10,000 Matching Annotations
  1. Last 7 days
    1. Moreover, while in 2013 and 2014 the Commission frequently associated civil society with democracy in its documents, the frequency of these associations has plunged since the populist turn. These findings may indicate that the Commission – following the populist turn and growing animosities towards NGOs – indeed uses civil society less as a legitimising tool understood in terms of input legitimacy and the contribution of CSOs to EU democratic governance.

      Confused about the definition of "Civil Society" -> says Commission has downplayed rhetoric about role of civil society since crisis -> uses it LESS as input legitimising tool and more as output?

    2. hus, this article is concerned with the question of whether civil society is still performing a legitimising function in the new context characterised by the growing animosity against CSOs. We expect the Commission to use to a lesser extent CSOs as an input legitimacy source; however, in the specific context of the refugee crisis, we expect the Commission to rely on CSOs when it comes to output legitimacy,

      AHA -> I understand. Commission's "attitude" towards CSOs is not one of favouring/disfavouring -> instead one of USE. CSOs are supposed to be INPUT bodies -> BUT NOW SINCE REFUGEE CRISIS ARE ALSO OUTPUT BODIES IN THIS SPECIFIC CONTEXT -> i.e., they do not just consult on legislation, they help ENACT IT

    3. Together with established rescue and aid organisations, grassroots initiatives and volunteers provided thousands of refugees with emergency supply, initial care, clothing, food, and provisional accommodation. This ‘refugees welcome’ culture resulted in significant media coverage, highlighting the polarisation between two opposing political cultures in Europe (see Ruzza and Sanchez’s article in this Special Issue). One camp was composed of parties, governments, and institutions that advocated protectionist and nativist migration policies; the other camp consisted of ‘pro-refugee’-oriented national governments, CSOs, and EU institutions – namely the Commission – which favoured a more receptive and welcoming migration strategy.

      VERY interesting -> SPLIT / POLARISED POLITICAL CULTURES IN EUROPE: - Right wing, anti-immigrant -> led by MEMBER STATES and national governments and some institutions - Left wing, "refugees welcome" -> Commission / EU and CSOs

      Therefore right wing culture sandwhiched between lower govty (CSOs) and highest tiers

    4. ‘fear and resentment toward elites’ (

      Abstract / Intro - Baasically Commission's attitude towards CSOs HAS changed since migrant crisis - CSOs provided on the ground support -> legal counsel, financial planning, etc -> helped disorganised EU deal w/ the crisis - Helped legitimise EU policies? - Helped EU regain control -> helped IMPLEMENT migration policies, DEBUNKED migration-related myths with counter information campaigns, etc. - Had to RELY ON CSOs because of failure of some member states to cooperate. - Was crisis that challenged not only unity of EU, but "efficiency and problem solving" -> i.e., not just LEGITIMACY of the EU but its EFFECTIVENESS at enforcing / actualising legislation.

    1. Countdown zur Transparenz: Wie sich das digitale Netz des Fiskus schließt Januar 2023 PStTG tritt in Kraft Juli 2024 Erste Meldepflichten greifen Juli 2025 Kryptowerte-Steuertransparenzgesetz Dezember 2025 Technische Schnittstellen finalisiert 31. Januar 2026 Erste Meldefrist unter neuem System März 2026 ELSTER-Update / Datenintegration Mitte 2026 Flächendeckende Auswertung startet Januar 2027 Automatischer Datenabgleich vollständig aktiv Viele technische Schnittstellen zwischen dem Bundeszentralamt für Steuern (BZSt) und den Landesfinanzbehörden werden erst im Laufe des Jahres 2025 finalisiert, sodass die flächendeckende Auswertung im Veranlagungszeitraum 2026 Premiere feiert.

      Please update the text in this table as follows:

      Januar 2023 (keep as it is) Juli 2024 (keep as it is, but add "131k Datensätze gehen an die Finanzämter") Juli 2025 (delete "Kryptowerte-Steuertransparenzgesetz" instead write "157k Datenzätze gehen an die Finanzämter, ein Ansteig von 20% zum Vorjahr) Dezember 2025 (delete "Technische Schnittstellen finalisiert" instead write "Kryptowerte-Steuertransparenzgesetz") Januar 2026 (delete "Erste Meldefrist unter neuem System" instead write "Kryptobörsen müssen Nutzeridentitäten und Transaktionen lückenlos erfassen") März 2026: (delete "ELSTER-UPDATE/DAtenintegration" instead write "Datenintegration" Januar 2027: (keep as it is)

      text on the bottom: keep as it is.

    2. Nach einer aktuellen Studie gibt mehr als ein Drittel an (35 %) das Plattformen-Steuertransparenzgesetz gar nicht zu kennen. Jeder Vierte (25 %) hat zwar schon davon gehört, sich aber nicht weiter damit beschäftigt. Und fast genauso viele (22 %) fühlen sich, obwohl sie das neue Gesetz bereits kennen, nicht gut darüber informiert. Folglich begegnen mehr als 80 Prozent der Befragten den neuen Regelungen nicht besonders wohlwissend.1

      delete this entire paragraph including the footnote.

      Then add this paragraph:

      Diese Einschätzung deckt sich mit der harten Realität der Steuerzahler: Nach einer exklusive Kurzumfrage, die BuchhaltungsButler in Zusammenarbeit mit DataPulse Research für diesen Beitrag durchgeführt hat, fühlt sich jeder Zweite bei Plattform- und Kryptosteuern unsicher oder überfordert. Damit klafft eine gefährliche Lücke zwischen der staatlichen Kontrolldichte und der privaten Handlungsfähigkeit.

    1. Until the 1970s and 1980s, same-sex acts were prohibited by state laws. It was illegal to be gay or lesbian, and the restrictions extended to simple displays like holding hands. Other laws prohibited clothing deemed “inappropriate” for one’s biological sex. As a result, military service members and even war veterans were dishonorably discharged (losing all benefits) if they were discovered to be gay. Police harassed and humiliated LGBTQ people and regularly raided gay bars. And anti-LGBTQ street violence or hate crimes were tacitly permitted because they were rarely prosecuted and often lightly punished. While most states had eliminated their anti-LGBTQ laws by the time the Supreme Court struck them down in 2003, 14 states still had some version of them on the books.

      It is sad to think that this is how my Uncle had to live. Living his life in secret, which lead to many other challenges in his life.

    2. In the early 1900s, an influx of immigrants began entering the country from Mexico. These newcomers took up residence in White communities, spoke a different language, and began competing for jobs and resources. They used marijuana more frequently than most Americans. Police and others began to circulate rumors regarding the substance’s link to violence and immorality. Newspapers and lawmakers spoke about the “Marijuana Menace” and the “evil weed,” and articles and images began to portray it as a corrupting force on America’s youth. Beginning in 1916, state after state began passing laws prohibiting marijuana use, and in 1937 Congress passed a federal law banning it (White

      Is this stating Mexican's brought Marijuana to the U.S.? It seems like a bit of a generalization. Learn more about this.

    3. But the relativity of deviance can have significant societal impacts, including perceptions and prosecutions of crime. They may often be based on racial, ethnic, or related prejudices.

      A crime committed by a white person is often teated less harshly then it it were a person of color.

    4. positive contributions of deviance is that it fosters social change. For example, during the U.S. civil rights movement, Rosa Parks violated social norms when she refused to move to the “Black section” of the bus, and the Little Rock Nine broke customs of segregation to attend an Arkansas public school.

      Deviance can sometimes have positive. For example breaking a rule or law because it is socially unjust. For example discriminatory laws. Sometimes it's come sence, like don't follow a rule over a cliff.

    1. The copyrightable elements in a sound recording will usually, though not always, involve "authorship" both on the part of the performers whose performance is captured and on the part of the record producer

      Does this mean that the performer and the producer hold equal copyright to the entire recording? Or is there a way of separating out what they hold the copyright to?

    2. The test of separability and independence from "the utilitarian aspects of the article" does not depend upon the nature of the design

      So, plans / patterns for something are not copyrightable unless they're for something non-utilitarian? I'm thinking of sewing patterns as an example...are those un-copyrightable since they're utilitarian and more about process than a finished work? Would instructions for them count as expressions of original ideas?

    3. does not include requirements of novelty, ingenuity, or esthetic merit

      so, original does not equal novel, i.e., I could create something that is the same as a preexisting thing, but as long as it's not a copy it would be original

    1. Antigone and he are engaged to be married.You wouldn't have thought she was his type. He likesdancing, sports, competition; he likes women, too. Nowlook at lsmene again. She is certainly more beautiful thanAntigone. She is the girl you'd think he'd go for.Well ... There was a ball one night. Ismene wore a newevening frock. She was radiant.

      showing that Antigone does not fit Haemon’s usual preferences while Ismene matches what others would expect him to choose.

    2. Another thing that she is thinking is this: she is goingto die. Antigone is young. She would much rather live thandie. But there is no help for it. When your name isAntigone, there is only one part you can play; and shewill have to play hers through to the end.

      This quote explains that she knows that the tragedy will happen which removes suspense and the tragedy feels unavoidable. Theme of fate.

    3. Ismene. He is stronger than we are, Antigone. He is thekmg. And the whole citv is with him. Thousands andthousands of them, swarming through all the streets ofThebes.Antigone. I am not listening to you.Ismene. His mob will come running

      I like how she is not scared of him and his army.

    1. social forces— for example, migration of capital, jobs, people, theway technological change in production and transportation impact onwhere and how economic activity take place

      This connects a lot to todays global supply chains and climate change. As wealthy companies relocate production to countries with weaker labor or environmental regulations (ex: Shein or Temu products being manufactured in China, Vietnam, and other countries at low costs, as a result many workers face serious challenges such as low wages, long work hours, and health hazards), it actively reshapes where pollution happens and the people who get exploited. Similarly with climate driven migration, where global warming is disproportionately caused by wealthy corporations forcing people to relocate (ex: AI usage leading to water pollution).

    2. by creating even more severe ones.5

      I like the way this sentence encompasses the economic issues New York faces. It points out the corruptive practices of quickly regulating the economy to save the pockets of those who handle or have a lot of money. It reveals inevitably, there is no short solution to fix an economy that's flourished off of exploitation. Gradually, the group who has become the scapegoat or has been taken advantage long enough will severely increase (or even decrease) to reveal the shortcomings of politicians, banks, or any high-earning person exploiting the economy.

    3. The key point is that the interests of the banks and those of most ofthe city’s residents and workers were in sharp conflict. Indeed, the banksturned crisis to profitable advantage.

      In a time of collapse for many, banks still sought profit. Even though they are supposed to seek profit, is there no way to regulate this? The banks having political advantage as well as the ability to use tactics like "pleading poverty". This is not to say everyone should suffer the same, but it's clear there is a method to exploiting benefits during times of need.

    4. The emerging strategy of “planned shrinkage” callsfor the dismantling of services to lower-income communities with the goalof pushing their residents out of the city.

      These conditions ultimately strip the community of its basic infrastructures. The creation of extreme conditions that lead to scarcity (lack of proper transit, safety, food supply, and policies) for the marginalized communities by state or private sectors, then placing blame on residents for the decline kind of makes me wonder how different it is from the logic of redlining or food deserts, since the city was intentionally withdrawing services from low income neighborhoods to push people out in all scenarios.

    5. Police were forced to take off two weeks without pay.When Detroit firemen refused a similar package, hundreds were laid off.

