitant comme un problème international".

      3. L'Intérêt Personnel comme Levier du Changement

      Pour surmonter ces obstacles et la résistance naturelle de l'être humain au changement, il est nécessaire de démontrer qu'un comportement plus collaboratif sert l'intérêt personnel des nations. C'est le cœur de la découverte d'Anholt.

      3.1 La Recherche sur la Réputation des Nations

      En 2005, Anholt a lancé l'Indice des Marques Nationales, une étude à très grande échelle recueillant les perceptions du public mondial sur les différents pays.

      Cette base de données de 200 milliards de points de données a révélé un fait économique crucial :

      • Les pays dépendent "énormément de leurs réputations afin de survivre et de prospérer dans le monde".

      • Une bonne image (ex : Allemagne, Suède, Suisse) facilite tout : tourisme, investissements, exportation.

      • Une mauvaise image rend tout "difficile et [...] cher".

      3.2 La Découverte Clé : Admiration et "Bonté"

      En interrogeant cette base de données pour comprendre pourquoi certains pays sont plus admirés que d'autres, la réponse fut surprenante.

      Ce n'est ni la richesse, ni la puissance, ni la modernité qui est le facteur principal.

      Citation clé : "les pays que nous préférons sont les bons pays. [...] nous admirons surtout un pays parce qu'il est bon."

      Un "bon pays" est défini comme un pays qui "contribue au monde dans lequel nous vivons", le rendant "plus sûr, meilleur, plus riche ou plus juste".

      Cette découverte crée un lien direct et puissant entre l'altruisme et l'égoïsme : pour réussir économiquement (servir son intérêt national), un pays doit "faire le bien" et contribuer à l'humanité.

      "Plus vous collaborez, plus vous devenez compétitif."

      4. L'Indice des Bons Pays : Une Nouvelle Mesure du Succès

      Pour concrétiser cette idée, Anholt et son équipe ont développé l'Indice des Bons Pays ("The Good Country Index").

      Objectif : Mesurer la contribution exacte de chaque pays, non pas à ses propres habitants, mais au reste de l'humanité.

      Définition de "Bon" : Le terme n'a pas une connotation morale ("bon" vs "mauvais"), mais est utilisé comme le contraire de "égoïste".

      Un "bon" pays est un pays qui se préoccupe des intérêts de tous.

      4.1 Classement et Enseignements

      Les résultats de l'indice offrent des perspectives importantes :

      Rang

      Pays

      Observations Clés

      1

      Irlande

      Le pays qui, par habitant ou par dollar de PIB, contribue le plus au monde. Salué pour sa capacité à maintenir ses devoirs internationaux tout en se relevant d'une grave récession.

      2

      Finlande

      Très proche de l'Irlande, avec des scores globalement élevés.

      13

      Allemagne

      21

      États-Unis

      66

      Mexique

      95

      Russie

      Pays en développement focalisé sur sa construction interne.

      107

      Chine

      Pays en développement focalisé sur sa construction interne.

      Domination Européenne : Le top 10 est majoritairement composé de pays riches d'Europe occidentale (à l'exception de la Nouvelle-Zélande).

      L'Importance de l'Attitude : La présence du Kenya dans le top 30 est cruciale.

      Elle prouve que la contribution au monde n'est pas qu'une question d'argent, mais "d'attitude", de "culture" et de volonté politique de se tourner vers l'extérieur.

      Les données complètes de l'indice sont accessibles sur le site goodcountry.org.

      5. Appel à l'Action : Redéfinir le Discours Politique

      La finalité de ce projet n'est pas seulement de classer les pays, mais de changer radicalement le dialogue public et politique.

      5.1 Changer le Vocabulaire du Succès

      Anholt exprime sa lassitude face à un vocabulaire centré sur l'égoïsme national : "J'en ai assez d'entendre parler de compétitivité.

      J'en ai assez d'entendre parler de prospérité, de richesse, de croissance rapide. J'en ai assez d'entendre parler de pays heureux parce que ça reste quand même égoïste."

      Il propose de réinjecter le mot "bon" (au sens de "non-égoïste") dans la conversation.

      5.2 Un Outil pour les Citoyens

      Ce mot doit devenir un "bâton qui s'abattrait sur nos politiciens".

      Les citoyens sont invités à utiliser ce critère pour juger les politiques et les dirigeants en se posant la question :

      Question clé : "Est-ce qu'un bon pays ferait ça ?"

      L'objectif ultime est de faire évoluer les mentalités, pour que le désir principal des citoyens ne soit plus de vivre dans un pays riche ou compétitif, mais dans un "bon pays".

      Un pays dont on peut être fier à l'international, car il est reconnu pour sa contribution positive au monde entier.

    1. The magnitude of the electrical field in the space between the parallel plates is E=σ/ϵ0, where σ denotes the surface charge density on one plate (recall that σ is the charge Q per the surface area A)

      This has been proven before in chapter 6 and 7.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. eleanor [@zornsllama]. Blue line: daily COVID cases in the USA red line: bad reviews of Yankee Candles on Amazon saying "they don't have any scent" sources: google and https://t.co/oZm6ro0E1S. December 2021. URL: https://twitter.com/zornsllama/status/1473575508784955394 (visited on 2023-12-05).

      This tweet is explaining that a candle doesn't have a scent but in all reality that person most likely has covid. Making the review false and misinformative, almost acting as an unintentional case of data poisoning.

    2. Samantha Cole. People Are Spamming Kellogg’s Job Applications in Solidarity with Striking Workers. Vice, December 2021. URL: https://www.vice.com/en/article/v7dvy9/spamming-kelloggs-job-

      Kellogg at the time of this articles publication have been trying to hire new workers to replace the previous workers who have gone on strike due for better wages and working conditions. To fight this, people from the antiwork subreddit have been spamming the job portal site to fight back. The union went on strike after the company refused to meet with the union, so Kellogg tried to hire another 1,400 employees. The members of antiwork then repeated sent Kellogg fake applications that were either completely made up people in the cities that Kellogg was hiring from, or just resumes from google images.

