1,169,866 Matching Annotations
  1. Oct 2024
    1. ull understanding of the well-beingof entrepreneurs demands knowledge of their family lives.

      ...

    2. he big five model of traits have been linked to the abovedimensions with numerous findings (openness is linked with personal growth, agreeableness with positive relations with others, andextraversion, conscientiousness, and neuroticism with environmental mastery, purpose in life, and self-acceptance) (Sc

      wow - awesome link to previous weeks' material...

    3. se who are married have a well-beingadvantage compared to the divorced, widowed, or never married, but single women score higher on autonomy and personal growthcompared to married women. Parenting seems to enhance well-being, particularly when children are flourishing

      ok...

    4. Self-acceptance brings a potentially neglected aspect of entrepreneurial well-being. It encompasses having positive attitudestoward oneself, but drawing on the Jungian idea of the shadow, also includes the capacity to see one's bad qualities. Thi

      self-acceptance!

    5. capacityto find meaning in the face of adversity,

      So many good Frankl quotes!

    6. plied to the entrepreneurial context, self-acceptance may be a critical asset, such that effective problem-solving and negotiating through unfolding challenges would seem todemand honest reckoning with one's self. A

      honesty is the best policy (especially with oneself!) As it can prevent you from getting in over your head...

    7. without goals, purposes, and meaning, including during periods ofchallenge and difficulty, it is difficult to fathom an entrepreneur who is experiencing genuine well-being. In

      (this is related to the question I asked at the end of our last class -- do you envy people who lead an easy life? Where do they find meaning?)

    8. Purpose in life is the existential core of eudaimonic well-being, with its emphasis on viewing one's life has having meaning,direction, and goals. These qualities comprise a kind of intentionality that involves having aims and objectives for living. Life

      Purpose in life!

    9. Positive relations with others is the most universally endorsed aspect of what it means to be well. This dimension encompasseshaving warm, trusting ties to others, being concerned about the welfare of others, understanding the give and take of social re-lationships, and having the capacity for empathy and affection.

      positive relations!

    10. Environmental mastery emphasizes the sense that one can manage the surrounding environment, including making effective useof available opportunities, while also creating contexts suitable to one's personal needs and values. Th

      Environmental mastery (tied to social settings and social skills in emotional intelligence...)

    11. igning views of subjective well-being at the time that revolved around assessmentsof happiness, life satisfaction, and positive and negative affect

      (mostly) the focus of the other article this week...

    12. The answer for him was eudaimonia, which he described as activity of the soul in accord with virtue. The key task in lifeis to know and live in truth with one's daimon, a kind of spirit given to all persons at birth. Eu

      getting very philosophical here (but context is good)

    13. The second venue addresses varieties of entrepreneurship, with a focus on the distinction between opportunity and ne-cessity entrepreneurs.

      all righty then...

    14. The first section thus examines the conceptual and philo-sophical foundations of a widely-used model of eudaimonic well-being built on the integration of perspectives from clinical, de-velopmental, existential and humanistic psychology, along with distant observations from Aristotle. These differing views convergedin their emphasis on six distinct aspects of what it means to be fully functioning and well.

      telling us what is to follow...

    15. Hedonic formulations emphasizepositive life evaluations, such as life satisfaction and positive feeling states, such as happiness and positive affect

      hedonism - often associated with the pursuit of pleasure.

      This article doesn't focus on it a lot (since it emphasizes the other main aspect of well-being), but I'd like to just highlight the connection between hedonism and happiness a little bit here by emphasizing the concept of the "hedonic treadmill".

      The hedonic treadmill is a metaphor for the human tendency to pursue one pleasure after another. That's because the surge of happiness that's felt after a positive event is likely to return to a steady personal baseline over time.

      So, it looks like this:

      This is why I was so interested in the discussion we had at the end of the last class (which we'll continue this week) about money and happiness. Mo money, mo problems. We desire more riches, but we're never satisfied ...

      Which is one of the reasons we need to look beyond hedonic well-being and explore eudaimonic well-being!

    16. ive key venues for theentrepreneurial field are then considered: (1) entrepreneurship and autonomy, viewed both as amotive (self-determination theory) and as an aspect of well-being (eudaimonic well-beingtheory); (2) varieties of entrepreneurship (opportunity versus necessity) and eudaimonic well-being; (3) eudaimonia in the entrepreneurial journey (beginning, middle, end); (4) en-trepreneurship, well-being and health; and (5) entrepreneurs and the eudaimonia of others –contrasting virtuous and vicious types.

      so, this is going to cover a lot of ground!

    17. Approaches to well-being tend to be partitioned into hedonic and eudaimonicformulations.

      ok - we were already introduced to this distinction in the last article - we're going to get into it more here!

    18. Researchers in entrepreneurial studies are increasingly interested in the psychological well-beingof entrepreneurs.

      ok - we are familiar with this rhetorical contextextualizing... (it's the last half of our whole course)

    19. e “dark side”of prosocial moti-vation, which may be good for society, but bad for the well-being of the entrepreneur. Im

      oof

    20. orking from a holistic conception of human flourishing that includes social aswell as economic benefits, they distilled three overarching virtues of the excellent/virtuous entrepreneur. These include creativity,beneficence, and integrity.

      !

    21. A first observation is that well-being in extant studies is studied primarily as anoutcome (consequent) of the business venture,

      curious - given the next statement...

    22. key aspects of eudaimonic well-being (e.g., realization of personal potential, purposeful life en-gagement, effective management of complex environments) have received little attention eventhough they may be particularly relevant to entrepreneurial pursuits.

      narrowing the focus...

    23. The third venue focuses the unfolding of the entrepreneurial process in time –how it progresses from early stages to longer-term enterprises, at least for some.

      ok

    24. The central objective of this essay is to examine the relevance ofeudaimonic well-being for understanding entrepreneurial experience. T

      let's take the road less travelled!

    1. his recognition of the extreme difficulties in making entirely ex-haustive causal imputations.

      probability of human behavior doesn't come from notions of free will as much as it comes from the variety of situations and possibilities that can't always be accounted for in strict categories

    2. Weber argued, for example, that human action was truly unpredict-able only in the case of the insane,

      maybe Durkheim would differ

    3. We shall then be in a position to determine empiricallywhether the concrete conduct of Protestants in, say, seventeenth-century Eng-land did in fact approximate the type and in what specific aspects it failedto do so

      Did the actions of Protestants via 17th-England correlate with the ideal type of Protestant?

    4. An ideal type never corresponds to concretereality but always moves at least one step away from it. It is constructed outof certain elements of reality and forms a logically

      ideal type- the social construction of what something should be??

    5. Thenotion of the ideal type was meant to provide escape from this dilemma

      believes in necessity of generalizations and concepts but wary of over encompassing categories that try to explain literally everything. Additionally, wary of too narrow a focus of a case or a situation.

    1. Stretching entrepreneurs’skills and abilities through flow experiences enhance their resilience andtenacity

      ooh! I really like this link to the previous week on perseverance and grit...

    2. rincipal axis factors(PAF) analysis

      unless you're into stats and quantitative measurement, you can skip over these details ... but the social significance rather than the statistical significance of their findings is still trenchant!

    3. Entrepreneurs need internal psycho-logical resources such as intrinsic definition of success and a spiritual practiceto weather the myriad of external storms

      like the lingo!

    4. rom this eudaimonicperspective, people are looking for what makes life fulfilling and meaningful.

      all right -- leading us into the next article!

    5. The fact that the business provides a source of flow experiences isimportant for entrepreneurs’well-being. Flow is a central construct withinpositive psychology that entrepreneurs can borrow and use to their advantage.

      generally accepted as entrepreneurs are assumed to get more meaning and purpose from their work than folk who work for someone/thing else other than themselves...

    6. ubjective well-being was significantlyand positively linked to intrinsic definitions of success while the more extrin-sic/material-driven definitions of success were significantly but negativelylinked to subjective well-being.

      yep

    7. Subjective well-being questions were asked using the Satisfaction with LifeScale
      • check it out in the quiz section this week...
    8. “In my business everyone gives his/her best efforts”; “In my business workquality is a high priority for all workers”; “I am able to apply my full capabil-ity in my business”, and “My business is very efficient in getting maximumoutput from the resources we have available (e.g. money, people, equipment,etc.)”

      wow! When listed in this way, it seems as though most workplaces or types of work might not encourage group productivity. How many of these apply to your work?

    9. The ability for finding meaning at work has been found to be a dominantfactor in the conceptualization and measure of intrinsic success and spiritualityresearch

      *

    10. ntrepreneurshipmotivation appears to link to the basis of rewards, which are either driven byextrinsic measures of success (money, social recognition, financial security,power, or buying power) or on intrinsic measures (such as personal fulfillment,doing something I love, finding meaning and purpose in their lives).

      **

    11. ersonal causesand callings are examples of intrinsic or meaningful objectives. The respon-dents’definition of success included making a difference, creating lastingimpact, and being engaged in a life of personal fulfillment

      making a difference (for others...) or making a difference for oneself (being personally fulfilled)...

      summing up perceptions of success

    12. The job of leadership today is not just to make money, it’s to make meaning

      not as far as the marketplace is concerned...

    13. An individual’s well-being is considered a potential source of productivity.On the other hand, an individual’s personal life can be a source of reducedfunctioning.

      hmmm

    14. Flow is interesting in a work context because findings indicate that themore individuals experience flow, the more they report control and greatersense of enjoyment in the activity

      *

    15. Since uncertainty is central to the entrepreneurialenvironment, it is unclear if the well-being and flow linkage found in otherwork situations extends to entrepreneurial environments.

      the testable proposition...

    16. nce flow isachieved, the attributes are (1) intense focus on the activity at hand and (2)time is perceived to move differently, either more slowly or quickly. The per-son experiences (3) a sense of control and (4) a loss of self-consciousness.There is (5) a merging of action and awareness, that is, the next move is evi-dent. Flow is experienced when (6) challenges and skills are balanced and theperceived challenges of the activity are at or very slightly above the person’sskill level. Usually (7) the experience is rewarding

      can you relate this to your own experiences?

      remember what I said in my note about happiness and flow in the seminar prompt in week 7 (creative/cultural entrepreneurs)

    17. real happiness lay in the prospect of finding work thatprovided close social relationships, meaning and purpose, pursuit of personalgoals, and being involved in flow activities

      sounds sensible enough (even if slightly utopian, moreso than ever in situations of precocity and neoliberal capitalist accumulation)

    18. none of theseare assured in an entrepreneurial environment.

      leading to the key insight...