      Since first responders had to be benched because of no money for wages, how was society operating at this time? If people who are seen as necessary to keep society running aren’t getting paid, that means the average person isn't getting paid. So that makes me wonder what were people doing to make ends meet, did crime go up, were people acting irrationally so more emergencies happened.

    6. It had prac-ticed socialism in one city and had painfully learned the cost of good in-tentions, that the streets were not paved with gold

      This is an interesting narrative to run with, when earlier in the text, it stated that New York's spending on these programs was not out of line. In reality, decisions made by the government for private profits actually created the issues New York was facing. It seems like a way to scapegoat the welfare programs and the people relying on them, so they can fund things they prioritize.

    7. In February 1975, average monthly public-assistance payments per person in the city were $94

      I wonder how this panned out for living wages. A common poverty benchmark is when the majority of your salary goes towards food, and I wonder what the cost of living would have been in accordance with this. How were people able to make a living wage despite the immense struggle of their salaries? Were government subsidies at play?

    1. There seems to be littleunderstanding in the humanities that professional archivistshave master's degrees, that archival standards and bestpractices are culturally constructed artifacts, and thatbehind every act of archival practice is at least a century-old theoretical conversation. Like so many other feminizedprofessions-education and nursing are prime examples-archivists have been relegated to the realm of practice,their work deskilled, their labor devalued, their expertiseunacknowledged.

      I would be interested to read further literature discussing this phenomenon in considering archival studies. Archivists tend to lack a full form in the social consciousness in comparison to more evident professionals like nurses and educators, so while I think this observation is sound it also feels centered around academia rather than society as a whole. That said, the points about "practical professions" being feminized and having theoretical contributions undercut as a result speaks to what I view as a broader problem in academia. Fields that are fundamentally concerned with "doing a job" are seen as disconnected from the big theoretical disciplines (hard science, social science, humanities,etc.) because they arose out of specific human practices rather than branching off from those theoretical disciplines.

  2. pressbooks.library.torontomu.ca pressbooks.library.torontomu.ca
    1. It flew straight down from the sky in drops the size of coffee saucers and hit the hot sidewalks with a hiss that sent clouds of stream writhing up from the gleaming, dark concrete.

      this line is so beautiful. i never thought of wet concrete as gleaming and dark. i wish to see the world in vividly descriptive terms

    1. You are accountable to telling the story to your reader as truthfully as you can, while using craft elements to engage the reader.

      Keeps your credibility as a wiriter and gains trust with your readers.

    2. Finally, your conclusion should help resolve the central conflict of the story and impress upon your reader the ultimate theme of the piece

      Important to summarize your theme of the narrative.

    3. The more specific the details in a memoir or literacy narrative, the more human, appealing, and universal your story becomes.

      Provide indepth details makes your story appealing. Becomes relatable to your readers without personal experience

    1. An alternative explanation for the precipitation changes over North America during the mid-Holocene is changes in the tropical Pacific.

      I don't fully get why these two things are mutually exclusive, as they note I think this kinda fits.

    2. Similarly, patterns of change in rainfall-sensitive proxies across western North America are in better agreement with simulated win-ter precipitation in simulations with prescribed vegetation and the PDO-like SST pattern (using the Gwet’s AC and Cohen’s Kappa metrics; Fig. 3, Extended Data Fig. 7, Supplementary Table 4 and Supplemen-tary Discussion). Both proxies and winter precipitation anomalies display a tripole pattern, with widespread drying over the Southwest United States, wetter conditions over the Pacific Northwest and dry-ing along the coast of Alaska (Fig. 3b), a pattern that is similar to the response seen in instrumental data during the negative phase of the PDO33 when the Aleutian Low is also anomalously weak (Extended Data Fig. 5)

      This I very much buy and think is cool

    3. This is evident in a distinct pattern of SST changes over the North Pacific, with intense surface warming extending across the mid- to high-latitude western Pacific surrounded by a ‘horseshoe’ pattern of minimal surface warming or cooling to the east and a weak La Niña-like pattern in the tropical Pacific (Fig. 3b).

      2 things about this: (1) To me, this doesn't really look that much like the PDO. They say they get a significant correlation between it and the historical PDO so OK, sure, but I'm guessing there's a few different ways to do the test. (2) Fig 3B looks more like the positive phase of the PDO than the negative phase to me? We can pull up another image. The weird thing is that they do have a La Niña response at the veeeeery bottom margin (which would be associated with PDO-) but it's hard to tell. I think I'd need to talk to someone about what this figure is actually showing.

    4. Winter precipitation tends to have stable isotope values that are significantly more negative

      Is it somehow a convention in these short format papers to not discuss the chain lengths in the body of the text? They say in methods it's 28-30 cause they want terrestrial. If you were a reviewer would it be fair to ask them to include more of this in the body? I guess they're pretty explicitly not writing for a leaf wax crowd if they're ok avoiding this discussion

    5. seasonal distributions of modern precipitation isotopes to estimate the range of possible winter and summer precipitation contributions consistent with the leaf-wax isotope records (

      It's been interesting to discuss mixing models in here and realize all the ways they can be applied in sketchy/problematic ways. Maybe it'd be helpful to discuss what some of the most common sins against good mixing model practice are here and we can see if this use case clears the bar?

    6. However, the magnitudes of past and current precipitation deficits associated with this North Pacific response are systematically underestimated in models,

      As we get better at proxy system modeling and we start comparing our paleo data more directly to model output this finding seems like it's getting reproduced in many different contexts

    1. Within 1 min following an 80 μg/kg intravenous dose in mice, sarin was detected in the brain, lung and heart, with the highest concentrations in the kidneys, liver and plasma

      very fast dispersal rate throughout the body -- compare with reports from Syria

    2. Using laboratory animals as an experimental model, studies demonstrated the short- and the long-term effects of sarin on the nervous system.

      potential studies to look further into and how their research compared with the studies after human sarin attacks

    3. Upon their mixing, after firing the weapon, the toxic chemical sarin is formed.

      how is sarin typically dispersed? if it must involve the mixing of two compounds into a toxic chemical

    4. organophosphorus compound

      from science direct: "Organophosphorus (OP) compounds are defined as derivatives of phosphorus that contain at least one organic group (alkyl or aryl) attached to the phosphorus atom, either directly or indirectly through another element such as oxygen, sulfur, or nitrogen. These compounds are often highly toxic and are significant in applications such as pesticides and chemical warfare agents."

    5. Symptoms related to sarin poisoning in Japan still exist 1–3 years after the incident and include fatigue, asthenia, shoulder stiffness, blurred vision, and chronic decline in memory function

      points towards long-term effects of survivors

    6. produced for chemical warfare, first produced in Germany in 1937

      not a natural phenomenon that has been weaponized -- instead, the origins are based in chemical warfare, during WWII

    1. A typical sound recording device would not be able to recordthe microwave sound because it is generated inside the sub-ject’s head. This includes any commercially available cellularmobile telephone. On the contrary, if it was easy to record thesound with a typical sound recording device, most personsin the same room or environment should be able to hear theloud sound.

      Illustrates the feasibility of the phenomenon

    Annotators

    1. We can’t always control how we feel, but we can control how we express our emotions

      This is key! Students are not learning to suppress emotions, but rather how to identify them. The teacher or parent can be important factors during this time and show that the emotions may come but they can control the outcome or how it makes them react.

    2. use language to express their feelings and treat others with kindness

      I feel like many times, students need constant reminders of this while in school. Even if they have programs they use in the young stages I think students will still need the consistent reminders in the classroom. Young students still have developing brains and sometimes learn better from experience.

    3. According to multiple studies, preschoolers who participate in social-emotional skills programs exhibit less aggression and anxiety and become better social problem solvers.

      This is a very important find! A lot of newer studies are showing the high anxiety that even young preschoolers start to feel. I think the main focus needs to turn to the anxiety piece, and to find out the main sources of the anxiety, and where it could be coming from.

    1. In reality, it is clear that microaggressions have major structural, interpersonal, and intrapersonal impacts.

      Just writing this as a note, I want to highlight the three impacts to later see how microaggressions could lead to large or even global predicaments: structural: interpersonal: intrapersonal: -- whats the difference between these three?

    2. Sometimes, the responsible adult sees through the grimy tactics of the older, often larger sibling, and at other times, they might tell the little sister to stop being so sensitive and whiny.

      From the first grounding question in the beginning of the chapter, the basic definition of micro aggressions was sort of how I predicted to to be, but this example I found to be a surprise. I didn't think that this is what microagressions would look like but more so derogatory comments in school or exclusion, so I need to learn more about the specific of what microaggression could look like to truly notice it. For questions 2 and 3, at first I didn't believe that I've seen microaggressions often in my life, but now I'm rethinking that. In addition, I thought I would be the person to stand up for others in situations of microaggressions, but in examples similar to this one about the siblings, I would probably be uncomfortable saying anything.

    3. French And Raven’s Bases of Power (1959; 1965)

      Seeing all of these bases make power feel so much more dangerous then just the singular word. When I think of power, I immediately think of diplomatic events/conflict, striving for power in the workplace, or the government. If I had to guess these different categories I would've first thought of the "reward", "coercive" and "informational" branch, but I didn't initially reflect on how common people not in higher positions can hold a lot of power as well. The "expert" and "referent" categories are the ones that I see majority of the general community use to increase their status because those are the two besides legitimate that can be displayed more outwardly. Things like bribery, violence, force or secrecy have to be more hidden. I wonder how each of these bases are shown or micro manners as well to where they wouldn't necessarily be frowned upon.

    4. Legitimate Power enjoyed because an individual has the formal right to make demands, and to expect others to be compliant and obedient

      Now this could relate to authoritative and parental figures, but how does this specific branch differ between cultures? What do each of these branches teach a person about another's culture? Are there certain people that bleed into multiple bases of power?

    5. Interpersonal power is often underacknowledged in personal and professional relationships but the impact can be profound.

      I feel like I have seen this very prominently growing up, but I am wondering what this looks like practically? Where can this be seen differently between parent relationships, friendships and relationships between authoritative figures like parents?

    6. Microinterventions:

      The section on microinterventions and microresistance makes me think about how public figures on social media call out subtle bias and offer support to targets of discrimination. On platforms like TikTok or Twitter, small acts like explaining why a comment hurts — even to strangers — can have a ripple effect, encouraging others to rethink their words. It connects the chapter’s leadership concepts to real-world interpersonal influences in everyday life, showing that leadership isn’t just formal authority but also everyday relational action.

    7. “death by a 1000 cuts”

      As I read the chapter’s explanation of microaggressions as “death by a thousand cuts,” I immediately connected it to moments in my own life where small comments about my identity, even when not intended to hurt, accumulated and felt emotionally heavy. Academically, it reminded me of class discussions on implicit bias and how subtle everyday interactions can reinforce stereotypes or exclusion without overt hostility. Recognizing these patterns helps me see why leaders must intentionally disrupt them rather than assume people get it.

    8. Microaggressions are defined and typed by Derald Wing Sue in the chart below.

      Do you think changing the language (e.g., abuse, subtle acts of exclusion) might help groups take interpersonal bias more seriously?

