10,000 Matching Annotations
  1. Last 7 days
    1. Reviewer #1 (Public review):

      Summary:

      In the work from Qiu et al., a workflow aimed at obtaining the stabilization of a simple small protein against mechanical and chemical stressors is presented.

      Strengths:

      The workflow makes use of state-of-the-art AI-driven structure generation and couples it with more classical computational and experimental characterizations in order to measure its efficacy. The work is well presented, and the results are thorough and convincing.

      Weaknesses:

      I will comment mostly on the MD results due to my expertise.

      The Methods description is quite precise, but is missing some important details:

      (1) Version of GROMACS used.

      (2) The barostat used.

      (3) pH at which the system is simulated.

      (4) The pulling is quite fast (but maybe it is not a problem)

      (5) What was the value for the harmonic restraint potential? 1000 is mentioned for the pulling potential, but it is not clear if the same value is used for the restraint, too, during pulling.

      (6) The box dimensions.

      From this last point, a possible criticism arises: Do the unfolded proteins really still stay far enough away from themselves to not influence the result? This might not be the major influence, but for correctness, I would indicate the dimensions of the box in all directions and plot the minimum distance of the protein from copies of itself across the boundary conditions over time.

      Additionally, no time series are shown for the equilibration phases (e.g., RMSD evolution over time), which would empower the reader to judge the equilibration of the system before either steered MD or annealing MD is performed.

    2. Reviewer #2 (Public review):

      Summary:

      Qiu, Jun et. al., developed and validated a computational pipeline aimed at stabilizing α-helical bundles into very stable folds. The computational pipeline is a hierarchical computational methodology tasked to generate and filter a pool of candidates, ultimately producing a manageable number of high-confidence candidates for experimental evaluation. The pipeline is split into two stages. In stage I, a large pool of candidate designs is generated by RFdiffusion and ProteinMPNN, filtered down by a series of filters (hydropathy score, foldability assessed by ESMFold and AlphaFold). The final set is chosen by running a series of steered MD simulations. This stage reached unfolding forces above 100pN. In stage II, targeted tweaks are introduced - such as salt bridges and metal ion coordination - to further enhance the stability of the α-helical bundle. The constructs undergo validation through a series of biophysical experiments. Thermal stability is assessed by CD, chemical stability by chemical denaturation, and mechanical stability by AFM.

      Strengths:

      A hierarchical computational approach that begins with high-throughput generation of candidates, followed by a series of filters based on specific goal-oriented constraints, is a powerful approach for a rapid exploration of the sequence space. This type of approach breaks down the multi-objective optimization into manageable chunks and has been successfully applied for protein design purposes (e.g., the design of protein binders). Here, the authors nicely demonstrate how this design strategy can be applied to successfully redesign a moderately stable α-helical bundle into an ultrastable fold. This approach is highly modular, allowing the filtering methods to be easily swapped based on the specific optimization goals or the desired level of filtering.

      Weaknesses:

      Assessing the change in stability relative to the WT α-helical bundle is challenging because an additional helix has been introduced, resulting in a comparison between a three-helix bundle and a four-helix bundle. Consequently, the appropriate reference point for comparison is unclear. A more direct and informative approach would have been to redesign the original α-helical bundle of the human spectrin repeat R15, allowing for a more straightforward stability comparison.

      While the authors have shown experimentally that stage II constructs have increased the mechanical stability by AFM, they did not show that these same constructs have increased the thermal and chemical stabilities. Since the effects of salt bridges on stability are highly context dependent (orientation, local environment, exposed vs buried, etc.), it is difficult to assess the magnitude of the effect that this change had on other types of stabilities.

      The three constructs chosen are 60-70% identical to each other, either suggesting overconstrained optimization of the sequence or a physical constraint inherent to designing ultrastable α-helical bundles. It would be interesting to explore these possible design principles further.

      While the use of steered MD is an elegant approach to picking the top N most stable designs, its computational cost may become prohibitive as the number of designs increases or as the protein size grows, especially since it requires simulating a water box that can accommodate a fully denatured protein.

    3. Reviewer #3 (Public review):

      Summary:

      Qiu et al. present a hierarchical framework that combines AI and molecular dynamics simulation to design an α-helical protein with enhanced thermal, chemical, and mechanical stability. Strategically, chemical modification by incorporating additional α-helix, site-specific salt bridges, and metal coordination further enhanced the stability. The experimental validation using single-molecule force spectroscopy and CD melting measurements provides fundamental physical chemical insights into the stabilization of α-helices. Together with the group's prior work on super-stable β strands (https://www.nature.com/articles/s41557-025-01998-3), this research provides a comprehensive toolkit for protein stabilization. This framework has broad implications for designing stable proteins capable of functioning under extreme conditions.

      Strengths:

      The study represents a complete framework for stabilizing the fundamental protein elements, α-helices. A key strength of this work is the integration of AI tools with chemical knowledge of protein stability.<br /> The experimental validation in this study is exceptional. The single-molecule AFM analysis provided a high-resolution look at the energy landscape of these designed scaffolds. This approach allows for the direct observation of mechanical unfolding forces (exceeding 200 pN) and the precise contribution of individual chemical modifications to global stability. These measurements offer new, fundamental insights into the physicochemical principles that govern α-helix stabilization.

      Weaknesses:

      (1) The authors report that appending an additional helix increases the overcall stability of the α-helical protein. Could the author provide a more detailed structural explanation for this? Why does the mechanical stability increase as the number of helixes increase? Is there a reported correlation between the number of helices (or the extent of the hydrophobic core) and the stability?

      (2) The author analyzed both thermal stability and mechanical stability. It would be helpful for the author to discuss the relationship between these two parameters in the context of their design. Since thermal melting probes equilibrium stability (ΔG), while mechanical stability probes the unfolding energy barriers along the pulling coordinate.

      (3) While the current study demonstrates a dramatic increase in global stability, the analysis focuses almost exclusively on the unfolding (melting) process. However, thermodynamic stability is a function of both folding (kf) and unfolding (ku) rates. It remains unclear whether the observed ultrastability is primarily driven by a drastic decrease in the unfolding rate (ku) or if the design also maintains or improves the folding rate (kf)?

      (4) The authors chose the spectrin repeat R15 as the starting scaffold for their design. R15 is a well-established model known for its "ultra-fast" folding kinetics, with folding rates (kf ~105s), near three orders of magnitude faster than its homologues like R17 (Scott et.al., Journal of molecular biology 344.1 (2004): 195-205). Does the newly designed protein, with its additional fourth helix and site-specific chemical modifications, retain the exceptionally high folding rate of the parent R15?

    1. One of the things you can do as an individual to better protect yourself against hacking is to enable 2-factor authentication on your accounts.

      This statement shifts the focus of "protection" from the company level to the individual level, emphasizing that users still have actionable self-protection strategies. The significance of 2FA lies in the fact that even if a password is leaked, it is difficult for attackers to log in directly using only the password, thus reducing the probability of credential stuffing and account takeover. It also reminds us that security is layered – even the best platform security can be compromised by individual vulnerabilities such as phishing or weak passwords. However, this also highlights a limitation: 2FA can only reduce the risk of "account theft," but it cannot solve structural problems such as the platform itself leaking your private data.

    2. But social media companies often fail at keeping our information secure.

      This statement highlights the fragility of the "trust relationship" between users and the platform: we share information assuming the platform will protect it properly. It also implies that the problem is not an isolated incident, but "happens frequently," suggesting that security failures may be related to systems, processes, or business priorities. More importantly, the consequences of a single security breach often extend beyond the platform itself, affecting users' accounts on other websites and posing risks to their real lives. Readers will naturally ask: why did the platform fail—was it due to insufficient technical capabilities, management negligence, or prioritizing growth and convenience over security?

    3. But while that is the proper security for storing passwords. So for example, Facebook stored millions of Instagram passwords in plain text, meaning the passwords weren’t encrypted and anyone with access to the database could simply read everyone’s passwords. And Adobe encrypted their passwords improperly and then hackers leaked their password database of 153 million users.

      This shows how even major platforms can ignore basic security practices. How can platforms be held to stricter accountability standards when they fail to protect user data?

    1. An outline is a written plan that serves as a skeleton for the paragraphs you write. Later, when you draft paragraphs in the next stage of the writing process, you will add support to create “flesh” and “muscle” for your assignment.

      Great way to think about it!

    1. You can walk up Mount Fuji, or you can run up (the Mount Fuji Climbing Race has been held every year since 1948), or you can roll up in a wheelchair (first done in 1978), or you can wait to go up until you’re really old (as old as Ichijiro “Super Grandpa” Araya, who climbed it when he was 100, or Hulda “Grandma Whitney” Crooks, who did it at 91). Or you can ride a horse

      I enjoy this part because it showcases that despite the implied negatives of tourism, the accessibility of Mt. Fuji creates an environment where there are several ways to successfully climb the mountain. Someone does not have to be in peak physical condition to make the trek.

    2. After I paid $2, he branded my stick with his symbol — some Japanese characters and a drawing of Fuji.

      The author's inclusion of the monetary price even in common rituals on the mountain shows how deeply embedded the tourism culture is within a hike that used to be about religion.

    3. , about how tradition in both countries is melting away.

      The use of the word melting ties the piece together well as is fits with the previous weather mentions. For example, the author's highlight of both the extreme heatwave and two typhoons connect to the connotation of the description melting.

    4. homely ninth-century building

      The emphasis on 9th century building adds to the foreign feeling. A general example of an old American building are colonial style buildings from the 17th century, which is nearly 800 years later. Additionally, the dedication to the Chinese scholar who died in 852 AD, implies the existence of preserved records from that time period which feels alien to me.

    5. except for a few damp kimonos flapping on balcony clotheslines.

      I like this visual. Having wet clothes drying on a line outside is something everyone recognizes, whether it is something they grew up doing, or they simply saw in multiple pieces of media. Thus it is very easy to picture that scene in your head. At the same time, the author manages to make it hint at the location by specifying that kimonos are drying as opposed to just leaving it at a general statement of clothes are drying.

    1. Neurodiversity suggests that these disabilities are a natural variation in brain differences and that the workplace should adapt to them
      1. How can workplaces better adapt policies, expectations, and environments to support neurodivergent employees rather than expecting them to conform to traditional norms?
        1. What responsibility do employers have to recognize neurodiversity as a strength while still addressing productivity and performance standards?
    2. Mental disorders cause distress or disability in social, work, or family activities

      Connection: Mental disorders causing distress or disability really shows up for me in how hard it can be to balance school and staying physically active at the same time. When my mental health is struggling, even things I want to do—like going to class prepared, studying, or working out—start to feel overwhelming. Some days my body feels heavy, my motivation drops, and it becomes harder to stay consistent, even though I know movement usually helps my mental health.

