10,000 Matching Annotations
  1. Feb 2026
    1. becomes more tyrannical as the traditionloses its living force and as the memory of its beginning recedes

      I don't completely understand this. How can traditions become more oppressive as they lose relevance? Why didn't the growth of anti-traditionalist thinking from Kierkegaard, Marx, and Nietzche cause a break in tradition? I feel like these things would naturally follow.

    2. Yet Kierkegaard's attempt to save faithfrom the onslaught of modernity made even religion modern,that is, subject to doubt and distrust. Traditional beliefs disinte-grated into absurdity when Kierkegaard tried to reassert themon the assumption that man cannot trust the truth-receiving ca-pacity of his reason or of his senses.

      It is interesting that through Kierkegaard's attempt to defend religion in a modern context, he goes against the tradition of relgion and opens the door for modern religious scrutiny.

    3. responsible for the structure ·and conditions of the .twentieth century is even more dangerous than it is unjus

      I agree with this. If we policed work that break tradition, enforcing a singular traditionalist view, we support current and past oppressive structures for the future.

    1. When we use social media platforms though, we at least partially give up some of our privacy. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      I have always been skeptical about whether privacy on social media is truly “private.” In many cases, so-called private messages are still accessible to platform developers or automated systems, which means users are trusting companies to protect their privacy rather than actually controlling it themselves. While this access can be helpful in situations like reporting threats or harassment, it also raises questions about who ultimately benefits from this arrangement. If only social media companies are able to see and manage my private data, I am not sure that this kind of “privacy” genuinely serves users’ interests rather than the platforms’ own priorities.

    2. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      Private messaging creates’ an expectation of privacy, but there are situations where limited access is necessary to protect users from threats or harassment. The challenge is designing systems that allow reporting and evidence sharing in harmful situations without turning routine private communication into something routinely monitored.

    1. For example, the proper security practice for storing user passwords is to use a special individual encryption process for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time).

      It is interesting that using symbols, uppercase letters, and numbers does not significantly increase the difficulty of brute-force attacks, while increasing the length of a password dramatically raises the cost of cracking it. However, many social media platforms still emphasize “complex” password rules rather than encouraging longer passwords. This can create a false sense of security for users, who may believe their passwords are strong when they are not. Ironically, these complexity requirements can even make passwords harder to remember, leading users to reuse them or choose predictable patterns, which ultimately gives attackers more opportunities.

    2. One of the things you can do as an individual to better protect yourself against hacking is to enable 2-factor authentication on your accounts.

      This statement shifts the focus of "protection" from the company level to the individual level, emphasizing that users still have actionable self-protection strategies. The significance of 2FA lies in the fact that even if a password is leaked, it is difficult for attackers to log in directly using only the password, thus reducing the probability of credential stuffing and account takeover. It also reminds us that security is layered – even the best platform security can be compromised by individual vulnerabilities such as phishing or weak passwords. However, this also highlights a limitation: 2FA can only reduce the risk of "account theft," but it cannot solve structural problems such as the platform itself leaking your private data.

    3. But social media companies often fail at keeping our information secure.

      This statement highlights the fragility of the "trust relationship" between users and the platform: we share information assuming the platform will protect it properly. It also implies that the problem is not an isolated incident, but "happens frequently," suggesting that security failures may be related to systems, processes, or business priorities. More importantly, the consequences of a single security breach often extend beyond the platform itself, affecting users' accounts on other websites and posing risks to their real lives. Readers will naturally ask: why did the platform fail—was it due to insufficient technical capabilities, management negligence, or prioritizing growth and convenience over security?

    4. But while that is the proper security for storing passwords. So for example, Facebook stored millions of Instagram passwords in plain text, meaning the passwords weren’t encrypted and anyone with access to the database could simply read everyone’s passwords. And Adobe encrypted their passwords improperly and then hackers leaked their password database of 153 million users.

      This shows how even major platforms can ignore basic security practices. How can platforms be held to stricter accountability standards when they fail to protect user data?

    1. There was consistent evidence of a reduction in psychological stress (3/3, 100% of RCTs) and improvement of sleep quality (3/4, 75%) following exercise compared to non-active controls.

      This suggests that exercise is an exceptionally reliable "first-line" intervention for the two most common complaints among healthcare workers: which is high stress and poor recovery.

    2. Healthcare professionals are also at increased risk of physical inactivity during leisure time, with research suggests that whilst some healthcare professionals are physically active during work duties, the amount of physical activity and exercise conducted during leisure time is relatively short and below physical activity guidelines for a substantial proportion of healthcare professionals

      This indicates that "being on your feet all day" at a hospital is not the same as purposeful exercise, and reinforces the need for structured interventions that happen outside of clinical duties.

    3. Across the general population, poor mental health amongst employees costs UK employers £42–45 billion each year, including absence costs, presenteeism costs and turnover costs (Deloitte, 2020),

      This quote provides a powerful "business case" for hospitals and clinics to invest in staff exercise programs, framing them as a cost-saving measure rather than an expense.

    4. Yoga, tai-chi and dance were excluded as these activities may benefit mental health through additional factors distinct from the physical activity itself

      By focusing solely on aerobic and resistance training, the review provides a more "clinical" look at how physical movement, independent of mindfulness, impacts the brain.

    5. For example, it can lead to compassion fatigue and the reduced ability to emphasis with patient groups, higher frequency of medical errors and reduced decision making abilities (Hall et al., 2020).

      This shows that physical activity programs are a safety intervention, a healthier, more active workforce is statistically less likely to commit medical errors.

    1. There were no significant differences between the three groups before intervention (T0) and one month after intervention (T2), although the mean scores of the aerobic and yoga groups were reduced, compared to the control group.

      ince the significant gap between groups disappeared one month after the sessions ended, the researchers imply that physical activity must be a continuous lifestyle habit rather than a one-time "treatment" to keep burnout at bay.

    2. New research has shown that burnout is transmitted from one employee to another; therefore, it harms the workplace atmosphere

      This frames exercise and yoga programs as a "public health" measure for the hospital unit—by treating one nurse's burnout, managers may prevent it from spreading to others.

    3. Additionally, it was indicated that yoga affects the parasympathetic nervous system and inhibits gamma-amino-butyric acid; however, aerobic exercise was found to stimulate the sympathetic nervous system

      This provides a biological rationale for the results: yoga focuses on "rest and digest" (parasympathetic), which may more directly counteract the "fight or flight" (sympathetic) stress common in clinical settings.

    4. Burnout in nurses was four times greater than that of other professionals (2). Moreover, the prevalence of burnout among female nurses was very high

      This underscores that burnout isn't just a general workplace issue but a specific crisis within the nursing profession that requires specialized self-care strategies.

    5. The mean score of emotional exhaustion in the yoga group (23.13 ± 4.13) was reduced compared to the aerobic (36.00 ± 5.65) and control (38.44 ± 10.96) groups.

      This suggests that for healthcare workers specifically suffering from the "drained" feeling of emotional exhaustion, yoga may be a more targeted intervention than traditional cardio.

    1. referred to as the gold standard among review

      This part stood out to me bcause it frames the systematic reviews as the most rigorous approach, especially in fields like medical science.

    2. he systematic review, the semi-systematic review, and the integrative review

      Before the reading, I was not really equipped with the idea of how differences between, systematic, semi-systematic, and integrative reviews. This helped me clarify how each approach serves as a different purpose.

    3. Why you should write a literature review

      This overall secrtion stood out to me because of the amount of clarity it provided on why literature reviews are essential across all research disciplines ,not just as background but aspart of the research process.

    1. eLife Assessment

      This valuable paper describes the regulation of the association of meiotic chromosome axis proteins on chromosome ends with sub-telomeric elements in budding yeast. The genome-wide analyses of binding of chromosome components as well as chromatin regulators, complemented with the mapping of meiotic DNA double-strand breaks on chromosome ends, provided incomplete evidence to support the authors' conclusion. The results in the paper are of interest to researchers in meiotic recombination and the structure of genomes and chromosomes.

    2. Reviewer #1 (Public review):

      Meiotic recombination at chromosome ends can be deleterious, and its initiation-the programmed formation of DSBs-has long been known to be suppressed. However, the underlying mechanisms of this suppression remained unclear. A bottleneck has been the repetitive sequences embedded within chromosome ends, which make them challenging to analyze using genomic approaches. The authors addressed this issue by developing a new computational pipeline that reliably maps ChIP-seq reads and other genomic data, enabling exploration of previously inaccessible yet biologically important regions of the genome.

      In budding yeast, chromosome ends (~20 kb) show depletion of axis proteins (Red1 and Hop1) important for recruiting DSB-forming proteins. Using their newly developed pipeline, the authors reanalyzed previously published datasets and data generated in this study, revealing heretofore unseen details at chromosome ends. While axis proteins are depleted at chromosome ends, the meiotic cohesin component Rec8 is not. Y' elements play a crucial role in this suppression. The suppression does not depend on the physical chromosome ends but on cis-acting elements. Dot1 suppresses Red1 recruitment at chromosome ends but promotes it in interior regions. Sir complex renders subtelomeric chromatin inaccessible to the DSB-forming machinery.

      The high-quality data and extensive analyses provide important insights into the mechanisms that suppress meiotic DSB formation at chromosome ends. To fully realise this value, several aspects of data presentation and interpretation should be clarified to ensure that the conclusions are stated with appropriate precision and that remaining future issues are clearly articulated.

      (1) To assess the chromosome fusion effects on overall subtelomeric suppression, authors should guide how to look at the data presented in Figure 2b-c. Based on the authors' definition of the terminal 20 kb as the suppressed region, SK1 chrIV-R and S288c chrI-L would be affected by the chromosome fusion, if any. In addition, I find it somewhat challenging to draw clear conclusions from inspecting profiles to compare subtelomeric and internal regions. Perhaps, applying a quantitative approach - such as a bootstrap-based analysis similar to those presented earlier-would be easier to interpret.

      (2) The relationship between coding density and Red1 signal needs clarification. An important conclusion from Figure 3 is that the subtelomeric depletion of Red1 primarily reflects suppression of the Rec8-dependent recruitment pathway, whereas Rec8-independent recruitment appears similar between ends and internal regions. Based on the authors' previous papers (referencess 13, 16), I thought coding (or nucleosome) density primarily influences the Rec8-independent pathway. However, the correlations presented in Figure 2d-e (also implied in Figure 3a) appear opposite to my expectation. Specifically, differences in axis protein binding between chromosome ends and internal regions (or within chromosome ends), where the Rec8-dependent pathway dominates, correlate with coding density. In contrast, no such correlation is evident in rec8Δ cells, where only the Rec8-independent pathway is active and end-specific depletion is absent. One possibility is that masking coding regions within Y' elements influences the correlation analysis. Additional analysis and a clearer explanation would be highly appreciated.

      (3) The Dot1-Sir3 section staring from L266 should be clarified. I found this section particularly difficult to follow. It begins by stating that dot1∆ leads to Sir complex spreading, but then moves directly to an analysis of Red1 ChIP in sir3∆ without clearly articulating the underlying hypothesis. I wonder if this analysis is intended to explain the differences observed between dot1∆ and H3K79R mutants in the previous section. I also did not get the concluding statement - Dot1 counteracts Sir3 activity. As sir3Δ alone does not affect subtelomeric suppression, it is unclear what Dot1 counteracts. Perhaps, explicitly stating the authors' working model at the outset of this section would greatly clarify the rationale, results, and conclusions.

    3. Reviewer #2 (Public review):

      Summary:

      In this manuscript, Raghavan and his colleagues sought to identify cis-acting elements and/or protein factors that limit meiotic crossover at chromosome ends. This is important for avoiding chromosome rearrangements and preventing chromosome missegregation.

      By reanalyzing published ChIP datasets, the researchers identified a correlation between low levels of protein axis binding - which are known to modulate homologous recombination - and the presence of cis-acting elements such as the subtelomeric element Y' and low gene density. Genetic analyses coupled with ChIP experiments revealed that the differential binding of the Red1 protein in subtelomeric regions requires the methyltransferase Dot1. Interestingly, Red1 depletion in subtelomeric regions does not impact DSB formation. Another surprising finding is that deleting DOT1 has no effect on Red1 loading in the absence of the silencing factor Sir3. Unlike Dot1, Sir3 directly impacts DSB formation, probably by limiting promoter access to Spo11. However, this explains only a small part of the low levels of DSBs forming in subtelomeric regions.

      Strengths:

      (1) This work provides intriguing observations, such as the impact of Dot1 and Sir3 on Red1 loading and the uncoupling of Red1 loading and DSB induction in subtelomeric regions.

      (2) The separation of axis protein deposition and DSB induction observed in the absence of Dot1 is interesting because it rules out the possibility that the binding pattern of these proteins is sufficient to explain the low level of DSB in subtelomeric regions.

      (3) The demonstration that Sir3 suppresses the induction of DSBs by limiting the openness of promoters in subtelomeric regions is convincing.

      Weaknesses:

      (1) The impact of the cis-encoded signal is not demonstrated. Y' containing subtelomeres behave differently from X-only, but this is only correlative. No compelling manipulation has been performed to test the impact of these elements on protein axis recruitment or DSB formation.

      (2) The mechanism by which Dot1 and Sir3 impact Red1 loading is missing.

      (3) Sir3's impact on DSB induction is compelling, yet it only accounts for a small proportion of DSB depletion in subtelomeric regions. Thus, the main mechanisms suppressing crossover close to the ends of chromosomes remain to be deciphered.

    4. Reviewer #3 (Public review):

      Summary:

      The paper by Raghavan et. al. describes pathways that suppress the formation of meiotic DNA double-strand breaks (DSBs) for interhomolog recombination at the end of chromosomes. Previously, the authors' group showed that meiotic DSB formation is suppressed in a ~20kb region of the telomeres in S. cerevisiae by suppressing the binding of meiosis-specific axis proteins such as Red1 and Hop1. In this study, by precise genome-wide analysis of binding sites of axis proteins, the authors showed that the binding of Red1 and Hop1 to sub-telomeric regions with X and Y' elements is dependent on Rec8 (cohesin) and/or Hop1's chromatin-binding region (CBR). Furthermore, Dot1 functions in a histone H3K79 trimethylation-independent manner, and the silencing proteins Sir2/3 also regulate the binding of Red1 and Hop1 and also the distribution of DSBs in sub-telomeres.