    1. eLife Assessment

      This important study by Bartas and colleagues examined how patterns of monosynaptic input to specific cell types in the ventral tegmental area are altered by drugs of abuse. The authors applied a dimensionality reduction approach (principal component analysis) and showed that various drugs of abuse, and somewhat surprisingly the anesthesia alone (ketamine/xylasin), caused changes in the distribution of inputs labeled by the transsynaptic rabies virus. The evidence supporting the conclusions is overall convincing and provides foundational information, as well as a cautionary note on the interpretation of rabies virus-based tracing experiments.

    2. Reviewer #1 (Public review):

      Summary:

      In this study, the authors mapped afferent inputs to distinct cell populations in the ventral tegmental area (VTA) using dimensionality reduction techniques, revealing markedly different connectivity patterns under normal versus drug-treated conditions. They further showed that drug-induced changes in inputs were negatively correlated with the expression of ion channels and proteins involved in synaptic transmission. Functional validation demonstrated that knockdown of a specific voltage-gated calcium channel led to reduced afferent inputs, highlighting a causal link between gene expression and connectivity.

      The authors have clearly addressed the reviewers' previous comments. The study's earlier weaknesses were thoroughly discussed, and additional data were provided to strengthen the findings. Overall, the revised version incorporates more extensive datasets and analyses, resulting in a more robust and compelling study.

    3. Reviewer #2 (Public review):

      The application of rabies virus (RabV)-mediated transsynaptic tracing has been widely utilized for mapping cell-type-specific neural connectivities and examining potential modifications in response to biological phenomena or pharmacological interventions. Despite the predominant focus of studies on quantifying and analyzing labeling patterns within individual brain regions based on labeling abundance, such an approach may inadvertently overlook systemic alterations. There exists a considerable opportunity to integrate RabV tracing data with the global connectivity patterns and the transcriptomic signatures of labeled brain regions. In the present study, the authors take an important step towards achieving these objectives.

      Specifically, the authors conducted an intensive reanalysis of a previously generated large dataset of RabV tracing to the ventral tegmental area (VTA) using dimension reduction methods such as PCA and UMPA. This reaffirmed the authors's earlier conclusion that different cell types in the VTA, namely dopamine neurons (DA) and GABAergic neurons, exhibit quantitatively distinct input patterns, and a single dose of addictive drugs, such as cocaine and morphine, induced altered labeling patterns. Additionally, the authors illustrate that distinct axes of PCA can discriminate experimental variations, such as minor differences in the injection site of viral tracers, from bona fide alterations in labeling patterns caused by drugs of abuse. While the specific mechanisms underlying altered labeling in most brain regions remain unclear, whether involving synaptic strength, synaptic numbers, pre-synaptic activities, or other factors, the present study underscores the efficacy of an informatics approach in extracting more comprehensive information from the RabV-based circuit mapping data.

      Moreover, the authors showcased the utility of their previously devised bulk gene expression patterns inferred by the Allen Gene Expression Atlas (AGEA) and "projection portrait" derived from bulk axon mapping data sourced from the Allen Mouse Brain Connectivity Atlas. The utilization of such bulk data rests upon several limitations. For instance, the collection of axon mapping data involves an arbitrary selection of both cell type-specific and non-specific data, which might overlook crucial presynaptic partners, and often includes contamination from neighboring undesired brain regions. Concerns arise regarding the quantitativeness of AGEA, which may also include the potential oversight of key presynaptic partners. Nevertheless, the authors conscientiously acknowledged these potential limitations associated with the dataset.

      Notably, building on the observation of a positive correlation between the basal expression levels of Ca2+ channels and the extent of drug-induced changes in RabV labeling patterns, the authors conducted a CRISPRi-based knockdown of a single Ca2+ channel gene. This intervention resulted in a reduction of RabV labeling, supporting that the observed gene expression patterns have causality in RabV labeling efficiency. While a more nuanced discussion is necessary for interpreting this result (see below), overall I commend the authors for their efforts to leverage the existing dataset in a more meaningful way. This endeavor has the potential to contribute significantly to our understanding of the mechanisms underlying alterations in RabV labeling induced by drugs of abuse.

      Finally, drawing upon the aforementioned reanalysis of previous data, the authors underscored that a single administration of ketamine/xylazine anesthesia could induce enduring modifications in RabV labeling patterns for VTA DA neurons, specifically those projecting to the nucleus accumbens and amygdala. Given the potential impact of such alterations on motivational behaviors at a broader level, I fully agree that prudent consideration is warranted when employing ketamine/xylazine for the investigation of motivational behaviors in mice.

      Comments on revisions:

      In the re-revised version, the authors have addressed all of my previous comments. I no longer have any major concerns.

    4. Reviewer #3 (Public review):

      Summary:

      Authors mapped monosynaptic inputs to dopamine, GABA, and glutamate neurons in the ventral tegmental area (VTA) under different anesthesia methods, and under drug (cocaine, morphine, methamphetamine, amphetamine, nicotine, fluoxetine). First, they propose an analysis method to separate the actual manipulation effects from the variability caused by experimental procedures. Using this method, they found differences in the anatomical location of monosynaptic inputs to dopamine neurons under different conditions, and identified some key brain areas for such separation. They also searched the database for gene expression patterns that are common across input brain areas, with some changes by anesthesia or drug administration.

      Strengths:

      The whole-brain approach to address drug effects is appealing, and their conclusion is clear. The methodology and motivation are clearly explained.

      Weaknesses:

      While gene expression analyses may not be related to their findings on the anatomical effects of drugs, this is a nice starting point for follow-up studies.

    5. Author response:

      The following is the authors’ response to the original reviews.

      Public Reviews:

      Reviewer #1(Public review):

      Summary:

      In this study, the authors distinguished afferent inputs to different cell populations in the VTA using dimensionality reduction approaches and found significantly distinct patterns between normal and drug treatment conditions. They also demonstrated negative correlations of the inputs induced by drugs with gene expression of ion channels or proteins involved in synaptic transmission and demonstrated the knockdown of one of the voltage-gated calcium ion channels caused decreased inputs.

      Weaknesses:

      (1) For quantifications of brain regions in this study, boundaries were based on the Franklin-Paxinos (FP) atlas according to previous studies (Beier KT et al 2015, Beier KT et al 2019). It has been reported significant discrepancies exist between the anatomical labels on the FP atlas and the Allen Brain Atlas (ref: Chon U et al., Nat Commun 2019). Although a summary of conversion is provided as a sheet, the authors need to describe how consistent or different the brain boundaries they defined in the manuscript with Allen Brain Atlas by adding histology images. Also, I wonder how reliable the annotations were for over a hundred of animals with manual quantification. The authors should briefly explain it rather than citing previous studies in the Material and Methods Section.

      We thank the reviewer for attention to this point; indeed, neuroanatomical detail is often overlooked in modern neuroscience, occasionally leading to spurious conclusions. We acknowledge that there are significant discrepancies in brain region definitions across atlases, which can make cross-study comparisons difficult. Here, all cells were manually quantified by Dr. Kevin Beier, as in previous studies (Beier et al., Cell 2015; Nature 2017; Cell Reports 2019; Tian et al., Cell Reports 2022; Tian et al., Neuron 2024; Hubbard et al., Neuropsychopharmacology, 2025). As such, these studies are internally consistent as relates to the definition of brain regions, which is critical here since our analysis in this manuscript relates to data quantified only by a single individual. Several brain regions were quite easy to distinguish anatomically, such as the medial habenula and lateral habenula. Others, such as the extended amygdala area, are much more difficult. We have now provided example images in Figure S1 that detail the anatomical boundaries that we used, overlayed on images of Neurotrace blue (fluorescent Nissl stain).

      (2) Regarding the ellipsoids in the PC, although it's written in the manuscript that "Ellipsoids were centered at the average coordinate of a condition and stretched one standard deviation along the primary and secondary axes", it's intuitively hard to understand in some figures such as Figure 2O, P and Figure S1. The authors need to make their data analysis methods more accessible by providing source code to the public.

      The source code is now available to the public at https://github.com/ktbartas/Bartas_et_al_eLife_2024, which is noted in the Code Availability statement. The code for generating ellipsoids is in the first notebook, `0-dataexploration-master-euclidean.ipynb`, in the function `confidence_ellipse`, which is called from `make_pca_plots` and `umap_and_heatmap`. Example plots are all live in the notebooks as can be viewed directly from GitHub.

      (3) In histology images (Figure 1B and 3K), the authors need to add dashed lines or arrows to guide the reader's attention.

      Dashed lines have been added to these figure panels as requested.

      (4) In Figure 2A and G, apparently there are significant differences in other brain regions such as NAcMed or PBN. If they are also statistically significant, the authors should note them as well and draw asterisks(*).

      We appreciate the care in ensuring that statistics are being applied and shown appropriately. In panel A (now Figure 3A), the Two-way ANOVA interaction term was not significant (p = 0.9365), we did not find it justified to do further comparisons. However, for Figure 3G, the interaction term was significant (p = 0.0001), and thus further pairwise comparisons were performed with Sidak's correction for multiple comparisons. When done, the only two brain regions that were significantly different were the DStr (p = 0.0051) and GPe (p = 0.0036). While the NAcMed and PBN visually look different, according to the corrected statistics, they were not significantly different (NAcMed p = 0.5037, PBN p = 0.8123). The notations in our original figure thus accurately reflected these statistics.

      (5) In Figure 2N about the spatial distribution of starter cells, the authors need to add histology images for each experimental condition (i.e. saline, fluoxetine, cocaine, methamphetamine, amphetamine, nicotine, and morphine) as supplement figures

      We have now provided these as Figure S2.

      (6) In the manuscript, it is necessary to explain why Cacna1e was selected among other calcium ion channels.

      We have added a sentence to the "Functional validation of link between gene expression and RABV labeling" section (lines 722-724).

      Reviewer #2 (Public review):

      The application of rabies virus (RabV)-mediated transsynaptic tracing has been widely utilized for mapping celltype-specific neural connectivities and examining potential modifications in response to biological phenomena or pharmacological interventions. Despite the predominant focus of studies on quantifying and analyzing labeling patterns within individual brain regions based on labeling abundance, such an approach may inadvertently overlook systemic alterations. There exists a considerable opportunity to integrate RabV tracing data with the global connectivity patterns and the transcriptomic signatures of labeled brain regions. In the present study, the authors take an important step towards achieving these objectives. Specifically, the authors conducted an intensive reanalysis of a previously generated large dataset of RabV tracing to the ventral tegmental area (VTA) using dimension reduction methods such as PCA and UMPA. This reaffirmed the authors' earlier conclusion that different cell types in the VTA, namely dopamine neurons (DA) and GABAergic neurons, exhibit quantitatively distinct input patterns, and a single dose of addictive drugs, such as cocaine and morphine, induced altered labeling patterns. Additionally, the authors illustrate that distinct axes of PCA can discriminate experimental variations, such as minor differences in the injection site of viral tracers, from bona fide alternations in labeling patterns caused by drugs of abuse. While the specific mechanisms underlying altered labeling in most brain regions remain unclear, whether involving synaptic strength, synaptic numbers, pre-synaptic activities, or other factors, the present study underscores the efficacy of an informatics approach in extracting more comprehensive information from the RabV-based circuit mapping data. Moreover, the authors showcased the utility of their previously devised bulk gene expression patterns inferred by the Allen Gene Expression Atlas (AGEA) and "projection portrait" derived from bulk axon mapping data sourced from the Allen Mouse Brain Connectivity Atlas. The utilization of such bulk data rests upon several limitations. For instance, the collection of axon mapping data involves an arbitrary selection of both cell type-specific and non-specific data, which might overlook crucial presynaptic partners, and often includes contamination from neighboring undesired brain regions. Concerns arise regarding the quantitativeness of AGEA, which may also include the potential oversight of key presynaptic partners. Nevertheless, the authors conscientiously acknowledged these potential limitations associated with the dataset. Notably, building on the observation of a positive correlation between the basal expression levels of Ca2+ channels and the extent of drug-induced changes in RabV labeling patterns, the authors conducted a CRISPRi-based knockdown of a single Ca2+ channel gene. This intervention resulted in a reduction of RabV labeling, supporting that the observed gene expression patterns have causality in RabV labeling efficiency. While a more nuanced discussion is necessary for interpreting this result (see below), overall I commend the authors for their efforts to leverage the existing dataset in a more meaningful way. This endeavor has the potential to contribute significantly to our understanding of the mechanisms underlying alterations in RabV labeling induced by drugs of abuse. Finally, drawing upon the aforementioned reanalysis of previous data, the authors underscored that a single administration of ketamine/xylazine anesthesia could induce enduring modifications in RabV labeling patterns for VTA DA neurons, specifically those projecting to the nucleus accumbens and amygdala. Given the potential impact of such alterations on motivational behaviors at a broader level, I fully agree that prudent consideration is warranted when employing ketamine/xylazine for the investigation of motivational behaviors in mice.