    3. 8.9. Bibliography# [h1] Web tracking. October 2023. Page Version ID: 1181294364. URL: https://en.wikipedia.org/w/index.php?title=Web_tracking&oldid=1181294364 (visited on 2023-12-05). [h2] Kurt Wagner. This is how Facebook collects data on you even if you don’t have an account. Vox, April 2018. URL: https://www.vox.com/2018/4/20/17254312/facebook-shadow-profiles-data-collection-non-users-mark-zuckerberg (visited on 2023-12-05). [h3] API. November 2023. Page Version ID: 1187436026. URL: https://en.wikipedia.org/w/index.php?title=API&oldid=1187436026 (visited on 2023-12-05). [h4] Ilya (Marshal) Siamionau. Getting Started: The AT Protocol SDK. 2024. URL: https://atproto.blue/readme.html (visited on 2025-04-03). [h5] Ilya (Marshal) Siamionau. Client - atproto. 2024. URL: https://atproto.blue/atproto_client/client.html (visited on 2025-04-03). [h6] Atproto/examples at main · MarshalX/atproto. 2025. URL: MarshalX/atproto (visited on 2025-04-03). [h7] AT Protocol. 2025. URL: https://atproto.com/ (visited on 2025-04-03). [h8] Everything Everywhere All at Once. December 2023. Page Version ID: 1188074672. URL: https://en.wikipedia.org/w/index.php?title=Everything_Everywhere_All_at_Once&oldid=1188074672 (visited on 2023-12-05). [h9] Jordan Pearson. Your Friends’ Online Connections Can Reveal Your Sexual Orientation. Vice, September 2014. URL: https://www.vice.com/en/article/gvydky/your-friends-online-connections-can-reveal-your-sexual-orientation (visited on 2023-12-05). [h10] Catherine Stinson. The Dark Past of Algorithms That Associate Appearance and Criminality. American Scientist, January 2021. URL: https://www.americanscientist.org/article/the-dark-past-of-algorithms-that-associate-appearance-and-criminality (visited on 2023-12-05). [h11] Greg Miller. Researchers are tracking another pandemic, too—of coronavirus misinformation. Science, March 2020. URL: https://www.science.org/content/article/researchers-are-tracking-another-epidemic-too-misinformation (visited on 2023-12-05). [h12] eleanor [@zornsllama]. Blue line: daily COVID cases in the USA red line: bad reviews of Yankee Candles on Amazon saying "they don't have any scent" sources: google and https://t.co/oZm6ro0E1S. December 2021. URL: https://twitter.com/zornsllama/status/1473575508784955394 (visited on 2023-12-05). [h13] Spurious relationship. November 2023. Page Version ID: 1184161183. URL: https://en.wikipedia.org/w/index.php?title=Spurious_relationship&oldid=1184161183 (visited on 2023-12-05). [h14] Tyler Vigen. Spurious correlations. November 2023. URL: http://tylervigen.com/spurious-correlations (visited on 2023-12-05). [h15] ABC News: 538. 2023. URL: https://abcnews.go.com/538 (visited on 2023-12-05). [h16] FiveThirtyEight. 2023. URL: https://projects.fivethirtyeight.com/p-hacking/ (visited on 2023-12-05). [h17] Christie Aschwanden. Science Isn’t Broken. FiveThirtyEight, August 2015. URL: https://fivethirtyeight.com/features/science-isnt-broken/ (visited on 2023-12-05). [h18] Dan Sabbagh. Trump 2016 campaign 'targeted 3.5m black Americans to deter them from voting'. The Guardian, September 2020. URL: https://www.theguardian.com/us-news/2020/sep/28/trump-2016-campaign-targeted-35m-black-americans-to-deter-them-from-voting (visited on 2023-12-05). [h19] Marie C. Baca. Housing companies used Facebook’s ad system to discriminate against older people, according to new human rights complaints. Washington Post, September 2020. URL: https://www.washingtonpost.com/technology/2019/09/18/housing-companies-used-facebooks-ad-system-discriminate-against-older-people-according-new-human-rights-charges/ (visited on 2023-12-05). [h20] Nicole Nguyen. Here's Who Facebook Thinks You Really Are. September 2016. Section: Tech. URL: https://www.buzzfeednews.com/article/nicolenguyen/facebook-ad-preferences-pretty-accurate-tbh (visited on 2024-01-30). [h21] Lindsey Murray. Here's How to Find Out Everything Facebook Knows About You. May 2017. Section: Life. URL: https://www.goodhousekeeping.com/life/news/a44016/facebook-privacy-ad-settings/ (visited on 2024-01-30). [h22] Rafi Letzter. A teenager on TikTok disrupted thousands of scientific studies with a single video. The Verge, September 2021. URL: https://www.theverge.com/2021/9/24/22688278/tiktok-science-study-survey-prolific (visited on 2023-12-05). [h23] Lauren Leffer. CNET Is Reviewing the Accuracy of All Its AI-Written Articles After Multiple Major Corrections. Gizmodo, January 2023. URL: https://gizmodo.com/cnet-ai-chatgpt-news-robot-1849996151 (visited on 2023-12-05). [h24] Why can't I use Artificial Intelligence tools to generate answers? - Help Center. 2023. URL: https://stackoverflow.com/help/ai-policy (visited on 2023-12-08). [h25] Samantha Cole. People Are Spamming Kellogg’s Job Applications in Solidarity with Striking Workers. Vice, December 2021. URL: https://www.vice.com/en/article/v7dvy9/spamming-kelloggs-job-applications-strike (visited on 2023-12-05). [h26] Antiwork: Unemployment for all, not just the rich! 2023. URL: https://www.reddit.com/r/antiwork/ (visited on 2023-12-05). [h27] Karen Hao. How to poison the data that Big Tech uses to surveil you. MIT Technology Review, March 2021. URL: https://www.technologyreview.com/2021/03/05/1020376/resist-big-tech-surveillance-data/ (visited on 2023-12-05).

      I looked at the Vox article by Kurt Wagner, “This is how Facebook collects data on you even if you don’t have an account.” I found it pretty shocking that Facebook can still track people who never even signed up. The article explains that Facebook builds what they call “shadow profiles” using data from other websites and users who do have accounts. It really made me think about how hard it is to stay completely private online — even if you try to avoid social media, your info can still end up being collected. It connects to this chapter’s point about how data gives companies power, because it shows how they can gather information on almost anyone, whether you consented or not.

    4. Web tracking. October 2023. Page Version ID: 1181294364. URL: https://en.wikipedia.org/w/index.php?title=Web_tracking&oldid=1181294364 (visited on 2023-12-05).

      By reading this Wikipedia, I understand how web track works and how the data collected in web tracking can be used. From my personal opinion, I think the web tracking is highly related to users’ privacy. It’s important for the tech companies to protect the data they collected.

    5. Web tracking. October 2023. Page Version ID: 1181294364. URL: https://en.wikipedia.org/w/index.php?title=Web_tracking&oldid=1181294364 (visited on 2023-12-05).

      This article explains how websites collect user data through cookies, browser fingerprinting, and other invisible scripts to monitor behavior across the internet. What struck me most is how this type of tracking creates an enormous secondary market for personal data. It connects directly to Ch8's discussion of data mining, because the same "mined" information used for analytics can also be used for manipulation, such as targeted advertising or misinformation campaigns. Reading this makes me realize that web tracking isn't just a technical issue, it's a question of digital consent and autonomy. When algorithms know more about us than we do about them, the balance of power becomes deeply uneven.

    6. Kurt Wagner. This is how Facebook collects data on you even if you don’t have an account. Vox, April 2018. URL: https://www.vox.com/2018/4/20/17254312/facebook-shadow-profiles-data-collection-non-users-mark-zuckerberg (visited on 2023-12-05).

      Great, accessible explainer of “shadow profiles”—how contact uploads, embedded pixels/Like buttons, and partner data let Facebook infer identities beyond users. Its strength is concreteness; its limitation is age: it predates GDPR enforcement UX changes, Facebook’s “Off-Facebook Activity” tool, and Apple ITP/ATT. The pipes largely persist even if consent flows look nicer. For class, pair it with a mini-lab: check “Off-Facebook Activity,” download your data archive, and watch requests to facebook.com/tr in DevTools to see tracking in the wild. Ethically, it spotlights “consent by proxy”: your friends’ uploads can deanonymize you—an argument for collective privacy rights, not just individual settings.

  4. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. People in the antiwork subreddit [h26] found the website where Kellogg’s posted their job listing to replace the workers. So those Redditors suggested they spam the site with fake applications, poisoning the job application data, so Kellogg’s wouldn’t be able to figure out which applications were legitimate or not (we could consider this a form of trolling). Then Kellogg’s wouldn’t be able to replace the striking workers, and they would have to agree to better working conditions.

      I think that it's fascinating that the term used is poison. Almost implying that it will affect or poison others, like the internet is connected and that we can work together just like in real life.

    1. The choice of words and phrases in a question is critical in expressing the meaning and intent of the question to the respondent and ensuring that all respondents interpret the question the same way. Even small wording differences can substantially affect the answers people provide.

      This line stood me as this really shows how people can see and interpret language easily even when researcher think that they are being neutral. I remember in INFO 300 that research should be as neutral as possible. I also agree with this because, the small wording in a conversation can make a break a conversation and that also applies here. Overall, this whole reading helped me see that making question needs to consider ethical thoughs in it.

  5. drive.google.com drive.google.com
    1. Andthank God she was there, for I was filled with that icy dreadagain. Everything I did seemed awkward to me, and every-thing I said sounded freighted with hidden meaning. I wastrying to remember everything I'd heard about dope addictionand I couldn't help watching Sonny for signs. I wasn't doing itout of malice. I was trying to find out something about mybrother. I was dying to hear him tell me he was safe.

      From this passage we can see the narrator keeps looking after his brother for fear of him being trapped by drugs again ;the theme of the obligation toward brotherly love.

    1. We might want to discuss something privately, avoiding embarrassment that might happen if it were shared publicly

      I agree that this is a good reason that we have to keep information private. Without privacy, every conversation will be public, and nobody wants to show all of their messages to the people around the world. Therefore, privacy gives users reassuring environment to discuss.

  6. docdrop.org docdrop.org
    1. epen staff understanding. It’s crucial for educators to keep in mind the many factors, some of them invisible, that play a role in students’ class-room actions. Many nonminority or middle-class teachers cannot under-stand why children from poor backgrounds act the way they do at school. Teachers don’t need to come from their students’ cultures to be able to teach them, but empathy and cultural knowledge are essential. Therefore, an introduction to how students are affected by poverty is highly useful.Consider summarizing information from this chapter or other sources and sharing it with staff. Hold discuss

      I find this passage meaningful because it reminds teachers that students’ behavior often reflects hidden struggles rather than lack of effort. I agree that empathy and cultural understanding are key for educators to truly connect with and support students from low-income backgrounds. My question is how schools can ensure that this kind of professional learning becomes a lasting part of teacher training instead of just a one-time workshop.

