- Oct 2024
-
kumu.brocku.ca kumu.brocku.ca
-
The entrepreneurial children, like theentrepreneur in the forest, seemed to have a kind of intelligence not well measuredby conventional tests
Their "street math" was not replicated in the classroom... They exhibited "street smarts" (not book smarts)
Have you ever been in a situation where your book smarts failed you in the "real" world? Contrarily, how often has "street" knowledge helped you in school?
-
intelligence is not asingle entity.
crucial insight - we have access to multiple intelligences!
Please note - this is definitely related to the "theory of multiple intelligences" (which was the basis for the reality TV series "Canada's Smartest Person"):
https://en.wikipedia.org/wiki/Theory_of_multiple_intelligences
-
Clearly, more is involved in entrepreneurial success than just the academic side ofintelligence
Think about how often your ability to act in a "socially competent" manner came off as intelligent (a way of adapting to, shaping, and sometimes selecting your environment).
Knowing the right thing to say or how to act (cultural capital) comes off as "smart"
-
There is obviously more to intelligence than what conventional tests of intelligence
the moral of the story
-
Successful entrepreneurs appearto be higher in social competence than are unsuccessful ones. In particular, four factors seemto underlie this social competence: social perception (which involves accuracy in perceivingothers), (b) impression management (which involves techniques for inducing positivereactions in others), (c) persuasiveness (which involves the ability to change others’ viewsor behavior in desired directions), and (d) social adaptability (which involves feelingcomfortable in a wide range of situations). These variables, especially social perception,seem to be key to entrepreneurial success.
** remember these 4 factors of social competence! (they will be very helpful next week!)
-
Successful entrepreneurship requires a blend of analytical, creative, and practical aspects ofintelligence, which, in combination, constitute successful intelligence.
ok - getting right to the heart of it. Introduces the key concepts and emphasizes its 3 parts.
-
Perhaps you know the story of the college professor and the entrepreneur who arewalking in a forest.
funny story - the punchline is at the end of the next paragraph!
-
sometimes they change themselves to fit the environment; other times,they change the environment to fit them; still other times, they find a different environment
what I was talking about at the end of last Thursday's class...
-
Successful intelligenceis the ability to succeed in life, according to one’s own conception of success, within one’senvironmental context.
key concept, defined
-
Creative intelligence is needed in order to think flexiblyand to be ahead of the pack rather than merely with it.
link to divergent thinking...
-
reative thinkers defy the crowd,seeing alternative ways of defining and solving problems that others often do not see
link to opportunity discovery/creation
-
Creative intelligence is used to generate ideas that are novel, high in quality, andappropriate to the task one faces.
ok - definition by contextualization (and very similar to last week's material...)
-
Tobe effective on the job, however, requires a third kind of skill beyond the analytical (IQ-based) and the practical.
completing the picture...
-
Practicalskills are necessary to apply these analytical tools correctly to the problems really facing oneon the job
but practical intelligence guides the application of intellectual intelligence...
-
there is some kind of construct of practical intelligencethat is distinct from the kind of academic intelligence
yep
-
-
www.youtube.com www.youtube.com
-
rustworthy. I
VISUAL ANNOTATIONS
-
(3:55) Code Carbon helps to provide a visual for the emissions produced in a certain time period. Much like the nutrition information on the outside of a cereal box, though it is helpful to know how many calories or grams of sugar are contained in one serving, that information would be useless without knowing what a serving size is. Even more so if we are unaware of how many calories we should consume in a given time frame. This information allows us to make informed decisions about what we should consume.
-
(5:04) This visual of the photos that are generated when she inputs her own information provides a bit of shock factor to the audience. Not only are most of those images of someone who is not her, but they are quite illicit photos of someone who is not her. Taken out of context and unknown to be AI generated, photos such as these could be detrimental to someone's career or personal life.
-
-
rustworthy. I
REACTION ANOTAION:
I never paused to consider that AI models are not contained within the digital world and exist boldly in our physical world. I figured that, since AI is so easily available on a cell phone, it couldn't possibly require so much to sustain it.
-
rustworthy. I
RESTATEMENT ANNOTAIONS
-
(0:37) Though at times AI can be extremely helpful, as we often hear in the media, there is also a dark side to these functions. For instance, one chatbot suggested that the solution to one man's problems was to file for divorce. Another suggested a sure-to-please recipe for a large gathering, that contained chlorine gas among its list of ingredients.
-
(1:19) AI does not exist in solitude. Its affects have left the digital world and have begun to affect our physical world. AI models have been noted to contribute to climate change, use artist and authors work without their consent, and discriminate against entire groups of people.
-
(1:56) In regard to sustainability, the figurative cloud we imagine AI resides upon is not something only contained within the digital world. We often fail to acknowledge the large quantity of materials needed to build these models as well as the sizeable amount of energy required to sustain them.
-
-
-
Local file Local file
-
This is a story we need to know. Industrial transformation turned out tobe a bubble of promise followed by lost livelihoods and damaged landscapes.And yet: such documents are not enough. If we end the story with decay, weabandon all hope—or turn our attention to other sites of promise and ruin,promise and ruin.
Important concept: details the cycle of extracting natural (and finite) resources.
Style elements: speaks directly to the reader, repeats important phrases.
-
This is a story we know. It is the story of pioneers, progress, and the trans-formation of “empty” spaces into industrial resource felds.
"Empty" land becomes a place to extract resources for profit.
-
-
pressbooks.pub pressbooks.pub
-
As our Religion, our Education, our Art look abroad, so does our spirit of society. All men plume themselves on the improvement of society, and no man improves.
It's almost like he's telling you to spend so much time "looking within" that you forget to look around and you become closed off to the world. He's advocating exceptionalism if you think about it.
-
And so the reliance on Property, including the reliance on governments which protect it, is the want of self-reliance.
According to Emerson The secret to a fulfilled life is to just do everything yourself no matter how daunting.
-
Let a man then know his worth,
contradicts the message of keep to your self, do what you want, don't care about what others think
-
What I must do is all that concerns me, not what the people think.
Getting a strong individualism vibe.
-
For nonconformity the world whips you with its displeasure.
unpopular opinions cause estrangement.
-
-
www.sciencespo.fr www.sciencespo.fr
-
La grande hétérogénéité des preuves empiriques est apparente lorsque l'on observe les analyses plus récentes au niveau de l'entreprise, qui ne confirment pas que l'automatisation a un effet négatif sur l'emploi et les salaires globaux lorsque l'on tient compte d'une période d'adaptation (Lane et Saint-Martin, 2021). Toutefois, une grande partie de la recherche empirique reste axée sur la robotisation et l'automatisation, de sorte qu'il est encore nécessaire de procéder à une analyse plus spécifique de l'impact de l'IA générative sur les résultats en matière d'emploi.
Il est ici question des biais liés aux données collectées, aux biais des statistiques et du manque de neutralité de certaines études
-
a réduction initiale de la demande de main-d'œuvre dans les domaines hautement automatisés pourrait potentiellement conduire à une résurgence des normes traditionnelles en matière de genre,
Référence à notre réflexion plus haut concernant les biais préexistants, avant l'IA et Nouvelles Technologies
-
L'IA a également le potentiel d'accroître les barrières à l'entrée pour les nouvelles générations de main-d'œuvre en raison de l'inégalité d'accès à l'éducation
Un souci primordial à expliciter lorsqu'on parle de l'IA sur le marché du travail est celui de l'accéssiblité numérique, une accessiblité qui n'est pas encore étendue au monde entier et donc le sujet de l'IA dans le monde du travail ne concerne pour l'instant que les pays et les sociétés dit.e.s "développés" (pour la plupart en Occident) et donc opérer un shift majeur en faveur de technologies inacessibles pour beaucoup ne fera qu'alourdir le gap entre eux
-
C'est là que réside la possibilité d'une répartition inégale de la charge du déplacement d'emplois entre les hommes et les femmes, la recherche n'ayant pas encore apporté de réponse claire.
Cela n'est pas inhérent à l'automatisation numérique en elle-même, il s'agit là d'un souci plus systémique -> l'IA et les Nouvelles Technologies ne font que refléter en prolongeant les problèmes qui existent déjà, ce ne sont que des outils
-
Les premiers verraient ainsi la productivité de leur travail augmenter, tandis que les seconds verraient probablement la plupart de leurs tâches remplacées par l'IA et seraient donc confrontés à un risque beaucoup plus élevé de perte d'emploi.
Même risque exposé que celui de l'article précédent.
-
-
learn.cantrill.io learn.cantrill.io
-
Welcome back and by now you should understand the difference between stateless and stateful security protection.
In this lesson I want to talk about one security feature of AWS VPCs and a little bit more depth and that's network access control lists known as knuckles.
Now we do have a lot to cover so let's jump in and get started.
A network access control list we thought of as a traditional firewall available within AWS VPCs so let's look at a visual example.
A subnet within an AWS VPC which has two EC2 instances A and B.
The first thing to understand and this is core to how knuckles work within AWS is that they are associated with subnets.
Every subnet has an associated network ACL and this filters data as it crosses the boundary of that subnet.
In practice this means any data coming into the subnet is affected and data leaving the subnet is affected.
But and this is super important to remember connections between things within that subnet such as between instance A and instance B in this example are not affected by network ACLs.
Each network ACL contains a number of rules, two sets of rules to be precise.
We have inbound rules and outbound rules.
Now inbound rules only affect data entering the subnet and outbound rules affect data leaving the subnet.
Remember from the previous lesson this isn't always matching directly to request and response.
A request can be either inbound or outbound as can a response.
These inbound and outbound rules are focused only on the direction of traffic not whether it's request or response.
In fact and I'll cover this very soon knuckles are stateless which means they don't know if traffic is request or response.
It's all about direction.
Now rules match the destination IP or IP range, destination port or port range together with the protocol and they can explicitly allow or explicitly deny traffic.
Remember this one network ACLs offer both explicit allows and explicit denies.
Now rules are processed in order.
First a network ACL determines if the inbound or outbound rules apply.
Then it starts from the lowest rule number.
It evaluates traffic against each individual rule until it finds a match.
Then that traffic is either allowed or denied based on that rule and then processing stops.
Now this is critical to understand because it means that if you have a deny rule and an allow rule which match the same traffic but if the deny rule comes first then the allow rule might never be processed.
Lastly there's a catch all showed by the asterisk in the rule number and this is an implicit deny.
If nothing else matches then traffic will be denied.
So those are the basics.
Next let's move on to some more complex elements of network ACLs.
Now I just mentioned that network ACLs are stateless and this means that rules are required for both the request and the response part of every communication.
You need individual rules for those so one inbound and one outbound.
Take this example a multi-tiered application running in a VPC.
We've got a web server in the middle and an application server on the left.
On the right we have a user Bob using a laptop and he's accessing the website.