    19. the processof creating art consumed his research subjects and compelled them to losetrack of time, forget to eat, and focus completely on the work. Artistsdescribed being consumed in the process as in the “flow”of it.

      !!

    20. These same factors are related to the intrinsic motivators oftenemployed in entrepreneurial perspectives

      ooh! a key answer for one of the questions I asked as a seminar prompt in week 7 (about the propensity for people to feel intrinsically motivated to act/achieve goals....)

    21. Since work is a major factor inpeople’s lives –it takes up as much as a half of an adult’s waking life –whatgoes on at work is a major factor in understanding what gives individuals asense of meaning and fulfillment

      sad but true (and one of the reasons why entrepreneurial ventures are filled with such hope (because of all those times that one's mundane work life isn't...)

    22. happiness is associated with behaviors that create success, and thathappiness also precedes successful outcomes.

      doesn't seem that controversial ... miserable people might be successful, but one doesn't expect it to be sustainable in the face of success (the misery...)

      on the other hand, if you're happy (or satisfied), do you strive to achieve greater success?

    23. happiness precedes successful outcomes by creating positive affect, the charac-teristics of which include confidence, optimism, and self-efficacy; likability andpositive construals of others; sociability, activity, and energy; prosocial behavior;immunity, and physical well-being; effective coping with challenge and stress;and originality and flexibility. Positive affect, in turn, encourages activeinvolvement with the environment, and with the pursuit of goals

      this is quite the list -- kind of like success breeds more success, the happier you are, the more spillover there is likely to be in other related fields of achievement.

    24. When focusing on psychological well-being, there are generally two perspec-tives: the hedonic/subjective well-being perspective and the eudaimonic/mean-ing perspective.

      and we're going to focus on the latter... or at least the other reading does!

    25. Thereare three types of well-being: (1) physical well-being; (2) psychological well-being; and (3) relationship/social well-being

      while entrepreneurial activities certainly relate to the well-being of one's physical body and one's relationships, we're going to focus on the psychological...

      Feel free to ruminate on the others, though...

    26. the termeudaimonia, or a state of meaningfulness and fulfillment,

      eudaemonia is quite distinct!

    27. ristotlebelieved that meaning was not about satisfying human appetites, but aboutdoing virtuous things such that we “achieve the best that is within us

      so, eudaemonia relates to self-improvement and self-actualization...

    28. Extrinsic fac-tors can include financial and social rewards, while intrinsic personal successis often researched using meaning, happiness, and spirituality within the workcontext.

      this should resonate with one of the questions I asked you to answer before the first class...

    29. what makes life pleasant and unpleasant (Ryan and Deci2001). Research in this area looks at life satisfaction, positive affect, and nega-tive affect

      hedonism is focused on the pursuit of pleasure. What feels good...

    30. Productivity, the second factor examined, can lead to well-being from anextrinsic perspective, since greater productivity would most likely lead togreater success of the organization

      whereas flow connects with a sense of intrinsic well-being, productivity relates to extrinsic forces too

    31. Although many factors could lead to increased entrepre-neurial well-being, the present study examines how flow, productivity, andentrepreneurs’own definition of personal success (intrinsic vs. extrinsic)impacts the entrepreneur’s subjective well-being

      focal points...

      because there's a difference between being entrepreneurial and happy and being entrepreneurial to be happy (down the road...)

    32. Continued engagement is a predictorof entrepreneurial business

      we're more likely to continue acting entrepreneurially if it satisfies us (if it gives us a sense of pleasure, or well-being) as a result of pursuing the dream, seeking and creating new opportunities... being bold and innovative and creative... (even though there are risks and great costs associated with these too)

    33. The third factor examined in this study is how an entrepreneur’s de finitionof personal success impacts their subjective well-being.

      *

    34. The first factor considered in this study was flow, which describes a state ofcomplete attentional energy focused on the task at hand

      already introduced 4 weeks ago...

    35. Yet the directionality is not clear. Are happy workers more productive, orare more productive workers happier?

      where do you stand?

    36. Of interest in this paper are the psychological factors that contribute toentrepreneurs’well-being

      focusing on one's sense of subjective well-being (otherwise known as happiness).

    1. Narodený z obesenej ženy sa sirota Guts dostáva do výchovy žoldniera. Napriek neľahkému detstvu vyrastie z tohto dieťaťa silný mladík a veľmi schopný bojovník. Jeho sila mu dovoľuje používať aj masívny meč, ktorý presahuje dĺžku dospelého človeka.Pri jednom z mnohých vojnových ťažení spoznáva Cascu a charizmatického Griffitha, vodcu žoldnierskej Skupiny Jastraba a držiteľa záhadného prívesku - Behelit. Guts mu očividne padne do oka a stane sa jedným z nich. Medzi členmi družiny nájde skutočných priateľov a postupom času získa pozíciu ako Griffithova pravá ruka.Toto je iba jedna kapitola príbehu z rozsiahlej manga ságy od autora menom Kentaro Miura. Veľmi temný fantasy príbeh láka stále nových fanúšikov, pretože dej nie je ani po vyše dvadsiatich rokoch od jeho uvedenia v roku 1990 stále uzavretý. V roku 1997 sa Berserk dočkal aj svojho 25 dielneho anime prevedenia, ktoré slávilo tiež veľký úspech. Po približne ďalších pätnástich rokoch sa dostávame opäť k anime, ktoré bude ale na rozdiel od svojho seriálového predchodcu rozdelené do niekoľkých dlhších filmov. Prvý z radu filmov, ktoré majú pokryť dej celej manga predlohy, bude uvedený v roku 2012. Nesie názov Berserk Golden Age Arc I: Egg of the Supreme Ruler a ako jeden z troch filmov nám zachytí časť príbehu „zlatého obdobia“.
    1. The Animatrix

      Vítejte do světa Animatrixu, vizionářské fúze počítačové animace a japonské školy animace, od světově nejuznávanějších tvůrců animovanch filmů. Vychutnejte si snímek, který vznikl před filmem Matrix a dozvíte se o posledních městech lidské rasy, válce mezi stroji a lidmi a o závěrečném úpadku lidstva. Staňte se svědky posledního letu Osirise, který připravil půdu pro film Matrix Reloaded a videohru Enter The Matrix. Doplňte si své povědomí o Matrixu a získejte informace, které jinde nenajdete. Je čas zapojit se... (oficiální text distributora)

    1. successful entrepreneurship is not really just a story about intelligence inthe traditional sense but more fully a story about successful intelligence—the strategic mergerof analytical, creative, and practical intelligence. All three kinds of intelligence can bedeveloped and are developed through good use of experience.

      **

    2. When entrepreneurs and others shape the environment, they are basically applyingsuccessful intelligence to idea generating

      !!

    3. They may end up on used-carlots

      that's quite the burn, for an academic article!

    4. People who are high in creative intelligence but not in the otherkinds may be good at coming up with ideas but often are not good either at knowingwhether their ideas are good ones (analytical intelligence) or at selling their ideas toothers (practical intelligence

      *

    5. the tests of practical intelligence I mentioned above measure adaptive skills

      ok

    6. Successful intelligence is applied in order to balance adapting to, selecting, and shapingenvironments. When one adapts to the environment, one changes oneself in order to fit intothe environment.

      how do you demonstrate this?

    7. People who are high in analytical intelligence but not the other kinds often aregood memorizers and analyzers, but they need other people’s ideas to remember andanalyze. They make poor entrepreneurs, because entrepreneurs simply must be ideagenerators to succeed

      interesting!

    8. This is the option in which entrepreneurs mustspecialize.

      this gets into persuasion & rhetoric. In essence, also "selling" but not selling things, but ideas, selling people on your version of reality...

    9. The third option is shaping

      !

    10. The most important kind of intelligence for an entrepreneur, or really anyone else, issuccessful intelligence, which involves a balance of analytical (IQ-based), creative, andpractical intelligence

      connecting the 3 types of intelligence...

    11. One needs the creative intelligence to come upwith new ideas, the analytical intelligence to evaluate whether the ideas are good ones,and the practical intelligence to figure out a way to sell these ideas to people who maynot want to hear about them

      synergy! For success ...

    12. What matters is not the amountof experience one has but how much one has learned from that experience

      you probably have experience with this ...

    13. In sum, tests of practical intelligence are useful predictors of job-related skills, independ-ently of IQ-based tests.

      underwhelming. This really drives home the fact that this article is good mostly as a shell -- kind-of boring and potentially difficult to see (at least in an immediate fashion) how it can relate in a real sense to students' lives (beyond the idea of multiple intelligences). Still, the lens is really useful for helping us focus on social competence and tacit knowledge (practical intelligence) for moving us forward... and considering what might be necessary in order to achieve success in a given field...

    14. one starts by interviewing successful people in agiven job and asking them for how they performed in the critical incidents that distinguishthose who are highly successful in a field from those who are not. We then try to extract thetacit knowledge underlying the successful actions.

      the method...

    15. Tacit knowledge for the workplace. Test-takers are presented with situations typical ofthose encountered in low-level jobs in workplace

      classic job interview question...

    16. ome entrepreneurs leave conventional businesssettings because they are not interested in playing the game of figuring out what the tacitknowledge of the organizational environment is. They would rather play by their own rulesthan learn other people’s.

      link to independent spirit and counterfactual knowledge...

    17. tacit knowledge is the knowledge that often is most important for success in theworkplace, but it is the knowledge that people must pick up on their own

      yowza! School can't teach tacit knowledge!

    18. Of course, people who are high in practical intelligence may also be high in academicintelligence. The two are not necessarily negatively related

      hah

    19. What matters for growth of practical intelligence is not experience but ratherlearning from experience.

      (link to the growth mindset)

    20. Modifiability of practical intelligence. Practical intelligence can be developed. Indeed, itmust be developed. People are not born with the kinds of common sense they show in theireveryday lives

      crucial insight

    21. The entrepreneurial children, like theentrepreneur in the forest, seemed to have a kind of intelligence not well measuredby conventional tests

      Their "street math" was not replicated in the classroom... They exhibited "street smarts" (not book smarts)

      Have you ever been in a situation where your book smarts failed you in the "real" world? Contrarily, how often has "street" knowledge helped you in school?

    22. intelligence is not asingle entity.

      crucial insight - we have access to multiple intelligences!