    2. mon issues in low-income families include depression, chemical dependence, and hectic work schedules—all factors that interfere with the healthy attachments that foster children’s self-esteem, sense of mastery of their environment, and optimistic attitudes. Instead, poor children often feel isolated and unloved, feelings that kick off a downward spiral of unhappy life events, including poor academic performance, behavioral problems, dropping out of school, and drug abuse. These events tend to rule out col-lege as an option and perpetuate the cycle of poverty. Figure 1.1 shows how 1.1 Adverse Childhood Experiences ModelSource: Adapted from “Relationship of Childhood Abuse and Household Dysfunction to Many of the Leading Causes of Death in Adults: The Adverse Childhood Experiences (ACE) Study,” by V. J. Felitti, R. F. Anda, D. Nordenberg, D. F. Williamson, A. M. Spitz, V. Edwards, et al., 1998, American Journal of Preventive Medicine, 14(4), pp. 245–258.Early DeathDisease, Disability, and Social ProblemsAdoption of Health Risk BehaviorsSocial, Emotional, and Cognitive ImpairmentAdverse Childhood ExperiencesDeathConceptionJensen.indb 5Jensen.indb 510/26/09 1:39 PM10/26/09 1:39 PM EBSCOhost - printed on 10/29/2021 10:58 PM via EL CAMINO COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

      I find this passage powerful because it reveals how emotional struggles and unstable home environments can deeply affect children’s confidence and future. I agree that without strong attachments and support, many children may lose hope and fall into a cycle that keeps them from education and opportunity. My question is how schools or communities can step in early to rebuild that sense of belonging and help break this pattern before it becomes permanent.

    3. lthough childhood is generally considered to be a time of joyful, care-free exploration, children living in poverty tend to spend less time fi nd-ing out about the world around them and more time struggling to survive within it. Poor children have fewer and less-supportive networks than their more affl uent counterparts do;

      I find this passage sad but eye-opening because it shows how poverty can take away a child’s chance to explore and learn freely. I agree that limited resources and weaker social networks make it harder for poor children to develop both emotionally and cognitively. My question is how schools and communities can create more equal learning environments so that every child has the chance to grow with curiosity instead of just survival.

    4. Relative poverty refers to the economic status of a family whose income is insuffi cient to meet its society’s average standard of living.• Urban poverty occurs in metropolitan areas with populations of at least 50,000 people. The urban poor deal with a complex aggregate of chronic and acute stressors (including crowding, violence, and noise) and are dependent on often-inadequate large-city services. • Rural poverty occurs in nonmetropolitan areas with populations below 50,000. In rural areas, there are more sin

      I find it interesting how poverty can look so different depending on where people live, and that urban and rural families face completely different challenges. I agree that city life brings stress from noise and crowding, while rural areas suffer from isolation and fewer services, yet both situations limit opportunities for children. My question is how governments and schools can design programs that truly fit the needs of these very different communities instead of offering one single solution.

    5. eel if your son or daughter were a student in Mr. Hawkins’s class? Only two short generations ago, policymakers, school lead-ers, and teachers commonly thought of children raised in poverty with sym-pathy but without an understanding of how profoundly their chances for success were diminished by their situation. Today, we have a broad research base that clearly outlines the ramifi cations of living in poverty as well as evi-dence of schools that do succeed with economically disadvantaged students. We can safely say that we have no excuse to let any child fail. Poverty calls for key information and smarter strategie

      I find this passage powerful because it shows how much progress education has made in understanding the effects of poverty, and it reminds me that teachers can truly change the path of disadvantaged students. I agree that knowing the challenges of poverty should lead to better strategies instead of lower expectations, since every child deserves a fair chance to succeed. My question is how schools can prepare teachers to recognize and respond to poverty in a way that empowers students rather than making them feel pitied.

    6. Teachers don’t need to come from their students’ cultures to be able to teach them, but empathy and cultural knowledge are essential.

      This shows the importance of a reciprocal relationship between students and teachers. Sometimes there is a strange separation between teacher and student that prevents true understanding. In my opinion, the best teachers don't just teach, but learn from their students and their lived experiences and perspectives.

    7. Adverse Childhood Experiences Model

      This figure really hurts to see, but it is so important to understand the impacts of poverty in all stages and sectors of someone's life. People's social and emotional problems, mental health, and even family dynamics, are not isolated but are shaped by the economic conditions they live under. It shows the need to understand the class structures that inform a student's ability to learn and thrive. There are ways that educators can fight back locally against the broader systems that keep people in poverty while those at the top continue to get richer.

    8. Single parenthood strains resources and correlates directly with poor school attendance, lower grades, and lower chances of attending college (Xi & Lal, 2006)

      This made me reflect on my experience growing up in a middle-class single parent household. My mom already struggled raising my brother and I while working full-time even with the privileges of being middle class, so I can't imagine what it would be like as a single parent in poverty trying to provide the best environment for your children. It makes me think back to the opportunity gap and how parents should not solely be to blame for the struggles their kids have in the classroom. Oftentimes they are trying their very best and fighting for their kids to meet their basic needs.

    9. Situational poverty is generally caused by a sudden crisis or loss and is often temporary. Events causing situational poverty include environ-mental disasters, divorce, or severe health problems

      The part about severe health problems really sticks out for situational poverty and exposes the system that cares more about profits for healthcare and big pharmaceutical companies than people's health and wellbeing. Why is it that having an injury or a medical emergency can plummet someone into poverty? Healthcare, just like education, should be accessible to everyone.

    1. simultaneously look at something in the real world and a digital overlay at the same time.

      nice use case, continue using laptop normally, and then when u need something more private, use the glasses

  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Mia Jankowicz. A TikToker said he wrote code to flood Kellogg with bogus job applications after the company announced it would permanently replace striking workers. Business Insider, December 2021. URL: https://www.businessinsider.com/tiktoker-wrote-code-spam-kellogg-strike-busting-job-ad-site-2021-12 (visited on 2023-12-05).

      Is this not a beneficial form of trolling? At the end of the day, trolling is a disruption of established order we are expected to follow. While this order is generally important for us to follow, it is created by those above us to control us. And when we use the internet, an invention of those above us, to disrupt the order that benefits them, I see that as a positive action.

    1. We th

      TEXT: "We the undersigned" is metaphoric in the sense that we, the people have the power to make political change. "Agree to wear our hearts on our sleeves means to be open about our feelings, like showing kindness, its telling us to be less cold and or distant. This poster takes "we the undersigned" to remind people to stay kind in a world of cold and distant individuals, in which empathy, kindness are a power, we the citizens have.

      COMPOSITION: The fist in the background is a symbolic, meaning strength, power, and so forth. It is commonly used in social and political movements. Then underneath the bold semi canalized text is a bunch of signatures meaning agreement and solidarity, in which to lessen the world of cold and distance within individuals, we need to come together. This is further solidified by "join in solidarity." In addition this page many official stamps and symbols, almost giving it an official feel, like this is an agreement policy, and the signs below is all the people who agree with this.

    1. One of the main goals of social media sites is to increase the time users are spending on their social media sites. The more time users spend, the more money the site can get from ads, and also the more power and influence those social media sites have over those users. So social media sites use the data they collect to try and figure out what keeps people using their site, and what can they do to convince those users they need to open it again later.

      My first though when I saw this is that they've been doing well on keeping people using their site. Personally, I am really affected by this because it works so well and I spend so much time on scrolling on my phone. Although this help people to see more interesting content but it really makes people addicted to the internet.

    2. Social Media platforms use the data they collect on users and infer about users to increase their power and increase their profits. One of the main goals of social media sites is to increase the time users are spending on their social media sites. The more time users spend, the more money the site can get from ads, and also the more power and influence those social media sites have over those users. So social media sites use the data they collect to try and figure out what keeps people using their site, and what can they do to convince those users they need to open it again later. Social media sites then make their money by selling targeted advertising, meaning selling ads to specific groups of people with specific interests. So, for example, if you are selling spider stuffed animal toys, most people might not be interested, but if you could find the people who want those toys and only show your ads to them, your advertising campaign might be successful, and those users might be happy to find out about your stuffed animal toys. But targeting advertising can be used in less ethical ways, such as targeting gambling ads at children, or at users who are addicted to gambling, or the 2016 Trump campaign ‘target[ing] 3.5m black Americans to deter them from voting’ [h18].

      Honestly, it’s kind of wild how social media uses our data to keep us hooked. I get how targeted ads can be helpful sometimes, like showing you stuff you might actually want, but it also feels manipulative. The part that stood out to me most is how they use data to figure out what keeps people on the app longer—it’s like they’re studying us just to make sure we don’t stop scrolling. I’ve definitely noticed that when I like one type of video, suddenly my feed is full of that topic, and it’s super easy to waste time without realizing it. It makes me wonder how much control we really have over what we see online.