      Strengths:

      The experiments were conducted with high quality and included nice bioinformatic analyses, and the results were mostly convincing. The text is easy to read.

      Weaknesses:

      The paper did not provide any new mechanistic insights into how DSB formation is suppressed at sub-telomeres.

    1. eLife Assessment

      This important study reveals intriguing connections between chromosome breakage and DNA elimination during programmed genome rearrangement in the ciliate Tetrahymena thermophila. By developing a novel FISH approach that distinguishes germline and somatic telomeres, the authors provide compelling evidence that chromosome breakage removes germline telomeres along with hundreds of kilobases of germline-limited sequences. By disrupting a single chromosome breakage site, they further showed that DNA elimination was globally affected, which opens up a new direction for mechanistic studies. Thus, this work reveals additional similarity between the programmed DNA elimination in ciliates and nematodes that underlies the transition from germline to somatic telomeres.

    2. Reviewer #1 (Public review):

      Summary:

      In this study, Nagao and Mochizuki examine the fate of germline chromosome ends during somatic genome differentiation in the ciliate Tetrahymena thermophila. During sexual reproduction, a new somatic genome is created from a zygotic, germline-derived genome by extensive programmed DNA elimination events. It has been known for some time that the termini of the germline chromosomes are eliminated, but the exact process and kinetics of the elimination events have not been thoroughly investigated. The authors first use germline-specific telomere probes to show that the loss of these chromosome ends occurs with similar timing as other DNA elimination events. By comparative analysis of the assembled germline and somatic genomes, the authors find that the ends of each of the germline chromosomes are composed of a few hundred kilobases of micronuclear limited sequences (MLS) that are removed starting around 14 hours after the start of conjugation, which initiates sexual development. They then develop an in situ hybridization assay to track the fate of one end of chromosome 4 while simultaneously following the adjacent macronuclear destined sequence (MDS) retained in the new somatic genome. This allows the authors to more clearly show that these adjacent chromosomal segments are initially amplified in the developing genome before the terminal MLS is eliminated. Finally, they mutate the chromosome breakage sequence (CBS) that normally separates the MLS terminus from the adjacent MDS region, to show that strains that develop with only one mutant chromosome can produce viable sexual progeny, but it appears that both the MLS and the MDS from the mutant chromosome are lost. If both chromosome copies have the CBS mutation, the cells arrest during development and do not eliminate many germline-limited sequences and fail to produce viable progeny. Overall, this study provides many new insights into the fate of germline chromosome ends during somatic genome remodeling and suggests extensive coordination of different DNA elimination events in Tetrahymena.

      Strengths:

      Overall, the experiments were well executed with appropriate controls. The findings are generally robust. Importantly, the study provides several novel findings. First, the authors provide a fairly comprehensive characterization of the size of the MLS at the end of each germline chromosome. I'm not sure whether this has been published elsewhere. Second, the authors develop a novel method to study the fate of chromosome termini during development and use it to conclusively track the elimination of these termini. Third, the authors show that the elimination of these termini appears to occur concurrently with most other DNA elimination events during somatic genome differentiation. And fourth, the authors show that failure to separate these eliminated sequences from the normally retained chromosome alters the fate of these adjacent MDS and the loss of the cells' ability to produce viable progeny.

      Weaknesses:

      It appears the authors did extensive analysis of the MLS chromosome ends, but did not provide too much information related to their composition. If this has not been published elsewhere, it would be useful to describe the proportion of unique and repetitive sequences and provide more information about the general composition of the chromosome ends. Such information would help the reader understand the nature of these MLS and how they may or may not differ from other eliminated sequences. Although the development of the novel FISH probes for large chromosome ends allowed for these novel discoveries, the signal in several images was visible, but often quite faint. I'm not sure there is anything the authors could do to improve the signal-to-noise ratio, but one needs to stare at the images carefully to understand the findings. One main weakness in the opinion of this reviewer is that the authors did very little to understand why, when a terminal MLS and the adjacent MDS fail to get separated because of failure in chromosome breakage, both segments are eliminated. The authors propose that possibly essential genes in the MDS get silenced, and the resulting lack of gene expression is the issue, but this and other possibilities were not tested. The study would provide more mechanistic insight if they had tried to assess whether the MDS on the CBS mutant chromosome becomes enriched in silencing modifications (e.g., H3K9me3). Alternatively, the authors could have examined changes in gene expression for some of the loci on the neighbouring MDS. The other main weakness is that since the authors only mutated the end of one germline chromosome, it is not clear whether the elimination of the MDS adjacent to the terminal MLS on chromosome 4 when the CBS is mutated is a general phenomenon, i.e., would happen at all chromosome ends, or is unique to the situation at Chromosome 4R. Knowing whether it is a general phenomenon or not would provide important insight into the authors' findings.

    3. Reviewer #2 (Public review):

      Summary:

      Nagao and Mochizuki investigated how the germline (MIC) telomere was removed during programmed genome rearrangement in the developing somatic nucleus (MAC). Using an optimized oligo-FISH procedure, the authors demonstrated that MIC telomeres were co-eliminated with a large region of MIC-limited sequences (MLS) demarcated on the opposite side by a sub-telomeric chromosome breakage site (CBS). This conclusion was corroborated by the latest assembly of the Tetrahymena MIC genome. They further employed CRISPR-Cas9 mutagenesis to disrupt a specific sub-telomeric CBS (4R-CBS). In uniparental progeny (mutant X WT), DNA elimination of the sub-telomeric MLS was not affected, but the adjacent MAC-destined sequence (MDS) may be co-eliminated. However, in biparental progeny (mutant X mutant), global DNA elimination was arrested, revealing previously unrecognized connections between chromosome breakage and DNA elimination. It also paves the way for future studies into the underlying molecular mechanisms. The work is rigorous, well-controlled, and offers important insights into how eukaryotic genomes demarcate genic regions (retained DNA) and regions derived from transposable elements (TE; eliminated DNA) during differentiation. The identification of chromosome breakage sequences as barriers preventing the spread of silencing (and ultimately, DNA elimination) from TE-derived regions into functional somatic genes is a key conceptual contribution.

      Strengths:

      New method development: Oligo-FISH in Tetrahymena. This allows high-resolution visualization of critical genome rearrangement events during MIC-to-MAC differentiation. This method will be a very powerful tool in this area of study.

      Integration of cytological and genomic data. The conclusion is strongly supported by both analyses.

      Rigorous genetic analysis of the role played by 4R-CBS in separating the fate of sub-telomeric MLS (elimination) and MDS (retention). DNA elimination in ciliates has long been regarded as an extreme form of gene silencing. Now, chromosome breakage sequences can be viewed as an extreme form of gene insulators.

      Weaknesses:

      The finding of global disruption of DNA elimination in 4R-CBS mutant progeny is highly intriguing, but it's mostly presented as a hypothesis in the Discussion. The authors propose that the failure to separate MLS from MDS allows aberrant heterochromatin spreading from the former into the latter, potentially silencing genes required for DNA elimination itself. While supported by prior literature on heterochromatin feedback loops, the specific targets silenced are not identified. While results from ChIP-seq and small RNA-seq can greatly strengthen the paper, the reviewer understands that direct molecular characterization may be beyond the scope of the current work.

    4. Reviewer #3 (Public review):

      Programmed DNA elimination (PDE) is a process that removes a substantial amount of genomic DNA during development. While it contradicts the genome constancy rule, an increasing number of organisms have been found to undergo PDE, indicating its potential biological function. Single-cell ciliates have been used as a prominent model system for studying PDE, providing important mechanistic insights into this process. Many of those studies have focused on the excision of internally eliminated sequences (IES) and the subsequent repair using non-homologous end joining (NHEJ). These studies have led to the identification of small RNAs that mark retained or eliminated regions and the transposons that generate double-strand breaks.

      In this manuscript, Nagao and Mochizuki examined the other type of breaks in ciliates that were healed with telomere addition. They specifically focused on the sequences at the ends of the germline (MIC) chromosomes, which have received relatively less attention due to the technical challenges associated with the highly repetitive nature of the sequences. The authors used the Tetrahymena model and developed a set of new tools. They used a novel FISH strategy that enables the distinction between germline and somatic telomeres, as well as the retained and eliminated DNA near the chromosome ends. This allows them to track these sequences at the cellular level throughout the development process, where PDE occurs. They also analyzed the more comprehensive germline and somatic genomes and determined at the sequence level the loss of subtelomeric and telomere sequences at all chromosome ends. Their result is reminiscent of the PDE observed in nematodes, where all germline chromosome ends are removed and remodeled. Thus, the finding connects two independent PDE systems, a protozoan and a metazoan, and suggests the convergent evolution of chromosome end removal and remodeling in PDE.

      The majority of sites (8/10) at the junctions of retained and eliminated DNA at the chromosome ends contain a chromosome breakage sequence (CBS). The authors created a set of mutants that modify the CBS at the ends of chromosome 4R. CBS regions are challenging for CRISPR due to their AT-rich sequences, making the creation of the 4R-CBS mutants a significant breakthrough. They used the FISH assay to determine if PDE still occurs in these mutant strains with compromised CBS. Surprisingly, they found that instead of blocking PDE, its adjacent retained DNA is now eliminated, suggesting a co-elimination event when the breakage is impaired. Furthermore, in biparental mutant crosses, no PDE occurred, and no viable progeny were produced, indicating that the removal of chromosome ends is crucial for proper PDE and sexual progeny development. Overall, the work demonstrates a critical role for 4R-CBS in separating retained and eliminated DNA.

    1. ght to exist.6 Yet only toeducate men and not to educatewomen-are they not being partial (bi廠)in theit treatment of thetwo sides?7According to the Record of Rituals, at the uge ofeight, children should beginreceiving instructions on the classics. At the age offiftcen, they should receiveadult education. Why is [women's education] alone notfollowing t

      It is hard to ascertain whether Zhao cares about women's education genuinely (even though it is within a patriarchal context), or if this is a means to an end (which is to further cement men's power in a marriage).

    2. ACCORDING TO THE [Book of Ceremonia/] Rituak, a husbandhas the groundof righteousness to remarry; however, no existing texts permita wife to have asecond marriage (ershi 二適).?Therefore, itis sai

      I'm interested to know what Zhao would think of widows and remarriage, as well as adulterous husbands.

    3. . She should act always as if tre

      The author's original claim of being unable to do anything remarkable in life and struggling with her duties seems to show here. This comment on how women should always live in fear seems to be projection from her own time as a 'lowly subject'.

    4. ays, ”A man is born like a wolf; it is feared thathe may develop the ill-ness of having a hunched weak back (uarg 尪).Awoman is boen like a mo

      The gendering of strength and weakness is particularly interesting here because Zhao does not think that either one is inferior to the other; he just thinks that both must exist to complement the other. It is interesting to consider the possibility of this proverb hinting at an observation of men and women, particularly that there is a 'fear' that women may turn into tigers.

    Annotators

    1. R0:

      Reviewer #1:

      Methodology: study design & datasource, heading overlap with data source and extraction. You may consider differentiating the study design+population from the data source+data extraction to improve clarity and avoid repetition.

      The covariates are presented in a table. Consider adding a concise paragraph describing key variables and their categorization. Perhaps detailed coding and operational definitions should be presented in a supplementary table.

      The analysis plan refers to Objective 2 and Objective 3 however, the study objectives are not stated anywhere earlier in the manuscript. They should be explicitly stated to improve coherence

      Also, this contradicts “shared frailty at the individual level”. Please clarify the intended clustering structure. Did you model with the shared or Individual-level frailty?

      Reviewer #2:

      This manuscript addresses an important and under-researched area by examining long-term trends in attrition from HIV care and associated predictors among adolescent girls and young women (AGYW) with non-viral load suppression in Tanzania. The use of routine programmatic data is a major strength and enhances the relevance of the findings for the national program. The objectives are clear, and the results provide insights into patterns of disengagement from care in this vulnerable population. However, the manuscript would benefit from clearer operational definitions of key outcomes particularly inconsistent viral load suppression. Further discussion linking the findings to existing regional and global literature, as well as clearer description of programmatic and policy implications, would strengthen the paper. I recommend minor revisions to improve clarity and consistency.

      R1:

      Reviewer #1:

      All comments have been addressed

      Reviewer #2:

      General review of the revised manuscript I have reviewed the revised manuscript and found that the authors have addressed all the comments; however, a few minor edits are still required before publication. Please see the table below.

      Section: Introduction <br /> Comment: Correct spelling UANIDS <br /> Line number: 58

      Section: Methods <br /> Comment: It is essential that the term inconsistent viral load suppression needs to be clearly defined in the manuscript. Note that two viral load results ≥1000 copies/ml at least six months after ART initiation is the standard definition for non-viral suppression or ART virological failure.<br /> Ideally, inconsistent viral load suppression would have been a situation whereby PLHIV achieves an undetectable viral load at least 6 months after ART initiation, but subsequently experience detectable viral load result/s ≥1000 copies/ml. To avoid confusion, refer to this sentence in conclusion: Notably, individuals with an initial unsuppressed viral load were more likely to disengage from care.

      Section: Results <br /> Comment: Table 1: First line and second line not defined. Not every reader knows what Tanzanian ART regimens. Line number: 170-171

      Section: Discussion Comment: A citation is not inserted <br /> Line number: 253

      Section: Discussion Comment: Correct the word form to read from Line number: 254

    1. When you write, it is helpful when your ideas are presented in an order that makes sense. The writing you complete in all your courses exposes how analytically and critically your mind works.

      Your ideas should be In order so that they make sense for yourself and the reader as well.

    2. An outline is a written plan that serves as a skeleton for the paragraphs you write. Later, when you draft paragraphs in the next stage of the writing process, you will add support to create “flesh” and “muscle” for your assignment.

      Great way to think about it!

    1. However, if you start to observe a pattern in the responses you receive from peer reviewers, you might want to take that feedback into consideration in future assignments. For example, if you read consistent comments about a need for more research

      If there is a pattern you should fix it to better your writing.