      This connection helps me see that these challenges aren’t about laziness or lack of discipline, but about how mental health directly affects functioning. Trying to meet academic expectations while pushing myself to stay active can create a lot of internal pressure, especially when I feel like I should be able to “handle it all.” Recognizing this helps me give myself more grace and reminds me that needing balance, flexibility, and rest is part of taking care of both my mental and physical well-being.

    1. Among ordinary Javanese, traditional animistic practices of spirit worship coexisted easily with a tolerant and accommodating Islam, while merchants often embraced a more orthodox version of the religion in line with Middle Eastern traditions.

      In this quote it shows how Islam adapted, similarly to Christianity, differently across groups of people instead of a uniform belief system. This shows how they were able to blend everyday religious practice with other older traditions. Again showing how religion was shaped by local culture or things like social context, as it highlights the flexibility Islam had as it spread similarly to Christianity.

    2. Central to an emerging Mexican Christianity were the saints who closely paralleled the functions of precolonial gods

      This sentece shows how Christianity in Mexico became and adaptation of fitting existing religious frameworks in the area. The blending of beleifs as stated in one of my previous highlights the reshaping of a foreign religion to reflect their traditions, wihtout outright adopting Christianity. This way they were still able to perserve spiritual meanings of their own society.

    3. “The world has turned about,” one member declared, “and this time God and the Spaniards [will be] defeated and all the Spaniards killed and their cities drowned … so that there will remain no memory of them.”

      This included quote is really striking and comparative to what we were talking about in class, with how indigenous people reacted to the conquest of Christian reform. Leading to ideological developments like apocalyptic ideas or incorporation of Christian God into their own beliefs. As stated in class they sometimes took on these reformations as a way of furthering their own colonies or interests.

    4. Although the Reformation was profoundly religious, it encouraged a skeptical attitude toward authority and tradition, for it had, after all, successfully challenged the immense prestige and power of the established Church

      What I find interesting with this quote is, it shows that a religious movement like this had broader implications like the skepticism toward authority. As the reformation challenged the Catholic Church's power, it established the inability of perfection within all higher ranking institutions. This I see as paving the way for independent thinking, which challenged the ongoing traditions or authority within society.

    5. Chinese elites took interest in some of aspects of it. Imperial officials, for instance, were impressed by European techniques for predicting eclipses, reforming the calendar, and making accurate maps of the empire. European mathematics was also of particular interest to Chinese scholars who were exploring the history of Chinese mathematics. To convince their skeptical colleagues that the barbarian Europeans had something to offer in this field

      How did Chinese elites selective acceptance of European scientific knowledge reflects broader attitudes toward cultural superiority?

    6. The age of the Enlightenment, however, also witnessed a reaction against too much reliance on human reason. Jean-Jacques Rousseau (1712–1778) minimized the importance of book learning for the education of children and prescribed instead an immersion in nature, which taught self-reliance and generosity rather than the greed and envy fostered by “civilization.” T

      a shift from the Enlightenment faith in pure reason and logic toward ideas that emphasize emotion and nature. Rousseau and the Romantic movement challenged the belief that rational progress alone could improve society

    7. nternally, the Christian world was seriously divided between the Roman Catholics of Western and Central Europe and the Eastern Orthodox of Eastern Europe and Russia. Externally, it was very much on the defensive against an expansive Islam.

      deep internal divisors weaken unity between Western Catholic and Eastern Orthodox regions. At the same time, the Christendom faced military, political, and religious pressure from the expanding Islamic world.

    8. China during the Ming and Qing dynasties continued to operate broadly within a Confucian framework, enriched now by the insights of Buddhism and Daoism to generate a system of thought called Neo-Confucianism. Chinese Ming dynasty rulers, in their aversion to the despised Mongols, embraced and actively supported this native Confucian tradition, whereas the foreign Qing rulers did so to woo Chinese intellectuals to support the new dynasty. Within this context, a considerable amount of controversy, debate, and new thinking emerged during the early modern era.

      Shows how Confucianism and Neo-Confucianism provided continuity in Chinese political and intellectual life while also allowing adaptation under different rulers

    9. The Wahhabi movement (see Map 15.3) took a new turn in the 1740s when it received the political backing of Muhammad Ibn Saud, a local ruler who found al-Wahhab’s ideas compelling. With Ibn Saud’s support, the religious movement became an expansive state in central Arabia. Within that state, offending tombs were razed; “idols” were eliminate

      shows how religious movement gained political power and became the foundation of a state, demonstrating the close alliance between religious ideology and political authority in the islamic world

    10. In the Protestant idea that all vocations were of equal merit, middle-class urban dwellers found a new religious legitimacy for their growing role in society. For common people, who were offended by the corruption and luxurious living of some churchmen, the new religious ideas served to express their opposition to the entire social order, particularly in a series of German peasant revolts in the 1520s.

      Protestant Reformation had broad social consequences beyond theology. It reshaped attitudes toward work and social status, and helped legitimized the rising middle class. However, it fueled unrest among peasants.

    11. As if these were not troubles enough, in the early sixteenth century the Protestant Reformation shattered the unity of Roman Catholic Christianity, which for the previous 1,000 years had provided the cultural and organizational foundation of an emerging Western European civilization.

      After the reformation, it led to the rise of multiple Protestant denominations, prolonged religious conflicts, and shifts in political power away from the church

    12. What they offered, in short, was connection to the wider, prestigious, prosperous world of Islam. Islamization extended modestly even to the Americas, particularly in Brazil, where Muslims led a number of slave revolts in the early nineteenth century.

      Began with slaves brought over from the west coast of Africa in regards to Brazil. Islam was spread by traders, merchants, and through warfare just as Christianity was. After muhammeds death, armies conquered areas in the Byzantine and Sassanid empires.

    13. The radical implication of this view was that the heavens and the earth, long regarded as separate and distinct spheres, were not so different after all, for the motion of a cannonball or the falling of an apple obeyed the same natural laws that governed the orbiting planets.

      Sir Isaac Newton unified early modern astronomy and physics by formulating the law of motion, which really took over science until the 20th century. What he thought and discovered was the same natural law that govern the heavens and the earth, linking them like falling apples and orbiting planets.

    14. Missionaries had their greatest success in Spanish America and in the Philippines, areas that shared two critical elements beyond their colonization by Spain

      The lasting success of these missionaries is still shown in present day Philippines. With nearly 90% of the country apart of the Christian faith, it's the largest Christian nation on the Asian continent. The vast majority of these Christians are Roman Catholic, just like the Spaniards who settled in Philippines in the 1500's https://blogs.loc.gov/international-collections/2018/07/catholicism-in-the-philippines-during-the-spanish-colonial-period-1521-1898/

    15. “a core of readings and lectures that were basically scientific,

      This goes to show that Europe developed legally independent institutions, especially universities, scholars gained greater freedom from church and state control. The independence allowed the study of nature to separate from philosophy and theology. This allowed universities and later scientific academic became key centers for producing scientific knowledge.

    16. Earlier conquerors had made no attempt to eradicate local deities and religious practices. The flexibility and inclusiveness of Mesoamerican and Andean religions had made it possible for subject people to accommodate the gods of their new rulers while maintaining their own traditions. But Europeans were different. They claimed an exclusive religious truth and sought the utter destruction of local gods and everything associated with them

      The Spaniard inflexibility to local religion makes sense, as Catholicism during this time was very much “Respect authority! Don’t question!” It’s clear that these religious traits appeared into the demeanors of the Spanish missionaries in Mesoamerica.

    17. he culmination of European religious conflict took shape in the Thirty Years’ War (1618–1648), a Catholic–Protestant struggle that began in the Holy Roman Empire but eventually engulfed most of Europe.

      A war that I have not learned much about. This is considered one of the first modern wars due to its widespread violence and impact, large armies, and economic impact. It shows how Christianity, like other religions, have internal conflict and yet still remain relatively stable. This war also gave birth to Switzerland and the Dutch Republic after its conclusion.

    18. into a variety of competing Protestant churches — Lutheran, Calvinist, Anglican, Quaker, Anabaptist — many of which subsequently subdivided, producing a bewildering array of Protestant denominations.

      In all my years, I haven't learned much about the Quaker community and have never heard of Anabaptist! After looking into more, it was created in Switzerland. It shows that even with numerous denominations in numerous areas of the world, Christianity still has a very strong presence and hold on Europe and other areas.

    19. Reformation thinking spread quickly both within and beyond Germany, thanks in large measure to the recent invention of the printing press.

      The printing press was a big factor in the split of the church. I think that without it, the Catholic Church may have been able to fight back quicker against the ideas presented by Martin Luther.

    20. though far more modestly, in Siberia, China, Japan, and India. A cultural tradition largely limited to Europe in 1500 was now becoming a genuine world religion,

      Brought to Japan by a Spanish priest named Francis Xavier in the 1500's, and to China in the 7th century, one could argue that it already was a genuine world religion being in the Middle East, Africa, and then Europe.

    21. They derived from various West African traditions and featured drumming, ritual dancing, animal sacrifice, and spirit possession. Over time, they incorporated Christian beliefs and practices such as church attendance, the search for salvation, and the use of candles and crucifixes and often identified their various spirits or deities with Catholic saints.

      I find it very interesting how they were able to incorporate Christianity into ancient traditions that they had been practicing for generations. It must have been challenging for them to make such a drastic transition.

    22. In short, it was a more highly fragmented but also a renewed and revitalized Christianity that established itself around the world in the several centuries after 1500 (see Map 15.2).

      I think it is very interesting to see all the different forms of Christianity across the world. They all worshiped the same God just a different way.

    23. Renewed efforts to foster individual spirituality and personal piety were accompanied by crackdowns on dissidents and the censorship of books.

      I thought it was interesting that the Catholic Church sought out to “correct” the corruption within the church, but increased censorship.

      Apparently, a big part of this censorship was banning a Bible in 1546 that contained commentary which “could be read as critical authority.”

      https://hob.gseis.ucla.edu/HoBCoursebook_Ch_6.html

    24. It was a genuinely scientific approach to knowledge, but one that was applied more to the study of the past and to practical applications of learning in medicine, farming, and industry than to fields like astronomy, physics, or anatomy, which were more prominent in Europe

      It is interesting that we still make distinctions between the advancements "western" and "eastern" science, technology, and medicine when both "fields" emerged at a similar time, but used for different purposes.

    25. These new scientists no longer relied on the external authority of the Bible, the Church, the speculations of ancient philosophers, or the received wisdom of cultural tradition. For them, knowledge was acquired through rational inquiry based on evidence, the product of human minds alone.

      This is such an interesting definition of science. The idea that knowledge is acquired through "the product of human minds alone" is a definition I would associate with philosophy, religion, and theology more so than science.

    26. Continued Islamization was not usually the product of conquering armies and expanding empires. It depended instead on wandering Muslim holy men or Sufis, Islamic scholars, and itinerant traders, none of whom posed a threat to local rulers.