    1. izen is a letterp

      Text: The phrase "I'm a citizen of a borderless country" seems to say that there is a rejection of nationalism and national boundaries. Then it says "whose flag is a worn tablecloth. This metaphor seems normalize the flag, as more so something humble and seen everyday. The line "whose constitution is a broken loaf of bread" seems to hints at the vulnerability, and fragilness of a country. This poster's main message is saying that true citizenships is flawed, and isn't just about politics, it also involves humanity, and togetherness.

      COLOR: These poster consist of mainly white with a combination of red and blue at the bottom of the poster. The use of white means purity, innocence, and so forth. While, red means more so intensity, and blue means calmness and stability. The minimalistic of this poster makes the message stand. The white background makes it feel there is more innocence within a country. While the other colors seem to hint at less noticeable feelings in this country concept, calmness and passion.

    1. “Bad faith” here means pretending to hold views or feelings, while not actually holding them (this may be intentional, or it may be through self-deception).

      As much as I enjoy the concept of trolling and feel that it's one of the most unique parts of the internet, bad faith arguing has gotten so out of control and soiled so much discourse that takes place online. The idea that now people will engage in discussions or arguments while positing opinions and ideas they don't really stand for completely derails the concept of debate in the first place, and so while I enjoy a bit of trolling here and there, bad faith I believe is just unhealthy.

    1. You can try social media sites as well. Twitter’s ad profile is located here

      I did this with my Twitter profile and the results were interesting. The Twitter personalized ads profile area is organized with a list of everything that Twitter thinks you're interested in. For me, I found that my list was so massive and overly generous with what it thinks I like. It was filled with a non-insignificant amount of things that I have never heard of that Twitter thought interested me. I'm not sure if this is intentional or not, because I feel having a bunch of stuff I'm not interested in would make it harder to advertise stuff to me.

    1. Generative AI creation can be both infringing as well as non-infringing, copyright within its periphery has means to deal with the infringing content, copyright should not be used as a tool to end the generative AI creation.69 Copyright law should be used as a tool to correct the infringing aspects, if any in copyright law from time to time

      Managing copyright law for AI music generation has to be done very carefully.

    2. different standards for machine creation. It would also reset the copyright infringement standards to a difficult level that would deter the objective of the Law where one would not be able to create without infringing the Law. The law would become counterproductive and supress creativity instead of encouraging it.

      While copyright laws are important, they can't become so extreme that they discourage creation.

    3. This paper is rather an attempt to say that the infringement analysis should be done on the output of the generative AI and not on its training.

      Output should be regulated, not training data.

    4. It has explained the major concerns around the concept of training what Prof. Lemley calls as ‘fair learning’. And further has raised questions regarding the infringement analysis of AI-generated music. It has also shown the possible alternate to the existing test of copyright infringement, and the problems of utilising AI tools to address the issues caused by Generative AI.

      Currently using copyrighted works for training data is fair use as it is used for learning purposes.

    5. SUNO AI claims to be the first Author of music when generated using its basic version and if the song is generated through a premium version of the same platform, the user becomes the owner of the song and enjoys a licence to commercially license the same

      The user became the owner of a song that was not theirs.

    6. Even musicians have begun to adopt the usage of SUNO AI, which shows the acceptance of this from the creative community.

      You can make money creating music with AI.

    7. having a copyright protection over a work does not guarantee any monetary returns in it, and the vice versa is equally true. Copyright protection is an incentive to create music, it is not a pre-requisite for creating music.

      Copyright helps you but does not make you immune to infringement.

    8. Though, it may have similarities on the surface, deep within they are different, and cannot be considered as same just because they belong to the same tune.61 It is not possible to grant protection to the tune itself. If given, it runs the risk of monopolising a commonly held substance that is free for all to use.

      There are plenty of examples of indirect, unintentional plagiarism in music that is inevitable.

    9. Within a song there are always ‘protectable’ and ‘unprotectable elements’, and as mentioned in the previous paragraph, melody is the protectable element in copyright law; by replacing the existing test of substantial similarity from lay observers, we might run the risk of granting protection to unprotectable elements and could turn the copyright infringement jurisprudence upside down.

      Under current copyright laws, most AI music plagiarism instances are under protectable elements.

    10. Unless the Generative AI platform generates songs on a particular style/particular voice, it may be difficult to prove before the court that the platform is trained upon the specific copyrighted material. The current form of copyright Act does not look at copyright infringement through the input, it looks at it through the lens of output.

      There is currently no clause of the copyright act that can prevent infringement of similar creations.

    11. This note-by-note fragmentation has not been the objective of law, if the test were to be replaced with finer tests, one could never create music without violating copyright law, applicable both for humans and machines as the percentage of similarity between two songs could be similar that does not necessarily mean that the songs are substantially similar/same.

      Notes are too small a detail to copyright.

    12. The platform does not thieve on any individual's voice or does not use any individual's voice or style, for instance, even if given a prompt to provide music like Mr. Frank Sinatra, it does not provide any output, the idea behind this is probably to exempt themselves from any violation of personality rights/moral rights.

      This means that the copyright safeguard does work.

    13. The AI-generated song does not have a separate composition alone. It is created as a recording itself, unlike the traditional understanding of creation, where the composition composed and then it is recorded.

      The two pieces of copyright from before, composition and recording, are only one step in AI music creation; it is composed as a recording.

    14. A decade ago, sampling of music raised a similar copyright concern from the right holders. Sampling is a process by which composers rely on portions from a previous song to create a subsequent work, courts in the United States held, sampling of music cannot be done without taking license from the rights holders.

      Sampling, regardless of how short, still requires permission from the artist.

    15. The melody has multiple musical elements that may be working together, the individual elements do not enjoy separate protection under the realm of copyright law. The unprotected element and the protected elements are so intertwined that the protected elements under the musical creation cannot be heard without the unprotected elements.

      There are so many ways to arrange individual elements that songs can be rearranged and become unrecognizable.

    16. There is a problem when someone begins to understand the concept of ‘musical copyright infringement’, there is no single accepted definition of a ‘song/musical work’. The inherent nature of ‘music’ makes it difficult to identify the infringing element in the work.

      This is true, where is the line drawn, a track of a song, a chord progression, a small string of notes, or a very similar layout or style, there isn't one answer.

    17. ‘Melody’ is the only part of the music that could be notated on a piece of paper, and rest can only be recorded. A song enjoys two separate sets of copyrighted protection, (i) the composition and (ii) recording.

      Composition and recording are considered two separate pieces of copyright, as a song can be significantly altered through different recording techniques.

    18. It is impossible to create anything new which does not remotely resemble the previous creation, it applies for creation in general, but it is truer for musical creation in particular.

      There will always be a hint of "infringement" in any creation of art.

    19. It is pertinent to remember that human authors also have access to the previous works, and their artistic taste and creation is also possible because of the training that they received from the existing works. According to Professor Mark Lemley, if the AI platform procures access to the work only for the purpose of training it should be exempted as fair learning.

      Humans can plagiarize too, even unintentionally, because just like an AI, humans are influenced by everything they have been trained on.

    20. ‘training of the AI platform’ is akin to training of humans and that does not per se amount to infringement and it is covered by ‘fair use doctrine’. It is interesting that fair use doctrine has played a key role in copyright infringement suit but has seldom played any concrete role in music copyright infringement cases

      This is a finicky argument that might not be strong enough to win a copyright court case.

    21. If the generated work resembles a particular musical work, then the platform is liable for copyright infringement if it had not taken license. In absence of it, the platform might have to take license from all copyrighted material before training which may not be technically feasible considering the mammoth data that is used for training purpose would involve several stake holders and right holders whose permission would become relevant.

      So if a user profits off of something that did plagiarize copyrighted works, then it leads to copyright infringement.But it would be very difficult to get explicit permission for all of those copyrighted songs in the database.

    22. SUNO AI has certain technological protection measures in place that is does not allow the user to generate music like creators, that is, in the same style or tone. This is a commendable move that safeguards the platform against the violation of personality rights and copyright implications.

      How well does this safeguard actually work?

    23. It is pertinent to mention that the AI platform can replicate the work in the style of a particular artist (may it be writing/composing etc), this could not have been possible unless and until the platform is specifically trained on the data.40

      Does this count as plagiarism?

    24. Generative AIs have made it possible to create a world of increased creation based on the existing body of work,38 in that sense it has transformed the way creativity and art have been perceived since art's inception.

      Does increased creation reduce its value?

    25. It makes it almost impossible for anyone to predict the outcome of the Generative AI creation and it adds layers of complexity to the creation by itself. Once the outcome is received at the users' end the AI receives feedback on its creation, this helps the AI in decision making and it learns from the mistake made in the past.3

      Because of the random nature of AI content generation, it can theoretically create anything and often needs guiding to avoid truly random creation.