    2. Set aside time to review the organization of your peer’s essay. Read their thesis statement and make sure their body paragraphs have topic sentences that connect to their thesis statement. If there isn’t a clear connection, consider helping your peer revise their topic sentence so the connection between the thesis and body paragraph is easy to understand.

      Take your time because at the end of the day your are trying to help improve a piece of writing

    3. Read your peer’s essay from the beginning to the end without adding any comments. This first read allows you to grasp your peer’s intentions and focus.

      Read the whole thing first before giving feedback.

    4. When giving feedback, try to answer your instructor’s questions, but of course, you should carefully read your classmates’ writing first.

      Always do the instructor questions first because that's what's most likely to be graded.

    5. Although you might think editing and proofreading aren’t necessary since you were fairly careful when you were writing, the truth is that even the brightest people and best writers make mistakes when they write.

      You will make mistakes so it's best to revise at least once.

    1. What your reader needs is for you to make sense of that evidence so that s/he understands what all this has to do with your thesis or claim.

      We need to understand the evidence we use so that the reader understand as well.

    1. eLife Assessment

      This important study presents new insights into the post-transcriptional mechanisms that govern cortical development. Through state-of-the-art methodology to track neuronal birth order, the data provide compelling evidence that Imp1 (Igf2bp1/Zbp1) orchestrates radial glia fate transitions and cortical neurogenesis. The findings establish a new framework for understanding how post-transcriptional mechanisms integrate with transcriptional and epigenetic regulatory layers to control cortical temporal patterning.

    2. Reviewer #1 (Public review):

      Summary:

      A hallmark of cortical development is the temporal progression of lineage programs in radial glia progenitors (RGs) that orderly generate a large set of glutamatergic projection neuron types, which are deployed to the cortex in a largely inside-out sequence. This process is thought to contribute to the formation of proper cortical circuitry, but the underlying cellular and molecular mechanisms remain poorly understood. To a large extent, this is due to technical limitations that can fate map RGs and their progeny with cell type resolution, and manipulate gene expression with proper cell and temporal resolution. Building on the TEMPO technique that Tsumin Lee group developed, here Azur et al show that the RNA binding protein Imp1 functions as a dosage- and stage-dependent post-transcriptional mechanism that orchestrates developmental stage transitions in radial glial progenitors, and controls neuronal fate decisions and spatial organization of neuronal and glial cell progeny. Their results suggest that while transcriptional regulators define available cellular states and gate major transitions, post-transcriptional mechanisms like Imp1 provide an additional layer of control by modulating stage-specific transcript stability. Imp1 thus acts as a temporal coordinator whose dosage and timing determine whether developmental transitions are temporarily delayed or blocked. These findings establish a new framework for understanding how post-transcriptional mechanisms integrate with transcriptional and epigenetic regulatory layers to control cortical temporal patterning.

      Strengths:

      The authors apply a novel genetic fate mapping and gene manipulation technology (TEMPO) with cellular resolution. This reveals a dosage- and stage-dependent post-transcriptional mechanism that orchestrates developmental stage transitions in radial glial progenitors, and controls neuronal fate decisions and spatial organization of neuronal and glial cell/astrocyte progeny.

      Weaknesses:

      The endogenous developmental expression pattern of Imp1 and TEMPO-mediated overexpression are not well described or characterized with cellular resolution (whether only in radial glial cells or also in post-mitotic neurons). Thus, the interpretations of the overexpression phenotypes are not always clear.

    3. Reviewer #2 (Public review):

      Summary:

      In this manuscript, Azur et al seek to determine the role of Imp1/Igf2bp1 in regulating the temporal generation of cortical neuron types. The authors showed that overexpression of Imp1 changes the laminar distribution of cortical neurons and suggest that Imp1 plays a temporal role in specifying cell fates.

      Strengths:

      The study uniquely used TEMPO to investigate the temporal effects of Imp1/Igf2bp1 in cortical development. The disrupted laminar distribution and delayed fate transition are interesting. The results are presented with proper quantification, they are generally well interpreted, and suggest important roles for Imp1.

      Weaknesses:

      (1) While the results suggest Imp1 is important in regulating cortical neurogenesis, it remains unclear when and where it is expressed to execute such temporal functions. For instance, where is Imp1 expressed in the developing brain? Is it specific to the radial glial cells or ubiquitous in progenitors and neurons? Does it show temporal expression in RGCs?

      (2) The advantage and interpretation of TEMPO need further clarification. TEMPO is an interesting method and appears useful in simultaneously labelling cells and controlling gene expression. Since the reporter, Cas9, and gRNA triggers are all driven by ubiquitous promoters and integrated into the genome using piggyBac, it appears logical that the color transition should happen in all cells over time. The color code appears to track the time when the plasmids got integrated instead of the birthday of neurons. Is this logically true? If the TEMPO system is introduced into postmitotic neurons and the CAG promoter is not silenced, would the tri-color transition happen?

      (3) The accumulation of neurons at the subplate region would benefit from showing larger views of the affected hemisphere. IUE is invasive. The glass pipette may consistently introduce focal damages and truncate RGCs. It is important to examine slices covering the whole IUE region.

    4. Reviewer #3 (Public review):

      Summary:

      The work by Azur and colleagues makes use of the TEMPO (Temporal Encoding and Manipulation in a Predefined Order) methodology to trace cortical neurogenesis in combination with overexpression of Imp1. Imp1 is a mammalian homologue of the Drosophila Imp, which has been shown to control temporal identity in a stem cell context. In their work, they show that overexpression of Imp1 in radial glia, which generate neurons and macroglia in a sequential manner during cortical development, leads to a disruption of faithful neuron/glia generation. They show that continuous overexpression leads to a distinct phenotypic outcome when compared to paradigms where Imp1 was specifically overexpressed in defined temporal windows, enabled by the unique TEMPO approach. Interestingly, the observed phenotype with 'ectopic' generation of mainly lower cortical layer neurons appears not to be due to migration deficits. Strikingly, the overexpression of Imp1 specifically at later stages also leads to ectopic glia-like foci throughout the developing cortical plate. Altogether, the new data provide new insights regarding the role of the post-transcriptional Imp1 regulator in controlling temporal fate in radial glia for the faithful generation of neurons and glia during cortical development.

      Strengths:

      The TEMPO approach provides excellent experimental access to probe Imp1 gene function at defined temporal windows. The data is very robust and convincing. The overexpression paradigm and its associated phenotypes match very well the expected outcome based on Imp1 loss-of-function. Overall, the study contributes significantly to our understanding of the molecular cues that are associated with the temporal progression of radial glia fate potential during cortical development.

      Weaknesses:

      The authors provide some experimental evidence, including live imaging, that deficits related to Imp1 overexpression and subsequent overabundance of lower-layer neurons, or accumulation at the subplate, appear to evolve independently of neuronal migration deficits. However, the analysis at the population level might not suffice to make the claim robust. To analyze neuronal migration in more depth, the authors could trace individual neurons and establish speed and directional parameters for comparison.

      In their analysis, the authors mainly rely on temporal parameters/criteria to associate the generation of certain neuron fates. While two markers were used to identify the neuronal fate, the variance seems quite high. The authors could consider utilizing an antibody against Satb2, which would provide additional data points that could help to establish statistical significance in some of the analyses.

      The analysis of glia was done at postnatal day 10, although gliogenesis and, in particular, astrocyte maturation last at least until postnatal day 28. The authors could consider extending their analysis to capture the full spectrum of their astrocyte phenotype.

    1. R0:

      Reviewer #1:

      The article is relevant and timely. Please use COREQ guidelines/other community guidelines for qualitative research listed on the EQUATOR network to improve the rigour and flow of the article. Additional suggestions for your consideration are listed below. 1. The rationale for the article as well as research question needs to be made more explicit. Additionally, the novelty of the article is relatively unclear. 2. The use of a framework devised for infectious diseases needs to be examined- why was this framework chosen? 3. Line 52-54: It may be useful to examine the cause of death in context of age; additionally, the later use of terms like young-old-middle aged are ambiguous later in the article, please provide an operational definition. 4. Line 54-57: The reason for prioritising lived experience is unclear. The logical flow establishing the rationale for this inquiry needs strengthening. 5. The linkages of NCDs with urbanisation need more citation and can be explored better. The authors may consider reassessing the introduction section which seems to appear definitive without providing a research gap. 6. Why is this research needed? What makes it relevant for global health? This needs to be elucidated in the text. 7. The use of the word "drug peddler" should be in quotes at least at first use, to ensure that it is seen in its local context. 8. The narrative findings are rich and well presented- the global health impact of these findings/future paths based on these findings need to be be made explicit.

      Reviewer #2:

      This manuscript is well-written and engaging, and I would like to commend the authors for presenting such rich and dense information.

      Here are my comments, which I believe will enhance the content of this manuscript.

      1. Page 2, line 27 (abstract section): The term "oppression" appears quite strong, and I do not find any evidence supporting it in the results section. Could the authors clarify what they mean by "oppression"? Additionally, the sentence “as gender norms and experiences of masculinities and femininities reflected the division of roles and access to resources by men and women, which in turn shaped their ability to seek early and better healthcare interventions” seems to contradict the notion of oppression if participants are able to seek early and improved healthcare interventions.

      2. Page 6, line 133: typo: a dot is in the middle of the sentence. Consider removing.

      3. Page 7 on selection of study participants: How did researchers identify participants based on diabetes and hypertension criteria, given that these medical conditions require a confirmed diagnosis from health professionals? Additionally, were any participants identified using a snowball sampling technique?

      4. It is mentioned that this study was conducted as part of the broad ARISE project. Can the authors clarify whether the study participants were enrolled into the main project and if so, to what extent this initial involvement of the main study had impacted the data collection?

      5. An important section on data collection is missing. I would like authors to include this in order to explain what specific data were collected at each round, why was it necessary to split data collection over different timepoints, where and in which language were data collected, how long lasted interviews on average, and who collected the data, any bias that may result from the way the study participants perceived the data collection team during fieldwork?

      6. The data analysis section requires further clarification. It would be beneficial if the authors could elaborate on their data coding strategy. It appears that a deductive approach was employed, yet they did not explain how the coding frame was initially developed before its application to the data, nor did they specify who conducted these procedures. Additionally, information regarding the software used to facilitate the data analysis is missing.

      7. The use of relevant qualitative data reporting guideline is missing. This is important to include as it will help ensure that ensure that the methods and findings are clearly and transparently communicated in the manuscript.

      8. In relation to adapting the framework for Infectious Diseases of Poverty Research, it would be beneficial if the authors could clarify the specific adaptations made to the framework and how it was applied during data analysis.

      9. They mentioned that participants who faced distress during the interviews were allowed to grieve and were consoled. How many participants developed such condition during interviews at which round of data collection, and to what extent did this impact on data collected?

      10. This study seeks to explore the lived experiences of individuals affected by NCDs in informal settlements. However, the findings presented in the results section, particularly the initial part titled "lived experience of NCD," fall short of adequately conveying the participants' current experiences with these health conditions. Firstly, the authors include excerpts from three informants but fail to demonstrate how these accounts are representative of all study participants. Secondly, the discussion of informants' lives prior to developing their current health conditions renders the information less pertinent to the study's objectives. It would be beneficial if the authors could focus on participants current lives to discuss the intersectionality of NCDs with social, economic, and gender factors within the participants' living environments, and how these elements contribute to shaping the management of their health conditions. This way of presenting the findings restricts our understanding, as the same observation is reiterated throughout the discussion section.

      11. In the context of chronic disease, it can be assumed that participants with diabetes, hypertension, or comorbidities might encounter similar yet distinct challenges. It would be beneficial for the authors to discuss the findings across these cases, highlighting both similarities and differences, and to establish a hierarchy within the data.

      12. The use of terms like "people," "women," or "men" in the results section can be misleading, as they might suggest that the findings apply to the general population. Instead, it is advisable to use terms such as "informants," "study participants," or "men" or "women in this study" to ensure that the information reported is limited to those individuals who participated in this data collection.

    1. semi-hidden files

      The "semi-hidden" file like .git in a git repository implies the existence of a higher order of hidden-ness.

      I searched this up and eventually ended up on the Wikipedia article linked below. The explanation bifurcates the idea of a hidden file into stuff hidden for convenience and super important stuff that the OS uses, which "remain hidden unless another setting, called "Hide protected operating system files (Recommended)," is cleared." This fully hidden-ness for sys files likely is to prevent a PEBKAC.

      https://en.wikipedia.org/wiki/Hidden_file_and_hidden_directory#:~:text=or%20clear%20attributes.-,File%20Explorer,of%20hidden%20items%20semi%2Dtransparently.

    2. Spaces

      I agree with this, and this limitation was exemplified by when I was going through a command line maze, but the directories used spaces instead of dashes or underscores, which initially led to a bit of friction in me figuring out how to proceed to the next terminal (I used quotes).

    3. Spaces :

      The issue with spaces is a good example of how a normal human habit like just using spaces becomes a technical problem. Something that comes so naturally to us when naming a file turns into extra work in command-line environments, which j shows a big difference between human language and systems.

    4. So here is my list of things that should not appear in file names:

      The goal of this piece is defintiely more practical than academic. It works like informal documentation meant to help readers toward better file-naming practices.

    5. On most days I move between Mac OS X (HFS+), Windows XP (mostly NTFS, some FAT32), Windows 2003 (NTFS), FreeBSD (UFS/UFS2) and Linux (pick one).

      The author baiscally supports his point by describing his experience working across many operating systems. This shows that the issues he mentions come from actual technical experience.

    6. Okay, all kidding aside, having goofy file names can make life miserable.

      The author’s main argument is that file naming is not just a personal preference. Poor file names create like actual technical problems, especially when files are shared or moved between different systems.

    1. eLife Assessment

      This is a well-executed intrathecal MRI tracer study that provides valuable early in vivo evidence for CSF drainage into human skull bone marrow and explores clinically relevant associations using robust imaging methodology and regional analyses. However, the evidence supporting the interpretation of early (4 h) tracer signal as impaired clearance is incomplete, and appears difficult to reconcile with established CSF tracer kinetics. They also note that the reported links to sleep and cognitive performance are weakened by reliance on subjective, retrospective questionnaires rather than objective physiological measurements.