      I wonder if the gentler method of introducing religion that Islam used was more effective for spreading the religion to more people than that of Christianity and Catholicism. Does allowing your beliefs to adjust with the culture strengthen or weaken the collective faith of the people?

    27. they set about correcting the abuses and corruption that had stimulated the Protestant movement by placing a new emphasis on the education of priests and their supervision by bishops.

      It is interesting to see how the problems Martin Luther had with the Catholic Church, excluding criticisms of doctrines, were, in a roundabout way, fixed by his ninety-five theses. By unintentionally creating a rift in Christianity, it conversely restrengthened the Catholic Church and corrected the problems that had arisen.

    28. many Jesuits learned Chinese, became thoroughly acquainted with classical Confucian texts, and dressed like Chinese scholars.

      I think this is quite interesting. Obviously China was very powerful and had many strong thoughts and political stance. So it was very different from other countries and nations interacting with Christianity. the Jesuits had to convert to learn the culture of Chinese. They did this by learning the language, wearing the clothes, and getting "acquainted" with their text. They basically just exchanged ideas and thoughts. Then that was how they were aloud to spear their religion with respect and honor.

    29. God has appointed the [printing] Press to preach, whose voice the pope is never able to stop,

      The reformation and the spread of religion boomed over the past years. The main help of this fact spreading religion was the printing press and how it would transform texts to different languages. This is what English protestant said was the word or what "God has appointed" to help give the voice of religion and God voice through the Pope. it most boomed through German but it also spread through France, Switzerland, and England.

    30. His teachings and those of subsequent gurus also generally ignored caste distinctions and untouchability and ended the seclusion of women, while proclaiming the “brotherhood of all mankind” as well as the essential equality of men and women.

      This stood out to me because it is the first place I have read where they are saying women have the same equal chances as men in this religion.

    31. The decisive conquest of the Aztec and Inca empires and all that followed from it — disease, population collapse, loss of land to Europeans, forced labor, resettlement — created a setting in which the religion of the victors took hold in Spanish American colonies.

      This id interesting to me because the last chapter spoke about how the Europeans brought over diseases and wiped out civilizations and had majority control.

    32. Christianity motivated European political and economic expansion and also benefited from it.

      I find it interesting that though all of these other religions were growing and expanding, Christianity seems to be the one that motivated and influenced most of everything.

    33. Although large numbers of women were attracted to Protestantism, Reformation teachings and practices did not offer them a substantially greater role in the Church or society. Protestant opposition to celibacy and monastic life closed the convents, which had offered some women an alternative to marriage. Nor were Protestants (except the Quakers) any more willing than Catholics to offer women an official role within their churches.

      why were the convents closed and where did the women who were living in them end up? We they allowed to break their oath and get married or were they to abide by the rules even when they had no place to be?

    34. When applied to the affairs of human society, scientific ways of thinking challenged ancient social hierarchies and political systems and played a role in the revolutionary upheavals of the modern era.

      I've never really considered how the cultural changes that came from the Scientific Revolution actually could've potentially led to difference in class such as hierarchies and political systems. I've only really thought of it as a cultural change and never really considered how the changes in culture can impact government decisions.

    35. Common African forms of religious revelation — divination, dream interpretation, visions, spirit possession — found a place in the Africanized versions of Christianity that emerged in the New World.

      I think it's interesting that Africa had a lot of strong Christian empires in ancient times, I always have viewed Africa as a continent that has been a predominantly Islamic continent with many different countries so the idea of unified Christian empires is fascinating to me.

    36. Europeans saw their political and military success as a demonstration of the power of the Christian God.

      Even though I am religious and Christian, I think it's interesting to learn throughout history how Christian beliefs have impacted the way that empires view everything that they are doing, even if it maybe morally wrong. God says not to kill, but here their success in wars shows them how powerful their God is.

    37. In 1500, the world of Christendom stretched from the Iberian Peninsula in the west to Russia in the east, with small and beleaguered communities of various kinds in Egypt, Ethiopia, southern India, and Central Asia.

      I think it's fascinating to see how Christianity was able to spread so fast from the Middle East all the way to Europe and Asia and how long it was able to retain it's power in those areas.

    38. Although Europeans were central players in the globalization of Christianity and the emergence of modern science, they were not alone in shaping the cultural transformations of the early modern era. Asian, African, and Native American peoples largely determined how Christianity would be accepted, rejected, or transformed as it entered new cultural environments.

      This passage highlights how Europeans were the cause of Christianity spreading to different parts of the world. However, Different cultures received Christianity differently. Some blended it into their pre-existing cultures and religious practices, others changed parts of the Bible to make it relate to the people of that culture.

    1. Spaces :

      The issue with spaces is a good example of how a normal human habit like just using spaces becomes a technical problem. Something that comes so naturally to us when naming a file turns into extra work in command-line environments, which j shows a big difference between human language and systems.

    2. So here is my list of things that should not appear in file names:

      The goal of this piece is defintiely more practical than academic. It works like informal documentation meant to help readers toward better file-naming practices.

    3. On most days I move between Mac OS X (HFS+), Windows XP (mostly NTFS, some FAT32), Windows 2003 (NTFS), FreeBSD (UFS/UFS2) and Linux (pick one).

      The author baiscally supports his point by describing his experience working across many operating systems. This shows that the issues he mentions come from actual technical experience.

    4. Okay, all kidding aside, having goofy file names can make life miserable.

      The author’s main argument is that file naming is not just a personal preference. Poor file names create like actual technical problems, especially when files are shared or moved between different systems.

    1. Which apps help you meet the expectations of college? Will you be able to meet the expectations of being responsible for your schedule and assignments?

      I already use on of these apps and I'm willing to try out more to see which one best fits my needs & learning style.

    2. Motivation. Being able to stay motivated while studying and balancing all you have to do in your classes will be important for meeting the rest of the components. Deliberate, focused effort. Taking ownership of learning will hinge on the effort that you put into the work. Because most learning in college will take place outside of the classroom, you will need determination to get the work done. And there will be times that the work will be challenging and maybe even boring, but finding a way to get through it when it is not exciting will pay in the long run. Time and task management. You will learn more about strategies for managing your time and the tasks of college in a later chapter, but without the ability to control your calendar, it will be difficult to block out the time to study. Progress tracking. A commitment to learning must include monitoring your learning, knowing not only what you have completed (this is where a good time management strategy can help you track your tasks), but also the quality of the work you have done.

      Taking ownership of your learning is one of the many keys to success.

    3. Intellectual adjustment. Experiencing an intellectual “a-ha!” moment is one of the most rewarding parts of college, right up there with moving across the graduation stage with a degree in hand. Prepare to be surprised when you stumble across a fascinating subject or find that a class discussion changes your life. At the very least, through your academic work, you will learn to think differently about the world around you and your place in it.

      This is one of my favorite parts of learning, having that "a-ha!" moment. Having a positive life & mind-changing experience and being able to share that with others is a blessing.

    4. There is some debate as to whether a college degree is needed to land a job, and there are certainly jobs that you can get without a college degree. However, there are many reasons that a college degree can give you an edge in the job market.

      Living proof here. I've worked many many jobs without a college degree and also missed out on promotional opportunities due to lack of further education.

    1. Stop creating videos that get views but no clients. These video concepts are designed to position you as the go-to expert while attracting your ideal clients—senior managers and directors ready to invest in their next-level leadership.

      How best do you suggest I create these? I have done DTC and they don't convert well...probably because they look amature.

      Any AI strategies to make them high quality while also being time effective?

    2. Pillar 2: The Hidden Job Market

      Right now I focus this topic around job seekers of all levels, not just leaders. Probably specialize this to just leaders looking to land their next role, ya?

    1. An annotated bibliography is essentially a list of the sources you find relevant, with all of the necessary bibliographic information (i.e. author, title, publisher, year, etc.), followed by information about the content of the source. Annotated bibliographies can be used for a variety of purposes.  They may demonstrate the quality of your research, or provide readers additional background information.Â

      I never knew that an annotated bibliography can demonstrate quality in my research. To be honest, before this class I didn't know what a bibliography was so I am glad I got to learn about it.

    1. Start the process of secondary research as soon as you can!  Certainly, it’s difficult to begin secondary research before you’ve been to your site, or written any fieldnotes—how would you know what to look for?  But, the fact is that since this process requires so much time, you do want to begin sooner, rather than later, and make sure that you don’t leave all of this work to one weekend or, worse yet, to one night

      Why is it difficult to do your research on your secondary source without writing any field notes? I am still confused on what exactly we can research. I was thinking of doing something related to the feeling people get when watching scary movies, but I wonder how it can relate to culture.

    1. For discussion: Is the Internet responsible for most of our wasted work time? Read through this article. What do you think? https://openstax.org/l/whowastestime

      I read this article and what I took from it was that, yes, the internet is the leading cause for distractions at work, mostly with then millennial generation.

    1. Finally, in one word, their Ambition and Avarice, than which the heart of Man never entertained greater, and the vast Wealth of those Regions;

      Las Casas point out that greed and disrespect drove the Spanish to there action against the natives.

    2. the Spaniards by their barbarous and execrable Actions have absolutely depopulated Ten Kingdoms,

      This highlights the destruction and the depopulation caused by the Spanish, emphasizing the cruelty of colonization.

    3. of Three Millions of Persons, which lived in Hispaniola itself, there is at present but the inconsiderable remnant of scarce Three Hundred.

      The number show the massive scale of death caused by Spanish actions, almost an entire population wiped out.

    4. Now this infinite multitude of Men are by the Creation of God innocently simple, altogether void of and averse to all manner of Craft, Subtlety and Malice, and most Obedient and Loyal Subjects to their Native Sovereigns

      Las Casas emphasizes how peaceful and loyal the Native Americans were showing that they’re suffering was undeserved.

    5. The Sun had treacherously murdered our people on the twentieth day after the captain left for the coast.

      Describing the killings as treachery shows the betrayal felt by the Aztecs.

    6. lords, that is enough! What are you doing? These people are not carrying shields or macanas

      Montezuma‘s protest emphasizes how unfair and brutal the Spanish actions were.

    7. The Spaniards attacked the musicians first, slashing at their hands and faces until they had killed all of them.

      The attack on the musicians highlights of the extreme violence of the conquest.

    8. I have seen you at last! I have met you face to face! I was in agony for five days, for ten days, with my eyes fixed on the Region of the Mystery.

      Montezuma‘s awe shows the impact the Spaniards had on the Aztecs.

    9. whereat the Skrellings were frightened, and ran away with their packs, wherein were gray furs, sables, and all kinds of pelts. They fled towards Karlsefni’s dwelling and sought to effect an entrance into the house; but Karlsefni caused the doors to be defended [against them].

      Encountering the Skrelling must have been tense and shows how uncertain life in a new land can be.

    10. They afterward determined to establish themselves there for the winter, and they accordingly built a large house.

      I think building a proper shelter, shows how serious they were about surviving the winter.