    26. The platform does not create in a human sense with the final goal in mind. Hence, the whole gamut of creation would also differ because of the prompt given by the user.

      AI doesn't truly understand art.

    27. quite like the training undertaken by a musical aspirant, every creator creates only upon the existing knowledge that they possess in the art form, the knowledge acts as the fodder that enabled the creator, bereft of the knowledge, the creator would not be equipped to create. Even phenomenal music composers like Mozart and Beethoven were trained in music before they began to create music. No creation springs from a vacuum or without existing knowledge.

      Where is the line drawn between inspiration and theft?

    28. If the AI is trained on fewer materials, it would hamper the quality of the output and at the same time, it may enhance the chance of copyright infringement.

      Are less popular genres prone to this?

    29. With the patterns that it has found, it creates a work based on the input it received from the user, who may ask for a particular style or genre of music. To find a pattern and produce a creative output that matched with the input the AI must be trained on thousands, millions or even billions of data.28 Massive amount of these audio files is freely available on various platforms such as YouTube, Spotify and i tunes.29 SUNO AI is trained on all these materials from the internet and the audio files are perceived by it as data.

      Do these patterns based on copyrighted data plagiarize existing music?

    30. It could be both copyrighted and non-copyrighted content, these contents are then stored in a numerical form which is then processed by a computer which is later used for training the platform.21

      Does it not differentiate between non-copyrighted and copyrighted content?

    31. Supervised learning is limited to selecting the exact data on which the model would be trained on with a clear goal of creation, unsupervised learning is when the model is trained on material and is expected to find a pattern and involve in creation, the reinforcement learning is akin to a trial and error where the platform is given specific feedback.

      Which type is Suno trained on?

    32. It could be in the form of invention of the micro phone device, the invention of music sampling, tune generator for composer17 or even the algorithmic sequencing of the playlist of the listener18 is also a form of AI. However, Generative AI is something different from the past as earlier AI aided the user in creativity, and merely acted as a staff, today the system has become an independent creator by itself, it is no longer a mere tool.

      AI has been disguised into many everyday tools, reducing awareness around how long its actually been a thing.

    33. It is pertinent to bear in mind that these platforms ‘train’ their Generative AI only to create future works, they do not replicate the works as such.12

      This could be argued, but I'd like to find evidence that these AI machines actually do replicate things they have been trained on.

    34. That too the creation can be done at the click of a button by giving few prompts. In that sense, it has enabled Authors to create without having any pre-requisite knowledge in art, and creation.

      Is this fair?

    35. Copyright had not been phenomenally successful in staving off any technological development in the past, it has at best worked its way around the technology in the process it has also bridged the long gap that existed between the creator and the consumer. The technological development has also helped the consumer to also become a creator,

      A prime example of this would be the way people are allowed to make videos on TikTok using songs that have been licensed out and are protected under copyright. Consumers of the songs are allowed to use them in TikTok videos as a creators,

    36. copyright law itself is a result of technology. It burgeoned only after the invention of the printing press- a technological development.3 It was introduced to censor the books that were sold in England and to regulate the book trade by governing the relationship between the publisher and the work by providing limited ownership to the publisher for reaping profits from the work.4

      The internet made copyright infringement way easier. Platforms such as YouTube needing to implement copyright for any unauthorized use of audio.

    37. Copyright law stands on basic foundations such as ‘individual Authorship, and promotion of creativity.2 These foundation principles have held the sanctity of copyright law since its inception, the validity of these peremptory norms has been currently challenged by the Generative AI creation.

      Music has always belonged to the one who created it, AI takes ownership of music it did not get permission to have.

    38. Music is perceived as a process by the human creator, it is perceived as product by the Copyright law and is perceived as data by the machine.

      Suno has access to many copyrighted music works as part of its training data.

    39. The Authors of this paper have analysed the quandary by creating ‘music’ using SUNO AI, and by performing infringement analysis of the created song through another AI platform MIPPIA to understand the complex terrain of infringement analysis of generative AI.

      This paper aims to understand how copyright infringement happens when generating music using Suno.

    40. Platforms like SUNO AI have enabled even non-musicians to create music and don the hats of composers by giving few prompts without understanding the language in the first place This has disrupted copyright's traditional understanding of music and infringement.

      AI makes it really easy for anyone to make songs.

    1. One particularly striking example of an attempt to infer information from seemingly unconnected data was someone noticing that the number of people sick with COVID-19 correlated with how many people were leaving bad reviews of Yankee Candles saying “they don’t have any scent”

      This paragraph provides an excellent example of data mining, the researchers can use data they collected from the seemingly irrelevant incidents to find what exactly they need.

    2. For example, social media data about who you are friends with might be used to infer your sexual orientation [h9]. Social media data might also be used to infer people’s: Race Political leanings Interests Susceptibility to financial scams Being prone to addiction (e.g., gambling) Additionally, groups keep trying to re-invent old debunked pseudo-scientific (and racist) methods of judging people based on facial features (size of nose, chin, forehead, etc.), but now using artificial intelligence [h10]. Social media data can also be used to infer information about larger social trends like the spread of misinformation [h11].

      I found this section both fascinating and unsettling. It shows how data that seems harmless, like who our friends are or what we buy, can be mined to infer extremely private information about us. As someone who often shares content online without much thought, it's alarming to realize how easily patterns can reveal aspects of our identity that we never explicitly disclose. The example of groups reviving racist pseudoscience through AI is especially disturbing. It reminds me that technological innovation can still recycle old forms of discrimination. It makes me question whether data mining is truly about knowledge discovery or if it's pften about reinforcing existing power and bias under a new technical name.

    1. The murder trial of three former guards in the videotaped beating of an inmate at an upstate prison was part of a remarkable prosecution that put New York’s culture of incarceration on trial.

      Good, this has got to stop.

    1. Steps to Get Started

      There should be three steps to configuring "Prompt Firewall".

      1. Add AccuKnox Prompt Firewall as proxy
      2. Create Application on Control Plane
      3. Configure Prompt Firewall policies for the application and monitor it.
  8. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Tom Standage. Writing on the Wall: Social Media - The First 2,000 Years. Bloomsbury USA, New York, 1st edition edition, October 2013. ISBN 978-1-62040-283-2.

      In this article, the author talks about how human communication and social media have evolved over time. The interesting fact I took away from this is that the concept of social media isn't entirely new and has similarities of human traditions in the past.

    1. How do you think attribution should work when copying and reusing content on social media (like if you post a meme or gif on social media)? When is it ok to not cite sources for content? When should sources be cited, and how should they be cited?

      The way I think this should be approached is credit to the original user. Acknowledging that the repost does help the popularity of the content. For example a simple tag or credit label to the original poster should be more than enough.

    1. How can you make sense of Shakespeare and Sir Walter15ScoR, or of the cons5tu5onal conflicts of the 17th century in both Scotland and England,without some such fundamental knowledge?

      This underscores how essential christian tradition is to grasping the meaning of british literature and the great moments in its history

    2. In Scotland, as in England, there is an historic connec5on expressed in our laws betweenChurch and State

      The christian tradition has left its mark everywhere in british literature and its official stories, an almost imperceptible but persistent way.

    1. Castillo, R., M. Grazzi,and E. Tacsir.2014.“Women in Science and Technology:What Does the Literature Say?” IDB Technical Note No. IDB-TN-637, Inter-American Development Bank, Washington, DC

      useful for goldie

    2. derman and Maloney (2003)found that for many developing countries the social rate of return on R&D expendituresis very high,and that actual investment in R&D in these countries is lower thantheoptimal level.Following the methodology used by these authors, Figure 1.2 shows new estimations of the social rate of returns on R&D investment and physical capital investmentfor 2013. The rate of return on R&D for Costa Rica is 34percent, as compared to a 6percentreturn on investment in physical capital.1This means that the return onan investment in R&D is almost sixtimes higher than that from investing in physical capitalin this country. In addition, given the high rate of return for investment in R&D in Costa Rica,it is striking that the level ofR&Dinvestment made in this country (approximately 0.57percentof GDPin 2014)and the participation of the private sector in this fieldare as low as they are, as documented later in this paper.1Following Lederman and Maloney (2003), the social rate of return on R&D investment (rs) is equal to:And the social rate of return on physical capital investment (r) is equal to:Because this approach does not incorporate the process of knowledge accumulation, these estimates indicate the lower limit of the real value of social returns (Guaipatin and Schwartz, 2014).