      Specific Points:

      (1) Beyond advancements in bioinformatics, readers may find it insightful to explore whether the PCA/UMPAbased approach yields novel biological insights. For example, the authors are encouraged to discuss more functional implications of PBN and LH in the context of drugs of abuse, as their labeling abundance could elucidate the PC2 axis in Fig. 2M.

      Thank you for this suggestion: we added text (Lines 787-795) discussing the LH and PBN (and GPe) specifically, but also highlighted the importance of our approach in hypothesis-generating science.

      (2) While I appreciate the experimental data on Cacna1e knockdown, I am unclear about the rationale behind specifically focusing on Cacna1e. The logic behind the statement, "This means that expression of this gene is not inhibitory towards RABV transmission," is also unclear. Loss-of-function experiments only signify the necessity or permissive functions of a gene. In this context, Cacna1e expression levels are required for efficient RabV labeling, but this neither supports nor excludes the possibility that this gene expression instructively suppresses RabV labeling/transmission, which could be assessed through gain-of-function experiments.

      We thank the reviewer for their suggestions regarding this result, and agree that a gain-of-function would be required to provide clearer evidence on this point.  We therefore understand that our original phrasing may be misleading. Thus, we have edited this section to the more conservative statement: “These results indicate that reduced levels of Cacna1e likely lower the number of RABV-labeled inputs from the NAcLat, and directly link the levels of Cacna1e and RABV input labeling” (lines 742-744) - we refrain from over-interpreting the results. As mentioned above in response to R1, we added a sentence to explain the rationale behind focusing on Cacna1e (lines 722-724).

      Reviewer #3 (Public Review):

      Summary:

      Authors mapped monosynaptic inputs to dopamine, GABA, and glutamate neurons in VTA under different anesthesia methods, and under drugs (cocaine, morphine, methamphetamine, amphetamine, nicotine, fluoxetine). They found that input patterns under different conditions are separated, and identified some key brain areas to contribute to such separation. They also searched a database for gene expression patterns that are common across input brain areas with some changes by anesthesia or drug administration.

      Strengths:

      The whole-brain approach to address drug effects is appealing and their conclusion is clear. The methodology and motivation are clearly explained.

      Weaknesses:

      While gene expression analyses may not be related to their findings on the anatomical effects of drugs, this will be a nice starting point for follow-up studies. 

      We understand and agree with the suggestion that gene expression allows us to provide correlative observations between in situ hybridization datasets and rabies mapping datasets, and that these results do not show causality. As such, future studies would be needed to assess this in more detail. We have added a line in the discussion to this effect (lines 851-853).

      Recommendations for the authors:

      Reviewer #1 (Recommendations for the authors):

      Recommendations for improving the writing and presentation:

      (1) There are a couple of packages available for 3D whole-brain reconstructions based on Allen Brain Atlas (eg. https://github.com/tractatus/wholebrain, https://github.com/lahammond/BrainJ), which would be helpful to align with the gene expression or other data from Allen Institute.

      This comment is related to the noted weakness we responded to previously in this rebuttal also from R1 (see comment 1), about the discrepancies between the Franklin-Paxinos atlas and Allen Brain atlas. We agree that a systematic comparison of these two atlases using a tool like wholebrain or BrainJ would be valuable for the field. However, it would be a substantial amount of work, and likely would be an independent study in itself. We believe that the resolution of these atlases was sufficient to make our key conclusions here (e.g., identify gene expression patterns that relate to drug-induced changes rabies virus labeling patterns, and develop a testable hypothesis for CRISPR-based gene editing). They are also based on the same atlases and region definitions that have been applied in our previous studies (e.g., Beier et al., Cell 2015; Beier et al., Nature 2017; Beier et al., Cell Reports 2019; Tian et al., Cell Reports 2022; Tian et al., Neuron 2024; Hubbard et al., Neuropsychophamacology 2025, etc.)  The expression of Cacna1e is relatively consistent across the NAc, as we have now detailed in Figure S13.

      (2) There are so far two kinds of rabies virus strains available in the neuroscience field (SAD-B19 or CVS-N2c). It is recommended to describe which strain was used in the Material and Methods Section because labeling efficiency and toxicity is quite different between the strains (Reardon TR et al., Neuron 2016).

      We have now noted that we used SAD B19 for all experiments (Lines 141-142).

      Minor corrections to the text and figures:

      (1)  In Figure 1A, the color differences are not clear (i.e. light gray and dark gray). The figure can be simplified.

      In addition, generally, images/figures are recommended not to be overlapped with other figures/images (Figures 2A-F, 2G-L).

      (2)  In Figures 7C and D, the authors could add enlarged views of starter cells in VTA and NAcLat.

      We have attempted to simplify schematics and figures throughout. High-magnification images of cells have been added as insets in what is now Figure 10 (formerly Figure 7).

      Reviewer #2 (Recommendations For the authors):

      The number of animals for each graph should be explicated within the figure legend. For example, Figure 1C and Figure 7E lack this information. It is also advisable to delineate the definition of error bars within the figure legend.

      We have now added mouse numbers to all figures and/or legends, as appropriate. We also indicated in the legend at the end of Figure 1 how error bars and asterisks are defined. Furthermore, we added a sentence to the methods saying that in UMAP and PCA plots each dot is an animal (lines 244-245).

      The visual representations, particularly in Figures 1 and 3, are overcrowding. Furthermore, the arrangement of figure subpanels does not consistently adhere to the sequence of explication in the main text, significantly compromising the readability of the text. The authors are encouraged to consider the possibility of segmenting dense figures into two if there exists no upper limit for the number of figure displays. To illustrate, in Figure 3Q, crucial details about experimental conditions are denoted by numerical references, owing to spatial constraints.

      We agree that the figure layout and mis-alignment with a linear read of the text was unideal. Therefore, we broke our figures, especially the original Figures 1-4, into multiple sub-figures, including both main and supplemental figures. This facilitated the use of space to rearrange the figure panels, allowing the story to be told in a linear fashion. All figures and panels should now be read in order.

      I am seeking clarification on how to interpret the term "overlap" at the bottom of figures illustrating Gene Ontology analysis.

      We have clarified the meaning of overlap in this context (lines 324-325): The ‘overlap’ term on the x-axis of these plots means the number of genes in the correlated gene lists that were also within the list of genes for the corresponding GO term.

      The authors could provide Cacna1e gene expression patterns within the NAc from the AGEA data.

      Cacna1e expression data are now provided in Figure S13.

      Additionally, the meaning of "controls" in Figure 7F, along with the "No gRNA" condition, remains ambiguous. While the text mentions "no shRNA", the involvement of shRNA in this experiment lacks clarity.

      We now clarify that the control conditions are based on previously published data where no AAVs were injected into NAcLat. This is now clarified in the legend for Figure 10F (lines 1277-1578). We also corrected “shRNA” to “gRNA” in the text.

  3. web.archive.org web.archive.org
    1. WhatsApp has its own backup feature (actually, it has more than one way to do it.) WhatsApp supports end-to-end encrypted backups that can be protected with a password, a 64-digit key, and (more recently) passkeys. WhatsApp’s public docs are here and WhatsApp’s engineering writeup of the key-vault design is here. Conceptually, this is an interesting compromise: it reduces what cloud providers can read, but it introduces new key-management and recovery assumptions (and, depending on configuration, new places to attack). Importantly, even if you think backups are a mess — and they often are — this is still a far cry from the effortless, universal access alleged in this lawsuit.

      WhatsApp has its own backup feature, w additional key pairs etc. But this is not what is being claimed.

    2. If you use native device backup on iOS or Android devices (for example, iCloud device backup or the standard Android/Google backup), your WhatsApp message database may be included in a device backup sent to Apple or Google.

      backed-up decrypted message can be stored elsewhere when you do backups of your phone, e.g. Google or Apple depending on your device

    3. Several online commenters have pointed out that there are loopholes in WhatsApp’s end-to-end encryption guarantees. These include certain types of data that are explicitly shared with WhatsApp, such as business communications (when you WhatsApp chat with a company, for example.) In fairness, both WhatsApp and the lawsuit are very clear about these exceptions. These exceptions are real and important. WhatsApp’s encryption protects the content of your messages, it does not necessarily protect information about who you’re talking to, when messages were sent, and how your social graph is structured. WhatsApp’s own privacy materials talk about how personal message content is protected while other categories of data exist.

      The lawsuit is not about metadata, or WhatsApp use within a company which is not E2EE apparently (making it very unsuited for work situations I'd say)

    4. The most important thing to keep in mind here is that Meta’s encryption happens on the client application, the one you run on your phone. If the claims in this lawsuit are true, then Meta would have to alter the WhatsApp application so that plaintext (unencrypted) data would be uploaded from your app’s message database to some infrastructure at Meta, or else the keys would. And this should not be some rare, occasional glitch. The allegations in the lawsuit state that this applied to nearly all users, and for every message ever sent by those users since they signed up. Those constraints would tend to make this a very detectable problem. Even if WhatsApp’s app source code is not public, many historical versions of the compiled app are available for download. You can pull one down right now and decompile it using various tools, to see if your data or keys are being exfiltrated. I freely acknowledge that this is a big project that requires specialized expertise — you will not finish it by yourself in a weekend (as commenters on HN have politely pointed out to me.) Still, reverse-engineering WhatsApp’s client code is entirely possible and various parts of the app have indeed been reversed several times by various security researchers. The answer really is knowable, and if there is a crime, then the evidence is almost certainly* right there in the code that we’re all running on our phones.

      If the claim is correct, one could reverse engineer the app to see if true. Not a low hurdle but possible. 'the answer is knowable'

    5. In the case of WhatsApp, the application software is written by a team inside of Meta. This wouldn’t necessarily be a bad thing if the code was open source, and outside experts could review the implementation. Unfortunately WhatsApp is closed-source, which means that you cannot easily download the source code to see if encryption performed correctly, or performed at all. Nor can you compile your own copy of the WhatsApp app and compare it to the version you download from the Play or App Store. (This is not a crazy thing to hope for: you actually can do those things with open-source apps like Signal.)