So he makes a connection using HTTPS which is TCP port 443 and this is the request as you know by now and this is also going to mean that a response is required using the ephemeral port range.
This ephemeral port is chosen at random from the available range decided by the operating system on Bob's laptop.
Now to allow for this initial communication if we're using network ACLs then we'll need to have one associated with the web subnet and it will need rules in the inbound and outbound sections of that network ACL.
Notice how on the inbound rule set we have rule number 110 which allows connections from anywhere and this is signified by 0.0.0.0 through this network ACL and this is allowed as long as it's using TCP port 443.
So this is what allows the request from Bob into the web server.
We also have on the outbound rule set rule number 120 and this allows outbound traffic to anywhere again 0.0.0.0 as long as the protocol is TCP using the port range of 1.0.2.4 to 65.5.3.5 and this is the ephemeral port range which I mentioned in the previous lesson.
Now this is not amazingly secure but with stateless firewalls this is the only way.
Now we also have the implicit denies and this is denoted by the rules with the star in the rule number and this means that anything which doesn't match rule 110 or 120 is denied.
Now it's also worth mentioning while I do have rule 110 and 120 number differently the rule numbers are unique on inbound and outbound so we could have the single rule number 110 on both rule sets and that would be okay.
It's just easier to illustrate this if I use unique rule numbers for each of the different rule sets.
Now let's move on and increase the complexity little.
So we have the same architecture we have Bob on the right, the web subnet in the middle and the application subnet on the left.
You know now that because network ACLs are stateless each communication requires one request rule and one response rule.
This becomes more complex when you have a multi-tiered architecture which operates across multiple subnets and let's step through this to illustrate why.
Let's say the pop initiates a connection to the web server we know about this already because I just covered it.
If we have a network ACL around the web subnet we'll need an inbound rule on the web network ACL.
There's also going to be response traffic so this is going to use the ephemeral port range and this is going to need an outbound rule on that same web network ACL so this should make sense so far.
But also the web server might need to communicate with the app server using some application TCP port.
Now this is actually crossing two subnet boundaries the web at subnet boundary and the application subnet boundary so it's going to need an outbound rule on the web at subnet knuckle and also an inbound rule on the application subnet knuckle.
Then we have the response for that as well from the app server through to the web server and this is going to be using ephemeral ports but this also crosses two subnet boundaries it leaves the application subnet which will need an outbound rule on that knuckle and it enters the web subnet which will also need an inbound rule on that network ACL and what if each of those servers need software updates it will get even more complex really quickly.
You always have to be aware of these rule pairs the application port request and the ephemeral response for every single communication in some cases you're going to have multi-tier architecture and this might mean the communications go through different subnets.
If you need software updates this will need more if you use network address translation or NAT you might need more rules still.
You'll need to worry about this if you use network ACLs within a vpc for traffic to a vpc or traffic from a vpc or traffic between subnets inside that vpc.
When a vpc is created it's created with a default network ACL and this contains inbound and outbound rule sets which have the default implicit deny but also a capsule allow and this means that the net effect is that all traffic is allowed so the default within a vpc is that knuckles have no effect they aren't used this is designed [Music] I need to be beginner friendly and reduce admin overhead.
AWS prefer using security groups which I'll be covering soon.
If you create your own custom network ACLs though that's a different story.
Custom knuckles are created for a specific vpc and initially they're associated with no subnets.
They only have one rule on both the inbound and outbound rule sets which is the default deny and the result is that if you associate this custom network ACL with any subnets all traffic will be denied so be careful with this it's radically different behavior than the default network ACL created with a vpc.
Now this point I just want to cover some finishing key points which you need to be aware of for any real-world usage and when you're answering exam questions.
So network access controlists remember they're known as knuckles they are stateless so they view request and response as different things so you need to add rules both for the request and for the response.
A knuckle only affects data which is crossing the subnet boundary so communications between instances in the same subnet is not affected by a network ACL on that subnet.
Now this can mean that if you do have data crossing between subnets then you need to make sure that each knuckle on both of those subnets has the appropriate inbound and outbound rules so you end up with a situation where one connection can in theory need two rules on each knuckle if that connection is crossing two different subnet boundaries.
Now knuckles are able to explicitly allow traffic and explicitly deny and the deny is important because as you'll see when I talk about security groups this is a capability that you need to network ACLs.
So network ACLs allow you to block specific IPs or specific IP ranges which are associated with bad actors so they're a really good security feature when you need to block any traffic attempting to exploit your systems.
Now network ACLs are not aware of any logical resources they only allow you to use IPs and cyber ranges ports and protocols you cannot reference logical resources within AWS and knuckles can also not be assigned two logical resources they're only assigned to subnets within VPCs within AWS.
Now knuckles are very often used together with security groups such as mentioned to add the capability to explicitly deny bad IPs or bad networks so generally you would use security groups to allow traffic and you use knuckles to deny traffic and I'll talk about exactly how this works in the next lesson.
Now each subnet within a VPC has one knuckle associated with it it's either going to be the default network ACL for that VPC or a custom one which you create and associate.
A single knuckle though can be associated with many different subnets so while a subnet can only have one network ACL one network ACL can be associated with many different subnets.
Now this point that is everything that I wanted to cover about network ACLs for this lesson so go ahead complete the video and when you're ready I'll look forward to you joining me in the next lesson.
-
-
openreview.net openreview.net
-
nd optimization step extracts the point’s feature embed-ding. Memory networks also share some connections with our work, in particular, if we interpretthe neighborhood of a node as the memory, which is
此处提出了一个新方法
-
-
www.biorxiv.org www.biorxiv.org
-
eLife Assessment
This important study provides proof of principle that C. elegans models can be used to accelerate the discovery of candidate treatments for human Mendelian diseases by detailed high-throughput phenotyping of strains harboring mutations in orthologs of human disease genes. The data are compelling and support an approach that enables the potential rapid repurposing of FDA-approved drugs to treat rare diseases for which there are currently no effective treatments. The authors should provide a clearer explanation of how the statistical analyses were performed, as well as a link to a GitHub repository to clarify how figures and tables in the manuscript were generated from the phenotypic data.
-
Reviewer #1 (Public review):
Summary:
As the scientific community identifies increasing numbers of genes and genetic variants that cause rare human diseases, a challenge in the field quickly identify pharmacological interventions to address known deficits. The authors point out that defining phenotypic outcomes required for drug screen assays is often a bottleneck, and emphasize how invertebrate models can be used for quick ID of compounds that may address genetic deficits. A major contribution of this work is to establish a framework for potential intervention drug screening based on quantitative imaging of morphology and mobility behavior, using methods that the authors show can define subtle phenotypes in a high proportion of disease gene knockout mutants. Overall, the work constitutes an elegant combination of previously developed high-volume imaging with highly detailed quantitative phenotyping (and some paring down to specific phenotypes) to establish proof of principle on how the combined applications can contribute to screens for compounds that may address specific genetic deficits, which can, in turn, suggest both mechanism and therapy.
In brief, the authors selected 25 genes for which loss of function is implicated in human neuro-muscular disease and engineered deletions in the corresponding C. elegans homologs. The authors then imaged morphological features and behaviors prior to, during, and after blue light stimuli, quantitating features, and clustering outcomes as they elegantly developed previously (PMID 35322206; 30171234; 30201839). In doing so, phenotypes in 23/25 tested mutants could be separated enough to distinguish WT from mutant and half of those with adequate robustness to permit high-throughput screens, an outcome that supports the utility of related general efforts to ID phenotypes in C. elegans disease orthologs. A detailed discussion of 4 ciliopathy gene defects, and NACLN-related channelopathy mutants reveals both expected and novel phenotypes, validating the basic approach to modeling vetted targets and underscoring that quantitative imaging approaches reiterate known biology.
The authors then screened a library of nearly 750 FDA-approved drugs for the capacity to shift the unc-80 NACLN channel-disrupted phenotype closer to the wild type. Top "mover" compounds shift outcome in the experimental outcome space; and also reveal how "side effects" can be evaluated to prioritize compounds that confer the fewest changes of other parameters away from the center.
Strengths:
Although the imaging and data analysis approaches have been reported and the screen is restricted in scope and intervention exposure, it is impressive, encouraging and important that the authors strongly combine tools to demonstrate how quantitative imaging phenotypes can be integrated with C. elegans genetics to accelerate the identification of potential modulators of disease (easily extendable to other goals). Generation of deletion alleles and documentation of their associated phenotypes (available in supplemental data) provide potentially useful reagents/data to the field. The capacity to identify "over-shooting" of compound applications with suggestions for scale back and to sort efficacious interventions to minimize other changes to behavioral and physical profiles is a strong contribution.
Weaknesses:
The work does not have major weaknesses, and in revision, the authors have expanded the discussion to potential utility and application in the field.
The authors have also taken into account minor modifications in writing.
-
Reviewer #2 (Public review):
Summary and strengths:
O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to make genotype-phenotype connections using C. elegans. Given the rate that rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.
Weaknesses:
(1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10 point font. Similarly, Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.
(2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.
(3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.
(4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.
(5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than "worsening" of 1000 correlated features.Reviewer #2 (Public review):
Summary and strengths:
O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to make genotype-phenotype connections using C. elegans. Given the rate that rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.
Weaknesses:
(1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10 point font. Similarly, Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.
(2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.
(3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.
(4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.
(5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than "worsening" of 1000 correlated features.
-
Reviewer #3 (Public review):
In this study, O'Brien et al. address the need for scalable and cost-effective approaches to finding lead compounds for the treatment of the growing number of Mendelian diseases. They used state-of-the-art phenotypic screening based on an established high-dimensional phenotypic analysis pipeline in the nematode C. elegans.
First, a panel of 25 C. elegans models was created by generating CRISPR/Cas9 knock-out lines for conserved human disease genes. These mutant strains underwent behavioral analysis using the group's published methodology. Clustering analysis revealed common features for genes likely operating in similar genetic pathways or biological functions. The study also presents results from a more focused examination of ciliopathy disease models.
Subsequently, the study focuses on the NALCN channel gene family, comparing the phenotypes of mutants of nca-1, unc-77, and unc-80. This initial characterization identifies three behavioral parameters that exhibit significant differences from the wild type and could serve as indicators for pharmacological modulation.
As a proof-of-concept, O'Brien et al. present a drug repurposing screen using an FDA-approved compound library, identifying two compounds capable of rescuing the behavioral phenotype in a model with UNC80 deficiency. The relatively short time and low cost associated with creating and phenotyping these strains suggest that high-throughput worm tracking could serve as a scalable approach for drug repurposing, addressing the multitude of Mendelian diseases. Interestingly, by measuring a wide range of behavioural parameters, this strategy also simultaneously reveals deleterious side effects of tested drugs that may confound the analysis.