      Please note - this is definitely related to the "theory of multiple intelligences" (which was the basis for the reality TV series "Canada's Smartest Person"):

      https://en.wikipedia.org/wiki/Theory_of_multiple_intelligences

    23. Clearly, more is involved in entrepreneurial success than just the academic side ofintelligence

      Think about how often your ability to act in a "socially competent" manner came off as intelligent (a way of adapting to, shaping, and sometimes selecting your environment).

      Knowing the right thing to say or how to act (cultural capital) comes off as "smart"

    24. There is obviously more to intelligence than what conventional tests of intelligence

      the moral of the story

    25. Successful entrepreneurs appearto be higher in social competence than are unsuccessful ones. In particular, four factors seemto underlie this social competence: social perception (which involves accuracy in perceivingothers), (b) impression management (which involves techniques for inducing positivereactions in others), (c) persuasiveness (which involves the ability to change others’ viewsor behavior in desired directions), and (d) social adaptability (which involves feelingcomfortable in a wide range of situations). These variables, especially social perception,seem to be key to entrepreneurial success.

      ** remember these 4 factors of social competence! (they will be very helpful next week!)

    26. Successful entrepreneurship requires a blend of analytical, creative, and practical aspects ofintelligence, which, in combination, constitute successful intelligence.

      ok - getting right to the heart of it. Introduces the key concepts and emphasizes its 3 parts.

    27. Perhaps you know the story of the college professor and the entrepreneur who arewalking in a forest.

      funny story - the punchline is at the end of the next paragraph!

    28. sometimes they change themselves to fit the environment; other times,they change the environment to fit them; still other times, they find a different environment

      what I was talking about at the end of last Thursday's class...

    29. Successful intelligenceis the ability to succeed in life, according to one’s own conception of success, within one’senvironmental context.

      key concept, defined

    30. Creative intelligence is needed in order to think flexiblyand to be ahead of the pack rather than merely with it.

      link to divergent thinking...

    31. reative thinkers defy the crowd,seeing alternative ways of defining and solving problems that others often do not see

      link to opportunity discovery/creation

    32. Creative intelligence is used to generate ideas that are novel, high in quality, andappropriate to the task one faces.

      ok - definition by contextualization (and very similar to last week's material...)

    33. Tobe effective on the job, however, requires a third kind of skill beyond the analytical (IQ-based) and the practical.

      completing the picture...

    34. Practicalskills are necessary to apply these analytical tools correctly to the problems really facing oneon the job

      but practical intelligence guides the application of intellectual intelligence...

    35. there is some kind of construct of practical intelligencethat is distinct from the kind of academic intelligence

      yep

    1. rustworthy. I

      VISUAL ANNOTATIONS

      1. (3:55) Code Carbon helps to provide a visual for the emissions produced in a certain time period. Much like the nutrition information on the outside of a cereal box, though it is helpful to know how many calories or grams of sugar are contained in one serving, that information would be useless without knowing what a serving size is. Even more so if we are unaware of how many calories we should consume in a given time frame. This information allows us to make informed decisions about what we should consume.

      2. (5:04) This visual of the photos that are generated when she inputs her own information provides a bit of shock factor to the audience. Not only are most of those images of someone who is not her, but they are quite illicit photos of someone who is not her. Taken out of context and unknown to be AI generated, photos such as these could be detrimental to someone's career or personal life.

    2. rustworthy. I

      REACTION ANOTAION:

      I never paused to consider that AI models are not contained within the digital world and exist boldly in our physical world. I figured that, since AI is so easily available on a cell phone, it couldn't possibly require so much to sustain it.

    3. rustworthy. I

      RESTATEMENT ANNOTAIONS

      1. (0:37) Though at times AI can be extremely helpful, as we often hear in the media, there is also a dark side to these functions. For instance, one chatbot suggested that the solution to one man's problems was to file for divorce. Another suggested a sure-to-please recipe for a large gathering, that contained chlorine gas among its list of ingredients.

      2. (1:19) AI does not exist in solitude. Its affects have left the digital world and have begun to affect our physical world. AI models have been noted to contribute to climate change, use artist and authors work without their consent, and discriminate against entire groups of people.

      3. (1:56) In regard to sustainability, the figurative cloud we imagine AI resides upon is not something only contained within the digital world. We often fail to acknowledge the large quantity of materials needed to build these models as well as the sizeable amount of energy required to sustain them.

    1. This is a story we need to know. Industrial transformation turned out tobe a bubble of promise followed by lost livelihoods and damaged landscapes.And yet: such documents are not enough. If we end the story with decay, weabandon all hope—or turn our attention to other sites of promise and ruin,promise and ruin.

      Important concept: details the cycle of extracting natural (and finite) resources.

      Style elements: speaks directly to the reader, repeats important phrases.

    2. This is a story we know. It is the story of pioneers, progress, and the trans-formation of “empty” spaces into industrial resource felds.

      "Empty" land becomes a place to extract resources for profit.

    Annotators

    1. As our Religion, our Education, our Art look abroad, so does our spirit of society. All men plume themselves on the improvement of society, and no man improves.

      It's almost like he's telling you to spend so much time "looking within" that you forget to look around and you become closed off to the world. He's advocating exceptionalism if you think about it.

    2. And so the reliance on Property, including the reliance on governments which protect it, is the want of self-reliance.

      According to Emerson The secret to a fulfilled life is to just do everything yourself no matter how daunting.

    3. Let a man then know his worth,

      contradicts the message of keep to your self, do what you want, don't care about what others think

    4. What I must do is all that concerns me, not what the people think.

      Getting a strong individualism vibe.

    5. For nonconformity the world whips you with its displeasure.

      unpopular opinions cause estrangement.

    1. La grande hétérogénéité des preuves empiriques est apparente lorsque l'on observe les analyses plus récentes au niveau de l'entreprise, qui ne confirment pas que l'automatisation a un effet négatif sur l'emploi et les salaires globaux lorsque l'on tient compte d'une période d'adaptation (Lane et Saint-Martin, 2021). Toutefois, une grande partie de la recherche empirique reste axée sur la robotisation et l'automatisation, de sorte qu'il est encore nécessaire de procéder à une analyse plus spécifique de l'impact de l'IA générative sur les résultats en matière d'emploi.

      Il est ici question des biais liés aux données collectées, aux biais des statistiques et du manque de neutralité de certaines études

    2. a réduction initiale de la demande de main-d'œuvre dans les domaines hautement automatisés pourrait potentiellement conduire à une résurgence des normes traditionnelles en matière de genre,

      Référence à notre réflexion plus haut concernant les biais préexistants, avant l'IA et Nouvelles Technologies

    3. L'IA a également le potentiel d'accroître les barrières à l'entrée pour les nouvelles générations de main-d'œuvre en raison de l'inégalité d'accès à l'éducation

      Un souci primordial à expliciter lorsqu'on parle de l'IA sur le marché du travail est celui de l'accéssiblité numérique, une accessiblité qui n'est pas encore étendue au monde entier et donc le sujet de l'IA dans le monde du travail ne concerne pour l'instant que les pays et les sociétés dit.e.s "développés" (pour la plupart en Occident) et donc opérer un shift majeur en faveur de technologies inacessibles pour beaucoup ne fera qu'alourdir le gap entre eux

    4. C'est là que réside la possibilité d'une répartition inégale de la charge du déplacement d'emplois entre les hommes et les femmes, la recherche n'ayant pas encore apporté de réponse claire.

      Cela n'est pas inhérent à l'automatisation numérique en elle-même, il s'agit là d'un souci plus systémique -> l'IA et les Nouvelles Technologies ne font que refléter en prolongeant les problèmes qui existent déjà, ce ne sont que des outils

    5. Les premiers verraient ainsi la productivité de leur travail augmenter, tandis que les seconds verraient probablement la plupart de leurs tâches remplacées par l'IA et seraient donc confrontés à un risque beaucoup plus élevé de perte d'emploi.

      Même risque exposé que celui de l'article précédent.

    1. Welcome back and by now you should understand the difference between stateless and stateful security protection.

      In this lesson I want to talk about one security feature of AWS VPCs and a little bit more depth and that's network access control lists known as knuckles.

      Now we do have a lot to cover so let's jump in and get started.

      A network access control list we thought of as a traditional firewall available within AWS VPCs so let's look at a visual example.

      A subnet within an AWS VPC which has two EC2 instances A and B.

      The first thing to understand and this is core to how knuckles work within AWS is that they are associated with subnets.

      Every subnet has an associated network ACL and this filters data as it crosses the boundary of that subnet.

      In practice this means any data coming into the subnet is affected and data leaving the subnet is affected.

      But and this is super important to remember connections between things within that subnet such as between instance A and instance B in this example are not affected by network ACLs.

      Each network ACL contains a number of rules, two sets of rules to be precise.

      We have inbound rules and outbound rules.

      Now inbound rules only affect data entering the subnet and outbound rules affect data leaving the subnet.

      Remember from the previous lesson this isn't always matching directly to request and response.

      A request can be either inbound or outbound as can a response.

      These inbound and outbound rules are focused only on the direction of traffic not whether it's request or response.

      In fact and I'll cover this very soon knuckles are stateless which means they don't know if traffic is request or response.

      It's all about direction.

      Now rules match the destination IP or IP range, destination port or port range together with the protocol and they can explicitly allow or explicitly deny traffic.

      Remember this one network ACLs offer both explicit allows and explicit denies.

      Now rules are processed in order.

      First a network ACL determines if the inbound or outbound rules apply.

      Then it starts from the lowest rule number.

      It evaluates traffic against each individual rule until it finds a match.

      Then that traffic is either allowed or denied based on that rule and then processing stops.

      Now this is critical to understand because it means that if you have a deny rule and an allow rule which match the same traffic but if the deny rule comes first then the allow rule might never be processed.

      Lastly there's a catch all showed by the asterisk in the rule number and this is an implicit deny.

      If nothing else matches then traffic will be denied.

      So those are the basics.

      Next let's move on to some more complex elements of network ACLs.

      Now I just mentioned that network ACLs are stateless and this means that rules are required for both the request and the response part of every communication.

      You need individual rules for those so one inbound and one outbound.

      Take this example a multi-tiered application running in a VPC.

      We've got a web server in the middle and an application server on the left.

      On the right we have a user Bob using a laptop and he's accessing the website.

      So he makes a connection using HTTPS which is TCP port 443 and this is the request as you know by now and this is also going to mean that a response is required using the ephemeral port range.

      This ephemeral port is chosen at random from the available range decided by the operating system on Bob's laptop.