      2nd para 1st issue issue

    3. However, Costa Rican authorities 3According to Informe Estado de la Ciencia, la Tecnología y la Innovación, 2014.19have certainly made efforts to confront a number of challenges in critical areas, as set forth in the PNCTI.First, to re-orient investment efforts in R&D financed with public resources towardinnovation activities that will have real-world applications, the following initiatives are underway

      Opportunity base for costa rica if done right

    4. owing,among other reasons,to perverse incentives confronted by academics. That is, the current incentives do not motivate academics to work in innovation projects demanded by firms

      systemic issue in getting academics involved in research

    5. However, the country’s public policies should be more successful in promoting supportivemarket architecture and an innovation mindset in the private sector, so that private investments in R&D may eventually overtake public sector expenditures to account for two-thirds or more of total investments in this area. In addition, R&D expenditure financed by the public sector does not necessarily make concrete contributions to innovation

      want to increase private as more efficient

    6. 18As mentioned previously, the bulk of R&D expenditures in Costa Rica are funded by the public sector (70.3percentin 20113). The government’s investment in innovation and related polices is geared to compensating for and overcoming market failures thatinhibit private sector innovation

      Almost all investment is through gov

    7. ies is lower thantheoptimal level.Following the methodology used by these authors, Figure 1.2 shows new estimations of the social rate of returns on R&D investment and physical capital investmentfor 2013. The rate of return on R&D for Costa Rica is 34percent, as compared to a 6percentreturn on investment in physical capital.1This means that the return onan investment in R&D is almost sixtimes higher than that from investing in physical capitalin this country. In addition, given the high rate of return for investment in R&D in Costa Rica,it is striking that the level ofR&Dinvestment made in this country (approximately 0.57percentof GDPin 2014)and the participation of the private sector in this fieldare as low as they are, as documented later in this paper.1Following Lederman and Maloney (2003), the social rate of return on R&D investment (rs) is equal to:And the social rate of return on physical capital investment (r) is equal to:Because this approach does not incorporate the process of knowledge accumulation, these estimates indicate the lower limit of the real value of social returns (Guaipatin and Schwartz, 2014).

      Surprisning why more R&D investment isnt happening

    1. Tennessee fans rallied to show up for the scrimmage portion of the practice. The scrimmages have long been open to the public, which sparked an online movement from fans to attend and show their love for the coach who has orchestrated a brilliant run.

      The impact of this decision can affect many people. UTK baseball fans, opposing teams, San Fran. Giants, the coach's family, etc.

    2. candidate for the vacant manager position with the San Francisco Giants

      Values: Proximity This is not only directly affecting UTK athletics/baseball fans, but also affecting the San Francisco Giants fanbase.

    3. the decision to remain in Knoxville as the saga surrounding Vitello's future continued another day.

      The premise of the story. Tony Vitello is considering leaving the University of Tennessee for another job offer. Values: Proximity, Prominence, Impact, Conflict

    1. Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them [i19]. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages [i20]

      This part reminded me that the scariest privacy leaks aren’t big hacks—they’re everyday stuff. Work chats feel “private,” but admins can read them. Most people don’t know that. And parents posting kid pics? It feels loving, but the photo can carry location/time info that gives away routines. My quick rules: assume work tools are reviewable, turn off location on your camera, ask before posting other people (especially kids), and apps should make it super clear who can see your post and auto-strip metadata by default.

  9. learn-eu-central-1-prod-fleet01-xythos.content.blackboardcdn.com learn-eu-central-1-prod-fleet01-xythos.content.blackboardcdn.com
    1. Text 1 Yorke explains that all stories share the same basic structure and purpose to make sense of the world. stories help us find meaning in chaos. This shows that storytelling is not just entertainment but a human need to understand life. Text 11 York concludes that story structure is a universal pattern that connects all humans. Every story reflects a journey of change and understanding. Understanding story structure helps writers and audiences see how stories mirror real human experience.

    1. His death is being investigated by police, the city police commission, the community police review agency and the county district attorney’s office.

      News writers, like AP in this instance, often seem to provide an update on cause of death at the end of article, even if there is no actual update, like this one, because they know that readers are also going to be looking for that pretty sought-after information, and it's worth it for the writers to leave the juicy bit at the end.

    2. His former agent, Brian Murphy, issued a statement at the request of Martin’s family which said Martin privately battled mental health challenges that “profoundly impacted his personal and professional life.”

      The writers included this passage because they knew that including details of Martin's mental health struggles would garner more interest. With the new knowledge of how CTE affects current and former NFL players, dangerous patterns of mental health deterioration among football players over time becomes evident in some cases. AP choosing to include this detail could be implying that Martin was struggling with CTE, without actually knowing if that information was true or not yet. However, it would require a little more context and understanding of the football and brain trauma world before reading the article, but I'd imagine that AP knew that most people who would read about the passing of a former NFL running back would be aware of CTE and its effects.

    3. Police said in a statement that Martin was involved in a break-in and that a “brief struggle” happened as police were attempting to detain him. The department did not release any other details.

      The article does not show what happened to Doug Martin, but rather uses police friendly language like "brief struggle" to explain how he ended up in custody in the first place, with no details of how he eventually died. The article also does not include why there might have been a break-in in the first place, or any key details that would provide some context into the developing story.

    4. OAKLAND, Calif. (AP) — Former All-Pro NFL running back Doug Martin died after a struggle with police officers who were taking him into custody while they were investigating a break-in at a home in Oakland, police said Monday.

      While the incident occurred in California, proximity to the event is not as relevant due to Doug Martin being known nationwide.

    5. Former NFL player Doug Martin died after struggling with officers while being detained, police say

      By introducing "Former NFL Player" into the headline, the writers are hoping to garner attention from people by using a public figure's fatal altercation with police, as opposed to a seemingly regular, ordinary police killing. Doug Martin being a fan favorite NFL player, from only a few years ago too for that matter, is likely going to draw a lot of media and fan attention from his death alone.

    1. Nobody believes for one moment that if Grijalva’s Republican opponent had won, that person wouldn’t already be a sitting member of Congress.

      Notice that this tone and viewpoint are saying "nobody" to purposely put the writer's viewpoint onto the reader.

    2. Then he insisted he couldn’t swear her in while the House was not in session, which is laughable given that earlier this year, he swore in two representatives elected in special elections during pro-forma sessions.

      This gives a lot of prespective about what is happening and shows the reader that this is not because the house was not in session but implies a political motive.

    3. Arizona's attorney general explains how Johnson is using the newly elected Democrat as a pawn in his shutdown fight, and keeping the Epstein files secret.

      This shows the reader that this source is from Arizona Attorney General Kris Mayes, which is an opinion piece

    1. Including marginalized voices has already changed science for the better. Movements like feminism, disability rights, and racial justice have pushed science to ask new questions and challenge old assumptions

      As someone that is a minority, other fellow minorities will bring a completely new perspective on topics and ideas.

    2. The Sociology of Science looks at what it’s actually like to be a scientist—and it reveals a lot of challenges that don’t show up in textbooks

      This make a lot of sense, but I believe that this goes with jobs or anything that's slightly productive in life. Because everything that is to benefit humidity or is going to benefit humidity.

    3. This means objectivity isn’t about being detached—it’s about being connected and accountable to others

      Science should be accessible to all. Some people may not have viable access to science because of social standings, but I think everyone should get a free shoot and I agree with the statement.

    4. Communalism – Scientific knowledge should be shared freely. It belongs to everyone, not just the person who discovered it. Today, this idea clashes with things like paywalls that block access to research.

      Scientific knowledge that is at the benefit of people should be released because science research should be used in ways that can help evolve the human race. I also think all of it should be released too, because good or bad, research is research.

    5. In short, science is not just about labs and equations—it’s about people. And by looking at the social side of science, we get a clearer picture of how it really works and how it can better serve everyone.

      I agree with this because I feel like most scientific research always has a benefit towards humans.

    1. this perspective, highlighting the leisure qualities of sex, including sexual pleasure, autonomy, self-determination and sexual rights for all.

      I believe in many cultures it is shamed upon when engaging in self-masturbation, or even sex with your unmarried partner. I believe many of these beliefs can contribute to individuals neglecting their sexual needs.

    2. “However, their general views of sexuality and sex as a recreational activity do explain quite a lot about young adults’ views on sexuality in later life. That is particularly important because it provides insight for developing sexual health education programs that focus on sexuality as a lifelong pursuit.”

      Ahh this answers my previous question about whether the research topic and her area of study were related.

    3. young adults tend to exhibit increasing levels of tolerance, acceptance and open-mindedness about later-life sexuality,

      we deserve to have the ability to experience sexual pleasure, no matter the age!

    4. a professor of recreation, sport and tourism

      I wonder what interested Liza in this topic. Correct me if I'm wrong, but is there a connection in the research question and their area of expertise?

    5. disinterest in sex is a normal and inevitable part of aging.

      Gosh :( It's so sad. Disinterest in sex is not a normal and inevitable part of aging; for many people, it's the opposite!