Considering the wealth of data generated in this study regarding important human disease genes, it is regrettable that the data is not made accessible to researchers less versed in data analysis methods. This diminishes the study's utility. It would have a far greater impact if an accessible and user-friendly online interface were established to facilitate data querying and feature extraction for specific mutants. This would empower researchers to compare their findings with the extensive dataset created here.
Another technical limitation of the study is the use of single alleles. Large deletion alleles were generated by CRISPR/Cas9 gene editing. At first glance, this seems like a good idea because it limits the risk that background mutations, present in chemically-generated alleles, will affect behavioral parameters. However, these large deletions can also remove non-coding RNAs or other regulatory genetic elements, as found, for example, in introns. Therefore, it would be prudent to validate the behavioral effects by testing additional loss-of-function alleles produced through early stop codons or targeted deletion of key functional domains.
-
Author response:
The following is the authors’ response to the original reviews.
Public Reviews:
Reviewer #1 (Public Review):
Summary:
As the scientific community identifies increasing numbers of genetic variants that cause rare human diseases, a challenge is how the field can most quickly identify pharmacological interventions to address known deficits. The authors point out that defining phenotypic outcomes required for drug screen assays is often challenging, and emphasize how invertebrate models can be used for quick ID of compounds that may address genetic deficits. A major contribution of this work is to establish a framework for potential intervention drug screening based on quantitative imaging of morphology and mobility behavior, using methods that the authors show can define subtle phenotypes in a high proportion of disease gene knockout mutants.
Overall, the work constitutes an elegant combination of previously developed high-volume imaging with highly detailed quantitative phenotyping (and some paring down to specific phenotypes) to establish proof of principle on how the combined applications can contribute to screens for compounds that may address specific genetic deficits, which can suggest both mechanism and therapy.
In brief, the authors selected 25 genes for which loss of function is implicated in human neuro-muscular disease and engineered deletions in the corresponding C. elegans homologs. The authors then imaged morphological features and behaviors prior to, during, and after blue light stimuli, quantitating features, and clustering outcomes as they elegantly developed previously (PMID 35322206; 30171234; 30201839). In doing so, phenotypes in 23/25 tested mutants could be separated enough to distinguish WT from mutant and half of those with adequate robustness to permit high-throughput screens, an outcome that supports the utility of general efforts to ID phenotypes in C. elegans disease orthologs using this approach. A detailed discussion of 4 ciliopathy gene defects, and NACLN-related channelopathy mutants reveals both expected and novel phenotypes, validating the basic approach to modeling vetted targets and underscoring that quantitative imaging approaches reiterate known biology. The authors then screened a library of nearly 750 FDA-approved drugs for the capacity to shift the unc-80 NACLN channel-disrupted phenotype closer to the wild type. Top "mover" compound move outcome in the experimental outcome space; and also reveal how "side effects" can be evaluated to prioritize compounds that confer the fewest changes of other parameters away from the center.
Strengths:
Although the imaging and data analysis approaches have been reported and the screen is limited in scope and intervention exposure, it is important that the authors strongly combine individual approach elements to demonstrate how quantitative imaging phenotypes can be integrated with C. elegans genetics to accelerate the identification of potential modulators of disease (easily extendable to other goals). Generation of deletion alleles and documentation of their associated phenotypes (available in supplemental data) provide potentially useful reagents/data to the field. The capacity to identify "over-shooting" of compound applications with suggestions for scale back and to sort efficacious interventions to minimize other changes to behavioral and physical profiles is a strong contribution.
Weaknesses:
The work does not have major weaknesses, although it may be possible to expand the discussion to increase utility in the field:
(1) Increased discussion of the challenges and limitations of the approach may enhance successful adaptation application in the field.
It is quite possible that morphological and behavioral phenotypes have nothing to do with disease mechanisms and rather reflect secondary outcomes, such that positive hits will address "off-target" consequences.
This is possible and can only be determined with human data. We now discuss the possibility in the discussion.
The deletion approach is adequately justified in the text, but the authors may make the point somewhere that screening target outcomes might be enhanced by the inclusion of engineered alleles that match the human disease condition. Their work on sod-1 alleles (PMID 35322206) might be noted in this discussion.
We agree and now mention this work in the discussion. We are currently working on a collection of strains with patient-specific mutations.
Drug testing here involved a strikingly brief exposure to a compound, which holds implications for how a given drug might engage in adult animals. The authors might comment more extensively on extended treatments that include earlier life or more extended targeting. The assumption is that administering different exposure periods and durations, but if the authors are aware as to whether there are challenges associated with more prolonged applications, larger scale etc. it would be useful to note them.
More prolonged applications are definitely possible. We chose short treatments for this screen to model the potential for changing neural phenotypes once developmental effects of the mutation have already occurred. We now briefly discuss this choice and the potential of longer treatments in the discussion.
(2) More justification of the shift to only a few target parameters for judging compound effectiveness.
- In the screen in Figure 4D and text around 313, 3 selected core features of the unc-80 mutant (fraction that blue-light pause, speed, and curvature) were used to avoid the high replicate requirements to identify subtle phenotypes. Although this strategy was successful as reported in Figure 5, the pared-down approach seems a bit at odds with the emphasis on the range of features that can be compared mutant/wt with the author's powerful image analysis. Adding details about the reduced statistical power upon multiple comparisons, with a concrete example calculated, might help interested scientists better assess how to apply this tool in experimental design.
To empirically test the effect of including more features on the subsequent screen, we have repeated the analysis using increasing numbers of features. In a new supplementary figure we find increasing the number of features reduces our power to detect rescue. At 256 features, we would not be able to detect any compounds that rescued the disease model phenotype.
(3) More development of the side-effect concept. The side effects analysis is interesting and potentially powerful. Prioritization of an intervention because of minimal perturbation of other phenotypes might be better documented and discussed a bit further; how reliably does the metric of low side effects correlate with drug effectiveness?
Ultimately this can only be determined with clinical trial data on multiple drugs, but there are currently no therapeutic options for UNC80 deficiency in humans. We have included some extra discussion of the side effect concept.
Reviewer #2 (Public Review):
Summary and strengths:
O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at the movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to making genotype-phenotype connections using C. elegans. Given the rate at which rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.
Weaknesses:
(1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10-point font. Similarly, the Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.
We have updated all figures with larger labels and, where necessary, split figures to allow for better readability. We’ve also corrected italicisation.
(2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.
We have removed references to causation. We were thinking of cases where a known variant is found in a patient where causality has already been established rather than cases of new variant discovery.
(3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.
We now explain the extra keyword filtering step. For the final filtering step, we simply examined the list and chose 25. There is therefore little justification to provide and we acknowledge these cannot be seen as representative of the larger set according to well-defined rules. The choice was based on which genes we thought would be interesting using their descriptions or our prior knowledge (“subjective interestingness” in the main text).
(4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.
In this case, we included all features because they were all tested for differences between mutants and controls. By consistently using all features for each fingerprint we can be sure that the features that are different that we want to highlight in box plots can be referred to in the fingerprint.
(5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than the "worsening" of 1000 correlated features.
This is a good point. We’ve redone the analysis using the Tierpsy 256 feature set and included this as a supplementary figure. We find that the same trend exists when looking at this reduced feature set.
Reviewer #3 (Public Review):
In this study, O'Brien et al. address the need for scalable and cost-effective approaches to finding lead compounds for the treatment of the growing number of Mendelian diseases. They used state-of-the-art phenotypic screening based on an established high-dimensional phenotypic analysis pipeline in the nematode C. elegans.
First, a panel of 25 C. elegans models was created by generating CRISPR/Cas9 knock-out lines for conserved human disease genes. These mutant strains underwent behavioral analysis using the group's published methodology. Clustering analysis revealed common features for genes likely operating in similar genetic pathways or biological functions. The study also presents results from a more focused examination of ciliopathy disease models.
Subsequently, the study focuses on the NALCN channel gene family, comparing the phenotypes of mutants of nca-1, unc-77, and unc-80. This initial characterization identifies three behavioral parameters that exhibit significant differences from the wild type and could serve as indicators for pharmacological modulation.
As a proof-of-concept, O'Brien et al. present a drug repurposing screen using an FDA-approved compound library, identifying two compounds capable of rescuing the behavioral phenotype in a model with UNC80 deficiency. The relatively short time and low cost associated with creating and phenotyping these strains suggest that high-throughput worm tracking could serve as a scalable approach for drug repurposing, addressing the multitude of Mendelian diseases. Interestingly, by measuring a wide range of behavioural parameters, this strategy also simultaneously reveals deleterious side effects of tested drugs that may confound the analysis.
Considering the wealth of data generated in this study regarding important human disease genes, it is regrettable that the data is not actually made accessible. This diminishes the study's utility. It would have a far greater impact if an accessible and user-friendly online interface were established to facilitate data querying and feature extraction for specific mutants. This would empower researchers to compare their findings with the extensive dataset created here. Otherwise, one is left with a very limited set of exploitable data.
We have now made the feature data available on Zenodo (https://doi.org/10.5281/zenodo.12684118) as a matrix of feature summaries and individual skeleton timeseries data (the feature matrix makes it more straightforward to extract the data from particular mutants for reanalysis). We have also created a static html version of the heatmap in Figure 2 containing the entire behavioural feature set extracted by Tierpsy. This can be opened in a browser and zoomed for detailed inspection. Mousing over the heatmap shows the names of features at each position making it easier to arrive at intuitive conclusions like ‘strain A is slow’ or ‘strain B is more curved’.
Another technical limitation of the study is the use of single alleles. Large deletion alleles were generated by CRISPR/Cas9 gene editing. At first glance, this seems like a good idea because it limits the risk that background mutations, present in chemically-generated alleles, will affect behavioral parameters. However, these large deletions can also remove non-coding RNAs or other regulatory genetic elements, as found, for example, in introns. Therefore, it would be prudent to validate the behavioral effects by testing additional loss-of-function alleles produced through early stop codons or targeted deletion of key functional domains.
We have added a note in the main text on limitations of deletion alleles. We like the idea of making multiple alleles in future studies, especially in cases where a project is focussed on just one or a few genes.
Recommendations for the authors
Reviewer #1 (Recommendations For The Authors):
Note that none of the above suggestions or the one immediately below are considered mandatory.
One additional minor point: The dual implication of mevalonate perturbations for NACLM deficiencies is striking. At the same time, the mevalonate pathway is critical for embryo viability among other things, which prompts questions about how reproductive physiology is integrated in this screen approach. It appears that sterilization protocols are not used to prepare screen target animals, but it would be useful to know if there were a signature associated with drug-induced sterility that might help identify one potential common non-interesting outcome of compound treatments in general. In this work, the screen treatment is only 4 hours, which is probably too short to compromise reproduction, but as noted above, it is likely users would intend to expose test subjects for much longer than 4-hour periods.