      WhatsApp being closed source cannot be proven to work as advertised by outsiders. Unlike Signal

    6. Today WhatsApp describes itself as serving on the order of three billion users worldwide, and end-to-end encryption is on by default for personal messaging. They haven’t once been ambiguous about what they claim to offer. That means that if the allegations in the lawsuit proved to be true, this would be one of the largest corporate coverups since Dupont.

      Publicly WhatsApp has always maintained they do E2EE, the lawsuit says otherwise, that would be a major scandal. But also makes the claim hard to swallow

    7. The state of encryption on major messaging apps in early 2026. Notice that three of these platforms are operated by Meta.

      this is a sobering image. Signal at 70 million monthly active users. Apple imessage 1,3 billion Whatsapp 3 billion Instagram 2 billion FB Messenger 1 billion Telegram 1 billion Snapchat 900 million Discord 200million WeChat 1.3 billion Dingtalk 191million QQ 553 million no mention of Threema too tiny I suppose.

    8. should never be able to read the content of your messages.

      no mention here of the type of metadata WhatsApp holds: Signal only if account exists, and when last used. WhatsApp has contact lists and the date / time of every message between sender/receivers etc. That in itself is an issue imo.

    9. Beginning in 2014 (around the time they were acquired by Facebook), the app began rolling out end-to-end (E2E) encryption based on the Signal protocol.

      WhatsApp started rolling out E2EE around the time they were acquired by Meta. They use the Signal protocol

    10. The downside of vast scale is that apps like this can also collect data at similarly large scale. Every time you send a message through an app like WhatsApp, you’re sending that data first to a server run by WhatsApp’s parent company, Meta.

      The scale is the reason the collected data is an issue.

    11. In terms of scale, modern messaging apps are unbelievably huge. At the start of the period in the lawsuit, WhatsApp already had more than one billion monthly active users. Today that number sits closer to three billion. This is almost half the planet. In many countries, WhatsApp is more popular than phone calls.

      Scale of WhatsApp is close to 3 billion people.

    1. "one's 'self' cannot be understood or fulfilled without reference to other persons, and to the broader set of realities.

      self through the other

    1. eLife Assessment

      This important work shows that corticotrophin-releasing factor is delivered monosynaptically to dorsal striatal cholinergic interneurons from the central amygdala and bed nucleus of the stria terminalis. CRF increases cholinergic interneuron firing and release of acetylcholine, and this action is attenuated by pre-exposure to ethanol, suggesting a potential role in stress- and alcohol use disorders. This revision addressed prior concerns, presented convincing evidence supporting the conclusions, and set the stage for additional studies.

    2. Reviewer #1 (Public review):

      Summary:

      The authors show that corticotropin-releasing factor (CRF) neurons in the central amygdala (CeA) and bed nucleus of the stria terminalis (BNST) monosynaptically target cholinergic interneurons (CINs) in the dorsal striatum of rodents. Functionally, activation of CRFR1 receptors increases CIN firing rate, and this modulation was reduced by pre-exposure to ethanol. This is an interesting finding, with potential significance for alcohol use disorders.

      Strengths:

      Well-conceived circuit mapping experiments identify a novel pathway by which the CeA and BNST can modulate dorsal striatal function by controlling cholinergic tone. Important insight into how CRF, a neuropeptide that is important in mediating aspects of stress, affective/motivational processes and drug-seeking, modulates dorsal striatal function.

      Weaknesses:

      (1) Tracing and expression experiments were performed both in mice and rats (often in non-overlapping ways). While these species are similar in many ways, differences do exist. The authors address this important point in their final text.

      (2) As the authors point out, CRF likely modulates CIN activity in both direct and indirect ways. As justified, exploration of the network-level modulation of CINs by CRF (and how these processes may interact with direct modulation via CRFR1 on CINs) is left for future studies.

    3. Reviewer #2 (Public review):

      Summary:

      Essoh and colleagues present a thorough and elegant study identifying the central amygdala and BNST as key sources of CRF input to the dorsal striatum. Using monosynaptic rabies tracing and electrophysiology, they show direct connections to cholinergic interneurons. The study builds on previous findings that CRF increases CIN firing, extending them by measuring acetylcholine levels in slices and applying optogenetic stimulation of CRF+ fibers. It also uncovers a novel interaction between alcohol and CRF signaling in the striatum, likely to spark significant interest and future research.

      Strengths:

      A key strength is the integration of anatomical and functional approaches to demonstrate these projections and assess their impact on target cells, striatal cholinergic interneurons.

      Comments on revisions:

      No further concerns or recommendations.

    4. Reviewer #3 (Public review):

      Summary:

      The authors demonstrate that CRF neurons in the extended amygdala form GABAergic synapses on to cholinergic interneurons and that CRF can excite these neurons. The evidence is strong, however the authors lack to make a compelling connection showing CRF released from these extended amygdala neurons is mediating any of these effects. Further, they show that acute alcohol appears to modulate this action, although the effect size is not particularly robust.

      Strengths:

      This is an exciting connection from the extended amygdala to the striatum that provides a new direction for how these regions can modulate behavior. The work is rigorous and well done.

      Weaknesses:

      The effects of acute ethanol are modest but consistent, the potential role of this has yet to be determined. Further, the opto stim experiments are conducted in an ai32 mouse, so it is impossible to determine if that is from CEA and BNST, vs. another population of CRF containing neurons. This is an important caveat that was acknowledged.

    5. Author response:

      The following is the authors’ response to the original reviews

      We appreciate the reviewers’ insightful comments. In response, we conducted three new experiments, summarized in Author response table 1. After the table, we provide detailed responses to each comment.

      Author response table 1.

      Summary of new experiments and results.

      Reviewer #1 (Public review):

      The authors show that corticotropin-releasing factor (CRF) neurons in the central amygdala (CeA) and bed nucleus of the stria terminalis (BNST) monosynaptically target cholinergic interneurons (CINs) in the dorsal striatum of rodents. Functionally, activation of CRFR1 receptors increases CIN firing rate, and this modulation was reduced by pre-exposure to ethanol. This is an interesting finding, with potential significance for alcohol use disorders, but some conclusions could use additional support.

      Strengths:

      Well-conceived circuit mapping experiments identify a novel pathway by which the CeA and BNST can modulate dorsal striatal function by controlling cholinergic tone. Important insight into how CRF, a neuropeptide that is important in mediating aspects of stress, affective/motivational processes, and drug-seeking, modulates dorsal striatal function.

      Weaknesses:

      (1) Tracing and expression experiments were performed both in mice and rats (in a mostly nonoverlapping way). While these species are similar in many ways, some conclusions are based on assumptions of similarities that the presented data do not directly show. In most cases, this should be addressed in the text (but see point number 2).

      In the revised manuscript, we have clarified this limitation in the first paragraph of the Methods and the third paragraph of the Discussion and avoid cross-species claims, limiting our conclusions to the species in which each assay was performed. Specifically, we now state that while mice and rats share many conserved amygdalostriatal components, our tracing and expression studies were performed in a species-specific manner, and direct cross-species comparisons of CRF–CIN connectivity and CRFR1 expression were not assessed. We further note that future studies will be needed to determine the extent to which these observations are conserved across species as more tools become available.

      (2) Experiments in rats show that CRFR1 expression is largely confined to a subpopulation of striatal CINs. Is this true in mice, too? Since most electrophysiological experiments are done in various synaptic antagonists and/or TTX, it does not affect the interpretation of those data, but non-CIN expression of CRFR1 could potentially have a large impact on bath CRF-induced acetylcholine release.

      To address whether CRFR1 expression in striatal CINs is conserved across species, we performed new histological experiments using CRFR1-GFP mice. Striatal sections were immunostained with anti-ChAT, and we found that approximately 10% of CINs express CRFR1 (new Fig. 4D, 4E). This result indicates that, similar to rats, a subset of CINs in mice express CRFR1. However, the proportion of CRFR1<sup>+</sup> CINs is lower than the proportion of CRF-responsive CINs observed during electrophysiology experiments, suggesting that CRF may also modulate CIN activity indirectly through network or synaptic mechanisms. We have also noted in the revised Discussion that while CRFR1 expression is confirmed in a subset of CINs, the broader distribution of CRFR1 among other striatal cell types remains to be determined (third paragraph of Discussion).

      In our study, bath application of CRF increased striatal ACh release. Because striatal ACh is released primarily from CINs, and CRFR1 is an excitatory receptor, this effect is most likely mediated by CRF activation of CRFR1 on CINs, leading to enhanced CIN activity and ACh release. Although CRFR1 may also be expressed on other striatal neurons, these cell types—medium spiny neurons and GABAergic interneurons—are inhibitory. If CRF were to activate CRFR1 on these GABAergic neurons, the resulting increase in GABA release would suppress CIN activity and consequently reduce, rather than enhance, ACh release. Given that most CINs responded functionally while only a small subset expressed CRFR1, these findings imply that indirect mechanisms, such as CRF modulation of local circuits influencing CIN excitability, may also contribute to the observed increase in ACh release. Together, these data support a model in which CRF primarily enhances ACh release via activation of CRFR1-expressing CINs, while indirect network effects may further amplify this response.

      (3) Experiments in rats show that about 30% of CINs express CRFR1 in rats. Did only a similar percentage of CINs in mice respond to bath application of CRF? The effect sizes and error bars in Figure 5 imply that the majority of recorded CINs likely responded. Were exclusion criteria used in these experiments?

      We thank the reviewer for this insightful question. In our mouse cell-attached recordings, ~80% of CINs increased firing during CRF bath application, and all recorded cells were included in the analysis (no exclusions based on response direction/magnitude; cells were only required to meet standard recording-quality criteria such as stable baseline firing and seal).

      Using a CRFR1-GFP reporter mouse, we found that ~10% of striatal CINs are GFP+, suggesting that the high proportion of CRF-responsive CINs cannot be explained solely by somatic reporter-labeled CRFR1 expression. Importantly, the CRF-induced increase in CIN firing is blocked by the selective CRFR1 antagonist NBI 35695 (Fig. 5B–C), supporting a CRFR1-dependent mechanism at the circuit level. We now discuss several non-mutually exclusive explanations for this apparent discrepancy: (i) reporter lines (e.g., CRFR1-GFP) may underestimate functional CRFR1 expression, particularly for low-level or compartmentalized receptor pools; (ii) bath-applied CRF may act indirectly via CRFR1 on presynaptic afferents, thereby enhancing excitatory drive onto CINs; and (iii) electrical coupling among CINs could allow direct effects in a subset of CINs to propagate through the CIN network (Ren, Liu et al. 2021). We added this discussion to the revised manuscript (fourth paragraph of the Discussion).

      (4) The conclusion that prior acute alcohol exposure reduces the ability of subsequent alcohol exposure to suppress CIN activity in the presence of CRF may be a bit overstated. In Figure 6D (no ethanol preexposure), ethanol does not fully suppress CIN firing rate to baseline after CRF exposure. The attenuated effect of CRF on CIN firing rate after ethanol pre-treatment (6E) may just reduce the maximum potential effect that ethanol can have on firing rate after CRF, due to a lowered starting point. It is possible that the lack of significant effect of ethanol after CRF in pre-treated mice is an issue of experimental sensitivity. Related to this point, does pre-treatment with ethanol reduce the later CIN response to acute ethanol application (in the absence of CRF)?