    2. Reviewer #1 (Public review):

      Summary:

      This manuscript examines the passage of an intrathecal CSF tracer into skull bone marrow, cortex, and venous compartments using serial MRI at multiple time points. The study builds on recent anatomical and imaging work suggesting direct communication between CSF spaces and bone marrow in the skull. It extends these observations to a larger, clinically heterogeneous human cohort. The imaging methodology is carefully executed, and the dataset is rich. The findings are potentially important for understanding CSF drainage pathways and their associations with inflammation, sleep quality, and cognition. However, key aspects of the interpretation - particularly regarding tracer kinetics and the definition of "clearance" - require clarification and, in my view, reconsideration.

      Strengths:

      (1) The study employs a well-established intrathecal contrast-enhanced MRI approach with multiple post-injection time points, enabling the assessment of regional tracer dynamics.

      (2) The analysis of skull bone marrow in distinct anatomical regions (near the superior sagittal sinus, lateral fissure, and cisterna magna) is novel and informative.

      (3) The cohort size is relatively large for an intrathecal tracer study in humans, and the authors make commendable efforts to relate imaging findings to clinical variables such as inflammation, sleep quality, and cognitive performance.

      (4) The manuscript is clearly written, the figures are informative, and the discussion is well grounded in recent anatomical and experimental literature on skull-meningeal connections.

      Weaknesses:

      The central interpretation that a higher percentage increase in skull bone marrow tracer signal at 4.5 hours reflects reduced clearance is not convincingly justified. Based on the existing CSF tracer literature, the 4-6 hour time window is generally considered an enrichment or inflow phase rather than a clearance phase. Later time points (15 and 39 hours) are more likely to reflect clearance or washout. An alternative interpretation - that a higher signal at 4.5 hours reflects more pronounced tracer entry - should be considered and discussed.

      Relatedly, the manuscript lacks a clear conceptual separation between tracer enrichment and clearance phases across time points. If 4.5 hours is intended to represent clearance, this assumption requires more vigorous justification and alignment with prior work.

      CSF passage via the nasal/olfactory pathway is insufficiently discussed. Previous human imaging studies have questioned the importance of peri-olfactory CSF clearance, yet the present findings suggest delayed enrichment in the nasal turbinates. This discrepancy should be explicitly addressed, including a discussion of potential methodological limitations (e.g., timing of acquisitions, ROI definition, or sensitivity to slow drainage pathways).

      More generally, given the descriptive nature of the study and the limited temporal sampling, some conclusions regarding directionality and efficiency of "drainage" may be overstated and would benefit from more cautious framing.

    3. Reviewer #2 (Public review):

      Summary

      Zhou et al. utilize longitudinal, intrathecal contrast-enhanced MRI to investigate a novel physiological pathway: the drainage of cerebrospinal fluid (CSF) into the human skull bone marrow. By mapping tracer enrichment across 87 patients at multiple time points, the authors identify regional variations in drainage speed and link these dynamics to systemic factors like aging, hypertension, and diabetes. Most notably, the study suggests that this drainage function serves as a significant mediator between sleep quality and cognitive performance.

      Strengths

      (1) The study provides a significant transition from murine models to human subjects, showing that CSF-to-marrow communication is a broader phenomenon in clinical cohorts.

      (2) The use of four imaging time points (0h to 39h) allows for a precise characterization of tracer kinetics, revealing that the parietal region near the superior sagittal sinus (SSS) is a rapid exit route.

      (3) The statistical finding that skull bone marrow drainage accounts for approximately 38% of the link between sleep and cognition provides a provocative new target for neurodegenerative research.

      Weaknesses

      (1) Figure 1: The figure relies on a single representative brain to illustrate a process that likely varies significantly across different skull anatomies and disease states. In the provided grayscale MRI scans, the tracer enrichment is essentially imperceptible to the naked eye. Without heatmaps or digital subtraction maps (Post-injection minus Baseline) for the entire cohort, it is difficult to substantiate the quantitative "percentage change" data visually.

      Reliance on a single, manually placed circular Region of Interest (ROI) is susceptible to sampling bias. A more robust approach would involve averaging multiple ROIs per region (multi-sampling) to ensure the signal is representative of the whole marrow compartment.

      (2) Methodological Rigor of Sleep Analysis: The study relies exclusively on the self-reported Pittsburgh Sleep Quality Index (PSQI), which is retrospective and highly prone to recall bias, particularly in a cohort with cognitive impairment. There is no objective verification of sleep (e.g., actigraphy or polysomnography). Since waste clearance is physiologically tied to specific stages, such as Slow-Wave Sleep, subjective scores cannot determine whether drainage is linked to sleep physiology or reflects a higher general disease burden. The MRI captures an acute state during hospitalization, whereas the sleep quality reported covers the month preceding admission. This mismatch complicates the claim that the current drainage function directly reflects historical sleep quality.

      Appraisal and Impact

      The authors demonstrate the feasibility of monitoring CSF-to-skull marrow drainage in humans. However, the strength of the associations with sleep and cognition is currently attenuated by a lack of visual "proof" in the raw data and a reliance on subjective behavioral metrics. If these technical gaps are explicitly addressed through the use of population heatmaps and more rigorous multi-ROI sampling, this work will significantly advance our understanding of the brain's waste-clearance systems and their role in systemic health.

    4. Reviewer #3 (Public review):

      Summary:

      In this study, the authors injected a contrast agent into patients and followed the induced signal change with MRI. Doing so, they observed cerebrospinal fluid (CSF) drainage whose magnitude and dynamics varied by anatomical location and scaled with a range of cognitive and socio-demographic metrics, including sleep scores and sex.

      Strengths:

      I would first like to stress that I am not a specialist in the topic of that paper; so my comments should be taken with a grain of salt, and feedback from the other reviewers should also be carefully considered.

      I found the text concise and the figures straightforward to understand. Although they are manually defined, the authors compared drainage across different anatomical locations, which is a positive feature. Albeit purely correlative, the attempt to connect these otherwise 'peripheral' measures to cognitive variables is quite interesting. I also particularly liked the last paragraph of the discussion, which listed the main limitations of the study.

      Weaknesses:

      In the paragraph starting at line 446, the authors interpret poor sleep quality as being a cause and a consequence of impaired CSF clearance, but their approach is purely correlational. In other words, a third variable could be driving both of these parameters (correct?), thereby explaining their correlation. Later, they also proposed that therapeutically altering CSF clearance could improve cognitive symptoms, but, again, if there's a hidden cause of the correlation, that does not seem like a valid possibility. I believe there were other instances of this sort of inferential problem in the Discussion. It seems essential, particularly in clinical research, to precisely identify what the available evidence supports (correlation) and what is speculation (causation).

      Assuming I did not miss it, the approach for testing and reporting correlations is not specified. In particular, the authors report correlation with CSF drainage and a variety of other metrics. But how many tests did the authors perform? They solely mention that they used the Benjamini-Hochberg method to correct for multiple comparisons. How were the decisions to test for this or that effect determined? Or did they test all the metrics they had? Also, that particular correction method is limited when statistics are negatively correlated. It would be helpful to validate findings with another approach.

      I assume many of the metrics the authors use are also correlated with one another. Is it possible that a single principal component is driving the different correlations they see? Performing dimensionality reduction across available metrics and relating the resulting principal components to CSF drainage would help clarify the forces at play here.

      In their interpretations, the authors claim that the CSF drainage they observe occurs through the bone marrow of the skull. How confident can we be in that claim? Is it that there are no other likely possibilities? It might be an unnecessary question, but given there seems to be no causal intervention (which is fine), and no consideration of alternatives, I am wondering whether this is because other possibilities are improbable or whether they were not adequately considered.

    1. R0:

      Reviewer #1: Title: Probabilistic Forecasting of Monthly Dengue Cases Using Epidemiological and Climate Signals: A BiLSTM–Naive Bayes Model Versus Mechanistic and Count-Model Baselines. Manuscript Number: PGPH-D-25-03170

      This manuscript presents a rigorous comparative study of probabilistic forecasting models for monthly dengue incidence in Freetown, Sierra Leone, covering the period 2015–2025. It evaluates four major model classes—NB-GLM, INGARCH-NB, Renewal-NB, and BiLSTM-NB—under a leakage-safe rolling-origin evaluation. The article demonstrates strong methodological maturity, careful control of data leakage, and thorough probabilistic evaluation using proper scoring rules, interval coverage, sharpness metrics, PIT diagnostics, and Diebold–Mariano tests. The manuscript is generally well-written, technically sound, and addresses an important operational public health problem. It positions itself as one of the few works offering aligned comparisons of mechanistic, statistical, and deep-learning models under realistic constraints for West African dengue surveillance. This article presents a methodologically rigorous comparison of four probabilistic forecasting approaches—NB-GLM, INGARCH-NB, Renewal-NB, and BiLSTM-NB—applied to monthly dengue case data from Freetown, Sierra Leone (2015–2025). The study addresses an important gap by evaluating mechanistic, statistical, and deep-learning models under aligned, leakage-safe conditions. While the work is comprehensive and technically strong, several critical issues affect its accessibility, interpretability, and broader applicability.

      Strengths The study excels in methodological rigor. Its strict leakage safeguards, careful feature-timing rules, and use of expanding-window rolling-origin evaluation significantly strengthen reliability. The inclusion of proper scoring rules, interval coverage, sharpness metrics, PIT histograms, and Diebold–Mariano tests provides a complete probabilistic evaluation rarely seen in dengue forecasting studies. The horizon-specific findings—INGARCH-NB outperforming at 1–2 months and BiLSTM-NB excelling at 3 months—are well supported by aligned comparisons and statistical significance tests. The transparency of data, code, and alignment artefacts enhances reproducibility and credibility. Additionally, the manuscript offers practical guidance for operational forecasting, including a realistic “light climate” input strategy suitable for resource-limited settings.

      Limitations Despite its strengths, the manuscript is heavily technical, with extensive mathematical exposition in the main text. This may limit accessibility for public-health practitioners who are likely part of the target audience. The mechanistic renewal model is presented as a baseline but is arguably underspecified; the use of a short, fixed 3-month kernel may not realistically capture dengue’s generation interval dynamics, likely contributing to its poor performance. This limits the interpretive value of the mechanistic comparison. This limitation should be addressed. The study’s climate treatment, while intentionally conservative, may underexploit important environmental drivers. Although justified operationally, this constraint restricts exploration of potentially meaningful lag structures or seasonal climate anomalies. The analysis is limited to a single city and monthly data frequency, raising questions about generalizability across geographies with different climate patterns and dengue transmission dynamics. Moreover, the monthly temporal resolution may obscure rapid outbreak shifts, possibly disadvantaging mechanistic and hybrid models that rely on finer-grained dynamics. This should be addressed. The manuscript makes a valuable and original contribution to dengue forecasting, offering robust methodological innovations and practical insights for real-time surveillance systems. However, improved clarity, stronger justification for mechanistic assumptions, and expanded discussion of generalizability would enhance its usefulness and scholarly impact. With revisions to improve accessibility and contextual depth, the study is well positioned for publication and for informing operational forecasting practice in similar settings.

      Reviewer #2: 1. What is PIT in the abstract stand for? The authors should avoid using abbreviations in the abstract. 2. The authors should providing some additional analysis, such as experimenting with alternative or longer serial-interval kernels, or simple sensitivity checks (e.g., different window lengths, or, if possible, finer temporal resolution). 3. Please, justifies the small climate feature set, mentioning any exploratory work with larger sets. 4. The authors should add a clearly labelled missing-data handling subsection that specifies: The imputation method, the number of imputed months, and how they were used in training/evaluation, plus any sensitivity. 5. While the architecture, optimization, and calibration steps are described, the process for choosing hyperparameters is not fully audit-ready. 6. I recommend that the authors conduct an additional experiment to demonstrate the generalizability of the proposed model.

    1. eLife Assessment

      This valuable work describes a computational and experimental workflow that turns a moderately stable α-helical bundle into a very stable fold. The authors advance our understanding of α-helix stabilization and provide a convenient framework with implications for the protein design field. The main claims are supported by convincing evidence through sound and well-validated methods, yet further characterization would strengthen specific conclusions for the design of mechanically, thermally, and chemically stable α-helical bundles.

    2. Reviewer #1 (Public review):

      Summary:

      In the work from Qiu et al., a workflow aimed at obtaining the stabilization of a simple small protein against mechanical and chemical stressors is presented.

      Strengths:

      The workflow makes use of state-of-the-art AI-driven structure generation and couples it with more classical computational and experimental characterizations in order to measure its efficacy. The work is well presented, and the results are thorough and convincing.

      Weaknesses:

      I will comment mostly on the MD results due to my expertise.

      The Methods description is quite precise, but is missing some important details:

      (1) Version of GROMACS used.

      (2) The barostat used.

      (3) pH at which the system is simulated.

      (4) The pulling is quite fast (but maybe it is not a problem)

      (5) What was the value for the harmonic restraint potential? 1000 is mentioned for the pulling potential, but it is not clear if the same value is used for the restraint, too, during pulling.

      (6) The box dimensions.

      From this last point, a possible criticism arises: Do the unfolded proteins really still stay far enough away from themselves to not influence the result? This might not be the major influence, but for correctness, I would indicate the dimensions of the box in all directions and plot the minimum distance of the protein from copies of itself across the boundary conditions over time.

      Additionally, no time series are shown for the equilibration phases (e.g., RMSD evolution over time), which would empower the reader to judge the equilibration of the system before either steered MD or annealing MD is performed.

    3. Reviewer #2 (Public review):

      Summary:

      Qiu, Jun et. al., developed and validated a computational pipeline aimed at stabilizing α-helical bundles into very stable folds. The computational pipeline is a hierarchical computational methodology tasked to generate and filter a pool of candidates, ultimately producing a manageable number of high-confidence candidates for experimental evaluation. The pipeline is split into two stages. In stage I, a large pool of candidate designs is generated by RFdiffusion and ProteinMPNN, filtered down by a series of filters (hydropathy score, foldability assessed by ESMFold and AlphaFold). The final set is chosen by running a series of steered MD simulations. This stage reached unfolding forces above 100pN. In stage II, targeted tweaks are introduced - such as salt bridges and metal ion coordination - to further enhance the stability of the α-helical bundle. The constructs undergo validation through a series of biophysical experiments. Thermal stability is assessed by CD, chemical stability by chemical denaturation, and mechanical stability by AFM.