This is an interesting point. In its current form our screen doesn’t assess reproductive physiology. This is something that we will consider in ongoing projects.
Figures
Figure 1D might be omitted or moved to supplement.
We have removed 1D and moved figure 1E as a standalone table (Table 1) to improve readability.
Figure 2D "key" is hard to make out size differences for prestim, bluelight, and poststim -more distinctive symbols should be used.
We have increased the size of the symbols so that the key is easier to read.
Line 412 unc-25 should be in italics
Corrected
Reviewer #2 (Recommendations For The Authors):
Specific edits:
All of the errors below have been corrected.
Line 47, "loss of function" should be hyphenated because it is a compound adjective that modifies mutations.
Line 50, "genetically-tractable" should not be hyphenated because it is not a compound adjective. It is an adverb-adjective pair. Line 102 has the same grammatical issue.
Line 85, "rare genetic diseases" do not "affect nervous system function". The disease might have deficits in this function, but the disease does not do anything to function.
Line 86, it should be mutations not mutants. Mutations are changes to DNA. Mutants are individuals with mutations.
Throughout, wild-type should be hyphenated when it is used as a compound adjective.
Figure 4, asterisks is spelled incorrectly.
Reviewer #3 (Recommendations For The Authors):
- As stated in the public review, the utility of the study is limited by the lack of access to the complete dataset. The wealth of data produced by the study is one of its major outputs.
We have made the data publicly available on Zenodo. We appreciate the request.
- Describe the exact break-points of the different alleles, because it was not readily feasible to derive them from the gene fact sheets provided in the supplementary materials.
We have now provided the start position and total length of deletion for each gene in the gene fact sheets.
- Figure 1C: what does "Genetic homology"/"sequence identity" refer to? How were these values calculated?
UNC-49 is clearly not 95% identical to vertebrate GABAR subunits at the protein level.
We have changed the axis label to “BLAST % Sequence Identity” to clarify that these values are calculated from BLAST sequence alignments on WormBase and the Alliance Genom Resources webpages.
- Figure 1E : The data presented in Figure 1E appears somewhat unreliable. For example, a cursory check showed:
(1) Wrong human ortholog: unc-49 is a Gaba receptor, not a Glycine receptor as indicated in the second column.
(2) Wrong disease association: dys-1 is not associated with Bardet-Biedl syndrome; overall the data indicated in the table does not seem to fully match the HPO database.
(3) Inconsistent disease association: why don't the avr-14 and glc-2 (and even unc-49) profiles overlap/coincide given that they present overlapping sets of human orthologs.
Thank you for catching this! We have corrected gene names which were mistakenly pasted. We have also made this a standalone table (Table 1) for improved readability.
- Error in legend to figure 4I : "with ciliopathies and N2" > ciliopathies should be "NALCN disease".
- Error at line 301: "Figures 2E-H" should be "Figures 4E-H".
Corrected.
-
-
wac.colostate.edu wac.colostate.edu
-
decolonization of the mind through the lens of language.
departure from tuck and yang
-
-
uw.pressbooks.pub uw.pressbooks.pub
-
Although the auxiliary view clarifies the geometry of the inclined face, it actually distorts everything else.
Important to realize that if referring to a model with auxiliary view, focus on the top and front views to get accurate dimensions. Auxiliary is not true to its sizing
-
-
learn.cantrill.io learn.cantrill.io
-
Welcome back and in this video I want to cover the differences between stateful and stateless firewalls.
And to do that I need to refresh your knowledge of how TCP and IP function.
So let's just jump in and get started.
In the networking fundamentals videos I talk about how TCP and IP worked together.
You might already know this if you have networking experience in the real world, but when you make a connection using TCP, what's actually happening is that each side is sending IP packets to each other.
These IP packets have a source and destination IP and are carried across local networks and the public internet.
Now TCP is a layer 4 protocol which runs on top of IP.
It adds error correction together with the idea of ports, so HTTP runs on TCP port 80 and HTTPS runs on TCP port 443 and so on.
So keep that in mind as we continue talking about the state of connections.
So let's say that we have a user here on the left Bob and he's connecting to the Categoram application running on a server on the right.
What most people imagine in this scenario is a single connection between Bob's laptop and the server.
So Bob's connecting to TCP port 443 on the server and in doing so he gets information back, in this case many different categories.
Now you know that below the surface at layer 3 this single connection is handled by exchanging packets between the source and the destination.
Conceptually though you can imagine that each connection, in this case it's an outgoing connection from Bob's laptop to the server.
Each one of these is actually made up of two different parts.
First we've got the request part where the client requests some information from a server, in this case from Categors, and then we have the response part where that data is returned to the client.
Now these are both parts of the same interaction between the client and server, but strictly speaking you can think of these as two different components.
What actually happens as part of this connection setup is this.
First the client picks a temporary port and this is known as an ephemeral port.
Now typically this port has a value between 1024 and 65535, but this range is dependent on the operating system which Bob's laptop is using.
Then once this ephemeral port is chosen the client initiates a connection to the server using a well-known port number.
Now a well-known port number is a port number which is typically associated with one specific popular application or protocol.
In this case TCP port 443 is HTTPS.
So this is the request part of the connection, it's a stream of data to the server.
You're asking for something, some cat pictures or a web page.
Next the server responds back with the actual data.
The server connects back to the source IP of the request part, in this case Bob's laptop, and it connects to the source port of the request part, which is the ephemeral port which Bob's laptop has chosen.
This part is known as the response.
So the request is from Bob's laptop using an ephemeral port to a server using a well-known port.
The response is from the server on that well-known port to Bob's laptop on the ephemeral port.
Now it's these values which uniquely identify a single connection.
So that's a source port and source IP.
And a destination IP and a destination port.
Now hope that this makes sense so far, if not then you need to repeat this first part of the video again because this is really important to understand.
If it does make sense then let's carry on.
Now let's look at this example in a little bit more detail.
This is the same connection that we looked at on the previous screen.
We have Bob's laptop on the left and the Catering Server on the right.
Obviously the left is the client and the right is the server.
I also introduced the correct terms on the previous screen so request and response.
So the first part is the client talking to the server asking for something and that's the request.
And the second part is the server responding and that's the response.
But what I want to get you used to is that the directionality depends on your perspective and let me explain what I mean.
So in this case the client initiates the request and I've added the IP addresses on here for both the client and the server.
So what this means is the packets will be sent from the client to the server and these will be flowing from left to right.
These packets are going to have a source IP address of 119.18.36.73, which is the IP address of the client.
So Bob's laptop and they will have a destination IP of 1.3.3.7, which is the IP address of the server.
Now the source port will be a temporary or ephemeral port chosen by the client and the destination port will be a well-known port.
In this case we're using HTTPS so TCP port 443.
Now if I challenge you to take a quick guess, would you say that this request is outbound or inbound?
If you had to pick, if you had to define a firewall rule right now, would you pick inbound or outbound?
Well this is actually a trick question because it's both.
From the client perspective this request is an outbound connection.
So if you're adding a firewall rule on the client you would be looking to allow or deny an outbound connection.
From the server perspective though it's an inbound connection so you have to think about perspective when you're working with firewalls.
But then we have the response part from the server through to the client.
This will also be a collection of packets moving from right to left.
This time the source IP on those packets will be 1.3.3.7, which is the IP address of the server.
The destination IP will be 119.18.36.73, which is the IP address of the client.
So Bob's laptop.
The source port will be TCP port 443, which is the well-known port of HTTPS and the destination port will be the ephemeral port chosen originally by the client.
Now again I want you to think about the directionality of this component of the communication.
Is it outbound or inbound?
Well again it depends on perspective.
The server sees it as an outbound connection from the server to the client and the client sees it as an inbound connection from the server to itself.
Now this is really important because there are two things to think about when dealing with firewall rules.
The first is that each connection between a client and a server has two components, the request and the response.
So the request is from a client to a server and the response is from a server to a client.
The response is always the inverse direction to the request.
But the direction of the request isn't always outbound and isn't always inbound.
It depends on what that data is together with your perspective.
And that's what I want to talk about a bit more on the next screen.
Let's look at this more complex example.
We still have Bob and his laptop on the CaterGram server, but now we have a software update server on the bottom left.
Now the CaterGram server is inside a subnet which is protected by a firewall.
And specifically this is a stateless firewall.
A stateless firewall means that it doesn't understand the state of connections.
What this means is that it sees the request connection from Bob's laptop to CaterGram and the response of from CaterGram to Bob's laptop as two individual parts.
You need to think about allowing or denying them as two parts.
You need two rules.
In this case one inbound rule which is the request and one outbound rule for the response.
This is obviously more management overhead.
Two rules needed for each thing.
Each thing which you as a human see as one connection.
But it gets slightly more confusing than that.
For connections to the CaterGram server, so for example when Bob's laptop is making a request, then that request is inbound to the CaterGram server.
The response logically enough is outbound, sending data back to Bob's laptop, which is possible to have the inverse.
Consider the situation where the CaterGram server is performing software updates.
Well in this situation the request will be from the CaterGram server to the software update server, so outbound, and the response will be from the software update server to the CaterGram server, so this is inbound.
So when you're thinking about this, start with the request.
Is the request coming to you or going to somewhere else?
The response will always be in the reverse direction.
So this situation also requires two firewall rules.
One outbound for the request and one inbound for the response.
Now there are two really important points I want to make about stateless firewalls.
First, for any servers where they accept connections and where they initiate connections, and this is common with web servers which need to accept connections from clients, but where they also need to do software updates.
In this situation you'll have to deal with two rules for each of these, and they will need to be the inverse of each other.
So get used to thinking that outbound rules can be both the request and the response, and inbound rules can also be the request and the response.
It's initially confusing, but just remember, start by determining the direction of the request, and then always keep in mind that with stateless firewalls you're going to need an inverse rule for the response.
Now the second important thing is that the request component is always going to be to a well-known port.
If you're managing the firewall for the category application, you'll need to allow connections to TCP port 443.
The response though is always from the server to a client, but this always uses a random ephemeral port, because the firewall is stateless, it has no way of knowing which specific port is used for the response, so you'll often have to allow the full range of ephemeral ports to any destination.
This makes security engineers uneasy, which is why stateless firewalls which I'll be talking about next are much better.
Just focus on these two key elements, that every connection has a request and a response, and together with those keep in mind the fact that they can both be in either direction, so a request can be inbound or outbound, and a response will always be the inverse to the directionality of the request.
Also you'll keep in mind that any rules that you create for the response will need to often allow the full range of ephemeral ports.
That's not a problem with stateless firewalls which I want to cover next.
So we're going to use the same architecture, we've got Bob's laptop on the top left, the category server on the middle right, and the software update server on the bottom left.