    11. They sailed up to the land, and cast anchor, and launched a boat, and went ashore, and saw no grass there. Great ice mountains lay inland back from the sea,

      The harsh landscape must have made exploring really challenging for the people.

    12. The entire region had been emptied by the diseases which had accompanied De Soto and his men, and had returned to wilderness

      Disease from the Spanish wiped out most of the people in the south, even before European settled there. This shows how big and impact disease had on native communities.

    13. To defend themselves, Spanish colonialists accused the Aztec and Inca Empires of atrocities of their own and emphasized the support conquistadors received from indigenous rivals of these empires.

      It’s interesting how history can be viewed differently depending on who is telling the story.

    14. Along the Mississippi River and its tributaries, indigenous people lived mostly in villages but occasionally gathered into cities and built mounds like those found at Cahokia.

      This shows that Native American societies were organized and capable of building large cities, not just small villages.

    15. To run their complex society, the Maya developed a written language based on 800 hieroglyphs that represented different syllables.

      This show that the Maya were very advanced because they created their own writing system to manage their society.

    1. It can be relevant and powerful to use popular cultural source material, but you need to be conscious of how and how you would use it.  Some of these texts, such as documentaries and websites, can often provide a great deal of information about a subject or project.  Statistics and facts can be powerful, but they are also often beside the point since the most important data is the data that you will collect.

      This is something I will definitely take note of. By making sure my sources are relevant I can fully utilize them and make sure that they fit and make sense in my paper. I wonder how I can effectively use my secondary source to strengthen my primary source.

    1. Not until around 500,000 years ago did “new species of deer, bovid, rhino, and horse appear” 8 in Europe. Around the same time, the cheetah, saber-tooth tiger, and dirk-tooth cat declined in the region, making more carcasses from the aforementioned species available to hominid foragers.

      I often wonder how early hominids figured out which animals were safe to eat and which were not, as well as how different animals were hunted. While much of this knowledge likely came from trial and error, how was it communicated among group members to help everyone avoid danger? How did they learn to hunt animals like rhinos? A rhino is massive and certainly not a friendly creature. These hominids must have learned through deliberate, calculated attempts rather than random attacks. Of course, scavenging from already deceased animals was an option, but I imagine their curiosity and ingenuity eventually led them taking on such formidable beasts as a challenge. I find that idea incredibly fascinating.

    1. The key is to find which system works best for you.

      There is no one-size-fits-all learning system, everyone learns differently and that's the beauty of it all. There are so many learning strategies this book reviews, one or many are bound to fit.

    1. TCP speed limits come from two independent sources that are combined to determine the final effective speed: Source 1: Installation Safety Parameters (user-configured in UR Polyscope) Source 2: Robot/Base/Payload Configuration (calculated by KinematicConstraintsFactory) The final speed is the minimum of both sources plus any user runtime constraints.

      à mettre à jour pour les trois sources

    2. Unlike TCP speed, which can be set via the maxTcpSpeed parameter in safety.conf files

      ça donne l'impression qu'on peut éditer ces fichiers. Mais ils sont protégé par un checksum et il faut modifier les Safety settings dans le UI.

    1. So is this simple substitution Cipher uncrackable? Well, let's wait a minute here. It's not, for example, one of the pieces of information we can use in analyzing simple substitution is the letter frequencies of the English language or any language If you looked at a histogram of English letter frequencies, you'd see that e is the most frequent letter just above 12 percent, T is the second most frequent at somewhere around nine percent, a is very frequent at more than eight percent and so forth, so you would see this familiar pattern in any text that you encrypted. For example, if you encrypted it using the simple substitution Cipher, you might get this pattern, but you'd still see a peak where the letter that was substituted for e occurs. And maybe this is the peak for T, and maybe this is the peak for a. By analyzing those peaks and valleys, you can determine how the message was encrypted, can figure out the key. But, wait a minute… frequency analysis works!<br /> Slide 21, 22 chart

      E.G. If you sorted by frequencies. Now, you can see this very clearly if you sort the two histograms, they're practically identical, and that's what lets the analyst with some effort, of course, figure out the key and break the message so you can break simple substitution cipher using frequency analysis. That makes Eve happy, Alice and Bob are not very happy about that. Eve wins … you don’t need brute force. Frequency analysis will break simple substitution. slide 23, 24 chart

    2. The last question how many keys would you have to try in order to perform a Brute Force attack on simple substitution? Let's look at that question again. The answer is an enormous number 26 factorial Keys. That's the number of ways you could shuffle the plain text alphabet of 26 letters. So that's way too hard. And that fact makes Alice and Bob happy and Eve not very happy.

    3. Simple Substitution Cipher

      Key: Randomly mix up the plain alphabet to get a cipher alphabet.

      So the key basically tells what to do with getting a cipher alphabet to be able to encrypt either the key consisting of a number for shifting each letter or a keyword to put in beginning as a way of scrambling

      Algorithm: Substitute plain letters with shuffled letters.

      This tells how to encrypt the message using to cipher alphabet

    4. Well, let's look at a slightly more complex Cipher, another example, of what's called a simple substitution Cipher, which means generally that you randomly mix up the alphabet to get a cipher alphabet and then you substitute plain letters with shuffled letters, so we're gonna use a little trick here that we're going to have a keyword that'll help us (one way to) construct our Cipher alphabet, which is our actual key by putting the keyword at the beginning and then putting all the letters that aren't in the word, zebrafish following it in alphabetical order. Now, obviously, there are lots of ways we could do this, but that gives us an easy way to transmit the key between Alice and Bob. Alice just tells Bob zebrafish and he knows how to construct this alphabet. But if they wanted, Alice could simply create a permutation or shuffling of this alphabet, not using the keyword and pass that along to Bob. Once you've created the cipher alphabet, encrypting and decrypting, in simple substitution cipher works the same as it did in Caesar Cypher. For each letter in the plane text message, you replace it with the corresponding letter from the cipher alphabet. Of course, you have many more possible Cipher alphabets because the alphabets aren't merely a shifting of the original plain alphabet. chart

    5. How do you crack a Caesar Cipher? In other words, how does Eve break these messages? Well, the one question you might ask is, well, how many different keys would Eve have to try to do what's called a Brute Force attack? That means try every possible key. As you've probably discovered, the answer is 25 Keys. That's way too easy, so Eve is very happy about that because she can easily break Caesar Cypher. chart

    1. In the following graphic you will find seven methods that highly successful people use to accomplish this.

      This chart is VERY useful and a daily reminder to ensure I am on the right track with achieving my goals.

    2. likely, if you were successful at all in meeting the goal, it was because you were motivated by earning the approval of someone or receiving a possible reward, or you were concerned with avoiding something adverse that might happen if you did not do what you were told. From an honest perspective in that situation, your real goal was based on something else, not the meeting of the goal set for you. To

      Is that a bad thing though? I mean, in the end, you were successful, no matter the reason. The goal was achieved, end of story. So is it ONLY to be motivated by the goals we set and not have other reasons to achieve a goal?

    3. all the reading, studying, and every assignment you do for that course contributes to the larger goal.

      The small tasks add up and contribute to achieving your goal.

    1. Bibliography plundering:  If you have the experience of finding one “really good” source, look to that source for more answers.  Plunder the Bibliography or Works Cited pages of that volume and go and get the sources that author uses in order to make his/her argument.  Of course it is best to skim the source you have, to read enough of it in order to identify some of the more relevant citations of that author before randomly choosing alternate authors from the Bibliography.

      This is a good strategy that I will definitely use in the future since I had trouble finding more than one good source. Furthermore, I should broaden my key words in order to get better results as well.

    1. Your working environment definitely includes your own state of mind and physical well-being.

      These are not tangible, so not only does the working environment include physical visual things it includes the things we cannot see, but what we feel.

    2. sitting up at a desk or table actually increases your typing speed and reduces the number of mistakes. Even the kind of mouse you use can impact how you work, and using one you are comfortable with can make a big difference.

      I never thought of this as an issue! Makes sense though.

    3. A large part of ensuring that you can complete tasks on time comes to setting up conditions that will allow you to do the work well. Much of this has to do with the environment where you will do your work. This not only includes physical space such as a work area, but other conditions like being free from distractions and your physical well-being and mental attitude.

      I agree, I personally find that where I choose, or am able to complete my work is very important in keeping me focused and lesses distractions.

    4. The moment when you see that something in your plan may become an issue is when to begin readjusting your plan.

      There's always room to readjust a plan. Have a plan A, B, C, D, etc.

    1. the corrupt politician has usurped too much of the power which should be exercised by the people,

      We can relate this to the discussions we had in class about why did inmigrants decide to come to the US. It's interesting how a period with a lot of immigration in the US was because of the government policies and corruption in different countries. But, here in the US, people also face governments with corrupt politicians. But I guess there was a lot less than in other countries.

    1. AMP is a nested multiplex–PCR enrichment chemistry that incorporatesstrand-specific priming and the incorporation of unique molecularidentifiers (UMIs) into sequenced reads16. cfDNA, fragmented periph-eral blood mononuclear cell (PBMC) DNA (60 ng) or fragmented normaltissue DNA (60 ng) was end-repaired phosphorylated and A-tailed. Anadapter containing a universal priming site, the indexes for multiplex-ing and a UMI are then ligated onto DNA. One round of target-specificPCR was performed with a gene-specific primer 1 (GSP1) which ampli-fies against the P5 primer in the adapter, and a further round of PCRwas then performed with a second nested gene-specific primer (GSP2)and a primer that incorporates a second primer containing a P7 index.Strand-specific priming was performed in both rounds of amplificationfacilitating the identification of positive- and negative-strand inputDNA molecules during informatic analyses.

      Match this against Zheng et al. 2014's description of AMP.

    Annotators

    1. In the convict camp in Greene County

      Me encanta esta fotografía porque están bailando en lo que parece una cárcel (convict camp). Me pregunto por qué estarían ellos ahí. Uno está bailando, otro toca la guitarra, y el otro aplaudiendo. Los demos no participan, pero hay un hombre hasta el fondo que los observa (creo que es un guardia). No me puedo imaginar cómo se dio ese momento, pero me gustaría creer que ellos tuvieron esperanza o, al menos, un breve encuentro con la felicidad.

  2. books-scholarsportal-info.ezproxy.library.yorku.ca books-scholarsportal-info.ezproxy.library.yorku.ca
    1. Freedom of belief is only limited by the condition that the belief shall not be prejudicial to peace and order

      This is a good example of how states use law and rhetoric to manage religion, and how religious freedom can be more about appearances than practice

    2. while Ameri-can diplomats disingenuously regarded Japan’s quest for racial equality in international relations as a ploy to eliminate religious freedom

      While reading this, I thought about how Western narratives today sometimes oversimplify or misrepresent Chinese government policies, especially around religion and ethnicity. For example, news coverage about Uyghur Muslims in Xinjiang often portrays the situation as entirely one sided, which can lead to political pressure or sanctions, even though the reality is more complicated.