  10. www.tripleeframework.com www.tripleeframework.com
    1. It is important to look for "time on task" engagement.

      This brief statement is powerful for me! Engagement can be described in different ways, but if students are busy being "engaged" by selecting user names, avatars or playing a "reward" game of flappy bird, engagement isn't "time on task." Students must be engaged in the content, as the previous statement, for this engagement to qualify as worthwhile. There is a balance, to be sure, of entertainment and education, but it must favor the content of the lesson.

    1. Figure 2. Culture shock stages

      My personal experience is mostly similar but with some differences to this graph. When I first came to the US for high school, I felt really excited and my excitement and joy level was high. About a year later when I keep repeating the same way of life, I found it hard to adapt in terms of the social life. I was in a really depressed state of mind. Therefore my second red line would be steeper than this graph.

    1. Acknowledgements i. Introduction tr. The Translation + 1 section- 1 section 1. The Candragarbha Perfection of Wisdom n. Notes b. Bibliography + 2 sections- 2 sections · Tibetan Canonical Texts · Secondary Texts g. Glossary

      this

    1. My colleagues have been reporting on one of the most dramatic heists this century

      Opinion- not necessarily the author's opinion, but their colleagues, who are people who are working for the New York Times, who extremely likely to be people who are not experts in art museum robberies.

    2. Today, we look at how thieves pulled off this weekend’s brazen daylight robbery in Paris and why they did it.

      This news is not something that is near to us or NYC at all, but is something that has been all over my news feed and social media feeds. Why this was in the news is likely largely due to the unusualness of the matter, that one of the most famous art museums in the art capital of the world was broken into, and is a place that is known to have lots of security in general. That leads to the next point of the prominence of the story, and how whether you are interested in art or not, almost everyone in America has heard of The Louvre, or at least some of the art that is in the museum, like the Mona Lisa.

      This article may have come from a public relations statement about the robbery in general, but not necessarily as a way to promote the museum in general, since hearing about a robbery may make people feel that they are unsafe while being at the museum, and that there isn't enough security.

    3. It happens more often than you may think!

      This wording sounds similar to an opinion rather than fact, where they are assuming what the reader is thinking.

    4. The thieves weren’t after oil masterworks

      This is interesting to say because how does this author know this? The thieves didn't say that they were specifically not looking for oil art pieces, but just that they went after the jewels first.

    1. Our results show a consistent association between an inflammatory diet (measured by the DII) and incident depressive outcomes, which supports the hypothesis that avoiding pro-inflammatory foods in favor to anti-inflammatory diet might contribute to prevent incidence of depression and depressive symptoms.

      Avoiding a highly inflammatory diet can help prevent depressive symptoms.

    2. It is common for large observational studies to collect self-reported dietary data with imperfect instruments such as food frequency questionnaires

      This elaborates on the last limitation of the questionnaires.

    3. there was heterogeneity across studies: most used questionnaires, in particular the CES-D, although differing versions, and some questionnaires were only used in a single study (MFQ [25], BDI [56]). Only a minority of studies examined clinical depression [48, 58, 67, 71, 75, 79], assessed by clinical interview or self-reported physician diagnosis, complemented by the use of anti-depressants.

      Limitations of the studies with questionnaires.

    4. Systemic inflammation can affect the brain by active transport of cytokines through the brain endothelium or activation of vagal fibers, and also plays a role in the regulation of emotions through mechanisms involving neurotransmitters including serotonin, dopamine, noradrenaline, and glutamate

      I could discuss the regulation of emotions through dietary substances, such as fiber.

    5. The three longitudinal studies [48, 51, 55] show a lower risk of incident depression in the high diet score category compared to low (0.76; 95% CI: 0.57, 1.02), but this association is only borderline significant at the conventional level

      Evidence for the benefits of high diet scores.

    6. The combined estimate from four longitudinal studies [31, 45, 46, 48] shows that people in the highest category of adherence to a Mediterranean diet have lower odds/risk of incident depressive outcomes, with an overall estimate of 0.67; 95% confidence interval (CI): 0.55, 0.82 compared to people with lowest adherence

      This could shed light on the types of diet in my section of the review.

    7. The neurological pathways potentially affecting depression risk that can be modulated by nutritional intake are related to inflammation, oxidative stress, neuroplasticity, mitochondrial function, and the gut microbiome

      This could be considered a research question.

    8. the dietary intake of specific nutrients such as n-3 polyunsaturated fatty acids, B vitamins, zinc, and magnesium have been implicated in brain function

      Vitamins that are associated with brain function.

    9. Depression, characterized by low mood, loss of interest or pleasure in life, and disturbed sleep or appetite, affects over 300 million people globally [1], which represents a global prevalence of 7% for women and 4% for men [2].

      This could be a relevant statistic to quote in the paper. Showing the overall population size of people with depression.

    10. The aim of this systematic review was to synthesize the link between diet quality, measured using a range of predefined indices, and depressive outcomes.

      This shows the relevance to my section (diet) in our literature review.

    1. Social media companies make profits through advertising. So, even though it clarifies that the platform respects privacy, it might still detect our personal information secretly in order to push advertisements we might be interested in. I once conducted a little experiment on myself, which involved scrolling through content related to clothes and fashion, and most of the advertisements were for clothing brands and jewelry.

    2. What are your biggest concerns around privacy on social media? What incentives do social media companies have to protect privacy? What incentives to social media companies have to violate privacy? What incentives do social media companies have to be careless with privacy?

      In terms of privacy on social media, the biggest concerns if the amount of information certain social media platforms require one to put in about their identity. It allows for countless others to know who you as as well as other factors about your life. Social media companies have some incentives on protecting privacy by giving the users many ways to hide their profile and to limit the information given out in the public. In terms of them violating privacy, they allow dates, locations, and more to show about a persons posts. Social media companies are also careless with privacy because they require a lot for one to make an account as well as recommending people who they should not be recommending.

    1. One of the main goals of social media sites is to increase the time users are spending on their social media sites. The more time users spend, the more money the site can get from ads, and also the more power and influence those social media sites have over those users. So social media sites use the data they collect to try and figure out what keeps people using their site, and what can they do to convince those users they need to open it again later.

      This reminds me of the saying "if you're not paying for the product, you are the product". I feel like it's a little disturbing to realize how much data social media takes from you. I wonder if theres an ethical way to do this that limits privacy infringement because I feel like targeted ads could be useful in some cases, for both consumers and business owners.

    1. At least four French museums have been robbed in the last two months

      Impact stretches beyond this crime, but the lack of security priceless French treasures over the past several months

    2. The French government will not be compensated for the stolen works of art.

      Impacts the nation both financially and culturally. This line also carries prominence, since it involves the French state and national property...it's not only a private loss.

    3. Beccuau told RTL: “The wrongdoers who took these gems won’t earn €88m

      This quote brings in human interest. It's not only about stolen jewels, but also about greed, destruction and value, which adds a more personal element to the story.

    4. Paris prosecutors have charged a specialised unit known as the BRB with investigating the crime.

      Mentioning an elite police force being brought into the investigation adds a special level of prominence, showing this is a high-stakes investigation over priceless jewels. It also shows impact as well, since the government is taking this matter very seriously at a national level.

    5. Contrary to some reports, it said, the display cases protecting the stolen Napoleonic jewellery had been installed in 2019 and “represented a considerable improvement in terms of security”.

      This adds conflict between the media's narrative and the museum itself. Journalists include this because of the tension and disagreement to make stories more engaging to the reader.

    6. “The Louvre museum’s security apparatus did not fail, that is a fact,”

      The quote from the culture minister is very defensive and repeated. Officials like her influence the media to protect their image through their word choices. Reiterating "that is a fact" further solidifies this idea.

    7. A gang of four thieves forced their way into the Louvre’s Apollo gallery shortly after the museum opened on Sunday morning

      Calling these individuals a "gang" makes this heist seem organized and dangerous. As an American, the proximity isn't super relevant to me since France is on the other side of the ocean. However, Oltermann is an effective storyteller, making this crime seem like a movie...crime-focused and dramatic.

    8. the head of the Louvre prepared to face difficult questions over how thieves were able to steal priceless jewellery in broad daylight.

      This line takes the blame and puts it on the leadership, shifting the focus on accountability. It frames this story as one that could've happened because someone didn't do their job.

    9. The financial loss from France’s most dramatic heist in decades has been put at nearly €90m

      The word choice of "dramatic" makes the story sound really exciting and huge. It's written to captivate the audience's attention right away, making this story seem like an important one. It's written to grab attention from the get-go, not just report facts.