A stateless firewall is intelligent enough to identify the response for a given request, since the ports and IPs are the same, it can link one to the other, and this means that for a specific request to category from Bob's laptop to the server, the firewall automatically knows which data is the response, and the same is true for software updates, for a given connection to a software update server, the request, the firewall is smart enough to be able to see the response or the return data from the software update server back to the category server, and this means that with a stateful firewall, you'll generally only have to allow the request or not, and the response will be allowed or not automatically.
This significantly reduces the admin overhead and the chance for mistakes, because you just have to think in terms of the directionality and the IPs and ports of the request, and it handles everything else.
In addition, you don't need to allow the full ephemeral port range, because the firewall can identify which port is being used, and implicitly allow it based on it being the response to a request that you allow.
Okay, so that's how stateless and stateful firewalls work, and now it's been a little bit abstract, but this has been intentional, because I want you to understand how they work, and sexually, before I go into more detail with regards to how AWS implements both of these different security firewall standards.
Now at this point, I've finished with the abstract description, so go ahead and finish this video, and when you're ready, I'll look forward to you joining me in the next.
-
-
engl252fa24.commons.gc.cuny.edu engl252fa24.commons.gc.cuny.edu
-
Butler’s Parable of the Sower and Mutu’s A Fantastic Journey both bespeak “the denial and desiring” of their respective homelands (in ways that are legible and reducible to the language of citizenship, cultural particularity, and national governance) but often do so to signal the necessary transformation of these geographies.
I thought this was interesting because in Octavia Butler's Parable of the Sower there was this sense of "denial and desiring." I interpreted this in a way that Lauren desired to fit in with the world around her but also despised that she had to change herself to fit in. This was very distinct to me in Lauren's world because when she had to leave her homeland, one of the first things she did was cut her hair to make herself resemble a man. The reason for this is that she knows in society she will be more feared if she presents herself as a man. We see throughout the novel how she suffers with her own femininity because of it. Where she finds being a woman sad a disadvantage. It's interesting to me how Frazier was able to point out this complex idea that both Butler and Mutu portray in their works.
-
-
doc-10-1g-prod-01-apps-viewer.googleusercontent.com doc-10-1g-prod-01-apps-viewer.googleusercontent.com
-
We shall then be in a position to determine empiricallywhether the concrete conduct of Protestants in, say, seventeenth-century Eng-land did in fact approximate the type and in what specific aspects it failedto do so
Did the actions of Protestants via 17th-England correlate with the ideal type of Protestant?
-
An ideal type never corresponds to concretereality but always moves at least one step away from it. It is constructed outof certain elements of reality and forms a logically
ideal type- the social construction of what something should be??
-
Thenotion of the ideal type was meant to provide escape from this dilemma
believes in necessity of generalizations and concepts but wary of over encompassing categories that try to explain literally everything. Additionally, wary of too narrow a focus of a case or a situation.
-
or does it partake of the contempla-tion of sages and philosophers about the meaning of the universe.
science is an occupation or method, cannot interpret meaning of the universe
Annotators
URL
-
-
-
Methods
Would you be willing to provide the code you used for this project as a GitHub repo or a gist?
-
The taxid for each BFVD sequence was retrieved from UniProt and its full lineage - from NCBI (31). The Sankey plot based on this information (Fig. 1a) was generated with Pavian (32). For each taxonomic rank, only the ten most abundant taxa were included in the plot.
It would be interesting to see a side-by-side comparison to PDB and ViralZone. Where does BFDV have more coverage? Where does ViralZone or PDB have more depth (more sequences per represented sequence in BFDV)
-
To that end, the 3,002 sequences longer than this threshold were split, resulting in 6,730 sequence fragments
As commented above, it would be interesting to know more details on how you did this splitting
-
Looking ahead, we aim to expand BFVD by predicting viral multimer structures, taking advantage of their compact genome size, and making them searchable using Foldseek Multimer (30).
Would you consider expanding it to all viral proteins in UniProt, or to a higher clustering resolution than UniRef30 (such as UniRef50 or UniRef90)?
In general, it would be interesting to know more about this trade off. Some questions I would love to know the answers to:
- How much computational cost and database size did you save by using UniRef30 over all UniProt viral proteins? It looks like you did 351K that represent 3M sequences. Is 3M too many to do?
- How taxonomically mixed are the UniRef30 clusters? For example, I looked at the representative sequence for a protein PB1 in influenza A and it's sequence PB1 in influenza B, so they're very closely related. Is this usually the case because viruses are so diverse?
- Do PDB and ViralZone provide more resolution for the virsues they do cover? For example, if I'm more interested in Eukaryotic viruses, will I get more exact results using one of those databases because they don't reduce down so much (e.g. UniRef30)?
-
To demonstrate BFVD’s utility, we repeated and extended a part of a recent study by Say et al. (14) that annotated putative bacteriophages within metagenomically assembled contigs from wastewater. Say et al. developed a pipeline for enhanced annotations by integrating structural information from the AFDB with sequence data. Here, we applied the steps of their pipeline to one of the metagenomic samples from their study: the Granulated Activated Carbon sample 6 (GAC6). In addition to using the AFDB like they did, we included BFVD and ViralZone as reference databases for structural similarity search (Fig. 1h). Like Say et al., we found that the sequence-similarity based tool Bakta (28) could annotate on average 8% of the putative bacteriophage proteins on each contig, while Foldseek with the AFDB as reference annotated on average 51% of them. By using BFVD, we could annotate a comparable fraction of 46% of the putative bacteriophage proteins, despite the tremendous size difference between the AFDB and BFVD. However, when we searched the sample structures against the combined structure set of the AFDB and BFVD, we observed only a marginal increase in annotation performance. This suggests that the AFDB likely includes some BFVD bacte-riophage structures indirectly, through prophages embedded in bacterial genomes covered by the AFDB. While ViralZone improved Bakta’s annotations, its contribution was limited compared to the AFDB and BFVD, likely due to its focus on eukaryotic viruses.
I think it could be interesting to repeat this experiment but with a metagenome where the viruses of interest are not bacteriophages. As written, this doesn't really highlight the benefit of BFVD.
It may also be interesting to report the additional metadata you receive from annotating with BFVD instead of AFDB. If the phage structures come from hits to prophages, AFDB would presumably provide "host" information while BFVD would provide viral taxonomy (or at least taxonomy of sequences in the cluster that have a hit).
-
Indeed, among the low-confidence structure predictions (pLDDT < 50), the majority (78%) had fewer than 30 homologs.
Maybe I'm misunderstanding, but I thought in the previous paragraph you stated that most of these sequences had high pLDDT, so were high confidence? That makes this sentence confusing, as well as the following one.
-
-
muse.jhu.edu muse.jhu.edu
-
Far from being an ideal career choice, possessing and capitalizing on a creative ability may be the most obvious means of facilitating life choices.
not sure what to make of this statement...
-
Contemporary economic ideologies result in attributing the creative industries with particular characteristics from the outside, not always recognized by creative individuals themselves, forming tensions between the individuals operating within the creative sectors and those support structures nominally established to aid their evolution.
*
-
Pursuing entrepreneurial activity, far from being a response to an external encouragement provided by government, is more likely to represent a mark of self-determination and self-expression. Discourses elevating the importance and the identity of “the entrepreneur” are seen as irrelevant at bes
hmmm
-
Market logics are understood and incorporated into solutions and, in fact, are seen to be part of the creative process
marketization is subsumed into a creative solution (another aspect of problem-solving!)
-
Creative industry entrepreneurs mediate the relationship between being creative and being an entrepreneur: in their narrative, the creative is often elevated above the business emphasis, but in their behaviors they demonstrate enactment of entrepreneurial actions (planning, strategy, etc.).
for creative entrepreneurs, the creative tends to come first!
-
Idealization of the entrepreneur by powerful external stakeholders contrasts with the intimate experience of the people concerned
yep
-
Lisa’s lived experience of creativity is a “feeling of...the satisfaction of knowing that you’re going about the job the right way...” and she is critical of the image of the agonized artist, “I’m very skeptical about these ‘creative impulses’.” For Lisa, creativity is not “a solitary activity”, something that she separates herself from the world to pursue, and is in some way at the mercy of being struck by. Rather, it is a reaction to a problem, “...a conversation...as much as anything.”
very interesting How do you relate to this?
-
Designers do not take much risk, and are, on the whole, not innovative, they are “basically coming up with the same solutions, one might be better than the other, but there’s nothing innovative about what one person is doing...they do good or less good work...but I wouldn’t equate that to innovation at all.”
huh
-
“some of the most creative people I know don’t work in the creative industries.” She insists that creativity is about problem-solving and seeing beyond “the surface of things” suggesting that she believes that it is a feature of all human endeavor.
ok - this statement is, on the other hand, exactly like Peter's. creativity = problem solving. A curious definition. But it also opens the door to allow everybody in ... (independent of entrepreneurial labels...)
-
The quest for self-sufficiency
!
-
Creative industry entrepreneurs draw on their creative expertise within a domain and build entrepreneurial possibilities around this expertise
we all exist as (relative) experts within some domain/field or other, acting creatively within it (with others) -- not just folk in the creative industry!
(it's just that they have this specific focus...)
-
“An entrepreneur is someone who from the outset has a plan.”
quite a distinct outlook from Peter's point of view! Which do you find more persuasive?
-
Peter regards his life as a creative entrepreneur as a collage of all the experiences he has had in life, both professionally and personally, “these jigsaw pieces I saw, I picked up along the way
the arbitrariness of it all! Purposeful entrepreneurial identity nowhere near as significant as the serendipity of retroactively putting the pieces together...
-
Opportunities are simply there, and the fact that others don’t see them is because they “mightn’t be looking for the same thing.” Lisa believes that most people are looking for opportunities and “constantly scanning a particular horizon” but different people have different “filters” and “notice certain things.” One person might notice one thing and another a different thing, and some people then “don’t act.
interesting
-
The protagonist of this research, the creative industries entrepreneur, does not have a standard profile. She specializes within specific domains but also operates across domains inside and outside the creative industries; she may run a solitary enterprise from remote, rural hinterlands far away from the world, or lead a large organization in a frenetic urban center. The type of work she engages in can involve detailed, intimate crafting but also strategic and collaborative negotiations. She is firmly situated within a creative world but demonstrates incisive business acumen
getting into the different case studies
-
The first interview involved questions about the lived experience of being a creative individual and being an entrepreneur, and the second interview was an exploration of how constructs such as “the creative industries” were understood and embraced.
...
-
Entrepreneurs may demonstrate creativity not only in their own creative output, but by their ability to identify resources needed to complete work
So, can we speak of all entrepreneurs as creative entrepreneurs, not just those employed in creative fields (much like the debate about "cultural" entrepreneurs)?