      Now to allow for this initial communication if we're using network ACLs then we'll need to have one associated with the web subnet and it will need rules in the inbound and outbound sections of that network ACL.

      Notice how on the inbound rule set we have rule number 110 which allows connections from anywhere and this is signified by 0.0.0.0 through this network ACL and this is allowed as long as it's using TCP port 443.

      So this is what allows the request from Bob into the web server.

      We also have on the outbound rule set rule number 120 and this allows outbound traffic to anywhere again 0.0.0.0 as long as the protocol is TCP using the port range of 1.0.2.4 to 65.5.3.5 and this is the ephemeral port range which I mentioned in the previous lesson.

      Now this is not amazingly secure but with stateless firewalls this is the only way.

      Now we also have the implicit denies and this is denoted by the rules with the star in the rule number and this means that anything which doesn't match rule 110 or 120 is denied.

      Now it's also worth mentioning while I do have rule 110 and 120 number differently the rule numbers are unique on inbound and outbound so we could have the single rule number 110 on both rule sets and that would be okay.

      It's just easier to illustrate this if I use unique rule numbers for each of the different rule sets.

      Now let's move on and increase the complexity little.

      So we have the same architecture we have Bob on the right, the web subnet in the middle and the application subnet on the left.

      You know now that because network ACLs are stateless each communication requires one request rule and one response rule.

      This becomes more complex when you have a multi-tiered architecture which operates across multiple subnets and let's step through this to illustrate why.

      Let's say the pop initiates a connection to the web server we know about this already because I just covered it.

      If we have a network ACL around the web subnet we'll need an inbound rule on the web network ACL.

      There's also going to be response traffic so this is going to use the ephemeral port range and this is going to need an outbound rule on that same web network ACL so this should make sense so far.

      But also the web server might need to communicate with the app server using some application TCP port.

      Now this is actually crossing two subnet boundaries the web at subnet boundary and the application subnet boundary so it's going to need an outbound rule on the web at subnet knuckle and also an inbound rule on the application subnet knuckle.

      Then we have the response for that as well from the app server through to the web server and this is going to be using ephemeral ports but this also crosses two subnet boundaries it leaves the application subnet which will need an outbound rule on that knuckle and it enters the web subnet which will also need an inbound rule on that network ACL and what if each of those servers need software updates it will get even more complex really quickly.

      You always have to be aware of these rule pairs the application port request and the ephemeral response for every single communication in some cases you're going to have multi-tier architecture and this might mean the communications go through different subnets.

      If you need software updates this will need more if you use network address translation or NAT you might need more rules still.

      You'll need to worry about this if you use network ACLs within a vpc for traffic to a vpc or traffic from a vpc or traffic between subnets inside that vpc.

      When a vpc is created it's created with a default network ACL and this contains inbound and outbound rule sets which have the default implicit deny but also a capsule allow and this means that the net effect is that all traffic is allowed so the default within a vpc is that knuckles have no effect they aren't used this is designed [Music] I need to be beginner friendly and reduce admin overhead.

      AWS prefer using security groups which I'll be covering soon.

      If you create your own custom network ACLs though that's a different story.

      Custom knuckles are created for a specific vpc and initially they're associated with no subnets.

      They only have one rule on both the inbound and outbound rule sets which is the default deny and the result is that if you associate this custom network ACL with any subnets all traffic will be denied so be careful with this it's radically different behavior than the default network ACL created with a vpc.

      Now this point I just want to cover some finishing key points which you need to be aware of for any real-world usage and when you're answering exam questions.

      So network access controlists remember they're known as knuckles they are stateless so they view request and response as different things so you need to add rules both for the request and for the response.

      A knuckle only affects data which is crossing the subnet boundary so communications between instances in the same subnet is not affected by a network ACL on that subnet.

      Now this can mean that if you do have data crossing between subnets then you need to make sure that each knuckle on both of those subnets has the appropriate inbound and outbound rules so you end up with a situation where one connection can in theory need two rules on each knuckle if that connection is crossing two different subnet boundaries.

      Now knuckles are able to explicitly allow traffic and explicitly deny and the deny is important because as you'll see when I talk about security groups this is a capability that you need to network ACLs.

      So network ACLs allow you to block specific IPs or specific IP ranges which are associated with bad actors so they're a really good security feature when you need to block any traffic attempting to exploit your systems.

      Now network ACLs are not aware of any logical resources they only allow you to use IPs and cyber ranges ports and protocols you cannot reference logical resources within AWS and knuckles can also not be assigned two logical resources they're only assigned to subnets within VPCs within AWS.

      Now knuckles are very often used together with security groups such as mentioned to add the capability to explicitly deny bad IPs or bad networks so generally you would use security groups to allow traffic and you use knuckles to deny traffic and I'll talk about exactly how this works in the next lesson.

      Now each subnet within a VPC has one knuckle associated with it it's either going to be the default network ACL for that VPC or a custom one which you create and associate.

      A single knuckle though can be associated with many different subnets so while a subnet can only have one network ACL one network ACL can be associated with many different subnets.

      Now this point that is everything that I wanted to cover about network ACLs for this lesson so go ahead complete the video and when you're ready I'll look forward to you joining me in the next lesson.

    1. nd optimization step extracts the point’s feature embed-ding. Memory networks also share some connections with our work, in particular, if we interpretthe neighborhood of a node as the memory, which is

      此处提出了一个新方法

    1. eLife Assessment

      This important study provides proof of principle that C. elegans models can be used to accelerate the discovery of candidate treatments for human Mendelian diseases by detailed high-throughput phenotyping of strains harboring mutations in orthologs of human disease genes. The data are compelling and support an approach that enables the potential rapid repurposing of FDA-approved drugs to treat rare diseases for which there are currently no effective treatments. The authors should provide a clearer explanation of how the statistical analyses were performed, as well as a link to a GitHub repository to clarify how figures and tables in the manuscript were generated from the phenotypic data.

    2. Reviewer #1 (Public review):

      Summary:

      As the scientific community identifies increasing numbers of genes and genetic variants that cause rare human diseases, a challenge in the field quickly identify pharmacological interventions to address known deficits. The authors point out that defining phenotypic outcomes required for drug screen assays is often a bottleneck, and emphasize how invertebrate models can be used for quick ID of compounds that may address genetic deficits. A major contribution of this work is to establish a framework for potential intervention drug screening based on quantitative imaging of morphology and mobility behavior, using methods that the authors show can define subtle phenotypes in a high proportion of disease gene knockout mutants. Overall, the work constitutes an elegant combination of previously developed high-volume imaging with highly detailed quantitative phenotyping (and some paring down to specific phenotypes) to establish proof of principle on how the combined applications can contribute to screens for compounds that may address specific genetic deficits, which can, in turn, suggest both mechanism and therapy.

      In brief, the authors selected 25 genes for which loss of function is implicated in human neuro-muscular disease and engineered deletions in the corresponding C. elegans homologs. The authors then imaged morphological features and behaviors prior to, during, and after blue light stimuli, quantitating features, and clustering outcomes as they elegantly developed previously (PMID 35322206; 30171234; 30201839). In doing so, phenotypes in 23/25 tested mutants could be separated enough to distinguish WT from mutant and half of those with adequate robustness to permit high-throughput screens, an outcome that supports the utility of related general efforts to ID phenotypes in C. elegans disease orthologs. A detailed discussion of 4 ciliopathy gene defects, and NACLN-related channelopathy mutants reveals both expected and novel phenotypes, validating the basic approach to modeling vetted targets and underscoring that quantitative imaging approaches reiterate known biology.

      The authors then screened a library of nearly 750 FDA-approved drugs for the capacity to shift the unc-80 NACLN channel-disrupted phenotype closer to the wild type. Top "mover" compounds shift outcome in the experimental outcome space; and also reveal how "side effects" can be evaluated to prioritize compounds that confer the fewest changes of other parameters away from the center.

      Strengths:

      Although the imaging and data analysis approaches have been reported and the screen is restricted in scope and intervention exposure, it is impressive, encouraging and important that the authors strongly combine tools to demonstrate how quantitative imaging phenotypes can be integrated with C. elegans genetics to accelerate the identification of potential modulators of disease (easily extendable to other goals). Generation of deletion alleles and documentation of their associated phenotypes (available in supplemental data) provide potentially useful reagents/data to the field. The capacity to identify "over-shooting" of compound applications with suggestions for scale back and to sort efficacious interventions to minimize other changes to behavioral and physical profiles is a strong contribution.

      Weaknesses:

      The work does not have major weaknesses, and in revision, the authors have expanded the discussion to potential utility and application in the field.

      The authors have also taken into account minor modifications in writing.

    3. Reviewer #2 (Public review):

      Summary and strengths:

      O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to make genotype-phenotype connections using C. elegans. Given the rate that rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.

      Weaknesses:

      (1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10 point font. Similarly, Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.

      (2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.

      (3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.

      (4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.

      (5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than "worsening" of 1000 correlated features.Reviewer #2 (Public review):

      Summary and strengths:

      O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to make genotype-phenotype connections using C. elegans. Given the rate that rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits.

      Weaknesses:

      (1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10 point font. Similarly, Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention.

      (2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text.

      (3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made.

      (4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps.

      (5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than "worsening" of 1000 correlated features.

    4. Reviewer #3 (Public review):

      In this study, O'Brien et al. address the need for scalable and cost-effective approaches to finding lead compounds for the treatment of the growing number of Mendelian diseases. They used state-of-the-art phenotypic screening based on an established high-dimensional phenotypic analysis pipeline in the nematode C. elegans.

      First, a panel of 25 C. elegans models was created by generating CRISPR/Cas9 knock-out lines for conserved human disease genes. These mutant strains underwent behavioral analysis using the group's published methodology. Clustering analysis revealed common features for genes likely operating in similar genetic pathways or biological functions. The study also presents results from a more focused examination of ciliopathy disease models.

      Subsequently, the study focuses on the NALCN channel gene family, comparing the phenotypes of mutants of nca-1, unc-77, and unc-80. This initial characterization identifies three behavioral parameters that exhibit significant differences from the wild type and could serve as indicators for pharmacological modulation.

      As a proof-of-concept, O'Brien et al. present a drug repurposing screen using an FDA-approved compound library, identifying two compounds capable of rescuing the behavioral phenotype in a model with UNC80 deficiency. The relatively short time and low cost associated with creating and phenotyping these strains suggest that high-throughput worm tracking could serve as a scalable approach for drug repurposing, addressing the multitude of Mendelian diseases. Interestingly, by measuring a wide range of behavioural parameters, this strategy also simultaneously reveals deleterious side effects of tested drugs that may confound the analysis.