      Strengths:

      A hierarchical computational approach that begins with high-throughput generation of candidates, followed by a series of filters based on specific goal-oriented constraints, is a powerful approach for a rapid exploration of the sequence space. This type of approach breaks down the multi-objective optimization into manageable chunks and has been successfully applied for protein design purposes (e.g., the design of protein binders). Here, the authors nicely demonstrate how this design strategy can be applied to successfully redesign a moderately stable α-helical bundle into an ultrastable fold. This approach is highly modular, allowing the filtering methods to be easily swapped based on the specific optimization goals or the desired level of filtering.

      Weaknesses:

      Assessing the change in stability relative to the WT α-helical bundle is challenging because an additional helix has been introduced, resulting in a comparison between a three-helix bundle and a four-helix bundle. Consequently, the appropriate reference point for comparison is unclear. A more direct and informative approach would have been to redesign the original α-helical bundle of the human spectrin repeat R15, allowing for a more straightforward stability comparison.

      While the authors have shown experimentally that stage II constructs have increased the mechanical stability by AFM, they did not show that these same constructs have increased the thermal and chemical stabilities. Since the effects of salt bridges on stability are highly context dependent (orientation, local environment, exposed vs buried, etc.), it is difficult to assess the magnitude of the effect that this change had on other types of stabilities.

      The three constructs chosen are 60-70% identical to each other, either suggesting overconstrained optimization of the sequence or a physical constraint inherent to designing ultrastable α-helical bundles. It would be interesting to explore these possible design principles further.

      While the use of steered MD is an elegant approach to picking the top N most stable designs, its computational cost may become prohibitive as the number of designs increases or as the protein size grows, especially since it requires simulating a water box that can accommodate a fully denatured protein.

    4. Reviewer #3 (Public review):

      Summary:

      Qiu et al. present a hierarchical framework that combines AI and molecular dynamics simulation to design an α-helical protein with enhanced thermal, chemical, and mechanical stability. Strategically, chemical modification by incorporating additional α-helix, site-specific salt bridges, and metal coordination further enhanced the stability. The experimental validation using single-molecule force spectroscopy and CD melting measurements provides fundamental physical chemical insights into the stabilization of α-helices. Together with the group's prior work on super-stable β strands (https://www.nature.com/articles/s41557-025-01998-3), this research provides a comprehensive toolkit for protein stabilization. This framework has broad implications for designing stable proteins capable of functioning under extreme conditions.

      Strengths:

      The study represents a complete framework for stabilizing the fundamental protein elements, α-helices. A key strength of this work is the integration of AI tools with chemical knowledge of protein stability.<br /> The experimental validation in this study is exceptional. The single-molecule AFM analysis provided a high-resolution look at the energy landscape of these designed scaffolds. This approach allows for the direct observation of mechanical unfolding forces (exceeding 200 pN) and the precise contribution of individual chemical modifications to global stability. These measurements offer new, fundamental insights into the physicochemical principles that govern α-helix stabilization.

      Weaknesses:

      (1) The authors report that appending an additional helix increases the overcall stability of the α-helical protein. Could the author provide a more detailed structural explanation for this? Why does the mechanical stability increase as the number of helixes increase? Is there a reported correlation between the number of helices (or the extent of the hydrophobic core) and the stability?

      (2) The author analyzed both thermal stability and mechanical stability. It would be helpful for the author to discuss the relationship between these two parameters in the context of their design. Since thermal melting probes equilibrium stability (ΔG), while mechanical stability probes the unfolding energy barriers along the pulling coordinate.

      (3) While the current study demonstrates a dramatic increase in global stability, the analysis focuses almost exclusively on the unfolding (melting) process. However, thermodynamic stability is a function of both folding (kf) and unfolding (ku) rates. It remains unclear whether the observed ultrastability is primarily driven by a drastic decrease in the unfolding rate (ku) or if the design also maintains or improves the folding rate (kf)?

      (4) The authors chose the spectrin repeat R15 as the starting scaffold for their design. R15 is a well-established model known for its "ultra-fast" folding kinetics, with folding rates (kf ~105s), near three orders of magnitude faster than its homologues like R17 (Scott et.al., Journal of molecular biology 344.1 (2004): 195-205). Does the newly designed protein, with its additional fourth helix and site-specific chemical modifications, retain the exceptionally high folding rate of the parent R15?

    1. You can walk up Mount Fuji, or you can run up (the Mount Fuji Climbing Race has been held every year since 1948), or you can roll up in a wheelchair (first done in 1978), or you can wait to go up until you’re really old (as old as Ichijiro “Super Grandpa” Araya, who climbed it when he was 100, or Hulda “Grandma Whitney” Crooks, who did it at 91). Or you can ride a horse

      I enjoy this part because it showcases that despite the implied negatives of tourism, the accessibility of Mt. Fuji creates an environment where there are several ways to successfully climb the mountain. Someone does not have to be in peak physical condition to make the trek.

    2. After I paid $2, he branded my stick with his symbol — some Japanese characters and a drawing of Fuji.

      The author's inclusion of the monetary price even in common rituals on the mountain shows how deeply embedded the tourism culture is within a hike that used to be about religion.

    3. , about how tradition in both countries is melting away.

      The use of the word melting ties the piece together well as is fits with the previous weather mentions. For example, the author's highlight of both the extreme heatwave and two typhoons connect to the connotation of the description melting.

    4. homely ninth-century building

      The emphasis on 9th century building adds to the foreign feeling. A general example of an old American building are colonial style buildings from the 17th century, which is nearly 800 years later. Additionally, the dedication to the Chinese scholar who died in 852 AD, implies the existence of preserved records from that time period which feels alien to me.

    5. except for a few damp kimonos flapping on balcony clotheslines.

      I like this visual. Having wet clothes drying on a line outside is something everyone recognizes, whether it is something they grew up doing, or they simply saw in multiple pieces of media. Thus it is very easy to picture that scene in your head. At the same time, the author manages to make it hint at the location by specifying that kimonos are drying as opposed to just leaving it at a general statement of clothes are drying.

    1. Neurodiversity suggests that these disabilities are a natural variation in brain differences and that the workplace should adapt to them
      1. How can workplaces better adapt policies, expectations, and environments to support neurodivergent employees rather than expecting them to conform to traditional norms?
        1. What responsibility do employers have to recognize neurodiversity as a strength while still addressing productivity and performance standards?
    2. Mental disorders cause distress or disability in social, work, or family activities

      Connection: Mental disorders causing distress or disability really shows up for me in how hard it can be to balance school and staying physically active at the same time. When my mental health is struggling, even things I want to do—like going to class prepared, studying, or working out—start to feel overwhelming. Some days my body feels heavy, my motivation drops, and it becomes harder to stay consistent, even though I know movement usually helps my mental health.

      This connection helps me see that these challenges aren’t about laziness or lack of discipline, but about how mental health directly affects functioning. Trying to meet academic expectations while pushing myself to stay active can create a lot of internal pressure, especially when I feel like I should be able to “handle it all.” Recognizing this helps me give myself more grace and reminds me that needing balance, flexibility, and rest is part of taking care of both my mental and physical well-being.

    1. Among ordinary Javanese, traditional animistic practices of spirit worship coexisted easily with a tolerant and accommodating Islam, while merchants often embraced a more orthodox version of the religion in line with Middle Eastern traditions.

      In this quote it shows how Islam adapted, similarly to Christianity, differently across groups of people instead of a uniform belief system. This shows how they were able to blend everyday religious practice with other older traditions. Again showing how religion was shaped by local culture or things like social context, as it highlights the flexibility Islam had as it spread similarly to Christianity.

    2. Central to an emerging Mexican Christianity were the saints who closely paralleled the functions of precolonial gods

      This sentece shows how Christianity in Mexico became and adaptation of fitting existing religious frameworks in the area. The blending of beleifs as stated in one of my previous highlights the reshaping of a foreign religion to reflect their traditions, wihtout outright adopting Christianity. This way they were still able to perserve spiritual meanings of their own society.

    3. “The world has turned about,” one member declared, “and this time God and the Spaniards [will be] defeated and all the Spaniards killed and their cities drowned … so that there will remain no memory of them.”

      This included quote is really striking and comparative to what we were talking about in class, with how indigenous people reacted to the conquest of Christian reform. Leading to ideological developments like apocalyptic ideas or incorporation of Christian God into their own beliefs. As stated in class they sometimes took on these reformations as a way of furthering their own colonies or interests.

    4. Although the Reformation was profoundly religious, it encouraged a skeptical attitude toward authority and tradition, for it had, after all, successfully challenged the immense prestige and power of the established Church

      What I find interesting with this quote is, it shows that a religious movement like this had broader implications like the skepticism toward authority. As the reformation challenged the Catholic Church's power, it established the inability of perfection within all higher ranking institutions. This I see as paving the way for independent thinking, which challenged the ongoing traditions or authority within society.

    5. Chinese elites took interest in some of aspects of it. Imperial officials, for instance, were impressed by European techniques for predicting eclipses, reforming the calendar, and making accurate maps of the empire. European mathematics was also of particular interest to Chinese scholars who were exploring the history of Chinese mathematics. To convince their skeptical colleagues that the barbarian Europeans had something to offer in this field

      How did Chinese elites selective acceptance of European scientific knowledge reflects broader attitudes toward cultural superiority?

    6. The age of the Enlightenment, however, also witnessed a reaction against too much reliance on human reason. Jean-Jacques Rousseau (1712–1778) minimized the importance of book learning for the education of children and prescribed instead an immersion in nature, which taught self-reliance and generosity rather than the greed and envy fostered by “civilization.” T

      a shift from the Enlightenment faith in pure reason and logic toward ideas that emphasize emotion and nature. Rousseau and the Romantic movement challenged the belief that rational progress alone could improve society

    7. nternally, the Christian world was seriously divided between the Roman Catholics of Western and Central Europe and the Eastern Orthodox of Eastern Europe and Russia. Externally, it was very much on the defensive against an expansive Islam.

      deep internal divisors weaken unity between Western Catholic and Eastern Orthodox regions. At the same time, the Christendom faced military, political, and religious pressure from the expanding Islamic world.

    8. China during the Ming and Qing dynasties continued to operate broadly within a Confucian framework, enriched now by the insights of Buddhism and Daoism to generate a system of thought called Neo-Confucianism. Chinese Ming dynasty rulers, in their aversion to the despised Mongols, embraced and actively supported this native Confucian tradition, whereas the foreign Qing rulers did so to woo Chinese intellectuals to support the new dynasty. Within this context, a considerable amount of controversy, debate, and new thinking emerged during the early modern era.

      Shows how Confucianism and Neo-Confucianism provided continuity in Chinese political and intellectual life while also allowing adaptation under different rulers

    9. The Wahhabi movement (see Map 15.3) took a new turn in the 1740s when it received the political backing of Muhammad Ibn Saud, a local ruler who found al-Wahhab’s ideas compelling. With Ibn Saud’s support, the religious movement became an expansive state in central Arabia. Within that state, offending tombs were razed; “idols” were eliminate

      shows how religious movement gained political power and became the foundation of a state, demonstrating the close alliance between religious ideology and political authority in the islamic world

    10. In the Protestant idea that all vocations were of equal merit, middle-class urban dwellers found a new religious legitimacy for their growing role in society. For common people, who were offended by the corruption and luxurious living of some churchmen, the new religious ideas served to express their opposition to the entire social order, particularly in a series of German peasant revolts in the 1520s.

      Protestant Reformation had broad social consequences beyond theology. It reshaped attitudes toward work and social status, and helped legitimized the rising middle class. However, it fueled unrest among peasants.

    11. As if these were not troubles enough, in the early sixteenth century the Protestant Reformation shattered the unity of Roman Catholic Christianity, which for the previous 1,000 years had provided the cultural and organizational foundation of an emerging Western European civilization.

      After the reformation, it led to the rise of multiple Protestant denominations, prolonged religious conflicts, and shifts in political power away from the church

    12. What they offered, in short, was connection to the wider, prestigious, prosperous world of Islam. Islamization extended modestly even to the Americas, particularly in Brazil, where Muslims led a number of slave revolts in the early nineteenth century.

      Began with slaves brought over from the west coast of Africa in regards to Brazil. Islam was spread by traders, merchants, and through warfare just as Christianity was. After muhammeds death, armies conquered areas in the Byzantine and Sassanid empires.

    13. The radical implication of this view was that the heavens and the earth, long regarded as separate and distinct spheres, were not so different after all, for the motion of a cannonball or the falling of an apple obeyed the same natural laws that governed the orbiting planets.

      Sir Isaac Newton unified early modern astronomy and physics by formulating the law of motion, which really took over science until the 20th century. What he thought and discovered was the same natural law that govern the heavens and the earth, linking them like falling apples and orbiting planets.

    14. Missionaries had their greatest success in Spanish America and in the Philippines, areas that shared two critical elements beyond their colonization by Spain

      The lasting success of these missionaries is still shown in present day Philippines. With nearly 90% of the country apart of the Christian faith, it's the largest Christian nation on the Asian continent. The vast majority of these Christians are Roman Catholic, just like the Spaniards who settled in Philippines in the 1500's https://blogs.loc.gov/international-collections/2018/07/catholicism-in-the-philippines-during-the-spanish-colonial-period-1521-1898/

    15. “a core of readings and lectures that were basically scientific,

      This goes to show that Europe developed legally independent institutions, especially universities, scholars gained greater freedom from church and state control. The independence allowed the study of nature to separate from philosophy and theology. This allowed universities and later scientific academic became key centers for producing scientific knowledge.

    16. Earlier conquerors had made no attempt to eradicate local deities and religious practices. The flexibility and inclusiveness of Mesoamerican and Andean religions had made it possible for subject people to accommodate the gods of their new rulers while maintaining their own traditions. But Europeans were different. They claimed an exclusive religious truth and sought the utter destruction of local gods and everything associated with them

      The Spaniard inflexibility to local religion makes sense, as Catholicism during this time was very much “Respect authority! Don’t question!” It’s clear that these religious traits appeared into the demeanors of the Spanish missionaries in Mesoamerica.