-
“total arbitrariness” characterizes some entrepreneurial discovery
this is fascinating to me.
surprise and randomness are not factors to be expunged but in fact are integral to the discovery process
-
The “alert” entrepreneur (Kirzner, 1973) uses knowledge to discover opportunities
what about the "creative" entrepreneur -- who might use knowledge, but even moreso, perhaps intuition... and inspiration. Perhaps knowledge is not so much in the head but in the gut, a feeling, an emotional need that must be met, a chord that must be struck...
-
The opportunity does not exist separate to the entrepreneur. Discovered opportunities come about due to “exogenous shocks” in the industry or market (Alvarez and Barney, 2007): the entrepreneur only reacts to such shocks. Such a “shock” creates a new set of circumstances (or information) that the entrepreneur can exploit before others do.
I'm digging this too...
it reminds me of the statement that genius is nothing more nor less than doing well what anyone can do badly.
-
Individuals have different stocks of knowledge based on their life experiences and each person’s prior knowledge creates a “knowledge corridor” that allows them to recognize certain opportunities but not others (Venkataraman, 1997 in Shane 2000, p. 452). The knowledge corridor for individuals are personal, socially constructed phenomena and creative entrepreneurs display differences in knowledge depth and quantity not only with other entrepreneurs, but with each other.
an interesting concept...
but it makes me wonder if this somehow constrains the potential of individuals to CREATIVELY seek and create opportunities where others couldn't see them... hmmm
-
he process of opportunity identification has a strong relationship with creativity and with prior knowledge of the entrepreneur
*
-
The audience for a creative work responds emotionally, making it difficult to successfully locate the “cultural product within the accepted norms of economic practice”
a different factor for creative entrepreneurs!
-
Creative individuals are challenged to create products and services that are different enough, but not too different, to be accepted within the domain
the conundrum...
-
the market is unknown prior to production of creative goods
interesting
-
The person, as the third element in the model, displays intrinsic and extrinsic motivations (Amabile, 1996). The extent to which creative individuals respond to intrinsic motivators (satisfaction, fulfilment) doing things for which they expect “neither fame nor fortune” (Csikszentmihalyi, 2004) as opposed to extrinsic motivations such as market demands, financial reward and domain recognition (Fletcher, 2006) is a matter of choice and personal agency.
nice overview
-
The need for autonomy (Penaluna and Penaluna, 2011), the attitude to risk (Taylor, 2011) and traits of curiosity, tenacity, and collaboration of creative people (Rabideau, 2015), also commonly cited as entrepreneurial characteristics
!
-
Creative people display contrasting qualities: they are considered to be prolific and at the center of a set of activities (Townley and Beech, 2010) but also marginal and capable of drawing inspiration from across social groups
*
-
creativity functions within social systems. Creativity occurs at the intersection of the domain, the field, and the person
creativity has to come from somewhere (people interact with and are influenced by their environment!)
-
The creative act whereby “that which is unknown, or known in another way, becomes translated into an image to be re-presented to itself” (Townley and Beech, 2010, p. 12) must be stripped of its mystery if it is to become operationalized within organizational settings.
*
-
Creative work encompasses the ethereal and the mundane, the autotelic, suspended state of the creative act (Csikzentmihalyi, 1996) and the prosaic view of creative work in which “works of art can be made in an orderly, rational and manageable manner”
it's a broad field! -- note the use of the term "autotelic" -- see my "journal prompts" for further explanation of this!
-
Different levels of intrinsic and extrinsic motivation can be traced to different sectors within the creative industries
Yep!
-
Entrepreneurs construct meaning from experience; the current study attempts to understand and interpret this meaning.
all of this seems self-evident...
-
As the creative industry entrepreneur absorbs ever more experience, their own social reality and the meaning they take from their lived experience is modified: the phenomenon is not static.
the only constant is change...
-
creative industry entrepreneurs do not align themselves with traditional entrepreneurship discourses. The need to express their creativity through products, experiences, and services is balanced against the need to generate income and varying strategies are employed to do so.
yep - this is basically how the other article concluded. This one provides actual narratives...
-
This article aims to examine the experiences of the creative individual in the context of the broader “entrepreneurial society”
ok - that seems to fit with the overall arc of this course material for sure!
-
This study seeks to contribute to an understanding of the life of the creative industries entrepreneur and is underpinned by a social constructionist philosophy
ok...
-
Discourses surrounding creativity separate the creative person from the mainstream and present her as an interesting and slightly mysterious object of study (
Just like (traditional) discourses surrounding entrepreneurship!
-
an entrepreneur in the creative industries
focusing specifically upon the 2nd type of cultural entrepreneur (as identified by the other article, which was really just trying to outline the importance of the concept and understanding the implications of how we use the terms...)
-
A fine-grained analysis of the lives of creative industry entrepreneurs goes some way to achieving an understanding of individuals from the inside.
justifying the narrative-based approach
-
“I wouldn’t call myself an entrepreneur: I’m simply working for myself.”
interesting - kind of the antithesis of the opening argument of this course...
-
entrepreneurs can be regarded as the “connective tissue” between creativity and business (
I use the term "connective tissue" all the time!
-
Creative ideas must be tradable
ooh! -- on the road to turning creativity into a commodity...
-
Peter differentiates between achievement and recognition, suggesting that the achievement is important, but the recognition of that achievement, less so
what's your opinion of this? Does the existence of a tribe change this?
-
-
www.ebhsoc.org www.ebhsoc.org
-
To be financially successful could decrease the reputation of such an artist, as it can be seen as an indication of their work having a poor, people-pleasing quality and a lack of artistic innovativeness and uniqueness. Hence, if they interpret entrepreneurship in the old-fashioned, dollar-greedy way they will not wish to label themselves cultural entrepreneurs.
hah - relates to one of my seminar prompts... Funny enough, though, there's the contrary perspective that some world famous artists (like Damien Hirst in the world of contemporary art or Drake (!) a musical artist - pictured below, together for an article titled "Damien Hirst Simply Cannot Stop Painting Things for Drake") are commercially successful AND artistic innovators...
-
two overarching uses of the cultural entrepreneurship concept:
...
-
societal change through the promotion of cultural objects and subjects
View 2: people engaged in the "arts" do it ... providing cultural good and services
-
Martin Luther, Karl Marx, Francis Bacon3, and Isaac Newton as examples of cultural entrepreneurs.
ok - so not anyone can change people's beliefs ... but the best examples of cultural entrepreneurs are those who change society's belief structures...
-
the dynamic development of intangible cultural features such as symbols, myths, languages, beliefs, values, norms, rituals, and attitudes
View 1: everyone engages in culture!
-
The quadruple bottom line of cultural entrepreneurship
I like this lingo. T'is true - the artistic innovation sphere might hardly ever be highlighted in "conventional" entrepreneurship...
-
the cultural entrepreneur as an agent for “1) changing people's understanding of what is possible (changing frame of reference),
I like this!
-
the automotive industry guru Henry Ford. Businessmen like Swift or Ford, because they undertook creative action that went beyond what was known or accepted at their time, had no choice but to draw their ideas and strategies from the deep sources of culture and value in which they were immersed.
culture (and business) being revolutionized alongside each other. But seriously, Henry Ford changed culture even if that's not what we predominantly associate with him
-
It is also culturally specific, an example of "local knowledge," and "common sense," which differ, sometimes radically, across societies.
the expertise of the cultural entrepreneur goes beyond possessing cultural capital - but affecting how we perceive cultural capital, how we negotiate its contours ... interesting...
-
they may not be employed directly or indirectly in the cultural industries per se, but they continue to produce cultural goods with or without pay... As aspiring creative workers often combine jobs, this feature leads to a slash-mark bisecting their working identity: café worker/ songwriter, courier/drummer, color consultant/ painter, administrator/jewelry designer, and so on
I like this distinction, though, as it clarifies that everyone can be a cultural entrepreneur, as long as you're working "creatively"
-
for a small number of individuals, the beliefs of others are not given but can be changed. I shall refer to those people as cultural entrepreneur
interesting - cultural entrepreneurs as those who can change the beliefs of others...
-
changing people's motivation for taking part in economic development
the commercial aspect is never (entirely) absent...
-
t means being multi-skilled in hand work, design work, publicity and promotions, management and business and having some idea of manufacturing, as well as being in possession of creative vision, imagination
this is an interesting definition (also circular in nature) -- the cultural entrepreneur will exhibit all the best qualities of someone undertaking a career in cultural sectors...
-
Occasionally entrepreneurs really open up supposedly settled matters, calling into question interpretations that define products or technologies
so we've come full circle - a cultural entrepreneur CAN be someone working in "industry" who has a profound impact on the wider culture (not just someone working in the "cultural industry/ies")
-
The alternative is to use the word “cultural” as an adjective attached to the good or service that the entrepreneur provides.
much more basic... a cultural entrepreneur produces a cultural good...
-
they have found very little in the literature when it comes to definitions of the term “arts entrepreneurship.
hah
-
Cultural entrepreneurs are cultural because they are about the cultural.
not a circular argument at all!
-
The economics has to be an instrument for them in order to realize cultural values... To be clear, we are working on a moral picture here and try to figure out what makes a good cultural entrepreneur. Someone who sees in cultural trade a way of adding profit becomes suspect as culture is his instrument and not his mission. He is rather a businessman. That does not make him a bad character but he is miscast as a cultural entrepreneur.
interesting - a values (morality) based argument for entrepreneurship!
-
ttempt to define a cultural entrepreneur: “An individual who identifies an opportunity and acts upon it in order to create social, cultural, or economic value."
interesting - this might also serve as an inclusive definition of entrepreneur (without the "cultural" modifier). But people in the arts definitely highlight the cultural (and maybe the social) value of their creations, while also recognizing the economic nature of their practices...
-
here is not one totalitarian culture industry—there are many “cultural industries.” Each culture, defined anthropologically, has its cultural industries. The same goes for each art form and each way of media communication.
yep!
-
Cultural entrepreneurs may, of course, have a focus on financial revenues. The economic value is always one part of their calculation. For some, maximum profit is the only objective. However, for most artists, earning money is most likely only one of several goals.
seems like something of a theme in a lot of the weeks we've looked at so far!
-
Those who wrote in English before the late nineteenth century mostly used the word “civilization” and its derivatives to describe the cultivated society.
interesting ... what makes us "cultured" or "cultivated"?
-
we are dealing with a word that depicts the transformation of an object or a subject from one state to another. Cicero (146-43 BC) turned to agriculture to clarify how the human soul must be cultivated to a mature state, just like the seed grows to become adulta fructus.
creativity --> creation --> culture --> cultivation --> GROWTH
-
Many entrepreneurs are identified by others as more “industrious” than the common person.
ok ... an industrious person doesn't necessarily work in an industry, but labours to create ... and cultural industries create all manner of material (that may "elevate" their citizens...)