    3. mainstream privilege

      Mainstream privilege refers to the advantages or benefits that people get from belonging to the dominant culture, group, or social norm. It’s the “default” status that makes life easier because society is structured around those mainstream values, language, and practices of the majority.

    4. McCarthy signed Act 30

      This shows how the government used schools to control Japanese kids and make them more “American.” It connects law, language, and politics, and helps explain how authorities tried to manage immigrant communities in the early 1900s.

    1. It is not unusual to choose obscure, or less-well-researched sites. When this is the case, you must consider some of the larger ideas that may inform the creation of the sites, and to think about ways of categorizing the action that occurs in the specific site.

      What if I do this and still don't find any results? Do I broaden my ideas furthermore? Or do I find another database or scholarly website to find my desired results? I have these questions because I had trouble finding anything that had to do with my topic on the MSU database. So as a result I used google search, I leaned more towards academic associated websites such as Harvard business review. Is that an appropriate solution?

    1. Here, we analyse spatial congruence between current (operational) and under development large-scale renewable energy facilities that produce electricity (hereafter renewable energy facilities) and the established PA estate, and mapped areas of globally significant wilderness and KBAs. Our study is focused on hydropower, solar PV and onshore wind power, as they are the mature renewable energy technologies for electricity generation that dominate the renewables sector. We use an industry-standard dataset of renewable energy facilities locations. As such, we provide the first comprehensive global assessment of current and possible future overlaps between renewable energy technologies and important biodiversity conservation areas.

      This is breaking down what the aim of the paper is trying to do.

    1. .  Your words used to explain or label a particular situation or idea may differ greatly from the words and terms used by a specific academic field to describe or label that very same situation or idea. The key here is to pay attention, to be willing to second-guess your own ideas, to ask for help, to know yourself, to be self-reflexive to the point of understanding whether you are able to ethically incorporate research ideas, or whether they would be used to further isolate or denigrate particular individuals, behaviors or cultures.

      I think it is important to always question your ideas, ask for help, and to know yourself. I think I should ask more help from my teacher and fellow peers, this will make my writing process much easier.

    1. Through provenance, archival studiesinsists on the importance of the context of the record, evenover and above its content.

      As I become more familiar with the definitions of provenance, this particular instance compels me as I can see many examples of this in some of the media that I consume -

      For instance, there is a zine called Sex Change USA by Daisy Thursday [https://luma.com/o1iss5rd] that is a collection of “stories where transgender people were covered in the National Esquire, Sun, and Weekly World News tabloids from 1993-2002.”

      What I took away from Sex Change USA was not only a better understanding of the different contexts the pieces from the zine have lived in and do currently live in but a better understanding of the context of it’s current time and how those pieces interact with and inform each other.

    1. What incentives do social media companies have to protect privacy?

      I think the only incentive that social media companies have to protect privacy is simply because users desire a service which does that. I feel like this incentive is also weak, as privacy as a resource has been regenotiated over the course of the past thrity years of the internet. Things which previously would have been unthinkable, like uploading SSIDs onto documents through email, are now common (I've had to do so to sign leases multiple times in college). I think its only if the underlying logic of these companies (that being profit and the monopolization of digital existence) changes that an incentive to protect privacy could strengthen.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. ight to be forgotten

      In my capstone research paper I'm writing this quarter, I place a lot of importance on the reification of thoughts and desires that the collection of behavioral data brings. I feel like there is a huge discomfort in the user of the internet at the prospect of encountering a digital world shaped by their thoughts in a way that they perceive themselves to have little to no control over. The right to be forgotten here resonates with that anxiety and discomfort, and I feel like the US model should definitely adopt something similar. It assumes that anonymity is an inalienable right we have, which is something i also hold to be true.

    2. There are many reasons, both good and bad, that we might want to keep information private. There might be some things that we just feel like aren’t for public sharing (like how most people wear clothes in public, hiding portions of their bodies) We might want to discuss something privately, avoiding embarrassment that might happen if it were shared publicly We might want a conversation or action that happens in one context not to be shared in another (context collapse) We might want to avoid the consequences of something we’ve done (whether ethically good or bad), so we keep the action or our identity private We might have done or said something we want to be forgotten or make at least made less prominent We might want to prevent people from stealing our identities or accounts, so we keep information (like passwords) private We might want to avoid physical danger from a stalker, so we might keep our location private We might not want to be surveilled by a company or government that could use our actions or words against us (whether what we did was ethically good or bad)

      People have many things wanted to be private, personal life, messages between friends and more, privacy is very important in modern years, especially in recent years as more and more things have begun to go digital, it highlights even further then importance of our data privacy, but data leaking is always inevitable...

    1. It is not enough to do research for a paper. It is also important to show the evidence you collected so your readers can understand why you came to the conclusion that you did.

    1. Key Changes 1. Block Reward Reduction, from 5eth to 3 eth. intro of the EIP-649, which brought about difficulty bomb. 2. new opcodes for smart contract, suuport for static calls(via eip -214) eip -140, 196 and 197. 3. light transaction receipt. EIP -658.

    2. (EIPs 196 & 197)

      EIP-196: EC point addition precompile

      EIP-197: EC point scalar multiplication precompile

      Curve: alt_bn128

      Goal: make heavy cryptography feasible in the EVM

    3. EIP-140

      allows for REVERT opcode, this code allows one to retert a failed opration, without comsuming the whole gaas, INVALID as the opcode before it, that actually consumes all gas. revert made possible for debug, and gas retrun on remain.

    1. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      Private messaging creates’ an expectation of privacy, but there are situations where limited access is necessary to protect users from threats or harassment. The challenge is designing systems that allow reporting and evidence sharing in harmful situations without turning routine private communication into something routinely monitored.

    1. The community archival perspective of this fourth paradigm does not stop withencouraging community archives to keep their archives to serve their own and,eventually, society’s interests in having expanded, vibrant, usable, and contextu-alized records for memory and identity, by sharing expertise and knowledge in bothdirections. Archivists can also engage interested members of the community ininteractive dialogues with mainstream archives and their holdings. Participatorydescription of mainstream archival holdings through online tagging and commen-tary by users and community members, in early experiments, has suggested that bysuch means, records can come into sharper focus and clearer context, addingvaluable information that archivists would not have the time or contacts orknowledge to unearth—to say nothing of building enthusiastic support for archivesthrough such welcoming attitudes (Yakel 2011; Huvila 2008). Another initiative isto rethink appraisal and acquisition in terms of creating a virtual, inclusive, ‘‘total’’archive for a country, province or state, or similar jurisdiction, one held by manyarchives and libraries, including community archives, but unified in conception andcomprehensiveness. Canada is now moving to make ‘‘total archives’’ more thanrhetorical flourish or institutional aspiration, but actual operational reality, within apan-Canadian national collaborative stewardship network to appraise, acquire, andpreserve the nation’s documentary heritage, whether published or unpublished,analogue or digital, text, graphic, or sound. As the Librarian and Archivist ofCanada has recently written, ‘‘We are beginning to understand that the constructionand constitution of the civic goods of public memory are a collective, socialresponsibility requiring broad participation across all sectors.’’

      What resonated most with me in this passage was Cook’s emphasis on collective civic accountability and responsibility in archival practice. Traditionally, archival spaces have frequently functioned as exclusive environments, where access was limited and interaction with records was restricted to a specific, skilled group of professionals. I do not agree that this model serves the greater good. If materials are preserved but remain inaccessible to the communities they serve, the archival mission is then a failure. Cook’s argument reinforces the idea that archives should reflect the perspectives, experiences, and sentiments of the communities they serve. I was affected by the example of Canadian archival initiatives. The Canadian archival system demonstrates how a coordinated and collaborative system can bring together institutions, professionals, and communities in order to support more inclusive access and stewardship. In contrast, the current standings of archival work in the United States appear to be moving in the opposite direction, especially regarding access and preservation. This passage made me reflect on how openness and collaboration have the potential to revitalize archives and align them more closely with the needs of society.

    1. One of the main goals of social media sites is to increase the time users are spending on their social media sites. The more time users spend, the more money the site can get from ads, and also the more power and influence those social media sites have over those users. So social media sites use the data they collect to try and figure out what keeps people using their site, and what can they do to convince those users they need to open it again later.

      This comment points to how modern social media platforms operate within an attention economy, where user time and engagement are the primary resources being monetized. By analyzing user behavior data and what people click, watch, like, or share: platforms can tailor content and notifications to keep users returning more often and staying longer.

    1. By looking at enough data in enough different ways, you can find evidence for pretty much any conclusion you want. This is because sometimes different pieces of data line up coincidentally (coincidences happen), and if you try enough combinations, you can find the coincidence that lines up with your conclusion.

      This observation highlights a real issue in data analysis known as data dredging or p-hacking: when people search through large amounts of data without a clear hypothesis, they can often find patterns that look meaningful but are actually just coincidences.

    2. By looking at enough data in enough different ways, you can find evidence for pretty much any conclusion you want. This is because sometimes different pieces of data line up coincidentally (coincidences happen), and if you try enough combinations, you can find the coincidence that lines up with your conclusion.

      This observation highlights a real issue in data analysis known as data dredging or p-hacking: when people search through large amounts of data without a clear hypothesis, they can often find patterns that look meaningful but are actually just coincidences.

    1. Ethnic Studies has always been interdisciplinary in nature, meaning that it combines the strengths and perspectives of multiple disciplines

      This helped me understand the core principles from which ethnic studies truly derives from.

    1. Solution 2 : Sicko's Lagoon

      This solution seems to revolve around the following

      • Loot being constant but not generous. This menas the player will always be picoing things up but everything matters.
      • Loot being losable. So that everything they have muat be guarded but of course that playing the game is inevitably risking losing it.
      • Interdependent. This means that there's no 'win button'. Very little will actually win you the game and as such you're looking for something thatauits your needs. And when you don't find it you're doing your best to use what you have.
      • Indirectly supportive og your goal. The racing game here is an excellent example because going faster won't help you win if your turning circle is rubbish. So the core challenge or test must require an interaction of different abilities to overcome.
    1. When you participate in the world you then participate in the worst of it. You can’t write up a sign at the beginning of an article that says “no monsters read further.” All attempts at this—and I've seen them all—fail. Even if you did they'd ignore the sign, because they're monsters. Someone awful will eventually read this too. Maybe you. Maybe just OpenAI's chat spider. Hi buddy.

      is this true

      has it always been true

      must everything wend its way through every shit-filled crevasse

    1. With white supremacy secured, prominent white southerners looked outward for support. New South boosters hoped to confront post-Reconstruction uncertainties by rebuilding the South’s economy and convincing the nation that the South could be more than an economically backward, race-obsessed backwater. And as they did, they began to retell the history of the recent past. A kind of civic religion known as the “Lost Cause” glorified the Confederacy and romanticized the Old South.