      Considering the wealth of data generated in this study regarding important human disease genes, it is regrettable that the data is not made accessible to researchers less versed in data analysis methods. This diminishes the study's utility. It would have a far greater impact if an accessible and user-friendly online interface were established to facilitate data querying and feature extraction for specific mutants. This would empower researchers to compare their findings with the extensive dataset created here.

      Another technical limitation of the study is the use of single alleles. Large deletion alleles were generated by CRISPR/Cas9 gene editing. At first glance, this seems like a good idea because it limits the risk that background mutations, present in chemically-generated alleles, will affect behavioral parameters. However, these large deletions can also remove non-coding RNAs or other regulatory genetic elements, as found, for example, in introns. Therefore, it would be prudent to validate the behavioral effects by testing additional loss-of-function alleles produced through early stop codons or targeted deletion of key functional domains.

    5. Author response:

      The following is the authors’ response to the original reviews.

      Public Reviews:

      Reviewer #1 (Public Review): 

      Summary: 

      As the scientific community identifies increasing numbers of genetic variants that cause rare human diseases, a challenge is how the field can most quickly identify pharmacological interventions to address known deficits. The authors point out that defining phenotypic outcomes required for drug screen assays is often challenging, and emphasize how invertebrate models can be used for quick ID of compounds that may address genetic deficits. A major contribution of this work is to establish a framework for potential intervention drug screening based on quantitative imaging of morphology and mobility behavior, using methods that the authors show can define subtle phenotypes in a high proportion of disease gene knockout mutants. 

      Overall, the work constitutes an elegant combination of previously developed high-volume imaging with highly detailed quantitative phenotyping (and some paring down to specific phenotypes) to establish proof of principle on how the combined applications can contribute to screens for compounds that may address specific genetic deficits, which can suggest both mechanism and therapy. 

      In brief, the authors selected 25 genes for which loss of function is implicated in human neuro-muscular disease and engineered deletions in the corresponding C. elegans homologs. The authors then imaged morphological features and behaviors prior to, during, and after blue light stimuli, quantitating features, and clustering outcomes as they elegantly developed previously (PMID 35322206; 30171234; 30201839). In doing so, phenotypes in 23/25 tested mutants could be separated enough to distinguish WT from mutant and half of those with adequate robustness to permit high-throughput screens, an outcome that supports the utility of general efforts to ID phenotypes in C. elegans disease orthologs using this approach. A detailed discussion of 4 ciliopathy gene defects, and NACLN-related channelopathy mutants reveals both expected and novel phenotypes, validating the basic approach to modeling vetted targets and underscoring that quantitative imaging approaches reiterate known biology. The authors then screened a library of nearly 750 FDA-approved drugs for the capacity to shift the unc-80 NACLN channel-disrupted phenotype closer to the wild type. Top "mover" compound move outcome in the experimental outcome space; and also reveal how "side effects" can be evaluated to prioritize compounds that confer the fewest changes of other parameters away from the center. 

      Strengths: 

      Although the imaging and data analysis approaches have been reported and the screen is limited in scope and intervention exposure, it is important that the authors strongly combine individual approach elements to demonstrate how quantitative imaging phenotypes can be integrated with C. elegans genetics to accelerate the identification of potential modulators of disease (easily extendable to other goals). Generation of deletion alleles and documentation of their associated phenotypes (available in supplemental data) provide potentially useful reagents/data to the field. The capacity to identify "over-shooting" of compound applications with suggestions for scale back and to sort efficacious interventions to minimize other changes to behavioral and physical profiles is a strong contribution. 

      Weaknesses: 

      The work does not have major weaknesses, although it may be possible to expand the discussion to increase utility in the field: 

      (1) Increased discussion of the challenges and limitations of the approach may enhance successful adaptation application in the field. 

      It is quite possible that morphological and behavioral phenotypes have nothing to do with disease mechanisms and rather reflect secondary outcomes, such that positive hits will address "off-target" consequences. 

      This is possible and can only be determined with human data. We now discuss the possibility in the discussion.

      The deletion approach is adequately justified in the text, but the authors may make the point somewhere that screening target outcomes might be enhanced by the inclusion of engineered alleles that match the human disease condition. Their work on sod-1 alleles (PMID 35322206) might be noted in this discussion. 

      We agree and now mention this work in the discussion. We are currently working on a collection of strains with patient-specific mutations.

      Drug testing here involved a strikingly brief exposure to a compound, which holds implications for how a given drug might engage in adult animals. The authors might comment more extensively on extended treatments that include earlier life or more extended targeting. The assumption is that administering different exposure periods and durations, but if the authors are aware as to whether there are challenges associated with more prolonged applications, larger scale etc. it would be useful to note them. 

      More prolonged applications are definitely possible. We chose short treatments for this screen to model the potential for changing neural phenotypes once developmental effects of the mutation have already occurred. We now briefly discuss this choice and the potential of longer treatments in the discussion.

      (2) More justification of the shift to only a few target parameters for judging compound effectiveness. 

      - In the screen in Figure 4D and text around 313, 3 selected core features of the unc-80 mutant (fraction that blue-light pause, speed, and curvature) were used to avoid the high replicate requirements to identify subtle phenotypes. Although this strategy was successful as reported in Figure 5, the pared-down approach seems a bit at odds with the emphasis on the range of features that can be compared mutant/wt with the author's powerful image analysis. Adding details about the reduced statistical power upon multiple comparisons, with a concrete example calculated, might help interested scientists better assess how to apply this tool in experimental design. 

      To empirically test the effect of including more features on the subsequent screen, we have repeated the analysis using increasing numbers of features. In a new supplementary figure we find increasing the number of features reduces our power to detect rescue. At 256 features, we would not be able to detect any compounds that rescued the disease model phenotype.

      (3) More development of the side-effect concept. The side effects analysis is interesting and potentially powerful. Prioritization of an intervention because of minimal perturbation of other phenotypes might be better documented and discussed a bit further; how reliably does the metric of low side effects correlate with drug effectiveness? 

      Ultimately this can only be determined with clinical trial data on multiple drugs, but there are currently no therapeutic options for UNC80 deficiency in humans. We have included some extra discussion of the side effect concept.

      Reviewer #2 (Public Review): 

      Summary and strengths: 

      O'Brien et al. present a compelling strategy to both understand rare disease that could have a neuronal focus and discover drugs for repurposing that can affect rare disease phenotypes. Using C. elegans, they optimize the Brown lab worm tracker and Tierpsy analysis platform to look at the movement behaviors of 25 knockout strains. These gene knockouts were chosen based on a process to identify human orthologs that could underlie rare diseases. I found the manuscript interesting and a powerful approach to making genotype-phenotype connections using C. elegans. Given the rate at which rare Mendelian diseases are found and candidate genes suggested, human geneticists need to consider orthologous approaches to understand the disease and seek treatments on a rapid time scale. This approach is one such way. Overall, I have a few minor suggestions and some specific edits. 

      Weaknesses: 

      (1) Throughout the text on figures, labels are nearly impossible to read. I had to zoom into the PDF to determine what the figure was showing. Please make text in all figures a minimum of 10-point font. Similarly, the Figure 2D point type is impossible to read. Points should be larger in all figures. Gene names should be in italics in all figures, following C. elegans convention. 

      We have updated all figures with larger labels and, where necessary, split figures to allow for better readability. We’ve also corrected italicisation.

      (2) I have a strong bias against the second point in Figure 1A. Sequencing of trios, cohorts, or individuals NEVER identifies causal genes in the disease. This technique proposes a candidate gene. Future experiments (oftentimes in model organisms) are required to make those connections to causality. Please edit this figure and parts of the text. 

      We have removed references to causation. We were thinking of cases where a known variant is found in a patient where causality has already been established rather than cases of new variant discovery.

      (3) How were the high-confidence orthologs filtered from 767 to 543 (lines 128-131)? Also, the choice of the final list of 25 genes is not well justified. Please expand more about how these choices were made. 

      We now explain the extra keyword filtering step. For the final filtering step, we simply examined the list and chose 25. There is therefore little justification to provide and we acknowledge these cannot be seen as representative of the larger set according to well-defined rules. The choice was based on which genes we thought would be interesting using their descriptions or our prior knowledge (“subjective interestingness” in the main text).

      (4) Figures 3 and 4, why show all 8289 features? It might be easier to understand and read if only the 256 Tierpsy features were plotted in the heat maps. 

      In this case, we included all features because they were all tested for differences between mutants and controls. By consistently using all features for each fingerprint we can be sure that the features that are different that we want to highlight in box plots can be referred to in the fingerprint.

      (5) The unc-80 mutant screen is clever. In the feature space, it is likely better to focus on the 256 less-redundant Tierpsy features instead of just a number of features. It is unclear to me how many of these features are correlated and not providing more information. In other words, the "worsening" of less-redundant features is far more of a concern than the "worsening" of 1000 correlated features. 

      This is a good point. We’ve redone the analysis using the Tierpsy 256 feature set and included this as a supplementary figure. We find that the same trend exists when looking at this reduced feature set.

      Reviewer #3 (Public Review): 

      In this study, O'Brien et al. address the need for scalable and cost-effective approaches to finding lead compounds for the treatment of the growing number of Mendelian diseases. They used state-of-the-art phenotypic screening based on an established high-dimensional phenotypic analysis pipeline in the nematode C. elegans. 

      First, a panel of 25 C. elegans models was created by generating CRISPR/Cas9 knock-out lines for conserved human disease genes. These mutant strains underwent behavioral analysis using the group's published methodology. Clustering analysis revealed common features for genes likely operating in similar genetic pathways or biological functions. The study also presents results from a more focused examination of ciliopathy disease models. 

      Subsequently, the study focuses on the NALCN channel gene family, comparing the phenotypes of mutants of nca-1, unc-77, and unc-80. This initial characterization identifies three behavioral parameters that exhibit significant differences from the wild type and could serve as indicators for pharmacological modulation. 

      As a proof-of-concept, O'Brien et al. present a drug repurposing screen using an FDA-approved compound library, identifying two compounds capable of rescuing the behavioral phenotype in a model with UNC80 deficiency. The relatively short time and low cost associated with creating and phenotyping these strains suggest that high-throughput worm tracking could serve as a scalable approach for drug repurposing, addressing the multitude of Mendelian diseases. Interestingly, by measuring a wide range of behavioural parameters, this strategy also simultaneously reveals deleterious side effects of tested drugs that may confound the analysis. 