-
the anthropologist’s definition of culture as part of: Institutions [that] are the humanly devised constraints that structure political, economic and social interaction. They consist of both informal constraints (sanctions, taboos, customs, traditions, and codes of conduct), and formal rules (constitutions, laws, property rights). “Culture” is not static—it changes over time.
ok - so let's explore these different directions in greater depth...
-
Horkheimer and Adorno's claim was that the Kulturindustrie produces the opposite of what they labeled “authentic culture." By this they meant culture that is a means in itself and culture that fosters human imagination in a different way than the culture industry does. The authentic culture, according to Horkheimer and Adorno, leaves room for independent thought. The clash results in a “sell-out of culture," in which the true meaning of culture is replaced by “well-calculated stupidities of amusement”
classic Frankfurt School thinking...
-
we now identify a wide range of objects for which the leverage from a lower state to a higher one can be the concern of an entrepreneur. Now we also see the entrepreneur as someone who could be equally or more interested in some kind of social change.
art and culture can create social change, yes?
-
cultural entrepreneurship is now radically different in the new long-tail economy, which is increasingly shifting away from a focus on a relatively small number of mainstream bestsellers at the head of the demand curve and toward a huge number of niches in the tail.
so, just as culture is always in flux, so too are the cultural industries. As capitalism develops, so too does the innovation sectors...
-
This chapter was eliminated by Schumpeter in the second edition 20 years later. Swedberg (2006) claims “that when Schumpeter wrote the first edition he was a very young and enormously ambitious economist in Europe who wanted to take the academic world by storm; when he prepared the [English] translation in the 1930s he was a tenured professor at Harvard and had developed a much better sense for what mainstream economics was about—and also what it demanded of its practitioners if they wanted to remain in the mainstream.
ouch!
-
Whereas the passive artist works statically and non-entrepreneurially with artistic adaptations according to the cultural zeitgeist, the dynamic cultural entrepreneur creates more radical artistic development.
interesting - "regular" folk typically are passive, but the artist, the true original, they CREATE!
-
ultural entrepreneurs can be either “social” or “artistic” or a combination of the two. It all depends on what we accept as included in the “culture” concept.
yep - so let's look a little closer at culture then...
-
Entrepreneur
Before the course started, some of you expressed a desire to learn about the history of entrepreneurship (who the first one was, etc). This is about as close as we can get (describing how the term came to be...)
-
“take things from one state to another” meaning of the word entrepreneurship
a wider scope than traditional commercial entrepreneurship...
-
The term “cultural entrepreneurship” has been increasingly used during the new millennium, mirroring the rapidly growing importance of the “quaternary sector of the economy,” i.e. knowledge-based industries, including culture. It seems to be used mostly in connection with “the cultural industries,” a term that is used for production and services related to both commercial mass culture and the fine arts
so, cultural entrepreneurship tends to be specific to entrepreneurship concerning cultural fields/industries ... NOT the cultural impact of entrepreneurship efforts...
-
The true artist, in other words, should presumably be conceptualized as an entre-preneur; and as the economic entrepreneur has his imitators and followers, so does the artist. Both the artist and the entrepreneur are dynamic, active, and energetic and show leadership qualities, while their followers are passive and static and accept the way things are.
aha! Now we're getting somewhere!
What do you think of this analogy? Artists don't typically think of themselves as entrepreneurs (too much ideological baggage), but successful artists have to be entrepreneurial!
-
'cultural entrepreneur' is used here as a synecdoche for the (mostly) young neo-bohemian person operating in freelance mode at the interstices of the flexible labor market (within and without the creative industries) and self-driven cultural production.
ah, neoliberalism (and liquid times) strike again...
-
ccording to Schumpeter the innovative entrepreneur creates a new good or service. Others learn from it,
good ole Schumpeter...
-
undertakers as persons who by “the natural selection of the fittest [were] to undertake, to organize, and to manage,”
love it! Let's all be "undertakers"
-
-
doc-0o-38-prod-01-apps-viewer.googleusercontent.com doc-0o-38-prod-01-apps-viewer.googleusercontent.comSkellig1
-
ay and there was just a square black gap behindthe hearth. The floor was soaking wet and it stank of disinfectant. Dadwas filthy and wet and grinning. He took me into the backyard. Thetoilet was standing there in the middle of the thistles and weeds.“Thought it’d make a nice garden seat for us,” he said.The gas fire and the plywood were down by the garage door, but theyhadn’t been taken inside.He looked at me and winked. “Come and see what I found.”He led me down to the garage door.“Hold your nose,” he said. He bent down and started to open anewspaper parcel. “Ready?”It was a parcel of birds. Four of them.“Found them behind the fire,” he said. “Must have got stuck in thechimney and couldn’t get out again.”You could make out that three of them were pigeons because of theirgray and white feathers. The last one was pigeon-shaped, but it was allblack.“This was the last one I found,” he said. “It was under a heap of sootand dust that had fallen down the chimney.”“Is it a pigeon as well?”“Yes. Been there a long, long time, that’s all.”He took my hand.“Touch it,” he said. “Feel it. Go on, it’s okay.”
they found dead birds that fell down the chimney. It is also sad and painful.
Annotators
URL
-
-
indigenousfisheriestrainingframework.wordpress.com indigenousfisheriestrainingframework.wordpress.com
-
Paradoxically, perhaps, a final lesson of these storias for us is that it is high time we turned the lens round on ourselves. For the underlying truth is that we have asked questions here of our own understanding of entrepreneurship, and have been found wanting.
powerful implications
-
Our method of microstoria attempts to undermine the hegemonic postcolonial conception of the term ‘entrepreneur’. Through approaching the less obvious characters in the prevailing entrepreneur tale, we are bringing forward alternative narratives upon which to discuss entrepre-neurship
wanting to tell a different story, with different characters that weave a different plot
-
it is precisely our loud approaches to entrepreneurship, made in the name of progress, which are killing so much of life around us.
a grand narrative minimizes or marginalizes alternative stories
-
recognizing the idea of the barefoot entrepreneur as the other, as a subaltern voice
*
-
We want to emphasize instead the vulnerability that exists among these barefoot entrepre-neurs—but also a deep sense of strength. It is their lives that are at stake everyday, where the lack of protection, care and freedom, and minimum subsistence, push them to act and enact their lives on a survival basis
its a variegated reality...
-
mere caricature (see Pralahad, 2005) in which our barefoot entrepreneurs are depicted as superbly creative entrepreneurs, resilient and value-conscious consumers
also not the point...
-
The storias we have shared here do not seek to provide a romanticized view of poor entrepre-neurs
not the point...
-
barefoot entrepreneurs reflect stories and practices that contain a plethora of meaning, values and relationships which question the prominent view of the entre-preneur.
!!
-
the embroidering of garments or the creation of small sculptures made from anything disposable
curiously, my kids were involved in a "venture" at their school where they collected old milk bags and "knit" them into sleeping mats. Not barefoot, but social entrepreneurship that was inherently viatorized (?!)
-
There is a flux, a flow (Csikszentmihalyi, 1992) to things, which the barefoot entrepreneur has to ride, just as any artist or creative in their work.
!
-
we see venture creation around crafting or other art forms
turning the disposable into something valuable. Upcycling...
-
barefoot entrepreneurs because they have no other option but to create something for themselves out of the void that they exist in. Each person has different reasons for doing so; how-ever, their reasons are often linked to the community, and the will to help both themselves, and also others around them to alleviate some of their problems.
the barefoot entrepreneur doesn't exist in a vacuum but in a community instead!
-
Children who are regarded without knowledge and the skills to generate ‘wealth’ are paradoxi-cally able in the urban hostile context of their existence to develop the necessary skills to create new business opportunities that sustain their existence when protection by family and state does not exist. Clearly Critical Entrepreneurship Studies (CES) needs to include taking account of such ‘other’ forms of entrepreneurship, especially the role of children in the construction of subsistence entrepreneurship
yep
-
we see a very collective form of social creativity in practice. The ‘boundaries’ being crossed are those of an organizational, hierarchical, industrial nature. The workers worked as mosquitoes, as a single joint cloud, contributing to their survival like the shoal of sardines under attack from shark and catapulting the business ahead
! collective rather than individual effort
-
Their work is also collective. The cartonero co-create the ‘opportunities’ that are invisible to others, in and through their social creativity. In doing so, their activities go beyond the category of ‘necessity’ entrepreneurship (Acs, 2006), all too easily seen as the poor relation of ‘opportunity’ led entrepreneurship.
learning stories allows us to finesse a definition of barefoot entrepreneuring that is distinct from "necessity" entrepreneurship (understood as the shadowy side of conventional opportunity-seeking entrepreneurship)
-
driven out, looked down upon and yet valued; the scarcity of resources, the necessity for ‘bootstrap’ or ‘parsimonious’ approaches (McGrath, 1997) to entrepreneurship and the need for bricolage—all are characteristic of entrepreneurship as widely discussed, and yet they speak to us in new ways about the possibility of an ‘altermodern’ (Bourriaud, 2009b) society characterized by fragmentation and hybridization.
interesting
-
The everydayness of their creative practice, the sense in which they trade in original and innovative ways to make a living—this is to act entrepreneurially. They embody the ‘entrepreneuring’ spirit
!!
-
begging appears as the antithesis of the mercurial business entrepreneur that is supposed to bring economic modernization, capital and progress to the city. Stigmatized and labelled as a dan-ger to progress, beggars negotiate their own ways of interpreting the economic, their space and their business activities
...
-
the discourse of entrepreneurship is not just about ‘massive successes’, but about ‘struggle, stress, debt and failure’
!!
-
microstorias do not form a unitary discourse, a unique and grand history, but instead unfold the unconventional, the forgot-ten and the improper
aha! Clear link to the other reading (and hence, the title of the week as an all-inclusive "unconventional" umbrella -- broader in scope than intended by the other reading...)
-
we did not plan specific questions upon which to interrogate their ‘entrepreneurship’ or capacity for creativity. Theirs was a language of deprivation and exclusion; the one our microstorias wanted to raise. That is, before we intervene with our translations and analytical frameworks, we wanted to hear in their own language what they went through as ‘barefoot entrepreneurs’ and in this way avoid the obses-sive attempt to impose (colonialist) representations that define who they are and what they do.
good approach... inductive vs. deductive research
-
There is also an enduring belief in the entrepreneur’s power to have a positive effect on others (see Arndt, 1983 for more on the so-called ‘trickle down myth’). This view of entrepreneurship puts emphasis on an economic system that values success as part of the ‘creation’ of business, at the expense of individuals and communities who are marginalized or excluded from the discourse
connecting the mainstream and marginal contexts...
-
We met these people in the streets. The streets of these cities are where most of the excluded members of society make their trade in informal and disorganized ways (Burrell, 1997). There they beg, collect rubbish, dance or play music, sell in small kiosks, whatever they have, in order to make a living. We approached them in the streets and engaged with them in the movement and moment of our street encounter that brought a fluid conversation about their and our existence
field-research -- opportunistic, and "real" -- these stories aren't processed like the published accounts of successful (commercial) entrepreneurs...