      How did the “Lost Cause” help white southerners justify white supremacy and reshape the South’s image to the rest of the nation?

    2. For April Fool’s Day in 1878, the New York Daily Graphic published a fictitious interview with the celebrated inventor Thomas A. Edison. The piece described the “biggest invention of the age”—a new Edison machine that could create forty different kinds of food and drink out of only air, water, and dirt. “Meat will no longer be killed and vegetables no longer grown, except by savages,” Edison promised. The machine would end “famine and pauperism.”

      Why do you think people in 1878 were willing to believe that technology could completely end hunger and poverty?

    1. Elsewhere, Israel’s Nostromo Energy became the latest vendor to bring a data center “ice battery” to the market. Ice batteries work by cooling ice stored in cells at times where demand for power is low. The batteries use the cold temperature of the ice to chill the cooling liquid needed in HVAC systems, eliminating the need for mechanical chillers, which are big consumers of electricity. Nostromo believes it can make up to 40 percent of data center power consumption flexible, which could be a big boon for operators looking to trim costs.

      This is actually a good example of dispatchable demand response - It's like an ipdated version of the practice of making nice at night.

    2. Open standards are emerging in liquid cooling, and many vendors are following the blueprint laid out by Google with its Project Deschutes, the in-house CDU design developed by the cloud and search giant. Revealed earlier this year, Google has made the specs of Project Deschutes available to the Open Compute Project (OCP) community.At the OCP Europe Summit, held in Dublin in May, Google revealed the extent of its own liquid cooling deployments, demonstrating how the technology has taken hold among the hyperscalers. Around half of Google’s global data center footprint has liquid cooling enabled and/or deployed, meaning the firm has around 1GW of liquid cooling capacity deployed across 2,000 pods equipped with its Tensor Processing Unit AI chips. It achieved uptime of 99.999 percent.

      Wow, half of Google's data centers are now using liquid cooling.

    1. Podcasts have also helped create a burgeoning class of casually obsessive consumers, searching for fresh crumbs of information thanks to an over-exposure to the same true-crime(-adjacent) stories or the same hosts discussing their lives each week

      The repetitiveness of true-crime stories has resulted in people going back to find more podcasts to quench their thirst for new material.

    2. The podcast model has popularised the documentation then dramatisation of real stories

      People enjoy the shock factor that comes in real true crime stories.

    3. Debuting in 2014, it saw journalist Sarah Koenig investigate the 1999 killing of Hae Min Lee, breaking records by becoming the first podcast to top 5m downloads later that year. The following year it won a Peabody award and in 2023, Adnan Syed, the man serving a life sentence for Lee’s murder, was released after the show highlighted flaws in the original case (though a Maryland appeals court has recently reinstated the murder conviction and Syed’s legal status remains uncertain).

      Supports my podcast by displaying a similar one that was actually able to help release a man who was wrongfully convicted. This shows that not only are the podcasts trustworthy, but also helps in the outside world.

    4. The accessible nature of podcasts means they are able to attract a large audience keen to repay the hosts for all the hitherto free entertainment,

      easy access grants more attraction to podcasts of people looking for news sources or entertainment. Are there podcasts that aren't free?

    1. CNM students have access to The Learning and Computer Center (TLCc), which is available on six campuses: Advanced Technology Center, Main, Montoya, Rio Rancho, South Valley, and Westside. At these writing centers, trained tutors help students meet college-level expectations. The tutoring centers offer one-on-one meetings, online, and group sessions for multiple disciplines. TLCc also offers workshops on citing and learning how to develop a

      Important for later incase you need some extra help in this course

    1. Rather, it is the combination and interplay of regulatory sites and regulatory mechanisms that ultimately determines flow into, through, and out of the pathway.

      It's fascinating how even a simple cell maintains so much control over its metabolic processes. Even though these regulatory mechanisms seem complex, they're actually the most energy-efficient because they prevent the cell from wasting energy.

    1. Metadata: Sometimes the metadata that comes with content might violate someone’s privacy. For example, in 2012, former tech CEO John McAfee was a suspect in a murder in Belize, John McAfee hid out in secret. But when Vice magazine wrote an article about him, the photos in the story contained metadata with the exact location in Guatemala.

      With how revealing metadata can be, it makes me wonder why platforms even include the metadata in posts. And should media outlets should be more responsible for removing metadata before publishing content that could put people at risk like this example?

    1. Microaggressions are defined and typed by Derald Wing Sue in the chart below.  Sue has built on the work of Dr. Chester Pierce who first coined the term in the 1970s. See the chart below.

      I also connected this to what I see in popular culture and social media. A lot of online “allyship” looks loud and performative, but not always relational. Sue et al.’s point about microinterventions being about reassurance and not leaving someone alone in their experience feels very different from posting something just to be seen as on the right side. It makes me think about how real resistance happens in everyday moments, not just big statements.

    2. RosalieRolon-Dow (2019) has created a microaffirmations typology that can be a helpful tool for understanding this type of microintervention more thoroughly.

      In Rolón-Dow’s microaffirmations typology, especially in the category about listening and validating lived experiences, how do we tell the difference between genuinely affirming someone and unintentionally centering ourselves as the helper?

    1. “All men are free and equal in the grave, if it comes to that, Mr. Wilson,” said George.

      This statement from George shows how badly he wants to obtain freedom, and how he is willing to die if he has to, as he would rather die then spend more of his life enslaved.

    2. No tear dropped over that pillow; in such straits as these, the heart has no tears to give,—it drops only blood, bleeding itself away in silence.

      This line is a strong description and visual for the silent suffering that slaves are forced to go through. The heart is only on the inside, and can't be seen by others, only felt by the person. It shows how horrible life was for people in slavery and how the worst part is the emotional trauma that is caused by it and not seen.

    3. If it were your Harry, mother, or your Willie, that were going to be torn from you by a brutal trader, tomorrow morning,—if you had seen the man, and heard that the papers were signed and delivered, and you had only from twelve o’clock till morning to make good your escape,—how fast could you walk?

      This part directly calls out to the reader, pushing them into Eliza's shoes and showing how intense and harrowing of a situation it is. It helps to connect the reader to her and get them to relate to her, as most everyone understands motherly love. This is especially important at the time of release as it can get a reader to relate to her in a way they wouldn't have thought of otherwise.

    4. “My dear,” said Mrs. Shelby, recollecting herself, “forgive me. I have been hasty. I was surprised, and entirely unprepared for this;—but surely you will allow me to intercede for these poor creatures. Tom is a noble-hearted, faithful fellow, if he is black. I do believe, Mr. Shelby, that if he were put to it, he would lay down his life for you.”

      Once more, despite the difference in race and the effects of the time, Mrs. Shelby stands up for Tom, Harry, and even Eliza, questioning her husband's decision of choosing to sell them and how they would risk their lives for him, while he would not do the same.

    5. “What! our Tom?—that good, faithful creature!—been your faithful servant from a boy! O, Mr. Shelby!—and you have promised him his freedom, too,—you and I have spoken to him a hundred times of it. Well, I can believe anything now,—I can believe now that you could sell little Harry, poor Eliza’s only child!” said Mrs. Shelby, in a tone between grief and indignation.

      This passage here presents how, despite the differences in race and the effects of the time, Mrs. Shelby truly does care for Tom, Harry, and even Eliza, so much so she feels willing to uphold the promise of granting Tom his freedom.

    6. “Hush, Harry,” she said; “mustn’t speak loud, or they will hear us. A wicked man was coming to take little Harry away from his mother, and carry him ’way off in the dark; but mother won’t let him—she’s going to put on her little boy’s cap and coat, and run off with him, so the ugly man can’t catch him.”

      This whole paragraph brilliantly showcases to the audience how Stowe expertly uses motherhood, appealing to the audience's sympathy by presenting how Harry's mother is willing to sacrifice herself and get into deeper trouble if it means sparing her son from being sold off and taken from her.

    1. 16.6: Case Study Conclusion: Bronchitis and Chapter Summary
      •   Bronchitis Treatment: Inhaling moist air from a humidifier or steamy shower can help loosen and thin mucus, making breathing easier.
      •   Bronchitis Symptoms: Coughing, sore throat, chest congestion, and coughing up thick mucus.
      •   Bronchitis Cause: Usually caused by viruses, not bacteria, so antibiotics are generally ineffective.
      •   Bronchitis Definition: Inflammation of the bronchial tubes, causing narrowing and excessive mucus production.
      •   Mucus Function and Problem: Mucus traps pathogens but excessive production hinders airflow, leading to coughing.
      •   Bronchitis Treatment: Thinning mucus for effective coughing through fluids, humidifiers, steam, and expectorants, while avoiding cough suppressants.
      •   Reason for Pulse Oximetry: To check Sacheen’s blood oxygen level and ensure clogged airways weren’t impacting her oxygen intake.
      •   Difference Between Acute and Chronic Bronchitis: Acute bronchitis is a short-term condition often caused by a cold or flu, while chronic bronchitis is a long-term condition often caused by smoking and associated with COPD.
      •   Smoking Cessation Advice: Dr. Tsosie strongly advised Sacheen to quit smoking to prevent future respiratory infections, COPD, and lung cancer.
      •   Respiratory System Function: Critical for gas exchange and protecting the body from harmful substances in the air.
      •   Respiratory System Vulnerability: Prone to infections and damage from allergens, mold, air pollution, and cigarette smoke.
      •   Respiratory System Overview: Comprises the upper respiratory tract (nasal cavity, pharynx, larynx) for air conduction and the lower respiratory tract (trachea, bronchi, bronchioles, lungs) for conduction and gas exchange.
      •   Respiratory System Defense: The mucociliary escalator, consisting of mucus-producing cells and cilia, protects the lungs by trapping and expelling harmful particles and pathogens.
      •   Breathing Regulation: The respiratory system, controlled by the brain, regulates breathing rate based on carbon dioxide levels in the blood to maintain homeostasis.
      •   Breathing Mechanics: Breathing involves inhaling (active process driven by diaphragm contraction) and exhaling (passive process driven by lung elasticity).
      •   Gas Exchange Definition: The biological process of transferring gases across cell membranes for entering or leaving the blood.
      •   Gas Exchange Mechanism: Occurs by diffusion across cell membranes, moving down a concentration gradient from high to low concentration.
      •   Lung Gas Exchange: Takes place in alveoli, where deoxygenated blood picks up oxygen and releases carbon dioxide.
      •   Smoking and COPD: Smoking is the primary cause of COPD, reducing lung elasticity and impairing exhalation.
      •   Smoking and Lung Cancer: Smoking is the leading cause of lung cancer, a malignant tumor characterized by uncontrolled cell growth in the lungs.
      •   Health Risks of Smoking: Smoking poses numerous health risks, including increased risk of various cancers, cardiovascular disease, and other adverse effects.
      •   Respiratory System Function: The respiratory system facilitates gas exchange, bringing oxygen into the body and removing carbon dioxide.
      •   Gas Exchange Mechanism: Oxygen and carbon dioxide flow across membranes based on concentration gradients, moving from areas of higher to lower concentration.
      •   COPD and Blood pH: COPD can lead to elevated carbon dioxide levels, causing respiratory acidosis and prompting the body to compensate by increasing breathing rate.
      •   Bronchitis Treatment: Changes to the environment, such as more frequent cleaning, would not help asthma caused by a gene.
      •   Bronchitis Definition: Bronchitis is an inflammation of the bronchi, the large and medium-sized airways in the lungs that carry air from the trachea.
      •   Bronchodilator Definition: A medication that opens constricted airways.
      •   Funding Sources: Department of Education Open Textbook Pilot Project, UC Davis Office of the Provost, UC Davis Library, California State University Affordable Learning Solutions Program, Merlot, and National Science Foundation.
      •   Support: NICE CXone Expert and LibreTexts libraries.
      •   Contact Information: info@libretexts.org.
      