    17. he culmination of European religious conflict took shape in the Thirty Years’ War (1618–1648), a Catholic–Protestant struggle that began in the Holy Roman Empire but eventually engulfed most of Europe.

      A war that I have not learned much about. This is considered one of the first modern wars due to its widespread violence and impact, large armies, and economic impact. It shows how Christianity, like other religions, have internal conflict and yet still remain relatively stable. This war also gave birth to Switzerland and the Dutch Republic after its conclusion.

    18. into a variety of competing Protestant churches — Lutheran, Calvinist, Anglican, Quaker, Anabaptist — many of which subsequently subdivided, producing a bewildering array of Protestant denominations.

      In all my years, I haven't learned much about the Quaker community and have never heard of Anabaptist! After looking into more, it was created in Switzerland. It shows that even with numerous denominations in numerous areas of the world, Christianity still has a very strong presence and hold on Europe and other areas.

    19. Reformation thinking spread quickly both within and beyond Germany, thanks in large measure to the recent invention of the printing press.

      The printing press was a big factor in the split of the church. I think that without it, the Catholic Church may have been able to fight back quicker against the ideas presented by Martin Luther.

    20. though far more modestly, in Siberia, China, Japan, and India. A cultural tradition largely limited to Europe in 1500 was now becoming a genuine world religion,

      Brought to Japan by a Spanish priest named Francis Xavier in the 1500's, and to China in the 7th century, one could argue that it already was a genuine world religion being in the Middle East, Africa, and then Europe.

    21. They derived from various West African traditions and featured drumming, ritual dancing, animal sacrifice, and spirit possession. Over time, they incorporated Christian beliefs and practices such as church attendance, the search for salvation, and the use of candles and crucifixes and often identified their various spirits or deities with Catholic saints.

      I find it very interesting how they were able to incorporate Christianity into ancient traditions that they had been practicing for generations. It must have been challenging for them to make such a drastic transition.

    22. In short, it was a more highly fragmented but also a renewed and revitalized Christianity that established itself around the world in the several centuries after 1500 (see Map 15.2).

      I think it is very interesting to see all the different forms of Christianity across the world. They all worshiped the same God just a different way.

    23. Renewed efforts to foster individual spirituality and personal piety were accompanied by crackdowns on dissidents and the censorship of books.

      I thought it was interesting that the Catholic Church sought out to “correct” the corruption within the church, but increased censorship.

      Apparently, a big part of this censorship was banning a Bible in 1546 that contained commentary which “could be read as critical authority.”

      https://hob.gseis.ucla.edu/HoBCoursebook_Ch_6.html

    24. It was a genuinely scientific approach to knowledge, but one that was applied more to the study of the past and to practical applications of learning in medicine, farming, and industry than to fields like astronomy, physics, or anatomy, which were more prominent in Europe

      It is interesting that we still make distinctions between the advancements "western" and "eastern" science, technology, and medicine when both "fields" emerged at a similar time, but used for different purposes.

    25. These new scientists no longer relied on the external authority of the Bible, the Church, the speculations of ancient philosophers, or the received wisdom of cultural tradition. For them, knowledge was acquired through rational inquiry based on evidence, the product of human minds alone.

      This is such an interesting definition of science. The idea that knowledge is acquired through "the product of human minds alone" is a definition I would associate with philosophy, religion, and theology more so than science.

    26. Continued Islamization was not usually the product of conquering armies and expanding empires. It depended instead on wandering Muslim holy men or Sufis, Islamic scholars, and itinerant traders, none of whom posed a threat to local rulers.

      I wonder if the gentler method of introducing religion that Islam used was more effective for spreading the religion to more people than that of Christianity and Catholicism. Does allowing your beliefs to adjust with the culture strengthen or weaken the collective faith of the people?

    27. they set about correcting the abuses and corruption that had stimulated the Protestant movement by placing a new emphasis on the education of priests and their supervision by bishops.

      It is interesting to see how the problems Martin Luther had with the Catholic Church, excluding criticisms of doctrines, were, in a roundabout way, fixed by his ninety-five theses. By unintentionally creating a rift in Christianity, it conversely restrengthened the Catholic Church and corrected the problems that had arisen.

    28. many Jesuits learned Chinese, became thoroughly acquainted with classical Confucian texts, and dressed like Chinese scholars.

      I think this is quite interesting. Obviously China was very powerful and had many strong thoughts and political stance. So it was very different from other countries and nations interacting with Christianity. the Jesuits had to convert to learn the culture of Chinese. They did this by learning the language, wearing the clothes, and getting "acquainted" with their text. They basically just exchanged ideas and thoughts. Then that was how they were aloud to spear their religion with respect and honor.

    29. God has appointed the [printing] Press to preach, whose voice the pope is never able to stop,

      The reformation and the spread of religion boomed over the past years. The main help of this fact spreading religion was the printing press and how it would transform texts to different languages. This is what English protestant said was the word or what "God has appointed" to help give the voice of religion and God voice through the Pope. it most boomed through German but it also spread through France, Switzerland, and England.

    30. His teachings and those of subsequent gurus also generally ignored caste distinctions and untouchability and ended the seclusion of women, while proclaiming the “brotherhood of all mankind” as well as the essential equality of men and women.

      This stood out to me because it is the first place I have read where they are saying women have the same equal chances as men in this religion.

    31. The decisive conquest of the Aztec and Inca empires and all that followed from it — disease, population collapse, loss of land to Europeans, forced labor, resettlement — created a setting in which the religion of the victors took hold in Spanish American colonies.

      This id interesting to me because the last chapter spoke about how the Europeans brought over diseases and wiped out civilizations and had majority control.

    32. Christianity motivated European political and economic expansion and also benefited from it.

      I find it interesting that though all of these other religions were growing and expanding, Christianity seems to be the one that motivated and influenced most of everything.

    33. Although large numbers of women were attracted to Protestantism, Reformation teachings and practices did not offer them a substantially greater role in the Church or society. Protestant opposition to celibacy and monastic life closed the convents, which had offered some women an alternative to marriage. Nor were Protestants (except the Quakers) any more willing than Catholics to offer women an official role within their churches.

      why were the convents closed and where did the women who were living in them end up? We they allowed to break their oath and get married or were they to abide by the rules even when they had no place to be?

    34. When applied to the affairs of human society, scientific ways of thinking challenged ancient social hierarchies and political systems and played a role in the revolutionary upheavals of the modern era.

      I've never really considered how the cultural changes that came from the Scientific Revolution actually could've potentially led to difference in class such as hierarchies and political systems. I've only really thought of it as a cultural change and never really considered how the changes in culture can impact government decisions.

    35. Common African forms of religious revelation — divination, dream interpretation, visions, spirit possession — found a place in the Africanized versions of Christianity that emerged in the New World.

      I think it's interesting that Africa had a lot of strong Christian empires in ancient times, I always have viewed Africa as a continent that has been a predominantly Islamic continent with many different countries so the idea of unified Christian empires is fascinating to me.

    36. Europeans saw their political and military success as a demonstration of the power of the Christian God.

      Even though I am religious and Christian, I think it's interesting to learn throughout history how Christian beliefs have impacted the way that empires view everything that they are doing, even if it maybe morally wrong. God says not to kill, but here their success in wars shows them how powerful their God is.

    37. In 1500, the world of Christendom stretched from the Iberian Peninsula in the west to Russia in the east, with small and beleaguered communities of various kinds in Egypt, Ethiopia, southern India, and Central Asia.

      I think it's fascinating to see how Christianity was able to spread so fast from the Middle East all the way to Europe and Asia and how long it was able to retain it's power in those areas.

    1. Which apps help you meet the expectations of college? Will you be able to meet the expectations of being responsible for your schedule and assignments?

      I already use on of these apps and I'm willing to try out more to see which one best fits my needs & learning style.

    2. Motivation. Being able to stay motivated while studying and balancing all you have to do in your classes will be important for meeting the rest of the components. Deliberate, focused effort. Taking ownership of learning will hinge on the effort that you put into the work. Because most learning in college will take place outside of the classroom, you will need determination to get the work done. And there will be times that the work will be challenging and maybe even boring, but finding a way to get through it when it is not exciting will pay in the long run. Time and task management. You will learn more about strategies for managing your time and the tasks of college in a later chapter, but without the ability to control your calendar, it will be difficult to block out the time to study. Progress tracking. A commitment to learning must include monitoring your learning, knowing not only what you have completed (this is where a good time management strategy can help you track your tasks), but also the quality of the work you have done.

      Taking ownership of your learning is one of the many keys to success.

    3. Intellectual adjustment. Experiencing an intellectual “a-ha!” moment is one of the most rewarding parts of college, right up there with moving across the graduation stage with a degree in hand. Prepare to be surprised when you stumble across a fascinating subject or find that a class discussion changes your life. At the very least, through your academic work, you will learn to think differently about the world around you and your place in it.

      This is one of my favorite parts of learning, having that "a-ha!" moment. Having a positive life & mind-changing experience and being able to share that with others is a blessing.

    4. There is some debate as to whether a college degree is needed to land a job, and there are certainly jobs that you can get without a college degree. However, there are many reasons that a college degree can give you an edge in the job market.

      Living proof here. I've worked many many jobs without a college degree and also missed out on promotional opportunities due to lack of further education.

    1. Stop creating videos that get views but no clients. These video concepts are designed to position you as the go-to expert while attracting your ideal clients—senior managers and directors ready to invest in their next-level leadership.

      How best do you suggest I create these? I have done DTC and they don't convert well...probably because they look amature.

      Any AI strategies to make them high quality while also being time effective?

    1. An annotated bibliography is essentially a list of the sources you find relevant, with all of the necessary bibliographic information (i.e. author, title, publisher, year, etc.), followed by information about the content of the source. Annotated bibliographies can be used for a variety of purposes.  They may demonstrate the quality of your research, or provide readers additional background information.Â

      I never knew that an annotated bibliography can demonstrate quality in my research. To be honest, before this class I didn't know what a bibliography was so I am glad I got to learn about it.

    1. Start the process of secondary research as soon as you can!  Certainly, it’s difficult to begin secondary research before you’ve been to your site, or written any fieldnotes—how would you know what to look for?  But, the fact is that since this process requires so much time, you do want to begin sooner, rather than later, and make sure that you don’t leave all of this work to one weekend or, worse yet, to one night

      Why is it difficult to do your research on your secondary source without writing any field notes? I am still confused on what exactly we can research. I was thinking of doing something related to the feeling people get when watching scary movies, but I wonder how it can relate to culture.

    1. For discussion: Is the Internet responsible for most of our wasted work time? Read through this article. What do you think? https://openstax.org/l/whowastestime

      I read this article and what I took from it was that, yes, the internet is the leading cause for distractions at work, mostly with then millennial generation.

    1. Finally, in one word, their Ambition and Avarice, than which the heart of Man never entertained greater, and the vast Wealth of those Regions;

      Las Casas point out that greed and disrespect drove the Spanish to there action against the natives.

    2. the Spaniards by their barbarous and execrable Actions have absolutely depopulated Ten Kingdoms,

      This highlights the destruction and the depopulation caused by the Spanish, emphasizing the cruelty of colonization.

    3. of Three Millions of Persons, which lived in Hispaniola itself, there is at present but the inconsiderable remnant of scarce Three Hundred.

      The number show the massive scale of death caused by Spanish actions, almost an entire population wiped out.

    4. Now this infinite multitude of Men are by the Creation of God innocently simple, altogether void of and averse to all manner of Craft, Subtlety and Malice, and most Obedient and Loyal Subjects to their Native Sovereigns

      Las Casas emphasizes how peaceful and loyal the Native Americans were showing that they’re suffering was undeserved.

    5. The Sun had treacherously murdered our people on the twentieth day after the captain left for the coast.

      Describing the killings as treachery shows the betrayal felt by the Aztecs.

    6. lords, that is enough! What are you doing? These people are not carrying shields or macanas

      Montezuma‘s protest emphasizes how unfair and brutal the Spanish actions were.

    7. The Spaniards attacked the musicians first, slashing at their hands and faces until they had killed all of them.

      The attack on the musicians highlights of the extreme violence of the conquest.

    8. I have seen you at last! I have met you face to face! I was in agony for five days, for ten days, with my eyes fixed on the Region of the Mystery.

      Montezuma‘s awe shows the impact the Spaniards had on the Aztecs.

    9. whereat the Skrellings were frightened, and ran away with their packs, wherein were gray furs, sables, and all kinds of pelts. They fled towards Karlsefni’s dwelling and sought to effect an entrance into the house; but Karlsefni caused the doors to be defended [against them].

      Encountering the Skrelling must have been tense and shows how uncertain life in a new land can be.

    10. They afterward determined to establish themselves there for the winter, and they accordingly built a large house.

      I think building a proper shelter, shows how serious they were about surviving the winter.

    11. They sailed up to the land, and cast anchor, and launched a boat, and went ashore, and saw no grass there. Great ice mountains lay inland back from the sea,

      The harsh landscape must have made exploring really challenging for the people.

    12. The entire region had been emptied by the diseases which had accompanied De Soto and his men, and had returned to wilderness

      Disease from the Spanish wiped out most of the people in the south, even before European settled there. This shows how big and impact disease had on native communities.

    13. To defend themselves, Spanish colonialists accused the Aztec and Inca Empires of atrocities of their own and emphasized the support conquistadors received from indigenous rivals of these empires.

      It’s interesting how history can be viewed differently depending on who is telling the story.

    14. Along the Mississippi River and its tributaries, indigenous people lived mostly in villages but occasionally gathered into cities and built mounds like those found at Cahokia.

      This shows that Native American societies were organized and capable of building large cities, not just small villages.

    15. To run their complex society, the Maya developed a written language based on 800 hieroglyphs that represented different syllables.

      This show that the Maya were very advanced because they created their own writing system to manage their society.