      In the revised manuscript, we have tempered our interpretation in the final Results section and throughout the Discussion to emphasize that ethanol pre-exposure attenuates, rather than abolishes, the CRFinduced increase in CIN firing. We also note the reviewer’s important point that in Figure 6D, ethanol does not fully suppress firing to baseline after CRF exposure, consistent with a partial effect. Regarding the reviewer’s question, our experiments were specifically designed to test interactions between CRF and ethanol, so we did not assess whether ethanol pre-treatment alters subsequent responses to ethanol alone. We now explicitly acknowledge CRF-dependent and CRF-independent effects of ethanol on CIN activity as an important point for future studies to disentangle (sixth paragraph of the Discussion). For example, comparing ethanol responses with and without prior ethanol without any treatment with CRF could resolve this question.

      (5) More details about the area of the dorsal striatum being examined would be helpful (i.e., a-p axis).

      We now provide more detail regarding the anterior–posterior axis of the dorsal striatum examined. Most recordings and imaging were performed in the posterior dorsomedial striatum (pDMS), corresponding to coronal slices posterior to the crossing of the anterior commissure and anterior to the tail of the striatum (starting around 0.62 mm and ending at −1.3 mm relative to the Bregma). While our primary focus was on posterior slices, some anterior slices were included to increase the sample size. These details have been added to the Methods (Last sentence of the ‘Histology and cell counting’ section and of the ‘Slice electrophysiology’ section).

      Reviewer #2 (Public review):

      Essoh and colleagues present a thorough and elegant study identifying the central amygdala and BNST as key sources of CRF input to the dorsal striatum. Using monosynaptic rabies tracing and electrophysiology, they show direct connections to cholinergic interneurons. The study builds on previous findings that CRF increases CIN firing, extending them by measuring acetylcholine levels in slices and applying optogenetic stimulation of CRF+ fibers. It also uncovers a novel interaction between alcohol and CRF signaling in the striatum, likely to spark significant interest and future research.

      Strengths:

      A key strength is the integration of anatomical and functional approaches to demonstrate these projections and assess their impact on target cells, striatal cholinergic interneurons.

      Weaknesses:

      (1) The nature of the interaction between alcohol and CRF actions on cholinergic neurons remains unclear. Also, further clarification of the ACh sensor used and others is required

      We have clarified the nature of the interaction between alcohol and CRF signaling in CINs and have provided additional details regarding the acetylcholine sensor used. These issues are addressed in detail in our responses to the specific comments below.

      Reviewer #2 (Recommendations for the authors):

      (1) The interaction between the effects of alcohol and CRF is a novel and important part of this study. When considering possible mechanisms underlying the findings in the discussion, there is no mention of occlusion. Given that incubation with alcohol produced a similar increase in firing of CINs as CRF, occlusion could be a parsimonious explanation for the observed interaction. Have the author considered blocking the effects of alcohol on CIN with CRF-R1 antagonist? Another experiment that could address the occlusion would be to test if alcohol also increases ACh levels as it did CRF.

      We thank the reviewer for proposing occlusion as a potential mechanism underlying the interaction between alcohol and CRF. We agree that, in principle, alcohol-induced endogenous CRF release could occlude subsequent exogenous CRF-mediated potentiation of CIN firing, and we carefully considered this possibility.

      However, several observations from our data argue against occlusion driven by acute alcohol exposure or withdrawal in this preparation. First, as shown in Fig. 6A, bath application of alcohol transiently reduced CIN firing, and firing recovered to baseline levels after washout without any rebound increase. Second, in Fig. 6D–E, the baseline firing rates under control conditions and following alcohol pretreatment were comparable, indicating that acute alcohol exposure and short-term withdrawal did not produce a sustained increase in CIN excitability. Together, these results suggest that acute withdrawal in slices is less likely to trigger substantial endogenous CRF release capable of occluding subsequent exogenous CRF effects.

      While we and others have previously reported increased spontaneous CIN firing following prolonged in vivo alcohol exposure and extended withdrawal periods (e.g., 21 days), short-term withdrawal (e.g., 1 day) does not robustly alter baseline CIN firing (Ma, Huang et al. 2021, Huang, Chen et al. 2024). Consistent with these prior findings, the absence of a rebound or elevated baseline firing in the present slice experiments discouraged further pursuit of an endogenous CRF occlusion mechanism under acute conditions.

      We also considered experimentally testing occlusion by blocking CRFR1 signaling during alcohol pre-treatment. However, this approach is technically challenging in slice recordings, as CRFR1 antagonists require prolonged incubation (~1 hour) during alcohol exposure. Because it is unclear whether endogenous CRF release is triggered by alcohol incubation itself or by withdrawal, the antagonist would need to remain present throughout both the incubation and withdrawal periods. This leaves insufficient time for complete washout of the CRFR1 antagonist prior to subsequent bath application of exogenous CRF to assess its effects on CIN firing. Consequently, residual antagonist presence would confound the interpretation of the exogenous CRF response.

      Finally, regarding the possibility that alcohol increases acetylcholine release, we did not observe alcohol-induced increases in CIN firing in slices, arguing against elevated ACh signaling under these conditions. Consistent with prior work (Ma, Huang et al. 2021, Huang, Chen et al. 2024), alcohol-induced increases in CIN excitability and cholinergic signaling appear to depend on prolonged in vivo exposure and extended withdrawal rather than acute slice-level manipulations.

      We have now incorporated discussion of occlusion as a potential mechanism (seventh paragraph) and clarified why our data and technical considerations argue against it in the present study. We thank the reviewer for this wonderful suggestion, which we will test in future in vivo studies.

      (2) Retrograde monosynaptic tracing of inputs to CIN. Results state the finding of labeling in all previously reported area..." Can the authors report these areas? A list in the text or a bar plot, if there is quantification, will suffice. This formation will serve as important validation and replication of previous findings.

      We thank the reviewer for this constructive suggestion. We agree that summarizing the anatomical sources of CIN input provides important validation of our tracing results. In the revised Results, we now list the major input regions observed, including the striatum itself, cortex (e.g., cingulate cortex, motor cortex, somatosensory cortex), thalamus (e.g., parafascicular thalamic nucleus, centrolateral thalamic nucleus), globus pallidus, and midbrain (first paragraph of the Results). Quantitative analysis of relative input strength will be presented in a separate study that expands on these findings. Here, we limit the current manuscript to the functional characterization of CRF and alcohol modulation of CINs.

      (3) Given the difference in connectivity among striatal subregions, it would be important to describe in more detail the injection site in the results and figures. In the figure, for example, you might want to include the AP coordinates, given that it is such a zoomed-in image, it is hard to tell how anterior/posterior the site is. I imagine that the picture is a representative image of the injection site, but maybe having a side image with overlay of injection sites in all the animals used, would help.

      The anterior–posterior (AP) coordinates for representative images have been included in the panels and reiterated more clearly in the revised Results section and figure legends. In the legend for Figure 3B, a list of AP coordinates for each animal used for Figure 3A-3E has been added.

      (4) Figure 1D inset, there seem to be some double-labeled cells in the zoomed in BNST images. The authors might want to comment on this. It seemed far from the injection site. Do D1-MSN so far away show connectivity to CINs?

      Upon closer inspection of the BNST images, we noted a small number of double-labeled cells were indeed present, consistent with prior reports that a subset of D1R-expressing neurons (~10%) has been reported previously in our lab in the BNST, with the majority being D2R-expressing neurons (Lu, Cheng et al. 2021). Given the BNST’s anatomical proximity to the dorsal striatum, it is plausible that some D1Rexpressing neurons in this region provide monosynaptic input to CINs, highlighting a potential ventral-to-dorsal connection that merits further study.

      (5) Can the author provide quantification of the onset delay of the optogenetic evoked CRF+ axon responses onto CINs? The claim of monosynaptic connectivity is well supported by the TTX/4AP experiment but additional information on the timing will strengthen that conclusion.

      We thank the reviewer for this insightful suggestion. Quantifying the onset latency of optogenetically evoked CRFMsup+</sup> axon responses onto CINs provides valuable confirmation of monosynaptic connectivity. To address this, we performed new latency measurements under the same recording conditions as the TTX/4-AP experiments. The average onset latency from the start of the optical stimulation was 5.85 ± 0.37 ms (new Figure 3J), consistent with direct monosynaptic transmission.

      As an additional reference, we analyzed latency data from a separate project in which we optogenetically stimulated cholinergic interneurons and recorded synaptic responses in medium spiny neurons. This circuit, known to involve disynaptic transmission from CINs to MSNs via nAChR-expressing interneurons (Autor response image 1) (English, Ibanez-Sandoval et al. 2011), exhibited a significantly longer latency (18.34 ± 0.70 ms; t<sub>(29)</sub> = 10.3, p < 0.001) compared to CRF⁺ CeA/BNST inputs to CINs (5.85 ± 0.37 ms). Together, these results further support that CRF⁺ axons form direct functional synapses onto CINs.

      Author response image 1.

      Latency of disynaptic transmission from CINs to MSNs via interneurons A) Schematic illustrating optogenetic stimulation of Chrimson-expressing CINs, leading to excitation of nAChRexpressing interneurons that release GABA onto recorded MSNs. B) Sample trace of disynaptic transmission (left) and bar graph summarizing onset latency (right) from light stimulation to synaptic response onset (n = 23 neurons from 3 mice).

      (6) The ACh sensor reported is "AAV-GRABACh4m" but the reference is for GRAB-ACh3.0. Also, BrainVTA has GRAB-ACh4.3. Is this the vector? Could you please check the name of the construct and report the corresponding reference, as well as clarify the meaning of the additional "m". They have a mutant version of the GRAB-ACH that researchers use for control, and of course, you want to use it as a control, but not for the test experiment.

      GRAB-ACh4m is the correct acetylcholine sensor used in this study. The ACh4 series (including ACh4h, ACh4m, and ACh4l; personal communication with Dr. Yulong Li’s lab) represents an updated generation following GRAB-ACh3.0. Although the ACh4 family has not yet been formally published, these constructs are publicly available through BrainVTA (https://www.brainvta.tech/plus/view.php?aid=2680).

      The suffix “m” does not indicate a mutant control; rather, it denotes a medium-affinity variant within the ACh4 sensor family. Importantly, the mutant (non-responsive) control sensor is only available for GRAB-ACh3.0 (ACh3.0mut) and does not exist for the ACh4 series.

      Our laboratory has previously used GRAB-ACh4m in multiple peer-reviewed publications (Huang, Chen et al. 2024, Gangal, Iannucci et al. 2025, Purvines, Gangal et al. 2025), and its use has also been reported by independent groups in recent preprints (Potjer, Wu et al. 2025, Touponse, Pomrenze et al. 2025). We have now clarified the construct name, its relationship to GRAB-ACh3.0, in the Methods ‘Reagents’ section, and we have corrected the reference accordingly.

      (7) Are CRF-R1+ CINs equally abundant in the DMS and DLS? From the image in Figure 4, it seems that a larger percentage of CINs are CRFR1+ in the DLS than in DMS. Is this true? The authors probably already have this data, or it should be easy to get, and it could be additional information that was not studied before.

      We did not perform a quantitative comparison of CRFR1+ CIN abundance between the DMS and DLS in the present study. While the representative images in Figure 4 may appear to suggest regional differences, these panels were selected to illustrate labeling quality rather than relative density and should not be interpreted as evidence of unequal distribution. We have clarified this point in the revised Discussion (last sentence of the third paragraph) and note that future studies will be needed to systematically evaluate potential regional differences in CRFR1 expression, which could have important implications for dorsal striatal function.