-
our main criteria for constructing our microstorias of barefoot entrepreneurs, accept-ing the limitations and moral paradoxes (Geertz, 1968) when researching and analysing the other, was to approach only people who have been disfranchised and who operate at the mar-gins of society. That is, people who are ignored or overlooked by mainstream institutions and therefore do not receive any state or (inter)national support for their minimum survival and existence; those who have to carve their own living out of poverty; those who do not have the freedom to be the person that ‘they are able to be’
privileging the "nobodies" (rather than ignoring them).
-
we attempted to de-colonize ‘the entrepreneur’
ethnographic connection with the research subject (empathy)
-
though our focus on the marginal, the excluded and the ‘barefoot entrepreneur’ inevita-bly calls for analytical separation between us and the ‘other’, we write this article in the firm belief that we are part of something that we need to transform together. Our universal commonality is an axiological principle of being ‘human’.
politics clarified
-
abandon this economic utopia that exploits nature and the poor for a more creative and organic integration and interdependence (of communities and peo-ples). This reflects, for him, a matter of bringing the ‘invisible’ (organizational) sectors into the forefront of life and of letting them, finally, have their say and ‘do their thing’
there is a definite link to communities and "tribes" here (though not consumer based!), networks of support...
-
‘to speak of labour is to speak of the already enfranchised’ (p. 79). Hence to speak of the entrepreneur, is to speak of individuals who have already been given, or born into a state of pos-sibility and enfranchisement
Privilege!
The same thing is true when we speak of "capital" (economic, human, social, cultural...)
-
the conventional knowledge we apply to understanding the economy of places and spaces in poverty are entirely meaningless.
the languages and experiences of those living "barefoot" require different ways of thinking ...
-
moving to an economic system that serves the people rather than people serving the economy
a political and social agenda, not just economic!
-
Currently the discourse of the entrepreneur is driven with values that promote a great [white] man narrative of progression and economic achievement via ‘creative destruction’ or business innovation in the omnipresent market
just another reminder...
-
the entrepreneur is defined as an individual who takes on certain tasks based solely on a perception of market oppor-tunities and how to exploit them
the (conventional) enterprising individual...
-
the Canadian aboriginal approach to economic development is predominantly collective, centred on the community or ‘nation’ for the purposes of ending dependency through economic self-sufficiency, controlling activities on tradi-tional lands, improving socio-economic circumstances, strengthening traditional culture, values and languages (and reflecting the same in development activities). These studies also question the postcoloniality of the ‘entrepreneur’ discourse and the economy of dependency that it creates (Khan et al., 2007). For example, Frederick and Foley (2006) maintain that colonial and postcolo-nial [entrepreneur] practices deprive indigenous communities of their land, culture and their basic human rights.
link to indigenous entrepreneurship...
-
lives, like Imin’s, do speak of experiences and narratives that present a sig-nificantly different, and arguably no less legitimate story (Boje, 2008) to the one generally employed to define, describe or analyse ‘the entrepreneur’ (e.g. Palomino, 2003). Imin’s life does not provide a grand narrative of successful business, growth or innovation (e.g. Peredo, 2003). Imin’s life does not contribute to what Weiskopf and Steyaert (2009) describe as the holy trinity of the entrepreneur—the strong entrepreneurial figure, a neo-positivist tradition of research and the belief of optimistic policy-making that is grounded in the discourse of neolib-eral economic success. Imin’s life does not embed the myth of noble armoured knight entrepre-neurs (Sørensen, 2008). But his life does reflect distinctively different and no less valuable experiences and stories that have a bearing on our understanding of entrepreneurship
!!
-
The mainstream discourse of entrepreneurship imposes an ideological and hegemonic reading that defines entrepreneurial behaviour and the enterprise economy
mainstream context, again
-
In microstoria we found a method that breaks with the hegemonic power of grand narratives (theories), such as those economic theories that have come to ‘represent’ entrepreneurship
**
-
the sublime
there's that term again!
-
we approach our study of the barefoot entrepreneurs by employing ‘microstoria’ as a method (Ginzburg, 1993). Microstoria precisely addresses Max-Neef’s concerns about the representation of the poor by engaging with stories of little people, i.e. indigenous, peasants, minorities, poor, marginal and so forth
a narrative based approach - people's stories about their lives and their struggles (either marginal or mainstream) tell you who they are, their values, etc...
-
two great attributes that the mosquito cloud has: first, it sticks together and second, it has no chief mosquito, therefore no one can behead the cloud
also interesting ! The tribe, but more nomadic than monadic!
-
we concentrate on those everyday entrepreneur[ial] stories that populate the mar-gins of our societies; those that belong to the disenfranchised and dislocated voices of the ‘barefoot entrepreneurs’.
!! barefoot entrepreneurs are obviously unconventional...
-
dominant economic theory assigns no value to tasks carried out at subsistence and domestic levels. In other words, such (economic) theory is unable to embrace the poorer sectors of the world
poorer populations aren't concerned with efficiency or maximizing growth...
-
the entrepreneur is defined within an economic system that legitimizes values, actions and identities that do not reflect life among poor or neglected communi-ties in the developing world or the poor south
context
-
We are emboldened to think again about ‘who is the entrepreneur?
their mission statement - to re-frame "marginal" actors and actions as entrepreneurial ... so "unconventional" can become the norm?
-
collecting stories of people who otherwise will be left out
refuting the great-man or hero-centric entrepreneurial ideology
-
survival tactics, self-reliance and creative practices (see De Certeau, 1988) reflect the more mundane (Rehn and Taalas, 2004) everydayness of the entrepreneur
those who live on the "margins of the neoliberal economic world" are still part of it!
-
the ‘everydayness’ (Steyaert and Katz, 2004) of entrepreneuring that takes place at the margins of our societies
mundane acts of living (often necessary for survival...)
-
‘the word entrepreneur has no meaning’ (p. 85). The entrepreneur emerges as a fairy tale character, a mythological role.
reminder of the mythic and discursive function of the entrepreneur ...
-
-
www.washingtonpost.com www.washingtonpost.com
-
The vast inequalities in income and opportunity that automation has given us so far could be significantly reduced
AI has an equal potential to displace people in the workplace or flatten the wealth gap.
-
-
www.sciencedirect.com www.sciencedirect.com
-
The other side of the coin, however, is the riskthat people who have become the entrepreneurs of their own lives willsuffer alienation rather than self-fulfilment
bad stuff
-
the rise of impassioned entrepreneurship becomes a vehicleto imbue professional life with meaning. Connecting passions that linkprivate and professional lives help people gain emotional and culturalcompetencie
good stuff
-
The inducement to manage and transform one's self and/or tribeinto an entrepreneurial business producing and selling emotional la-bour, such as intimate videos, has a substantial effect on entrepreneurs'psyche
a fancy way of saying that the constant need to update and maintain an attractive self-image in order to cultivate followers is damaging to one's mental health.
Are autopreneurs "unconventional entrepreneurs"? Are they part of a tribe?
-
Whether this involves a person's work, play, or love life, they mustact like a superhero. The quest is driven by the unfettered desire to existand develop one's own identity (
more... the constant emphasis on performance, leading to an illogical and unhealthy end...
-
The danger to which the autopreneur is exposed is an element thatcomplements the others presented in this article and helps define aframework within which the unconventional entrepreneurship is placed(see Fig. 1).
curious! I missed this reference to Ashman's piece in my first read...
Are autopreneurs "unconventional entrepreneurs"? Are they part of a tribe?
-
Neoliberalism is the dominant ideology of liquid times (Scharff,2016), a form of governmentality in people's lives where they become“entrepreneurs of themselves
!!
-
today it is the entrepreneurwho represents neoliberal alienation
yowza
-
For most people today, unconventional entrepreneurship representsabsolute emancipation, allowing the perfect combination of privatepassion and professional success. Emancipation is usually defined as theprocess of being liberated from constraints that can be physical, in-tellectual, moral, or spiritual
ok
-
passion can provide the stability, meaning, and social recognition
can't get my highlighter to cover the text that I want! Liquid times call out for anchors - for we need stability. Passions can become that anchor (for the self, and a sense of community).
-
ach individualbecomes an entrepreneurial subject, living their lives like a companyand behaving entrepreneurially at every level (Scharff, 2016). Peopleare asked to use “technologies of the self”(Foucault, 1988) to shapetheir identity corporeally and cognitively so that they may be re-cognised both off- and online
social media = social networking = networked entrepreneurship, promoting our selves (via our interests & passions).
-
The fig-urehead of work today is the entrepreneur, not in the Schumpeteriansense of the term but the unconventional entrepreneur driven by theprimacy of consumption in contemporary life.
cool -- so the unconventional figure has now become the archetype of current (liquid) times.
Do you buy what they're selling?
-
nconventional entrepreneurs are supposed toabsorb and express liquidity by eliminating the barriers between private(consumption) and professional (production) lives.
reinforcing Szeman...
-
n-trepreneurs are the embodiment of liquid times where planning be-comes impossible
kind of a cool statement with big time implications...
-
tribes areconstrued here as sets of individuals who are not homogeneous (interms of their objective social characteristics) but linked by one and thesame passion
tribes brief definition -- if you really want to get into it, consult Maffesoli, Michel (1996). The Time of the Tribes: The Decline of Individualism in Mass Society.-- in this book Maffesoli claims that neotribalism will replace individualism in a postmodern society that follows modernity (Zygmunt Bauman's notion of liquid society charts some of the same ground ... since modern times are solid times). Neo-tribes are typically consumer tribes (groupings), but also ephemeral and lacking stability (i.e. liquid...)
-
With the ad-vent of liquid times, society went from being work-centred to a situa-tion where people's lives increasingly centred on consumption
ripe for tribal entrepreneurship ...
-
Unconventional entrepreneurs want to please the commu-nity but some adjustments and choices have to be made to fit their ownagenda. Even if their endeavour is conducted with passion, it is also aproject that, at some point, is expected to deliver a return on invest-ment. The balance seems hard to maintain but remains essential forunconventional entrepreneurs who do not want to disappoint theirtribe
unconventional entrepreneurs likely face a trickier balancing act than conventional entrepreneurs.
-
To exploit cultural opportunity, they accept thecultural mission (Pedeliento, Bettinelli, Andreini, & Bergamaschi, 2018)of bridging the inside community with outside society.
the role, further explained...
-
Beyond cultural competency, unconventional entrepreneurs manageand commercialise emotional bonds. This type of entrepreneurship re-quires significant and novel forms of emotional labour from both theentrepreneur and the broader tribe (
clear link to emotional intelligence (3 weeks hence) (but also really useful for the concept of emotional labour -- often the most difficult to monetize!)
-