    1. It can be relevant and powerful to use popular cultural source material, but you need to be conscious of how and how you would use it.  Some of these texts, such as documentaries and websites, can often provide a great deal of information about a subject or project.  Statistics and facts can be powerful, but they are also often beside the point since the most important data is the data that you will collect.

      This is something I will definitely take note of. By making sure my sources are relevant I can fully utilize them and make sure that they fit and make sense in my paper. I wonder how I can effectively use my secondary source to strengthen my primary source.

    1. Not until around 500,000 years ago did “new species of deer, bovid, rhino, and horse appear” 8 in Europe. Around the same time, the cheetah, saber-tooth tiger, and dirk-tooth cat declined in the region, making more carcasses from the aforementioned species available to hominid foragers.

      I often wonder how early hominids figured out which animals were safe to eat and which were not, as well as how different animals were hunted. While much of this knowledge likely came from trial and error, how was it communicated among group members to help everyone avoid danger? How did they learn to hunt animals like rhinos? A rhino is massive and certainly not a friendly creature. These hominids must have learned through deliberate, calculated attempts rather than random attacks. Of course, scavenging from already deceased animals was an option, but I imagine their curiosity and ingenuity eventually led them taking on such formidable beasts as a challenge. I find that idea incredibly fascinating.

    1. The key is to find which system works best for you.

      There is no one-size-fits-all learning system, everyone learns differently and that's the beauty of it all. There are so many learning strategies this book reviews, one or many are bound to fit.

    1. TCP speed limits come from two independent sources that are combined to determine the final effective speed: Source 1: Installation Safety Parameters (user-configured in UR Polyscope) Source 2: Robot/Base/Payload Configuration (calculated by KinematicConstraintsFactory) The final speed is the minimum of both sources plus any user runtime constraints.

      à mettre à jour pour les trois sources

    2. Unlike TCP speed, which can be set via the maxTcpSpeed parameter in safety.conf files

      ça donne l'impression qu'on peut éditer ces fichiers. Mais ils sont protégé par un checksum et il faut modifier les Safety settings dans le UI.

    1. So is this simple substitution Cipher uncrackable? Well, let's wait a minute here. It's not, for example, one of the pieces of information we can use in analyzing simple substitution is the letter frequencies of the English language or any language If you looked at a histogram of English letter frequencies, you'd see that e is the most frequent letter just above 12 percent, T is the second most frequent at somewhere around nine percent, a is very frequent at more than eight percent and so forth, so you would see this familiar pattern in any text that you encrypted. For example, if you encrypted it using the simple substitution Cipher, you might get this pattern, but you'd still see a peak where the letter that was substituted for e occurs. And maybe this is the peak for T, and maybe this is the peak for a. By analyzing those peaks and valleys, you can determine how the message was encrypted, can figure out the key. But, wait a minute… frequency analysis works!<br /> Slide 21, 22 chart

      E.G. If you sorted by frequencies. Now, you can see this very clearly if you sort the two histograms, they're practically identical, and that's what lets the analyst with some effort, of course, figure out the key and break the message so you can break simple substitution cipher using frequency analysis. That makes Eve happy, Alice and Bob are not very happy about that. Eve wins … you don’t need brute force. Frequency analysis will break simple substitution. slide 23, 24 chart

    2. The last question how many keys would you have to try in order to perform a Brute Force attack on simple substitution? Let's look at that question again. The answer is an enormous number 26 factorial Keys. That's the number of ways you could shuffle the plain text alphabet of 26 letters. So that's way too hard. And that fact makes Alice and Bob happy and Eve not very happy.

    3. Simple Substitution Cipher

      Key: Randomly mix up the plain alphabet to get a cipher alphabet.

      So the key basically tells what to do with getting a cipher alphabet to be able to encrypt either the key consisting of a number for shifting each letter or a keyword to put in beginning as a way of scrambling

      Algorithm: Substitute plain letters with shuffled letters.

      This tells how to encrypt the message using to cipher alphabet

    4. Well, let's look at a slightly more complex Cipher, another example, of what's called a simple substitution Cipher, which means generally that you randomly mix up the alphabet to get a cipher alphabet and then you substitute plain letters with shuffled letters, so we're gonna use a little trick here that we're going to have a keyword that'll help us (one way to) construct our Cipher alphabet, which is our actual key by putting the keyword at the beginning and then putting all the letters that aren't in the word, zebrafish following it in alphabetical order. Now, obviously, there are lots of ways we could do this, but that gives us an easy way to transmit the key between Alice and Bob. Alice just tells Bob zebrafish and he knows how to construct this alphabet. But if they wanted, Alice could simply create a permutation or shuffling of this alphabet, not using the keyword and pass that along to Bob. Once you've created the cipher alphabet, encrypting and decrypting, in simple substitution cipher works the same as it did in Caesar Cypher. For each letter in the plane text message, you replace it with the corresponding letter from the cipher alphabet. Of course, you have many more possible Cipher alphabets because the alphabets aren't merely a shifting of the original plain alphabet. chart

    5. How do you crack a Caesar Cipher? In other words, how does Eve break these messages? Well, the one question you might ask is, well, how many different keys would Eve have to try to do what's called a Brute Force attack? That means try every possible key. As you've probably discovered, the answer is 25 Keys. That's way too easy, so Eve is very happy about that because she can easily break Caesar Cypher. chart

    1. In the following graphic you will find seven methods that highly successful people use to accomplish this.

      This chart is VERY useful and a daily reminder to ensure I am on the right track with achieving my goals.

    2. likely, if you were successful at all in meeting the goal, it was because you were motivated by earning the approval of someone or receiving a possible reward, or you were concerned with avoiding something adverse that might happen if you did not do what you were told. From an honest perspective in that situation, your real goal was based on something else, not the meeting of the goal set for you. To

      Is that a bad thing though? I mean, in the end, you were successful, no matter the reason. The goal was achieved, end of story. So is it ONLY to be motivated by the goals we set and not have other reasons to achieve a goal?

    3. all the reading, studying, and every assignment you do for that course contributes to the larger goal.

      The small tasks add up and contribute to achieving your goal.

    1. Bibliography plundering:  If you have the experience of finding one “really good” source, look to that source for more answers.  Plunder the Bibliography or Works Cited pages of that volume and go and get the sources that author uses in order to make his/her argument.  Of course it is best to skim the source you have, to read enough of it in order to identify some of the more relevant citations of that author before randomly choosing alternate authors from the Bibliography.

      This is a good strategy that I will definitely use in the future since I had trouble finding more than one good source. Furthermore, I should broaden my key words in order to get better results as well.

    1. Your working environment definitely includes your own state of mind and physical well-being.

      These are not tangible, so not only does the working environment include physical visual things it includes the things we cannot see, but what we feel.

    2. sitting up at a desk or table actually increases your typing speed and reduces the number of mistakes. Even the kind of mouse you use can impact how you work, and using one you are comfortable with can make a big difference.

      I never thought of this as an issue! Makes sense though.

    3. A large part of ensuring that you can complete tasks on time comes to setting up conditions that will allow you to do the work well. Much of this has to do with the environment where you will do your work. This not only includes physical space such as a work area, but other conditions like being free from distractions and your physical well-being and mental attitude.

      I agree, I personally find that where I choose, or am able to complete my work is very important in keeping me focused and lesses distractions.

    4. The moment when you see that something in your plan may become an issue is when to begin readjusting your plan.

      There's always room to readjust a plan. Have a plan A, B, C, D, etc.

    1. the corrupt politician has usurped too much of the power which should be exercised by the people,

      We can relate this to the discussions we had in class about why did inmigrants decide to come to the US. It's interesting how a period with a lot of immigration in the US was because of the government policies and corruption in different countries. But, here in the US, people also face governments with corrupt politicians. But I guess there was a lot less than in other countries.

    1. AMP is a nested multiplex–PCR enrichment chemistry that incorporatesstrand-specific priming and the incorporation of unique molecularidentifiers (UMIs) into sequenced reads16. cfDNA, fragmented periph-eral blood mononuclear cell (PBMC) DNA (60 ng) or fragmented normaltissue DNA (60 ng) was end-repaired phosphorylated and A-tailed. Anadapter containing a universal priming site, the indexes for multiplex-ing and a UMI are then ligated onto DNA. One round of target-specificPCR was performed with a gene-specific primer 1 (GSP1) which ampli-fies against the P5 primer in the adapter, and a further round of PCRwas then performed with a second nested gene-specific primer (GSP2)and a primer that incorporates a second primer containing a P7 index.Strand-specific priming was performed in both rounds of amplificationfacilitating the identification of positive- and negative-strand inputDNA molecules during informatic analyses.

      Match this against Zheng et al. 2014's description of AMP.

    Annotators

    1. In the convict camp in Greene County

      Me encanta esta fotografía porque están bailando en lo que parece una cárcel (convict camp). Me pregunto por qué estarían ellos ahí. Uno está bailando, otro toca la guitarra, y el otro aplaudiendo. Los demos no participan, pero hay un hombre hasta el fondo que los observa (creo que es un guardia). No me puedo imaginar cómo se dio ese momento, pero me gustaría creer que ellos tuvieron esperanza o, al menos, un breve encuentro con la felicidad.

  2. books-scholarsportal-info.ezproxy.library.yorku.ca books-scholarsportal-info.ezproxy.library.yorku.ca
    1. Freedom of belief is only limited by the condition that the belief shall not be prejudicial to peace and order

      This is a good example of how states use law and rhetoric to manage religion, and how religious freedom can be more about appearances than practice

    2. while Ameri-can diplomats disingenuously regarded Japan’s quest for racial equality in international relations as a ploy to eliminate religious freedom

      While reading this, I thought about how Western narratives today sometimes oversimplify or misrepresent Chinese government policies, especially around religion and ethnicity. For example, news coverage about Uyghur Muslims in Xinjiang often portrays the situation as entirely one sided, which can lead to political pressure or sanctions, even though the reality is more complicated.

    3. mainstream privilege

      Mainstream privilege refers to the advantages or benefits that people get from belonging to the dominant culture, group, or social norm. It’s the “default” status that makes life easier because society is structured around those mainstream values, language, and practices of the majority.

    4. McCarthy signed Act 30

      This shows how the government used schools to control Japanese kids and make them more “American.” It connects law, language, and politics, and helps explain how authorities tried to manage immigrant communities in the early 1900s.

    1. It is not unusual to choose obscure, or less-well-researched sites. When this is the case, you must consider some of the larger ideas that may inform the creation of the sites, and to think about ways of categorizing the action that occurs in the specific site.

      What if I do this and still don't find any results? Do I broaden my ideas furthermore? Or do I find another database or scholarly website to find my desired results? I have these questions because I had trouble finding anything that had to do with my topic on the MSU database. So as a result I used google search, I leaned more towards academic associated websites such as Harvard business review. Is that an appropriate solution?

    1. Here, we analyse spatial congruence between current (operational) and under development large-scale renewable energy facilities that produce electricity (hereafter renewable energy facilities) and the established PA estate, and mapped areas of globally significant wilderness and KBAs. Our study is focused on hydropower, solar PV and onshore wind power, as they are the mature renewable energy technologies for electricity generation that dominate the renewables sector. We use an industry-standard dataset of renewable energy facilities locations. As such, we provide the first comprehensive global assessment of current and possible future overlaps between renewable energy technologies and important biodiversity conservation areas.

      This is breaking down what the aim of the paper is trying to do.

    1. .  Your words used to explain or label a particular situation or idea may differ greatly from the words and terms used by a specific academic field to describe or label that very same situation or idea. The key here is to pay attention, to be willing to second-guess your own ideas, to ask for help, to know yourself, to be self-reflexive to the point of understanding whether you are able to ethically incorporate research ideas, or whether they would be used to further isolate or denigrate particular individuals, behaviors or cultures.

      I think it is important to always question your ideas, ask for help, and to know yourself. I think I should ask more help from my teacher and fellow peers, this will make my writing process much easier.

    1. Through provenance, archival studiesinsists on the importance of the context of the record, evenover and above its content.

      As I become more familiar with the definitions of provenance, this particular instance compels me as I can see many examples of this in some of the media that I consume -

      For instance, there is a zine called Sex Change USA by Daisy Thursday [https://luma.com/o1iss5rd] that is a collection of “stories where transgender people were covered in the National Esquire, Sun, and Weekly World News tabloids from 1993-2002.”

      What I took away from Sex Change USA was not only a better understanding of the different contexts the pieces from the zine have lived in and do currently live in but a better understanding of the context of it’s current time and how those pieces interact with and inform each other.

    1. What incentives do social media companies have to protect privacy?

      I think the only incentive that social media companies have to protect privacy is simply because users desire a service which does that. I feel like this incentive is also weak, as privacy as a resource has been regenotiated over the course of the past thrity years of the internet. Things which previously would have been unthinkable, like uploading SSIDs onto documents through email, are now common (I've had to do so to sign leases multiple times in college). I think its only if the underlying logic of these companies (that being profit and the monopolization of digital existence) changes that an incentive to protect privacy could strengthen.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. ight to be forgotten

      In my capstone research paper I'm writing this quarter, I place a lot of importance on the reification of thoughts and desires that the collection of behavioral data brings. I feel like there is a huge discomfort in the user of the internet at the prospect of encountering a digital world shaped by their thoughts in a way that they perceive themselves to have little to no control over. The right to be forgotten here resonates with that anxiety and discomfort, and I feel like the US model should definitely adopt something similar. It assumes that anonymity is an inalienable right we have, which is something i also hold to be true.

    1. It is not enough to do research for a paper. It is also important to show the evidence you collected so your readers can understand why you came to the conclusion that you did.

    1. Key Changes 1. Block Reward Reduction, from 5eth to 3 eth. intro of the EIP-649, which brought about difficulty bomb. 2. new opcodes for smart contract, suuport for static calls(via eip -214) eip -140, 196 and 197. 3. light transaction receipt. EIP -658.

    2. (EIPs 196 & 197)

      EIP-196: EC point addition precompile

      EIP-197: EC point scalar multiplication precompile

      Curve: alt_bn128

      Goal: make heavy cryptography feasible in the EVM

    3. EIP-140

      allows for REVERT opcode, this code allows one to retert a failed opration, without comsuming the whole gaas, INVALID as the opcode before it, that actually consumes all gas. revert made possible for debug, and gas retrun on remain.