      (8) The manuscript states several times that there are no CRF+ neurons in the dorsal striatum. At the same time, there are reports of the CRF+ neuron in the ventral striatum and its role in learning. Could the authors include mention of the studies by the Lemos group (10.1016/j.biopsych.2024.08.006)

      We have revised the Discussion section to clarify that our findings pertain specifically to the dorsal striatum and now acknowledge the presence and functional relevance of CRF+ neurons in the ventral striatum, citing the Lemos group’s study (fifth paragraph of the Discussion).

      (9) For the histology analysis, please express cell counts as "density", not just number of cells, by providing an area (e.g., "number of cell/ µm2").

      In the revised manuscript, all histological outcomes have been recalculated as cell density (cells/mm<sup>2</sup>) by normalizing raw cell counts to the measured area of each region of interest (ROI). Figures that previously displayed absolute counts now present densities (cells/mm<sup>2</sup>), with corresponding updates made to figure legends and text. We note one exception in Figure 4B, where the comparison between the total number of CINs and CRFR1+ CINs is best represented as cell counts rather than normalized values, as the counting was conducted in the same area (within the same ROI) of the dorsostriatal subregion.

      (10) Figure 2C, we can see there are some labeled fibers in the striatum cut. Would it be possible to get a better confocal image?

      Figure 2C has been replaced with a higher-quality confocal image captured at the same magnification and scale. The updated image provides improved clarity and resolution, ensuring accurate visualization of labeled CRF+ fibers, but not cell bodies, within the striatum.

      (11) The ACh measurements in the slice are very informative and an important addition. I first thought that these experiments with the GRAB-ACh sensor were performed in ChAT-eGFP mice. After reading more carefully, I realized they were done in wild-type mice. Would you include the wildtype label in the figure as well? The ChATeGFP BAC transgenic line was reported to have enhanced ACh packaging and increased ACh release, which could have magnified the signals. So, it is important to highlight the experiments were done in wildtype mice.

      We now label with ‘WT mice’ and note in the legend that all GRAB-ACh experiments were performed in wild-type mice, not ChAT-eGFP, to avoid confounds in ACh release. We thank the reviewer for this important suggestion.

      Reviewer #3 (Public review):

      The authors demonstrate that CRF neurons in the extended amygdala form GABAergic synapses onto cholinergic interneurons and that CRF can excite these neurons. The evidence is strong, however, the authors fail to make a compelling connection showing CRF released from these extended amygdala neurons is mediating any of these effects. Further, they show that acute alcohol appears to modulate this action, although the effect size is not particularly robust.

      Strengths:

      This is an exciting connection from the extended amygdala to the striatum that provides a new direction for how these regions can modulate behavior. The work is rigorous and well done.

      Weaknesses:

      (1) While the authors show that opto stim of these neurons can increase firing, this is not shown to be CRFR1 dependent. In addition, the effects of acute ethanol are not particularly robust or rigorously evaluated. Further, the opto stim experiments are conducted in an Ai32 mouse, so it is impossible to determine if that is from CEA and BNST, vs. another population of CRF-containing neurons. This is an important caveat.

      We added recordings with the CRFR1 antagonist antalarmin. Light-evoked increases in CIN firing were abolished under CRFR1 blockade, linking the effect to CRFR1 (Figure 5J, 5K). We also clarify that CRFCre;Ai32 does not isolate CeA versus BNST sources, so we temper regional claims and highlight this as a limitation. The acute ethanol effects are modest but consistent; we expanded the discussion of dose and preparation constraints in acute slice physiology and note that in vivo studies will be needed to define the network-level impact.

      Reviewer #3 (Recommendations for the authors):

      (1) The authors could bring some of this data together by examining CRFR1 dependence of optical stimulationinduced increases in firing. Further, the authors have devoted significant effort to exploring how the BNST and CEA project to the CIN, yet their ephys does not explore site-specific infusion of ChR2 into either region. How are we to be sure it is not some other population of CRF neurons mediating this effect? The alcohol data does not appear particularly robust, but I think if the authors wanted to, they could explore other concentrations. Mostly I think it is important to discuss the limitations of acute alcohol on 5a brain slice.

      We thank the reviewer for these thoughtful comments, which helped us strengthen the mechanistic interpretation of the CRF-CIN interaction. In the revised manuscript, we have addressed each point as follows:

      - CRFR1 dependence of optogenetically evoked responses: We performed new recordings in which optogenetic stimulation of CRF⁺ terminals in the dorsal striatum was conducted in the presence of the CRFR1 antagonist antalarmin. The increase in CIN firing evoked by light stimulation was abolished under CRFR1 blockade, confirming that this effect is mediated through CRFR1 activation (new Figure 5J, 5K, third paragraph of the corresponding Result section). These results directly link the functional effects of CRF⁺ terminal activation to CRFR1 signaling on CINs.

      - CeA vs. BNST projection specificity: The reviewer is correct that CeA and BNST projections were not analyzed separately. As unknown pathways, our experiment was designed to first establish the monosynaptic connections between CeA/BNST CRF neurons to striatal CINs. Future studies would further explore the specific contribution of each site. However, our data exclude the possibility of other CRF neurons as we selectively infused Cre-dependent opsins into both CeA and BNST of CRF-Cre mice (Figure 3G-3J).

      - Limitations of acute slice experiments: We have expanded the Discussion (sixth paragraph) to acknowledge that acute slice physiology cannot fully capture the dynamic and network-level effects of ethanol observed in vivo. While this preparation enables mechanistic precision, factors such as washout, diffusion constraints, and the absence of systemic feedback may underestimate ethanol’s impact on CINs. We now explicitly note this limitation and highlight the need for in vivo studies to examine behavioral and circuit-level implications of CRF–alcohol interactions.

      Collectively, these revisions clarify the CRFR1 dependence of CRF<sup>+</sup> terminal effects and reaffirm that both CeA and BNST projections contribute to CIN modulation while addressing the methodological limitations of the slice preparation.

      Reviewer #4 Public Review):

      This manuscript presents a compelling and methodologically rigorous investigation into how corticotropin-releasing factor (CRF) modulates cholinergic interneurons (CINs) in the dorsal striatum - a brain region central to cognitive flexibility and action selection-and how this circuit is disrupted by alcohol exposure. Through an integrated series of anatomical, optogenetic, electrophysiological, and imaging experiments, the authors uncover a previously uncharacterized CRF⁺ projection from the central amygdala (CeA) and bed nucleus of the stria terminalis (BNST) to dorsal striatal CINs.

      Strengths:

      Key strengths of the study include the use of state-of-the-art monosynaptic rabies tracing, CRF-Cre transgenic models, CRFR1 reporter lines, and functional validation of synaptic connectivity and neurotransmitter release. The finding that CRF enhances CIN excitability and acetylcholine (ACh) release via CRFR1, and that this effect is attenuated by acute alcohol exposure and withdrawal, provides important mechanistic insight into how stress and alcohol interact to impair striatal function. These results position CRF signaling in CINs as a novel contributor to alcohol use disorder (AUD) pathophysiology, with implications for relapse vulnerability and cognitive inflexibility associated with chronic alcohol intake. The study is well-structured, with a clear rationale, thorough methodology, and logical progression of results. The discussion effectively contextualizes the findings within broader addiction neuroscience literature and suggests meaningful future directions, including therapeutic targeting of CRFR1 signaling in the dorsal striatum.

      Weaknesses:

      (1) Minor areas for improvement include occasional redundancy in phrasing, slightly overlong descriptions in the abstract and significance sections, and a need for more concise language in some places. Nevertheless, these do not detract from the manuscript's overall quality or impact. Overall, this is a highly valuable contribution to the fields of addiction neuroscience and striatal circuit function, offering novel insights into stress-alcohol interactions at the cellular and circuit level, which requires minor editorial revisions.

      We have streamlined the abstract and significance statement, reduced redundancy, and improved conciseness throughout the text. We appreciate the reviewer’s feedback, which has helped us further strengthen the clarity and readability of the manuscript.

      Reviewer #4 (Recommendations for the authors):

      (1) Line 29-30: Slightly verbose. Consider: "Alcohol relapse is associated with corticotropin-releasing factor (CRF) signaling and altered reward pathway function, though the precise mechanisms are unclear."

      The sentence has been revised as recommended to improve clarity and conciseness in the introductory section (Lines 31-32).

      (2) Lines 39-43: Good synthesis, but could better emphasize the novelty of identifying a CRF-CIN pathway.

      The abstract has been revised to more clearly emphasize the novelty of identifying a CRF-CIN pathway and its functional significance (Line 42-43).

      (3) Lines 66-68: Consider integrating clinical relevance more directly, e.g., "AUD affects over 14 million adults in the U.S., with relapse often triggered by stress...".

      The introduction has been revised to more directly emphasize the clinical relevance of alcohol use disorder, including its high prevalence and the role of stress in relapse, thereby underscoring the translational significance of our findings (Lines 68-69).

      (4) Line 83: Repetition of "goal-directed learning, habit formation, and behavioral flexibility" appears multiple times; consider variety.

      We have varied the phrasing in the Introduction to avoid redundancy. Specifically, in place of repeating “goal-directed learning, habit formation, and behavioral flexibility,” we now use alternative terms such as “action selection,” “habitual responding,” and “cognitive flexibility,” depending on the context.

      (5) Lines 107-116: Clarify why both rats and mice were used-do they serve different experimental purposes?

      We now explain that each species was used for complementary experimental purposes. Rats were used for histological validation of CRFR1 expression using the CRFR1-Cre-tdTomato line, which has been extensively characterized in this species. Mice were used for the majority of electrophysiological, optogenetic, and GRAB-ACh sensor experiments due to the availability of well-established transgenic CRF-Cre-driver lines. This division allowed us to leverage the most appropriate tools in each species to address different aspects of the study. We have clarified this rationale in the Methods (first paragraph of the “Animals” section) and Discussion (third paragraph).

      (6) Electrophysiology section: The distinction between acute exposure vs. withdrawal could be further emphasized.

      To better highlight the distinction between acute alcohol exposure and withdrawal, we have clarified the timing and context of each condition within the Results section for Figure 6. Specifically, we now distinguish the immediate suppressive effects of alcohol observed during bath application (acute exposure) from the subsequent changes in CIN firing measured after washout (withdrawal). These revisions clarify the temporal dynamics and functional implications of CRF–alcohol interactions in our experimental design.

      (7) Lines 227-229: Reword for clarity: "Significantly more BNST neurons projected to CINs compared to the CeA...".

      The sentence has been reworded to clarify as recommended (Lines 247-248).

      (8) Lines 373-374: Consider connecting the CRF-CIN circuit to behavioral inflexibility in AUD more directly.

      We have modified the sentence (Lines 390-395) to more explicitly link alcohol-induced dysregulation of the CRF–CIN circuit to behavioral inflexibility in AUD, consistent with the established role of CINs in action selection and cognitive flexibility.

      (9) Lines 387-389: This is an excellent point about stress resilience; consider expanding with examples or potential implications.