    1. Stand up for that, and you will find that you are not alone.

      Seaman is doing her best to raise awareness on the issues of climate change, just like the authors of all our previous readings.

    2. She hopes the news will wake people up.

      Just like Wallace-Wells, Seaman hopes that people will realize how bad and just how fast climate change is moving.

    3. Tourists have a close encounter with Adélie penguins in the Antarctic Sound.

      It looks like this specific part of Antarctica has more ice, most likely not as affected by global warming. This area most likely has a higher survival rate of penguins as well.

    4. Adélie penguins try to beat the heat on Paulet Island.

      We can see from the photo that there is barely any ice on the ground, and we can infer from that, that the sea water is most likely not that cold either.

    5. “They were looking for any little patch of snow or ice to lay on.”

      So much of the snow and ice have melted because of global warming, eliminating habitats for these arctic animals.

    6. baby Adélie penguin with its tongue sticking out to cool off.

      As cute as this sounds, penguins having to stick their tongue out to cool off sounds very saddening. I searched up a photo of this, and though it was not an Adélie penguin, the penguin looked very exhausted because of the heat.

    7. Higher temperatures can also be difficult for cold-weather penguins, especially chicks, Seaman said.

      Cold-weather species are not used to higher temperatures, so the effect on them will be more significant. Chicks are especially more vulnerable, and most of the recent issues have to do with chicks not being able to survive because of the effects climate change have caused.

    8. So it has this incredible chain effect.

      In nature, the chain effect with prey and predators is very important. When one species is affected, so are the rest.

    9. They believe climate change is largely to blame, saying less sea ice and warmer oceans have reduced the krill that many of the penguins rely on for food.

      Climate change is a big factor when it comes to the decline of the penguin population. Less sea ice and warmer temperatures affect penguin's diets, breeding, and habitat.

    10. An Adélie penguin jumps over water at Brown Bluff on the Antarctic peninsula.

      Different species of animals are having to adapt because of the loss of sea ice caused by global warming.

    11. Tourists kayak near icebergs off the coast of Cuverville Island.

      From the photo, it looks like there's barely any sea ice left in this particular region. There should be more considering it's the coast of an island in Antarctica.

    12. Scientists say the planet is warming faster than previously thought and that the window is rapidly closing to cut our reliance on fossil fuels and avoid catastrophic outcomes.

      We know this from the previous readings we did in class, climate change is real and it's happening fast.

    13. nearly 3 degrees Celsius (5.4 degrees Fahrenheit) in the last 50 years.

      The Antarctic peninsula is one of the fastest warming regions on Earth, in the past 50 years, the temperatures have risen nearly 3 degrees, raising sea levels and in turn threatening animals who rely on that environment to survive.

    1. George R.T. Hewes wrote the following reminiscence of the Boston Tea Party almost 61 years after it occurred. It is likely that his memories included more than a few stories he picked up well after 1773. Nonetheless Hews provides a highly detailed account of this important event.

      Although this is a primary source due to the person being a part of the act, it is not entirely reliable due to the fact that it was written almost 61 years after the act.

  11. docdrop.org docdrop.org
    1. Third grade was the year I learned in school that I was poor.

      I've seen that school is often the place where children gain class consciousness, especially students t in poverty being surrounded by their peers experience differing economic conditions at home. Having to become aware of your class so early on in life and with such hostility is a reality for so many kids. I taught art over the summer and there were students who would brag about the money their parents had, while other students would try to compete or get just get quiet. I felt that there needed to be guidance for teachers to deal with situations like that so no student every felt shame for their class background.

    1. When you come in, we want you to have a good time, enjoy the atmosphere andwalk away with a haircut that you’re happy with and by God will we make sure thathappens. So, if your hair is getting a little too long, I’ll be seeing you.

      So throughout, we want to make sure that we're articulating values and connecting them to specific actions at every turn. And pictures. More pictures.

    2. When coming to Campus Cuts there is no beating around the bush that the placeyou will be getting your haircut is in my dorm bathroom. Not exactly ideal, I know.However, we do our damnedest to make sure that it is as comfortable as we canmake it. With the very comfy chair we have as well as the speaker for music, we atCampus Cuts try to create an environment that feels both fun and relaxed while stilladdressing the fact that, yes, I do shit in here

      It's good to use humor and somehow be serious at the same time--how do you feel this business model is fun and odd and still manages to convey respect and professionalism? It's a hard question to answer, but a good trick if you can pull it off.

    3. kind here at Campus Cuts, something we’re very proud of and plan to keep thatway.2. QualityWhen cutting hair, I put every last drop of sweat to make sure that the hair cut I givelooks as good as it can possibly look. Paying attention to small details is somethingwe value here, and that causes us to give the professional looking haircuts that wedo. Doesn’t matter how long it takes; I will make sure the haircut is up to thecustomer’s par. To aid with this we always make sure to ask throughout the wholehaircut experience how it looks and if there’s anything I could be doing differently.This assures us that we don’t mess up and go too deep that we can’t fix it. We arehappy when you are happy. And to ensure happiness, if you don't like the haircut,you can come back 5 days after your original cut to have it fixed in case there issomething you're not satisfied with

      What kind of homework do you do? Is there training, do you keep up with current trends? What ways do you value preparation and research to provide the best experience for your customers?

    4. When sitting in my chair ready to get your hair cut, you have a pair of sharp scissorsaround your neck at all times. Scary. You could get cut by accident and startbleeding everywhere. Your carotid artery is also right there, which is probably themost important artery in your body. Definitely don't want to snip that. For thatreason, here at Campus Cuts we prioritize safety as one of the most importantqualities to have. Whether that be sterilizing the equipment after use to avoid thespread of lice or being extra careful when cutting your hair, we prepare for it all.Through being anal about safety, I can report there has never been an injury of any

      You can talk about how you provide a safe sanitary, and pleasant atmosphere for employees, customers, etc.

    5. Table of Contents:INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3QUALITIES FOR CUSTOMERS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4QUALITIES FOR EMPLOYEES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5COMMUNITY CONTACT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

      Insert Table in Word to correctly align the columns of your numbers in your TOC.

    6. Everyone needs to get their hair cut eventually no matter who you are.This is a necessity that I doubt will ever go away. You need to make sure youhave a great barber as well. We live in a material world where appearance is ahuge factor and without a good haircut that could dramatically drop howpeople think your appearance is. Someone you trust is going to do a good joband, preferably, someone you enjoy talking with since you are going to have tosit there with them for a while. Good thing I’m around!A few years back I began cutting my own hair when all the barbershopswere shut due to Covid-19. After a little while I began cutting other people’shair and getting even better at it, so I began to be able to charge money for it.Once I came here to school, I heard people complaining about not being ableto get their haircuts here and so I decided to bring my abilit

      The backstory is cool, but you'll want to connect this to the idea of values--allowing people to enjoy like through the experience of a good appearance. You'll also want to contextualize: services like haircuts have become more expensive and your services can provide economic value in difficult financial times.

    Annotators

    1. Consider the following sequence of events. Server 1, 2, and 3 are up; server 3crashes; server 1 and 2 form a new group; server 2 crashes. Now as we want to tolerate networkpartitions correctly, we forced server 1 to fail. However, this is too strict. If server 1 stays aliveand server 3 is restarted, server 1 and 3 can form a new group, because server 1 must have per-formed all the updates that server 2 could have performed. The rule in general is that twoservers can recover, if the server that did not fail has a higher sequence number, as in this case itis certain that the new member has not formed a group with the (now) unavailable member in themeantime. We will incorporate this improvement in our directory service in the near future.

      Нетривиальный корнейкейс: система заставляет Server 1 упасть, хотя он мог бы подождать Server 3 и нормально восстановиться... Решение очень элегантное: смотреть sequence numbers. Если у неупавшего сервера sequence number выше, он гарантированно видел все апдейты и может безопасно пересобрать группу

    2. Inthe PB method, each message appears on the network twice: once to the sequencer and oncefrom the sequencer. Thus a message of length n bytes consumes 2n bytes of network bandwidth.However, only the second message is broadcast, so each user machine is interrupted only once(for the second message).In the BB method, the full message appears only once on the network, plus a very short acceptmessage from the sequencer. Thus, only about n bytes of bandwidth are consumed. On theother hand, every machine is interrupted twice, once for the message and once for the accept

      Интересный trade-off между bandwidth и количеством прерываний. PB ест 2n байт трафика, с одним прерыванием на машину. BB же экономит bandwidth (n), но у него два прерывания на обе машины. На практике же это будто можно применить при оптимизации под разные боттлнеки: если сеть - ботлнек, то BB метод лучше, если процессор - ботлнек, то PB лучше. Ещё классно, что протокол динамически меняется в зависимости от размера сообщения