    1. The community archival perspective of this fourth paradigm does not stop withencouraging community archives to keep their archives to serve their own and,eventually, society’s interests in having expanded, vibrant, usable, and contextu-alized records for memory and identity, by sharing expertise and knowledge in bothdirections. Archivists can also engage interested members of the community ininteractive dialogues with mainstream archives and their holdings. Participatorydescription of mainstream archival holdings through online tagging and commen-tary by users and community members, in early experiments, has suggested that bysuch means, records can come into sharper focus and clearer context, addingvaluable information that archivists would not have the time or contacts orknowledge to unearth—to say nothing of building enthusiastic support for archivesthrough such welcoming attitudes (Yakel 2011; Huvila 2008). Another initiative isto rethink appraisal and acquisition in terms of creating a virtual, inclusive, ‘‘total’’archive for a country, province or state, or similar jurisdiction, one held by manyarchives and libraries, including community archives, but unified in conception andcomprehensiveness. Canada is now moving to make ‘‘total archives’’ more thanrhetorical flourish or institutional aspiration, but actual operational reality, within apan-Canadian national collaborative stewardship network to appraise, acquire, andpreserve the nation’s documentary heritage, whether published or unpublished,analogue or digital, text, graphic, or sound. As the Librarian and Archivist ofCanada has recently written, ‘‘We are beginning to understand that the constructionand constitution of the civic goods of public memory are a collective, socialresponsibility requiring broad participation across all sectors.’’

      What resonated most with me in this passage was Cook’s emphasis on collective civic accountability and responsibility in archival practice. Traditionally, archival spaces have frequently functioned as exclusive environments, where access was limited and interaction with records was restricted to a specific, skilled group of professionals. I do not agree that this model serves the greater good. If materials are preserved but remain inaccessible to the communities they serve, the archival mission is then a failure. Cook’s argument reinforces the idea that archives should reflect the perspectives, experiences, and sentiments of the communities they serve. I was affected by the example of Canadian archival initiatives. The Canadian archival system demonstrates how a coordinated and collaborative system can bring together institutions, professionals, and communities in order to support more inclusive access and stewardship. In contrast, the current standings of archival work in the United States appear to be moving in the opposite direction, especially regarding access and preservation. This passage made me reflect on how openness and collaboration have the potential to revitalize archives and align them more closely with the needs of society.

    1. One of the main goals of social media sites is to increase the time users are spending on their social media sites. The more time users spend, the more money the site can get from ads, and also the more power and influence those social media sites have over those users. So social media sites use the data they collect to try and figure out what keeps people using their site, and what can they do to convince those users they need to open it again later.

      This comment points to how modern social media platforms operate within an attention economy, where user time and engagement are the primary resources being monetized. By analyzing user behavior data and what people click, watch, like, or share: platforms can tailor content and notifications to keep users returning more often and staying longer.

    1. By looking at enough data in enough different ways, you can find evidence for pretty much any conclusion you want. This is because sometimes different pieces of data line up coincidentally (coincidences happen), and if you try enough combinations, you can find the coincidence that lines up with your conclusion.

      This observation highlights a real issue in data analysis known as data dredging or p-hacking: when people search through large amounts of data without a clear hypothesis, they can often find patterns that look meaningful but are actually just coincidences.

    2. By looking at enough data in enough different ways, you can find evidence for pretty much any conclusion you want. This is because sometimes different pieces of data line up coincidentally (coincidences happen), and if you try enough combinations, you can find the coincidence that lines up with your conclusion.

      This observation highlights a real issue in data analysis known as data dredging or p-hacking: when people search through large amounts of data without a clear hypothesis, they can often find patterns that look meaningful but are actually just coincidences.

    1. Ethnic Studies has always been interdisciplinary in nature, meaning that it combines the strengths and perspectives of multiple disciplines

      This helped me understand the core principles from which ethnic studies truly derives from.

    1. Solution 2 : Sicko's Lagoon

      This solution seems to revolve around the following

      • Loot being constant but not generous. This menas the player will always be picoing things up but everything matters.
      • Loot being losable. So that everything they have muat be guarded but of course that playing the game is inevitably risking losing it.
      • Interdependent. This means that there's no 'win button'. Very little will actually win you the game and as such you're looking for something thatauits your needs. And when you don't find it you're doing your best to use what you have.
      • Indirectly supportive og your goal. The racing game here is an excellent example because going faster won't help you win if your turning circle is rubbish. So the core challenge or test must require an interaction of different abilities to overcome.
    1. When you participate in the world you then participate in the worst of it. You can’t write up a sign at the beginning of an article that says “no monsters read further.” All attempts at this—and I've seen them all—fail. Even if you did they'd ignore the sign, because they're monsters. Someone awful will eventually read this too. Maybe you. Maybe just OpenAI's chat spider. Hi buddy.

      is this true

      has it always been true

      must everything wend its way through every shit-filled crevasse

    1. With white supremacy secured, prominent white southerners looked outward for support. New South boosters hoped to confront post-Reconstruction uncertainties by rebuilding the South’s economy and convincing the nation that the South could be more than an economically backward, race-obsessed backwater. And as they did, they began to retell the history of the recent past. A kind of civic religion known as the “Lost Cause” glorified the Confederacy and romanticized the Old South.

      How did the “Lost Cause” help white southerners justify white supremacy and reshape the South’s image to the rest of the nation?

    2. For April Fool’s Day in 1878, the New York Daily Graphic published a fictitious interview with the celebrated inventor Thomas A. Edison. The piece described the “biggest invention of the age”—a new Edison machine that could create forty different kinds of food and drink out of only air, water, and dirt. “Meat will no longer be killed and vegetables no longer grown, except by savages,” Edison promised. The machine would end “famine and pauperism.”

      Why do you think people in 1878 were willing to believe that technology could completely end hunger and poverty?

    1. Elsewhere, Israel’s Nostromo Energy became the latest vendor to bring a data center “ice battery” to the market. Ice batteries work by cooling ice stored in cells at times where demand for power is low. The batteries use the cold temperature of the ice to chill the cooling liquid needed in HVAC systems, eliminating the need for mechanical chillers, which are big consumers of electricity. Nostromo believes it can make up to 40 percent of data center power consumption flexible, which could be a big boon for operators looking to trim costs.

      This is actually a good example of dispatchable demand response - It's like an ipdated version of the practice of making nice at night.

    2. Open standards are emerging in liquid cooling, and many vendors are following the blueprint laid out by Google with its Project Deschutes, the in-house CDU design developed by the cloud and search giant. Revealed earlier this year, Google has made the specs of Project Deschutes available to the Open Compute Project (OCP) community.At the OCP Europe Summit, held in Dublin in May, Google revealed the extent of its own liquid cooling deployments, demonstrating how the technology has taken hold among the hyperscalers. Around half of Google’s global data center footprint has liquid cooling enabled and/or deployed, meaning the firm has around 1GW of liquid cooling capacity deployed across 2,000 pods equipped with its Tensor Processing Unit AI chips. It achieved uptime of 99.999 percent.

      Wow, half of Google's data centers are now using liquid cooling.

    1. Podcasts have also helped create a burgeoning class of casually obsessive consumers, searching for fresh crumbs of information thanks to an over-exposure to the same true-crime(-adjacent) stories or the same hosts discussing their lives each week

      The repetitiveness of true-crime stories has resulted in people going back to find more podcasts to quench their thirst for new material.

    2. The podcast model has popularised the documentation then dramatisation of real stories

      People enjoy the shock factor that comes in real true crime stories.

    3. Debuting in 2014, it saw journalist Sarah Koenig investigate the 1999 killing of Hae Min Lee, breaking records by becoming the first podcast to top 5m downloads later that year. The following year it won a Peabody award and in 2023, Adnan Syed, the man serving a life sentence for Lee’s murder, was released after the show highlighted flaws in the original case (though a Maryland appeals court has recently reinstated the murder conviction and Syed’s legal status remains uncertain).

      Supports my podcast by displaying a similar one that was actually able to help release a man who was wrongfully convicted. This shows that not only are the podcasts trustworthy, but also helps in the outside world.

    4. The accessible nature of podcasts means they are able to attract a large audience keen to repay the hosts for all the hitherto free entertainment,

      easy access grants more attraction to podcasts of people looking for news sources or entertainment. Are there podcasts that aren't free?

    1. CNM students have access to The Learning and Computer Center (TLCc), which is available on six campuses: Advanced Technology Center, Main, Montoya, Rio Rancho, South Valley, and Westside. At these writing centers, trained tutors help students meet college-level expectations. The tutoring centers offer one-on-one meetings, online, and group sessions for multiple disciplines. TLCc also offers workshops on citing and learning how to develop a

      Important for later incase you need some extra help in this course

    1. Rather, it is the combination and interplay of regulatory sites and regulatory mechanisms that ultimately determines flow into, through, and out of the pathway.

      It's fascinating how even a simple cell maintains so much control over its metabolic processes. Even though these regulatory mechanisms seem complex, they're actually the most energy-efficient because they prevent the cell from wasting energy.

    1. Metadata: Sometimes the metadata that comes with content might violate someone’s privacy. For example, in 2012, former tech CEO John McAfee was a suspect in a murder in Belize, John McAfee hid out in secret. But when Vice magazine wrote an article about him, the photos in the story contained metadata with the exact location in Guatemala.

      With how revealing metadata can be, it makes me wonder why platforms even include the metadata in posts. And should media outlets should be more responsible for removing metadata before publishing content that could put people at risk like this example?

    1. Microaggressions are defined and typed by Derald Wing Sue in the chart below.  Sue has built on the work of Dr. Chester Pierce who first coined the term in the 1970s. See the chart below.

      I also connected this to what I see in popular culture and social media. A lot of online “allyship” looks loud and performative, but not always relational. Sue et al.’s point about microinterventions being about reassurance and not leaving someone alone in their experience feels very different from posting something just to be seen as on the right side. It makes me think about how real resistance happens in everyday moments, not just big statements.

    1. “All men are free and equal in the grave, if it comes to that, Mr. Wilson,” said George.

      This statement from George shows how badly he wants to obtain freedom, and how he is willing to die if he has to, as he would rather die then spend more of his life enslaved.

    1. 16.6: Case Study Conclusion: Bronchitis and Chapter Summary
      •   Bronchitis Treatment: Inhaling moist air from a humidifier or steamy shower can help loosen and thin mucus, making breathing easier.
      •   Bronchitis Symptoms: Coughing, sore throat, chest congestion, and coughing up thick mucus.
      •   Bronchitis Cause: Usually caused by viruses, not bacteria, so antibiotics are generally ineffective.
      •   Bronchitis Definition: Inflammation of the bronchial tubes, causing narrowing and excessive mucus production.
      •   Mucus Function and Problem: Mucus traps pathogens but excessive production hinders airflow, leading to coughing.
      •   Bronchitis Treatment: Thinning mucus for effective coughing through fluids, humidifiers, steam, and expectorants, while avoiding cough suppressants.
      •   Reason for Pulse Oximetry: To check Sacheen’s blood oxygen level and ensure clogged airways weren’t impacting her oxygen intake.
      •   Difference Between Acute and Chronic Bronchitis: Acute bronchitis is a short-term condition often caused by a cold or flu, while chronic bronchitis is a long-term condition often caused by smoking and associated with COPD.
      •   Smoking Cessation Advice: Dr. Tsosie strongly advised Sacheen to quit smoking to prevent future respiratory infections, COPD, and lung cancer.
      •   Respiratory System Function: Critical for gas exchange and protecting the body from harmful substances in the air.
      •   Respiratory System Vulnerability: Prone to infections and damage from allergens, mold, air pollution, and cigarette smoke.
      •   Respiratory System Overview: Comprises the upper respiratory tract (nasal cavity, pharynx, larynx) for air conduction and the lower respiratory tract (trachea, bronchi, bronchioles, lungs) for conduction and gas exchange.
      •   Respiratory System Defense: The mucociliary escalator, consisting of mucus-producing cells and cilia, protects the lungs by trapping and expelling harmful particles and pathogens.
      •   Breathing Regulation: The respiratory system, controlled by the brain, regulates breathing rate based on carbon dioxide levels in the blood to maintain homeostasis.
      •   Breathing Mechanics: Breathing involves inhaling (active process driven by diaphragm contraction) and exhaling (passive process driven by lung elasticity).
      •   Gas Exchange Definition: The biological process of transferring gases across cell membranes for entering or leaving the blood.
      •   Gas Exchange Mechanism: Occurs by diffusion across cell membranes, moving down a concentration gradient from high to low concentration.
      •   Lung Gas Exchange: Takes place in alveoli, where deoxygenated blood picks up oxygen and releases carbon dioxide.
      •   Smoking and COPD: Smoking is the primary cause of COPD, reducing lung elasticity and impairing exhalation.
      •   Smoking and Lung Cancer: Smoking is the leading cause of lung cancer, a malignant tumor characterized by uncontrolled cell growth in the lungs.
      •   Health Risks of Smoking: Smoking poses numerous health risks, including increased risk of various cancers, cardiovascular disease, and other adverse effects.
      •   Respiratory System Function: The respiratory system facilitates gas exchange, bringing oxygen into the body and removing carbon dioxide.
      •   Gas Exchange Mechanism: Oxygen and carbon dioxide flow across membranes based on concentration gradients, moving from areas of higher to lower concentration.
      •   COPD and Blood pH: COPD can lead to elevated carbon dioxide levels, causing respiratory acidosis and prompting the body to compensate by increasing breathing rate.
      •   Bronchitis Treatment: Changes to the environment, such as more frequent cleaning, would not help asthma caused by a gene.
      •   Bronchitis Definition: Bronchitis is an inflammation of the bronchi, the large and medium-sized airways in the lungs that carry air from the trachea.
      •   Bronchodilator Definition: A medication that opens constricted airways.
      •   Funding Sources: Department of Education Open Textbook Pilot Project, UC Davis Office of the Provost, UC Davis Library, California State University Affordable Learning Solutions Program, Merlot, and National Science Foundation.
      •   Support: NICE CXone Expert and LibreTexts libraries.
      •   Contact Information: info@libretexts.org.