    2. 16.1: Case Study: Respiratory System and Gas Exchange
      •   Patient Information: Sacheen, a 20-year-old smoker, presents with a worsening cough, thick mucus production, sore throat, and chest congestion after an initial mild cough.
      •   Medical History: Sacheen recently experienced symptoms of a common cold, including runny nose, fatigue, and mild cough.
      •   Doctor’s Actions: Dr. Tsosie examines Sacheen, inquires about her symptoms and medical history, and measures her blood oxygen level using a pulse oximeter.
      •   Diagnosis: Sacheen has bronchitis, an infection commonly occurring after a cold or flu.
      •   Treatment Recommendations: Dr. Tsosie recommends Sacheen to thin and remove mucus by drinking plenty of fluids, using a humidifier, getting plenty of rest, and avoiding smoking.
      •   Chapter Overview: The chapter will cover the respiratory system, the process of respiration, and acute bronchitis.
      •   Respiratory System Overview: Includes lungs, bronchial tubes, and the rest of the respiratory tract, responsible for breathing and gas exchange.
      •   Breathing Regulation: Rate of breathing is regulated to maintain blood gas and pH homeostasis.
      •   Respiratory Disorders: Asthma, pneumonia, COPD, and lung cancer are examples of respiratory system disorders.
      •   Content Source: This page is from a CK-12 licensed resource authored by Suzanne Wakim & Mandeep Grewal.
      •   Content Topic: Respiratory System and Gas Exchange.
      •   Content License: CK-12 license.
      
    3. 16.4: Disorders of the Respiratory System
      •   Dust Mite Allergy: Dust mite feces contain proteins that can trigger asthma attacks.
      •   Asthma Definition: A chronic inflammatory disease of the lungs where airways periodically become inflamed.
      •   Asthma Symptoms: Airways narrow and may become clogged with mucus, making breathing difficult.
      •   Asthma Definition: A chronic lung disease causing swelling and narrowing of airways, leading to difficulty breathing.
      •   Asthma Triggers: Environmental factors like allergens, pollution, and stress, along with genetic predisposition.
      •   Asthma Treatment: Inhaled bronchodilators for immediate relief and corticosteroids for long-term control, along with trigger avoidance.
      •   Pneumonia Definition: Inflammation of the alveoli in the lungs, causing fluid buildup and impaired gas exchange.
      •   Pneumonia Symptoms and Causes: Coughing, chest pain, difficulty breathing, fever, often caused by bacterial or viral infections.
      •   COPD Definition: Chronic lung disease characterized by poor airflow, leading to shortness of breath and coughing.
      •   COPD Causes: Tobacco smoking is the major cause, followed by air pollution and genetics.
      •   COPD Symptoms: Reduced lung function, trapped air, impaired gas exchange, low oxygen levels, and high carbon dioxide levels.
      •   Lung Cancer Definition: Malignant tumor in the lungs characterized by uncontrolled cell growth, originating from lung tissue or metastasized from other parts of the body.
      •   Primary Cause: Tobacco smoking, accounting for about 85% of cases.
      •   Other Risk Factors: Exposure to radon gas, asbestos, secondhand smoke, air pollutants, and family history of lung cancer.
      •   Prognosis and Treatment: Often diagnosed late, making it the leading cause of cancer-related death; treatment options include surgery, radiation therapy, and chemotherapy.
      •   Sleep Apnea Definition: A potentially dangerous sleep disorder characterized by pauses in breathing due to physical blockage of the airway.
      •   Sleep Apnea Symptoms: Loud snoring, restless sleep, daytime sleepiness, fatigue, moodiness, and increased risk of accidents.
      •   Sleep Apnea Causes and Risk Factors: Relaxed muscles during sleep, exacerbated by alcohol or certain medications; more common in overweight individuals, smokers, those with diabetes, older people, and males.
      •   Sleep Apnea Treatment: Treatment options include lifestyle changes, oral devices, CPAP therapy, and surgery.
      •   CPAP Therapy: CPAP is the most common treatment for moderate to severe sleep apnea, using pressurized air to keep the airway open.
      •   Sleep Apnea Risk Factors: Sleeping on one’s back can increase the risk of sleep apnea due to potential airway blockage.
      •   Source of the Text: The text is adapted from “Human Biology” by CK-12 and licensed under CC BY-NC 3.0.
      •   Content of the Text: The text is about disorders of the respiratory system.
      •   License and Authorship: The page is shared under a CK-12 license and authored by Suzanne Wakim & Mandeep Grewal.
      
    4. •   Respiration Definition: The process of releasing water vapor and other gases from the body.
      •   Breath Visibility: Exhaled warm, moist air condenses into tiny droplets in cold weather, making it visible.
      •   Respiration and Temperature: Exhaled air is warm and contains water vapor, which condenses in cold air.
      •   Respiration Definition: Life-sustaining process of gas exchange between the body and the atmosphere, involving oxygen intake and waste gas removal.
      •   Respiratory System Function: Supplies oxygen for cellular respiration and removes carbon dioxide produced by cells.
      •   Respiratory System Processes: Ventilation (breathing) and gas exchange (oxygen and carbon dioxide diffusion).
      •   Respiratory System Organs: Lungs, trachea, bronchi, and diaphragm are involved in respiration.
      •   Upper Respiratory Tract Function: Provides a route for air to move between the outside atmosphere and the lungs, cleaning, humidifying, and warming the incoming air.
      •   Nasal Cavity Function: Warms and humidifies inhaled air, traps foreign particles, and contains chemoreceptors for smell and taste.
      •   Pharynx Function: Connects nasal cavity and mouth to the throat, serving as a passageway for both air and food.
      •   Larynx Function: Connects pharynx and trachea, houses vocal cords for sound production, and protects the trachea from food aspiration.
      •   Lower Respiratory Tract: A tree-like branching system of passages within the lungs.
      •   Respiratory Tract Structure: Inverted tree-like shape with 1,500 miles of airways conducting air to the lungs.
      •   Trachea Function: Connects the larynx to the lungs, allowing air passage.
      •   Lung Function: Site of gas exchange between air and bloodstream.
      •   Lung Structure: Two lungs, right lung larger with three lobes and left lung smaller with two lobes, suspended in the pleural cavity.
      •   Alveoli Function: Tiny air sacs where gas exchange occurs, providing a large surface area for oxygen absorption and carbon dioxide release.
      •   Blood Supply: Lungs receive deoxygenated blood for oxygenation and oxygenated blood for cellular respiration.
      •   Respiratory System Importance: Vital for survival, requiring protection due to its exposure to harmful substances.
      •   Mucociliary Escalator: A primary defense mechanism where mucus traps particles and cilia move them away from the lungs.
      •   Coughing Mechanism: An involuntary response to remove mucus, debris, and irritants from the respiratory tract.
      •   Sneezing Mechanism: Sneezing is an involuntary response triggered by irritation in the nasal passage, resulting in the forceful expulsion of air, mucus, and debris from the mouth.
      •   Respiratory System and Homeostasis: The respiratory system collaborates with the nervous and cardiovascular systems to maintain homeostasis in blood gases (oxygen and carbon dioxide) and pH levels.
      •   Carbon Dioxide Regulation: The body primarily monitors carbon dioxide levels to regulate breathing rate and maintain blood gas and pH balance.
      •   Respiratory and Cardiovascular System Interaction: The respiratory system exchanges gases with the outside air, while the cardiovascular system transports these gases to and from body cells.
      •   Choking Definition and Causes: Choking is the mechanical obstruction of airflow into the lungs, often caused by objects blocking the pharynx or trachea, particularly in young children.
      •   Choking Symptoms and Signs: Inability to speak or cry, labored breathing, clutching the throat, and blue discoloration of the face indicate choking.
      •   Choking Treatment for Infants: Turn the baby upside down and slap on the back to dislodge the object.
      •   Choking Treatment for Older People: Encourage coughing, give back slaps, and if needed, perform the Heimlich maneuver.
      •   Emergency Action for Choking: If choking persists after the Heimlich maneuver, call for emergency medical care.
      •   Respiratory System Overview: The respiratory system facilitates breathing, enabling the exchange of oxygen and carbon dioxide.
      •   Key Components: The respiratory system includes the larynx, lungs, alveoli, and ciliated epithelium.
      •   Respiratory Processes: Breathing involves inhalation and exhalation, while sneezing is a reflex action to expel irritants.
      •   Page Source: This page is from CK-12 and authored by Suzanne Wakim & Mandeep Grewal.
      •   Content License: The page is shared under a CK-12 license.
      •   Content Topic: The page is about the structure and function of the respiratory system.
      