      Considering the wealth of data generated in this study regarding important human disease genes, it is regrettable that the data is not actually made accessible. This diminishes the study's utility. It would have a far greater impact if an accessible and user-friendly online interface were established to facilitate data querying and feature extraction for specific mutants. This would empower researchers to compare their findings with the extensive dataset created here. Otherwise, one is left with a very limited set of exploitable data. 

      We have now made the feature data available on Zenodo (https://doi.org/10.5281/zenodo.12684118) as a matrix of feature summaries and individual skeleton timeseries data (the feature matrix makes it more straightforward to extract the data from particular mutants for reanalysis). We have also created a static html version of the heatmap in Figure 2 containing the entire behavioural feature set extracted by Tierpsy. This can be opened in a browser and zoomed for detailed inspection. Mousing over the heatmap shows the names of features at each position making it easier to arrive at intuitive conclusions like ‘strain A is slow’ or ‘strain B is more curved’.

      Another technical limitation of the study is the use of single alleles. Large deletion alleles were generated by CRISPR/Cas9 gene editing. At first glance, this seems like a good idea because it limits the risk that background mutations, present in chemically-generated alleles, will affect behavioral parameters. However, these large deletions can also remove non-coding RNAs or other regulatory genetic elements, as found, for example, in introns. Therefore, it would be prudent to validate the behavioral effects by testing additional loss-of-function alleles produced through early stop codons or targeted deletion of key functional domains. 

      We have added a note in the main text on limitations of deletion alleles. We like the idea of making multiple alleles in future studies, especially in cases where a project is focussed on just one or a few genes.

      Recommendations for the authors

      Reviewer #1 (Recommendations For The Authors): 

      Note that none of the above suggestions or the one immediately below are considered mandatory. 

      One additional minor point: The dual implication of mevalonate perturbations for NACLM deficiencies is striking. At the same time, the mevalonate pathway is critical for embryo viability among other things, which prompts questions about how reproductive physiology is integrated in this screen approach. It appears that sterilization protocols are not used to prepare screen target animals, but it would be useful to know if there were a signature associated with drug-induced sterility that might help identify one potential common non-interesting outcome of compound treatments in general. In this work, the screen treatment is only 4 hours, which is probably too short to compromise reproduction, but as noted above, it is likely users would intend to expose test subjects for much longer than 4-hour periods. 

      This is an interesting point. In its current form our screen doesn’t assess reproductive physiology. This is something that we will consider in ongoing projects.

      Figures 

      Figure 1D might be omitted or moved to supplement. 

      We have removed 1D and moved figure 1E as a standalone table (Table 1) to improve readability.

      Figure 2D "key" is hard to make out size differences for prestim, bluelight, and poststim -more distinctive symbols should be used. 

      We have increased the size of the symbols so that the key is easier to read.

      Line 412 unc-25 should be in italics 

      Corrected

      Reviewer #2 (Recommendations For The Authors): 

      Specific edits: 

      All of the errors below have been corrected.

      Line 47, "loss of function" should be hyphenated because it is a compound adjective that modifies mutations. 

      Line 50, "genetically-tractable" should not be hyphenated because it is not a compound adjective. It is an adverb-adjective pair. Line 102 has the same grammatical issue. 

      Line 85, "rare genetic diseases" do not "affect nervous system function". The disease might have deficits in this function, but the disease does not do anything to function. 

      Line 86, it should be mutations not mutants. Mutations are changes to DNA. Mutants are individuals with mutations. 

      Throughout, wild-type should be hyphenated when it is used as a compound adjective. 

      Figure 4, asterisks is spelled incorrectly. 

      Reviewer #3 (Recommendations For The Authors): 

      - As stated in the public review, the utility of the study is limited by the lack of access to the complete dataset. The wealth of data produced by the study is one of its major outputs. 

      We have made the data publicly available on Zenodo. We appreciate the request.

      - Describe the exact break-points of the different alleles, because it was not readily feasible to derive them from the gene fact sheets provided in the supplementary materials. 

      We have now provided the start position and total length of deletion for each gene in the gene fact sheets.

      - Figure 1C: what does "Genetic homology"/"sequence identity" refer to? How were these values calculated? 

      UNC-49 is clearly not 95% identical to vertebrate GABAR subunits at the protein level. 

      We have changed the axis label to “BLAST % Sequence Identity” to clarify that these values are calculated from BLAST sequence alignments on WormBase and the Alliance Genom Resources webpages.

      - Figure 1E : The data presented in Figure 1E appears somewhat unreliable. For example, a cursory check showed: 

      (1) Wrong human ortholog: unc-49 is a Gaba receptor, not a Glycine receptor as indicated in the second column. 

      (2) Wrong disease association: dys-1 is not associated with Bardet-Biedl syndrome; overall the data indicated in the table does not seem to fully match the HPO database. 

      (3) Inconsistent disease association: why don't the avr-14 and glc-2 (and even unc-49) profiles overlap/coincide given that they present overlapping sets of human orthologs. 

      Thank you for catching this! We have corrected gene names which were mistakenly pasted. We have also made this a standalone table (Table 1) for improved readability.

      - Error in legend to figure 4I : "with ciliopathies and N2" > ciliopathies should be "NALCN disease". 

      - Error at line 301: "Figures 2E-H" should be "Figures 4E-H". 

      Corrected.

    1. Although the auxiliary view clarifies the geometry of the inclined face, it actually distorts everything else.

      Important to realize that if referring to a model with auxiliary view, focus on the top and front views to get accurate dimensions. Auxiliary is not true to its sizing

    1. Welcome back and in this video I want to cover the differences between stateful and stateless firewalls.

      And to do that I need to refresh your knowledge of how TCP and IP function.

      So let's just jump in and get started.

      In the networking fundamentals videos I talk about how TCP and IP worked together.

      You might already know this if you have networking experience in the real world, but when you make a connection using TCP, what's actually happening is that each side is sending IP packets to each other.

      These IP packets have a source and destination IP and are carried across local networks and the public internet.

      Now TCP is a layer 4 protocol which runs on top of IP.

      It adds error correction together with the idea of ports, so HTTP runs on TCP port 80 and HTTPS runs on TCP port 443 and so on.

      So keep that in mind as we continue talking about the state of connections.

      So let's say that we have a user here on the left Bob and he's connecting to the Categoram application running on a server on the right.

      What most people imagine in this scenario is a single connection between Bob's laptop and the server.

      So Bob's connecting to TCP port 443 on the server and in doing so he gets information back, in this case many different categories.

      Now you know that below the surface at layer 3 this single connection is handled by exchanging packets between the source and the destination.

      Conceptually though you can imagine that each connection, in this case it's an outgoing connection from Bob's laptop to the server.

      Each one of these is actually made up of two different parts.

      First we've got the request part where the client requests some information from a server, in this case from Categors, and then we have the response part where that data is returned to the client.

      Now these are both parts of the same interaction between the client and server, but strictly speaking you can think of these as two different components.

      What actually happens as part of this connection setup is this.

      First the client picks a temporary port and this is known as an ephemeral port.

      Now typically this port has a value between 1024 and 65535, but this range is dependent on the operating system which Bob's laptop is using.

      Then once this ephemeral port is chosen the client initiates a connection to the server using a well-known port number.

      Now a well-known port number is a port number which is typically associated with one specific popular application or protocol.

      In this case TCP port 443 is HTTPS.

      So this is the request part of the connection, it's a stream of data to the server.

      You're asking for something, some cat pictures or a web page.

      Next the server responds back with the actual data.

      The server connects back to the source IP of the request part, in this case Bob's laptop, and it connects to the source port of the request part, which is the ephemeral port which Bob's laptop has chosen.

      This part is known as the response.

      So the request is from Bob's laptop using an ephemeral port to a server using a well-known port.

      The response is from the server on that well-known port to Bob's laptop on the ephemeral port.

      Now it's these values which uniquely identify a single connection.

      So that's a source port and source IP.

      And a destination IP and a destination port.

      Now hope that this makes sense so far, if not then you need to repeat this first part of the video again because this is really important to understand.

      If it does make sense then let's carry on.

      Now let's look at this example in a little bit more detail.

      This is the same connection that we looked at on the previous screen.

      We have Bob's laptop on the left and the Catering Server on the right.

      Obviously the left is the client and the right is the server.

      I also introduced the correct terms on the previous screen so request and response.

      So the first part is the client talking to the server asking for something and that's the request.

      And the second part is the server responding and that's the response.

      But what I want to get you used to is that the directionality depends on your perspective and let me explain what I mean.

      So in this case the client initiates the request and I've added the IP addresses on here for both the client and the server.

      So what this means is the packets will be sent from the client to the server and these will be flowing from left to right.

      These packets are going to have a source IP address of 119.18.36.73, which is the IP address of the client.

      So Bob's laptop and they will have a destination IP of 1.3.3.7, which is the IP address of the server.

      Now the source port will be a temporary or ephemeral port chosen by the client and the destination port will be a well-known port.

      In this case we're using HTTPS so TCP port 443.

      Now if I challenge you to take a quick guess, would you say that this request is outbound or inbound?

      If you had to pick, if you had to define a firewall rule right now, would you pick inbound or outbound?

      Well this is actually a trick question because it's both.

      From the client perspective this request is an outbound connection.

      So if you're adding a firewall rule on the client you would be looking to allow or deny an outbound connection.

      From the server perspective though it's an inbound connection so you have to think about perspective when you're working with firewalls.

      But then we have the response part from the server through to the client.

      This will also be a collection of packets moving from right to left.

      This time the source IP on those packets will be 1.3.3.7, which is the IP address of the server.

      The destination IP will be 119.18.36.73, which is the IP address of the client.

      So Bob's laptop.

      The source port will be TCP port 443, which is the well-known port of HTTPS and the destination port will be the ephemeral port chosen originally by the client.

      Now again I want you to think about the directionality of this component of the communication.

      Is it outbound or inbound?

      Well again it depends on perspective.

      The server sees it as an outbound connection from the server to the client and the client sees it as an inbound connection from the server to itself.

      Now this is really important because there are two things to think about when dealing with firewall rules.

      The first is that each connection between a client and a server has two components, the request and the response.

      So the request is from a client to a server and the response is from a server to a client.

      The response is always the inverse direction to the request.

      But the direction of the request isn't always outbound and isn't always inbound.

      It depends on what that data is together with your perspective.

      And that's what I want to talk about a bit more on the next screen.

      Let's look at this more complex example.

      We still have Bob and his laptop on the CaterGram server, but now we have a software update server on the bottom left.

      Now the CaterGram server is inside a subnet which is protected by a firewall.

      And specifically this is a stateless firewall.

      A stateless firewall means that it doesn't understand the state of connections.

      What this means is that it sees the request connection from Bob's laptop to CaterGram and the response of from CaterGram to Bob's laptop as two individual parts.

      You need to think about allowing or denying them as two parts.

      You need two rules.

      In this case one inbound rule which is the request and one outbound rule for the response.

      This is obviously more management overhead.

      Two rules needed for each thing.

      Each thing which you as a human see as one connection.

      But it gets slightly more confusing than that.

      For connections to the CaterGram server, so for example when Bob's laptop is making a request, then that request is inbound to the CaterGram server.

      The response logically enough is outbound, sending data back to Bob's laptop, which is possible to have the inverse.

      Consider the situation where the CaterGram server is performing software updates.

      Well in this situation the request will be from the CaterGram server to the software update server, so outbound, and the response will be from the software update server to the CaterGram server, so this is inbound.

      So when you're thinking about this, start with the request.

      Is the request coming to you or going to somewhere else?

      The response will always be in the reverse direction.

      So this situation also requires two firewall rules.

      One outbound for the request and one inbound for the response.

      Now there are two really important points I want to make about stateless firewalls.

      First, for any servers where they accept connections and where they initiate connections, and this is common with web servers which need to accept connections from clients, but where they also need to do software updates.

      In this situation you'll have to deal with two rules for each of these, and they will need to be the inverse of each other.

      So get used to thinking that outbound rules can be both the request and the response, and inbound rules can also be the request and the response.

      It's initially confusing, but just remember, start by determining the direction of the request, and then always keep in mind that with stateless firewalls you're going to need an inverse rule for the response.

      Now the second important thing is that the request component is always going to be to a well-known port.

      If you're managing the firewall for the category application, you'll need to allow connections to TCP port 443.

      The response though is always from the server to a client, but this always uses a random ephemeral port, because the firewall is stateless, it has no way of knowing which specific port is used for the response, so you'll often have to allow the full range of ephemeral ports to any destination.

      This makes security engineers uneasy, which is why stateless firewalls which I'll be talking about next are much better.

      Just focus on these two key elements, that every connection has a request and a response, and together with those keep in mind the fact that they can both be in either direction, so a request can be inbound or outbound, and a response will always be the inverse to the directionality of the request.

      Also you'll keep in mind that any rules that you create for the response will need to often allow the full range of ephemeral ports.

      That's not a problem with stateless firewalls which I want to cover next.

      So we're going to use the same architecture, we've got Bob's laptop on the top left, the category server on the middle right, and the software update server on the bottom left.

      A stateless firewall is intelligent enough to identify the response for a given request, since the ports and IPs are the same, it can link one to the other, and this means that for a specific request to category from Bob's laptop to the server, the firewall automatically knows which data is the response, and the same is true for software updates, for a given connection to a software update server, the request, the firewall is smart enough to be able to see the response or the return data from the software update server back to the category server, and this means that with a stateful firewall, you'll generally only have to allow the request or not, and the response will be allowed or not automatically.

      This significantly reduces the admin overhead and the chance for mistakes, because you just have to think in terms of the directionality and the IPs and ports of the request, and it handles everything else.

      In addition, you don't need to allow the full ephemeral port range, because the firewall can identify which port is being used, and implicitly allow it based on it being the response to a request that you allow.

      Okay, so that's how stateless and stateful firewalls work, and now it's been a little bit abstract, but this has been intentional, because I want you to understand how they work, and sexually, before I go into more detail with regards to how AWS implements both of these different security firewall standards.

      Now at this point, I've finished with the abstract description, so go ahead and finish this video, and when you're ready, I'll look forward to you joining me in the next.

    1. Butler’s Parable of the Sower and Mutu’s A Fantastic Journey both bespeak “the denial and desiring” of their respective homelands (in ways that are legible and reducible to the language of citizenship, cultural particularity, and national governance) but often do so to signal the necessary transformation of these geographies.

      I thought this was interesting because in Octavia Butler's Parable of the Sower there was this sense of "denial and desiring." I interpreted this in a way that Lauren desired to fit in with the world around her but also despised that she had to change herself to fit in. This was very distinct to me in Lauren's world because when she had to leave her homeland, one of the first things she did was cut her hair to make herself resemble a man. The reason for this is that she knows in society she will be more feared if she presents herself as a man. We see throughout the novel how she suffers with her own femininity because of it. Where she finds being a woman sad a disadvantage. It's interesting to me how Frazier was able to point out this complex idea that both Butler and Mutu portray in their works.

    1. Methods

      Would you be willing to provide the code you used for this project as a GitHub repo or a gist?

    2. The taxid for each BFVD sequence was retrieved from UniProt and its full lineage - from NCBI (31). The Sankey plot based on this information (Fig. 1a) was generated with Pavian (32). For each taxonomic rank, only the ten most abundant taxa were included in the plot.

      It would be interesting to see a side-by-side comparison to PDB and ViralZone. Where does BFDV have more coverage? Where does ViralZone or PDB have more depth (more sequences per represented sequence in BFDV)

    3. To that end, the 3,002 sequences longer than this threshold were split, resulting in 6,730 sequence fragments

      As commented above, it would be interesting to know more details on how you did this splitting

    1. Far from being an ideal career choice, possessing and capitalizing on a creative ability may be the most obvious means of facilitating life choices.

      not sure what to make of this statement...

    2. Contemporary economic ideologies result in attributing the creative industries with particular characteristics from the outside, not always recognized by creative individuals themselves, forming tensions between the individuals operating within the creative sectors and those support structures nominally established to aid their evolution.

      *

    3. Pursuing entrepreneurial activity, far from being a response to an external encouragement provided by government, is more likely to represent a mark of self-determination and self-expression. Discourses elevating the importance and the identity of “the entrepreneur” are seen as irrelevant at bes

      hmmm

    4. Market logics are understood and incorporated into solutions and, in fact, are seen to be part of the creative process

      marketization is subsumed into a creative solution (another aspect of problem-solving!)

    5. Creative industry entrepreneurs mediate the relationship between being creative and being an entrepreneur: in their narrative, the creative is often elevated above the business emphasis, but in their behaviors they demonstrate enactment of entrepreneurial actions (planning, strategy, etc.).

      for creative entrepreneurs, the creative tends to come first!

    6. Idealization of the entrepreneur by powerful external stakeholders contrasts with the intimate experience of the people concerned

      yep

    7. Lisa’s lived experience of creativity is a “feeling of...the satisfaction of knowing that you’re going about the job the right way...” and she is critical of the image of the agonized artist, “I’m very skeptical about these ‘creative impulses’.” For Lisa, creativity is not “a solitary activity”, something that she separates herself from the world to pursue, and is in some way at the mercy of being struck by. Rather, it is a reaction to a problem, “...a conversation...as much as anything.”

      very interesting How do you relate to this?

    8. Designers do not take much risk, and are, on the whole, not innovative, they are “basically coming up with the same solutions, one might be better than the other, but there’s nothing innovative about what one person is doing...they do good or less good work...but I wouldn’t equate that to innovation at all.”

      huh

    9. “some of the most creative people I know don’t work in the creative industries.” She insists that creativity is about problem-solving and seeing beyond “the surface of things” suggesting that she believes that it is a feature of all human endeavor.

      ok - this statement is, on the other hand, exactly like Peter's. creativity = problem solving. A curious definition. But it also opens the door to allow everybody in ... (independent of entrepreneurial labels...)

    10. The quest for self-sufficiency

      !

    11. Creative industry entrepreneurs draw on their creative expertise within a domain and build entrepreneurial possibilities around this expertise

      we all exist as (relative) experts within some domain/field or other, acting creatively within it (with others) -- not just folk in the creative industry!

      (it's just that they have this specific focus...)

    12. “An entrepreneur is someone who from the outset has a plan.”

      quite a distinct outlook from Peter's point of view! Which do you find more persuasive?

    13. Peter regards his life as a creative entrepreneur as a collage of all the experiences he has had in life, both professionally and personally, “these jigsaw pieces I saw, I picked up along the way

      the arbitrariness of it all! Purposeful entrepreneurial identity nowhere near as significant as the serendipity of retroactively putting the pieces together...

    14. Opportunities are simply there, and the fact that others don’t see them is because they “mightn’t be looking for the same thing.” Lisa believes that most people are looking for opportunities and “constantly scanning a particular horizon” but different people have different “filters” and “notice certain things.” One person might notice one thing and another a different thing, and some people then “don’t act.

      interesting

    15. The protagonist of this research, the creative industries entrepreneur, does not have a standard profile. She specializes within specific domains but also operates across domains inside and outside the creative industries; she may run a solitary enterprise from remote, rural hinterlands far away from the world, or lead a large organization in a frenetic urban center. The type of work she engages in can involve detailed, intimate crafting but also strategic and collaborative negotiations. She is firmly situated within a creative world but demonstrates incisive business acumen

      getting into the different case studies

    16. The first interview involved questions about the lived experience of being a creative individual and being an entrepreneur, and the second interview was an exploration of how constructs such as “the creative industries” were understood and embraced.

      ...

    17. Entrepreneurs may demonstrate creativity not only in their own creative output, but by their ability to identify resources needed to complete work

      So, can we speak of all entrepreneurs as creative entrepreneurs, not just those employed in creative fields (much like the debate about "cultural" entrepreneurs)?

    18. “total arbitrariness” characterizes some entrepreneurial discovery

      this is fascinating to me.

      surprise and randomness are not factors to be expunged but in fact are integral to the discovery process

    19. The “alert” entrepreneur (Kirzner, 1973) uses knowledge to discover opportunities

      what about the "creative" entrepreneur -- who might use knowledge, but even moreso, perhaps intuition... and inspiration. Perhaps knowledge is not so much in the head but in the gut, a feeling, an emotional need that must be met, a chord that must be struck...

    20. The opportunity does not exist separate to the entrepreneur. Discovered opportunities come about due to “exogenous shocks” in the industry or market (Alvarez and Barney, 2007): the entrepreneur only reacts to such shocks. Such a “shock” creates a new set of circumstances (or information) that the entrepreneur can exploit before others do.

      I'm digging this too...

      it reminds me of the statement that genius is nothing more nor less than doing well what anyone can do badly.