    5. 16.2: Structure and Function of the Respiratory System Last updated May 7, 2022 Save as PDF 16.1: Case Study: Respiratory System and Gas Exchange 16.3: Breathing
      •   Respiration Definition: The process of releasing water vapor and other gases from the body.
      •   Breath Visibility: Exhaled warm, moist air condenses into tiny droplets in cold weather, making it visible.
      •   Respiration and Temperature: Exhaled air is warm and contains water vapor, which condenses in cold air.
      •   Respiration Definition: Life-sustaining process of gas exchange between the body and the atmosphere, involving oxygen intake and waste gas removal.
      •   Respiratory System Function: Supplies oxygen for cellular respiration and removes carbon dioxide produced by cells.
      •   Respiratory System Processes: Ventilation (breathing) and gas exchange (oxygen and carbon dioxide diffusion).
      •   Respiratory System Organs: Lungs, trachea, bronchi, and diaphragm are involved in respiration.
      •   Upper Respiratory Tract Function: Provides a route for air to move between the outside atmosphere and the lungs, cleaning, humidifying, and warming the incoming air.
      •   Nasal Cavity Function: Warms and humidifies inhaled air, traps foreign particles, and contains chemoreceptors for smell and taste.
      •   Pharynx Function: Connects nasal cavity and mouth to the throat, serving as a passageway for both air and food.
      •   Larynx Function: Connects pharynx and trachea, houses vocal cords for sound production, and protects the trachea from food aspiration.
      •   Lower Respiratory Tract: A tree-like branching system of passages within the lungs.
      •   Respiratory Tract Structure: Inverted tree-like shape with 1,500 miles of airways conducting air to the lungs.
      •   Trachea Function: Connects the larynx to the lungs, allowing air passage.
      •   Lung Function: Site of gas exchange between air and bloodstream.
      •   Lung Structure: Two lungs, right lung larger with three lobes and left lung smaller with two lobes, suspended in the pleural cavity.
      •   Alveoli Function: Tiny air sacs where gas exchange occurs, providing a large surface area for oxygen absorption and carbon dioxide release.
      •   Blood Supply: Lungs receive deoxygenated blood for oxygenation and oxygenated blood for cellular respiration.
      •   Respiratory System Importance: Vital for survival, requiring protection due to its exposure to harmful substances.
      •   Mucociliary Escalator: A primary defense mechanism where mucus traps particles and cilia move them away from the lungs.
      •   Coughing Mechanism: An involuntary response to remove mucus, debris, and irritants from the respiratory tract.
      •   Sneezing Mechanism: Sneezing is an involuntary response triggered by irritation in the nasal passage, resulting in the forceful expulsion of air, mucus, and debris from the mouth.
      •   Respiratory System and Homeostasis: The respiratory system collaborates with the nervous and cardiovascular systems to maintain homeostasis in blood gases (oxygen and carbon dioxide) and pH levels.
      •   Carbon Dioxide Regulation: The body primarily monitors carbon dioxide levels to regulate breathing rate and maintain blood gas and pH balance.
      •   Respiratory and Cardiovascular System Interaction: The respiratory system exchanges gases with the outside air, while the cardiovascular system transports these gases to and from body cells.
      •   Choking Definition and Causes: Choking is the mechanical obstruction of airflow into the lungs, often caused by objects blocking the pharynx or trachea, particularly in young children.
      •   Choking Symptoms and Signs: Inability to speak or cry, labored breathing, clutching the throat, and blue discoloration of the face indicate choking.
      •   Choking Treatment for Infants: Turn the baby upside down and slap on the back to dislodge the object.
      •   Choking Treatment for Older People: Encourage coughing, give back slaps, and if needed, perform the Heimlich maneuver.
      •   Emergency Action for Choking: If choking persists after the Heimlich maneuver, call for emergency medical care.
      •   Respiratory System Overview: The respiratory system facilitates breathing, enabling the exchange of oxygen and carbon dioxide.
      •   Key Components: The respiratory system includes the larynx, lungs, alveoli, and ciliated epithelium.
      •   Respiratory Processes: Breathing involves inhalation and exhalation, while sneezing is a reflex action to expel irritants.
      •   Page Source: This page is from CK-12 and authored by Suzanne Wakim & Mandeep Grewal.
      •   Content License: The page is shared under a CK-12 license.
      •   Content Topic: The page is about the structure and function of the respiratory system.
      
    1. ss: instead of trying to erase the wear and tearthat accrues inevitably with time, she finds ways of acknowledging and celebratin

      In broken aesthetics, traces of repair show the relationship between people and objects, and the passage of time. This reminds me of the debate in heritage restoration about whether to restore the old to look new or to keep the marks of time. For example, many ancient Chinese Buddhist statues are not repainted with bright colors(their original colors), but keep the color shaped by time.

    1. You’re putting in negative incentives to be good teachers.”

      What he means is that teachers want to see their students succeed, therefore teach them to write in a way that will give them a high SAT score and hopefully get into a good college. But this approach stunts the student, because they are not thinking critically about what they are writing.

    2. “a work of art is good if it has sprung from necessity.”

      I don't know who Rilke is, but I can connect with this quote. We have so many examples of beautiful works of art that were inspired by tragedy. For example Amanda Gorman wrote "the Hill we Climb", ultimately addressing the fact that our country in in poor shape but we will rise to the occasion to fix it.

    1. What assumptions do the site and your device make about individuals or groups using social media, which might not be true or might cause problems? List as many as you can think of (bullet points encouraged).

      it shows how social media is built around a “default user” who has stable internet, a newer phone, lots of attention, and no accessibility needs. The assumptions about things like vision/hearing/motor control and even privacy/safety are the ones that can cause real harm, because if the platform gets those wrong, people don’t just have a worse experience — they can get excluded or put at risk. Also love that it points out how “defaults” (autoplay, public sharing, tracking) are basically assumptions forced onto everyone unless they know how to fight the settings.

    1. Which abilities are expected of people, and therefore what things are considered disabilities, are socially defined. Different societies and groups of people make different assumptions about what people can do, and so what is considered a disability in one group, might just be “normal” in another.

      This really makes me think about how “disability” isn’t just about someone’s body or mind—it’s also about whether the environment is built to include them. If a society assumes everyone can do things one specific way (like stairs everywhere or no captions), then people get labeled “disabled” mostly because the world isn’t designed for them.

    1. You do not have to make announcements like, “This paragraph is about …” There is no need to remind your reader that he or she is reading a paper. The focus should be on the argument. This kind of announcement is unnecessary, and seeing it in a paper can be somewhat startling to the reader, who’s expecting a professional presentation.

      Don't remind the reader they are reading a paper. The focus should be on the argument.

    2. Paragraphs should be used to develop one idea at a time. If you have several ideas and claims to address, you may be tempted to combine related claims into the same paragraph. Don’t do it!

      You shouldn't combine ideas in the same paragraph because it can divide the readers attention and can make your argument not as relevant anymore.

    3. Facts are the best kind of evidence to use because they  cannot be disputed and help build your credibility.

      Facts are the best kind of evidence you can use in your body paragraphs because they provide background information and support your point of view.

    4. Be relevant to the thesis.

      The primary support should be strong. It should show, explain, or prove your main argument without leaning away from the main focus. Just because there is a lot of information doesn't not mean you should be including every little thing in each paragraph.

    5. Without primary support, your argument may not be convincing. Primary support can be described as the major points you choose to expand on as you prove your thesis.

      You need evidence/ support to make your argument more convincing.

    1. Rethinking Repair 233ethical, even moral, relationship to categories of objects long consignedto a realm

      This is a good question. It reminds me that certain objects not only have functions but also carry other meanings, for example, a sweater made by a family member, or Chinese bronze vessels that represent a hierarchical system. When preserving or repairing objects that have a clear relationship with people, what is being repaired may also be the relationship behind them.

    2. weakening of our connection to the worlds of goods and work weinhabit today

      Weakening of relational ties that the text describes in discussions of repair and care may be because the form of labor has changed. In the past, people fabricated objects by hand and had a direct and physical relationship with them. In modern production, machines replace manual labor, and people mainly use their brains. As a result, the relationship between people and the objects they produce becomes weaker than before. This may require reading further literature to fully understand.

    1. ardening is

      I would be the most interested in the gardening activity because I already enjoy gardening on my own, so learning how to do it in a way that's healthier for the environment, but also me and the crops I grow would be an awesome thing to learn and incorporate into my everyday life.

    2. In conclusion, there are many ways to enjoy eco-friendly leisure activities. Whether you enjoy hiking, gardening, outdoor pursuits, crafts, or ecotours, you can find ways to reduce your environmental impact while having fun.By engaging in these activities, you can help protect the environment while improving your mental and physical well-being.

      Something to add would be how to find these different activities, would it be online, in a pamphlet, through local booking agencies, that kind of thing.

    3. 5 – Eco-tours

      eco tours are tours that focus on preserving the enviroment, when booking make sure to find an operator that adheres to the environmental rules and that does not disturb natural habitats.

    4. Commentaires fermé

      I think the intended audience is people wanting to get out more, or even tourists. Showing these different activities that do not require technology or spending money really helps the environment.

    5. 5 idées de loisir écoresponsable

      based off of my scanning of the text, i think this article will be informative and entertaining, its showing us different ways and activities to enjoy the outdoors

    1. nglish-Only laws and practices, then, emerge as much more than misguided efforts to achieve national uniformity or a pleasinglinguistic sameness

      continuing the project of white supremacy and cultural and linguistic homogeneity

    2. public accommodation

      how does this interact w/ SC ruling banning racial discrimination in places of public accommodation / defending Congressional power to regulate due to the Commerce Clause - Heart of Atlanta Motel case ?

    3. ince relatively fewmainstream historians read Spanish or consulted these sources, Latino lynching remained beyond the ken of most mainstreamreaders

      epistemological erasure - gap between what happens and what is known and understood

    4. Although the violence amounted to beatings, forcible undressings, and other forms of nonlethal humiliation, theattacks went on for several days without official intervention. 18 As with the earlier wave of lynching, the World War II-eraattacks targeted Mexican youths who displayed their identity too proudly and openly

      state sanctioned violence via the violence of under-protection

    1. er, wenn du dachtest, Bitcoin & Co. seien nur was für Tech-Geek-Memes und Tesla-Jünger, dann aufgepasst: Rund zwölf Prozent der Deutschen besitzen Kryptowährungen. Das sind rund 7 Millionen Menschen. Und allein 2024 realisierten diese Krypto-Nutzer geschätzte 47,3 Mrd. Euro Gewinn. Eine ordentliche Summe, an der das Finanzamt durchaus interessiert ist.

      insert a footnote here. It should connect to this source at the end of the text: Beatvest: Bitcoin-Statistik für Deutschland & weltweit [2025]

  4. pressbooks.library.torontomu.ca pressbooks.library.torontomu.ca
    1. They sought to do this by purging theparty of Negro influence and a Negro share in the spoils of victory and byattracting the new South's businessmen.

      Every party is discriminatory

    Annotators

  5. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. While we have our concerns about the privacy of our information, we often share it with social media platforms under the understanding that they will hold that information securely. But social media companies often fail at keeping our information secure. For example, the proper security practice for storing user passwords is to use a special individual encryption process [i6] for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time [i7]).

      No matter how strong the password is, as the context suggested, social media companies may not be able to secure our data privacy, this is because the detection of password is outdated as it mentioned brute force, that a program that can generate millions of pattern to break the account security lock.

    1. It prohibited, in particular, persons concerned from complying with the laws included inthe annex or acts resulting therefrom (Article 5, first paragraph), unless an authorisation to beexempt from that prohibition was obtained, which could be granted by the European Commissionwhere non-compliance with those foreign laws would seriously harm the interests of the personscovered by that regulation or those of the European Union

      limit to the long-armed reach of US laws; competing interests in state sovereignty and liberty; where does US interest and coercion end and others' liberties begin?

    2. Since that date, it is onceagain prohibited for any person to trade, outside the territory of the United States, with any personor entity included in that list

      discriminatory? presumably based in territoriality (jdiction)

    Annotators