    21. Individuals have different stocks of knowledge based on their life experiences and each person’s prior knowledge creates a “knowledge corridor” that allows them to recognize certain opportunities but not others (Venkataraman, 1997 in Shane 2000, p. 452). The knowledge corridor for individuals are personal, socially constructed phenomena and creative entrepreneurs display differences in knowledge depth and quantity not only with other entrepreneurs, but with each other.

      an interesting concept...

      but it makes me wonder if this somehow constrains the potential of individuals to CREATIVELY seek and create opportunities where others couldn't see them... hmmm

    22. he process of opportunity identification has a strong relationship with creativity and with prior knowledge of the entrepreneur

      *

    23. The audience for a creative work responds emotionally, making it difficult to successfully locate the “cultural product within the accepted norms of economic practice”

      a different factor for creative entrepreneurs!

    24. Creative individuals are challenged to create products and services that are different enough, but not too different, to be accepted within the domain

      the conundrum...

    25. the market is unknown prior to production of creative goods

      interesting

    26. The person, as the third element in the model, displays intrinsic and extrinsic motivations (Amabile, 1996). The extent to which creative individuals respond to intrinsic motivators (satisfaction, fulfilment) doing things for which they expect “neither fame nor fortune” (Csikszentmihalyi, 2004) as opposed to extrinsic motivations such as market demands, financial reward and domain recognition (Fletcher, 2006) is a matter of choice and personal agency.

      nice overview

    27. The need for autonomy (Penaluna and Penaluna, 2011), the attitude to risk (Taylor, 2011) and traits of curiosity, tenacity, and collaboration of creative people (Rabideau, 2015), also commonly cited as entrepreneurial characteristics

      !

    28. Creative people display contrasting qualities: they are considered to be prolific and at the center of a set of activities (Townley and Beech, 2010) but also marginal and capable of drawing inspiration from across social groups

      *

    29. creativity functions within social systems. Creativity occurs at the intersection of the domain, the field, and the person

      creativity has to come from somewhere (people interact with and are influenced by their environment!)

    30. The creative act whereby “that which is unknown, or known in another way, becomes translated into an image to be re-presented to itself” (Townley and Beech, 2010, p. 12) must be stripped of its mystery if it is to become operationalized within organizational settings.

      *

    31. Creative work encompasses the ethereal and the mundane, the autotelic, suspended state of the creative act (Csikzentmihalyi, 1996) and the prosaic view of creative work in which “works of art can be made in an orderly, rational and manageable manner”

      it's a broad field! -- note the use of the term "autotelic" -- see my "journal prompts" for further explanation of this!

    32. Different levels of intrinsic and extrinsic motivation can be traced to different sectors within the creative industries

      Yep!

    33. Entrepreneurs construct meaning from experience; the current study attempts to understand and interpret this meaning.

      all of this seems self-evident...

    34. As the creative industry entrepreneur absorbs ever more experience, their own social reality and the meaning they take from their lived experience is modified: the phenomenon is not static.

      the only constant is change...

    35. creative industry entrepreneurs do not align themselves with traditional entrepreneurship discourses. The need to express their creativity through products, experiences, and services is balanced against the need to generate income and varying strategies are employed to do so.

      yep - this is basically how the other article concluded. This one provides actual narratives...

    36. This article aims to examine the experiences of the creative individual in the context of the broader “entrepreneurial society”

      ok - that seems to fit with the overall arc of this course material for sure!

    37. This study seeks to contribute to an understanding of the life of the creative industries entrepreneur and is underpinned by a social constructionist philosophy

      ok...

    38. Discourses surrounding creativity separate the creative person from the mainstream and present her as an interesting and slightly mysterious object of study (

      Just like (traditional) discourses surrounding entrepreneurship!

    39. an entrepreneur in the creative industries

      focusing specifically upon the 2nd type of cultural entrepreneur (as identified by the other article, which was really just trying to outline the importance of the concept and understanding the implications of how we use the terms...)

    40. A fine-grained analysis of the lives of creative industry entrepreneurs goes some way to achieving an understanding of individuals from the inside.

      justifying the narrative-based approach

    41. “I wouldn’t call myself an entrepreneur: I’m simply working for myself.”

      interesting - kind of the antithesis of the opening argument of this course...

    42. entrepreneurs can be regarded as the “connective tissue” between creativity and business (

      I use the term "connective tissue" all the time!

    43. Creative ideas must be tradable

      ooh! -- on the road to turning creativity into a commodity...

    44. Peter differentiates between achievement and recognition, suggesting that the achievement is important, but the recognition of that achievement, less so

      what's your opinion of this? Does the existence of a tribe change this?

    1. To be financially successful could decrease the reputation of such an artist, as it can be seen as an indication of their work having a poor, people-pleasing quality and a lack of artistic innovativeness and uniqueness. Hence, if they interpret entrepreneurship in the old-fashioned, dollar-greedy way they will not wish to label themselves cultural entrepreneurs.

      hah - relates to one of my seminar prompts... Funny enough, though, there's the contrary perspective that some world famous artists (like Damien Hirst in the world of contemporary art or Drake (!) a musical artist - pictured below, together for an article titled "Damien Hirst Simply Cannot Stop Painting Things for Drake") are commercially successful AND artistic innovators...

    2. two overarching uses of the cultural entrepreneurship concept:

      ...

    3. societal change through the promotion of cultural objects and subjects

      View 2: people engaged in the "arts" do it ... providing cultural good and services

    4. Martin Luther, Karl Marx, Francis Bacon3, and Isaac Newton as examples of cultural entrepreneurs.

      ok - so not anyone can change people's beliefs ... but the best examples of cultural entrepreneurs are those who change society's belief structures...

    5. the dynamic development of intangible cultural features such as symbols, myths, languages, beliefs, values, norms, rituals, and attitudes

      View 1: everyone engages in culture!

    6. The quadruple bottom line of cultural entrepreneurship

      I like this lingo. T'is true - the artistic innovation sphere might hardly ever be highlighted in "conventional" entrepreneurship...

    7. the cultural entrepreneur as an agent for “1) changing people's understanding of what is possible (changing frame of reference),

      I like this!

    8. the automotive industry guru Henry Ford. Businessmen like Swift or Ford, because they undertook creative action that went beyond what was known or accepted at their time, had no choice but to draw their ideas and strategies from the deep sources of culture and value in which they were immersed.

      culture (and business) being revolutionized alongside each other. But seriously, Henry Ford changed culture even if that's not what we predominantly associate with him

    9. It is also culturally specific, an example of "local knowledge," and "common sense," which differ, sometimes radically, across societies.

      the expertise of the cultural entrepreneur goes beyond possessing cultural capital - but affecting how we perceive cultural capital, how we negotiate its contours ... interesting...

    10. they may not be employed directly or indirectly in the cultural industries per se, but they continue to produce cultural goods with or without pay... As aspiring creative workers often combine jobs, this feature leads to a slash-mark bisecting their working identity: café worker/ songwriter, courier/drummer, color consultant/ painter, administrator/jewelry designer, and so on

      I like this distinction, though, as it clarifies that everyone can be a cultural entrepreneur, as long as you're working "creatively"

    11. for a small number of individuals, the beliefs of others are not given but can be changed. I shall refer to those people as cultural entrepreneur

      interesting - cultural entrepreneurs as those who can change the beliefs of others...

    12. changing people's motivation for taking part in economic development

      the commercial aspect is never (entirely) absent...

    13. t means being multi-skilled in hand work, design work, publicity and promotions, management and business and having some idea of manufacturing, as well as being in possession of creative vision, imagination

      this is an interesting definition (also circular in nature) -- the cultural entrepreneur will exhibit all the best qualities of someone undertaking a career in cultural sectors...

    14. Occasionally entrepreneurs really open up supposedly settled matters, calling into question interpretations that define products or technologies

      so we've come full circle - a cultural entrepreneur CAN be someone working in "industry" who has a profound impact on the wider culture (not just someone working in the "cultural industry/ies")

    15. The alternative is to use the word “cultural” as an adjective attached to the good or service that the entrepreneur provides.

      much more basic... a cultural entrepreneur produces a cultural good...

    16. they have found very little in the literature when it comes to definitions of the term “arts entrepreneurship.

      hah

    17. Cultural entrepreneurs are cultural because they are about the cultural.

      not a circular argument at all!

    18. The economics has to be an instrument for them in order to realize cultural values... To be clear, we are working on a moral picture here and try to figure out what makes a good cultural entrepreneur. Someone who sees in cultural trade a way of adding profit becomes suspect as culture is his instrument and not his mission. He is rather a businessman. That does not make him a bad character but he is miscast as a cultural entrepreneur.

      interesting - a values (morality) based argument for entrepreneurship!

    19. ttempt to define a cultural entrepreneur: “An individual who identifies an opportunity and acts upon it in order to create social, cultural, or economic value."

      interesting - this might also serve as an inclusive definition of entrepreneur (without the "cultural" modifier). But people in the arts definitely highlight the cultural (and maybe the social) value of their creations, while also recognizing the economic nature of their practices...

    20. here is not one totalitarian culture industry—there are many “cultural industries.” Each culture, defined anthropologically, has its cultural industries. The same goes for each art form and each way of media communication.

      yep!

    21. Cultural entrepreneurs may, of course, have a focus on financial revenues. The economic value is always one part of their calculation. For some, maximum profit is the only objective. However, for most artists, earning money is most likely only one of several goals.

      seems like something of a theme in a lot of the weeks we've looked at so far!

    22. Those who wrote in English before the late nineteenth century mostly used the word “civilization” and its derivatives to describe the cultivated society.

      interesting ... what makes us "cultured" or "cultivated"?

    23. we are dealing with a word that depicts the transformation of an object or a subject from one state to another. Cicero (146-43 BC) turned to agriculture to clarify how the human soul must be cultivated to a mature state, just like the seed grows to become adulta fructus.

      creativity --> creation --> culture --> cultivation --> GROWTH

    24. Many entrepreneurs are identified by others as more “industrious” than the common person.

      ok ... an industrious person doesn't necessarily work in an industry, but labours to create ... and cultural industries create all manner of material (that may "elevate" their citizens...)

    25. the anthropologist’s definition of culture as part of: Institutions [that] are the humanly devised constraints that structure political, economic and social interaction. They consist of both informal constraints (sanctions, taboos, customs, traditions, and codes of conduct), and formal rules (constitutions, laws, property rights). “Culture” is not static—it changes over time.

      ok - so let's explore these different directions in greater depth...