      We thank the reviewer for this insightful suggestion. In the revised Discussion (sixth paragraph), we expanded this section to more directly connect alcohol-induced disruption of CRF–CIN signaling with impaired stress resilience and behavioral inflexibility. Specifically, we now note that such dysregulation may compromise stress resilience mechanisms mediated by CRF–cholinergic interactions in the striatum and related corticostriatal circuits. We further discuss how impaired CIN responsiveness could blunt adaptive behavioral adjustments under stress, biasing animals toward habitual or compulsive alcohol seeking. This addition highlights the broader implication that alcohol-induced alterations in CRF–CIN signaling may contribute to relapse vulnerability by undermining adaptive stress coping.

      References

      English, D. F., O. Ibanez-Sandoval, E. Stark, F. Tecuapetla, G. Buzsaki, K. Deisseroth, J. M. Tepper and T. Koos (2011). "GABAergic circuits mediate the reinforcement-related signals of striatal cholinergic interneurons." Nat Neurosci 15(1): 123–130.

      Gangal, H., J. Iannucci, Y. Huang, R. Chen, W. Purvines, W. T. Davis, A. Rivera, G. Johnson, X. Xie, S. Mukherjee, V. Vierkant, K. Mims, K. O'Neill, X. Wang, L. A. Shapiro and J. Wang (2025). "Traumatic brain injury exacerbates alcohol consumption and neuroinflammation with decline in cognition and cholinergic activity." Transl Psychiatry 15(1): 403.

      Huang, Z., R. Chen, M. Ho, X. Xie, H. Gangal, X. Wang and J. Wang (2024). "Dynamic responses of striatal cholinergic interneurons control behavioral flexibility." Sci Adv 10(51): eadn2446.

      Lu, J. Y., Y. F. Cheng, X. Y. Xie, K. Woodson, J. Bonifacio, E. Disney, B. Barbee, X. H. Wang, M. Zaidi and J. Wang (2021). "Whole-Brain Mapping of Direct Inputs to Dopamine D1 and D2 Receptor-Expressing Medium Spiny Neurons in the Posterior Dorsomedial Striatum." Eneuro 8(1).

      Ma, T., Z. Huang, X. Xie, Y. Cheng, X. Zhuang, M. J. Childs, H. Gangal, X. Wang, L. N. Smith, R. J. Smith, Y. Zhou and J. Wang (2021). "Chronic alcohol drinking persistently suppresses thalamostriatal excitation of cholinergic neurons to impair cognitive flexibility." J Clin Invest 132(4): e154969.

      Potjer, E. V., X. Wu, A. N. Kane and J. G. Parker (2025). "Parkinsonian striatal acetylcholine dynamics are refractory to L-DOPA treatment." bioRxiv.

      Purvines, W., H. Gangal, X. Xie, J. Ramos, X. Wang, R. Miranda and J. Wang (2025). "Perinatal and prenatal alcohol exposure impairs striatal cholinergic function and cognitive flexibility in adult offspring." Neuropharmacology 279: 110627.

      Ren, Y., Y. Liu and M. Luo (2021). "Gap Junctions Between Striatal D1 Neurons and Cholinergic Interneurons." Front Cell Neurosci 15: 674399.

      Touponse, G. C., M. B. Pomrenze, T. Yassine, V. Mehta, N. Denomme, Z. Zhang, R. C. Malenka and N. Eshel (2025). "Cholinergic modulation of dopamine release drives effortful behavior." bioRxiv.

    1. ERC-4337

      First ERC for the implementation of AA. Introduced, UserOperations to handle txns differentlt. transactions, are first kept in a high-level mempopl, tehn packaged as a sinlge classic transaction, this process is known as bundling, anthe bundler, takes the txns, and proposes a bloc.

      it also brought about the concept of paymaster, which allows other bodies to pay for users's gas, and also made room for payment, that are not with native tokens, like paying for gas with solana

    2. The most common derivation method uses a treelike structure, as described in "Hierarchical Deterministic Wallets (BIP-32/BIP-44)".

      The Standard used to generate keys to mneonic phase.

    1. In respect of the jazz content of German propagandaSittler had this to say, using the series ‘Dance Tunes and Cabaret’ as a example:The ‘Dance Tunes and Cabaret’ programme is trying to build a bridge of jazz betweenGermany and America. The broadcast assumes that thousands of friendly disposedAmericans have gathered round their loudspeakers to hear how in poor old Hunlandthey treasure the cultural legacy of Jewish-American jazz. ‘Listen! We Germans cando it too!’ is what the announcer seems to be saying. The choice of material wouldmake you think you were in the heart of New York’s black ghetto — well, a few yearsback, actually, as the latest hits have not yet filtered through to us barbarians.

      Interesting primary source

    2. DanceandEntertainmentOrchestra

      Despite the ban on Jazz, Goebbles, in an attempt to maintain public morale, increasingly permitted lighter, popular music to be played on German radio, with a 'German Dance and Entertainment Orchestra established in 1941 to enable this. As such, music on the radio becoming increasingly similar between Germany and Britain as the war progressed

    3. Asthewarcontinuedandpublicgloomdeepened, Goebbelsbecameincreasinglyemphaticabouttheimportanceofprogrammeswhichofferedlightrelieftothenation—entertainmentontheleveloftheenormouslypopularradiofeature,the‘WunschkonzertfiirdieWehrmacht(‘Forces’Choice’)withitsmixtureofsentimen-tality,oldfavouritesandcurrenthits—martialmusicsuchas‘EsistsoschénSoldatzusein’,‘Siegreichwoll’nwirFrankreichschlagen’,or‘Bomben aufEn-ge-land,withcheerfulgreetingsfromthefrontandforthefamily

      SLAYYY quote! Matches the r]british forces programme

    4. his directive had the result of increasing the proportion of musical programmes tonearly seventy per cent in 19357, compared with sixty per cent in 1934. At the openingof the 1939 Funkausstellung, Goebbels again emphasized the importance of relaxationand entertainment on the radio, in addition to spiritual uplift and political dedication,pointing out that this made it, ‘next to the press, the most effective weapon in ourstruggle for national existence.

      ABSOLUTE SLAY QUOTE HERE!!!

    1. USA is leaving OGP under the Trump regime. The USA was a cofounder in 2011 and together w Brazil held a launching conference w civil society in July that year. I missed the OGP launch in Washington bc I thought the formal invitation by then Secretary of State Hillary Clinton I received was spam. [[Hoe ik Hillary Clinton spamfilterde en de oprichting van OGP miste]]

    1. https://web.archive.org/web/20260203103605/https://edition.cnn.com/2026/02/02/business/companies-worldwide-distance-ice-backlash

      Headline somewhat misleading, mostly covers that CapGemini is selling their US branch that works for ICE where bonuses directly correlate with immigrants located and detained. They're not ditching doing business with ICE, they're selling it to the next bidder who by def has no qualms doing business with ICE. And it remains to be seen how fast this sale will happen if at all. A few other examples that are smaller, like office leases. IBM-style behaviour still the norm imo. Vgl [[Comment le groupe français Capgemini aide la police fédérale américaine ICE à localiser les migrants]]

    1. eLife Assessment

      The authors investigate how dominance hierarchy shapes defensive strategies in mice under two naturalistic threats: a transient visual looming stimulus and a sustained live rat. This study provides important insights into how social context and dominance hierarchy modulate innate defensive behaviors across distinct naturalistic threats. The strength of evidence is convincing, with detailed classification and analysis of behaviors.

    2. Reviewer #1 (Public review):

      Summary:

      This study presents an interesting behavioral paradigm and reveals interactive effects of social hierarchy and threat type on defensive behaviors. However, addressing the aforementioned points regarding methodological detail, rigor in behavioral classification, depth of result interpretation, and focus of the discussion is essential to strengthen the reliability and impact of the conclusions in a revised manuscript.

      Strengths:

      The paper is logically sound, featuring detailed classification and analysis of behaviors, with a focus on behavioral categories and transitions, thereby establishing a relatively robust research framework.

      Weaknesses:

      Several points require clarification or further revision.

      (1) Methods and Terminology Regarding Social Hierarchy:

      The study uses the tube test to determine subordinate status, but the methodological description is quite brief. Please provide a more detailed account of the experimental procedure and the criteria used for determination.

      The dominance hierarchy is established based on pairs of mice. However, the use of terms like "group cohesion" - typically applied to larger groups - to describe dyadic interactions seems overstated. Please revise the terminology to more accurately reflect the pairwise experimental setup.

      (2) Criteria and Validity of Behavioral Classification:

      The criteria for classifying mouse behaviors (e.g., passive defense, active defense) are not sufficiently clear. Please explicitly state the operational definitions and distinguishing features for each behavioral category.

      How was the meaningfulness and distinctness of these behavioral categories ensured to avoid overlap? For instance, based on Figure 3E, is "active defense" synonymous with "investigative defense," involving movement to the near region followed by return to the far region? This requires clearer delineation.

      The current analysis focuses on a few core behaviors, while other recorded behaviors appear less relevant. Please clarify the principles for selecting or categorizing all recorded behaviors.

      (3) Interpretation of Key Findings and Mechanistic Insights:

      Looming exposure increased the proportion of proactive bouts in the dominant zone but decreased it in the subordinate zone (Figure 4G), with a similar trend during rat exposure. Please provide a potential explanation for this consistent pattern. Does this consistency arise from shared neural mechanisms, or do different behavioral strategies converge to produce similar outputs under both threats?

      (4) Support for Claims and Study Limitations:

      The manuscript states that this work addresses a gap by showing defensive responses are jointly shaped by threat type and social rank, emphasizing survival-critical behaviors over fear or stress alone. However, it is possible that the behavioral differences stem from varying degrees of danger perception rather than purely strategic choices. This warrants a clear description and a deeper discussion to address this possibility.

      The Discussion section proposes numerous brain regions potentially involved in fear and social regulation. As this is a behavioral study, the extensive speculation on specific neural circuitry involvement, without supporting neuroscience data, appears insufficiently grounded and somewhat vague. It is recommended to focus the discussion more on the implications of the behavioral findings themselves or to explicitly frame these neural hypotheses as directions for future research.

    3. Reviewer #2 (Public review):

      Summary:

      The authors investigate how dominance hierarchy shapes defensive strategies in mice under two naturalistic threats: a transient visual looming stimulus and a sustained live rat. By comparing single versus paired testing, they report that social presence attenuates fear and that dominant and subordinate mice exhibit different patterns of defensive and social behaviors depending on threat type. The work provides a rich behavioral dataset and a potentially useful framework for studying hierarchical modulation of innate fear.

      Strengths:

      (1) The study uses two ecologically meaningful threat paradigms, allowing comparison across transient and sustained threat contexts.

      (2) Behavioral quantification is detailed, with manual annotation of multiple behavior types and transition-matrix level analysis.

      (3) The comparison of dominant versus subordinate pairs is novel in the context of innate fear.

      (4) The manuscript is well-organized and clearly written.

      (5) Figures are visually informative and support major claims.

      Weaknesses:

      Lack of neural mechanism insights.

    4. Reviewer #3 (Public review):

      Summary:

      This study examines how dominance hierarchy influences innate defensive behaviors in pair-housed male mice exposed to two types of naturalistic threats: a transient looming stimulus and a sustained live rat. The authors show that social presence reduces fear-related behaviors and promotes active defense, with dominant mice benefiting more prominently. They also demonstrate that threat exposure reinforces social roles and increases group cohesion. The work highlights the bidirectional interaction between social structure and defensive behavior.

      Strengths:

      This study makes a valuable contribution to behavioral neuroscience through its well-designed examination of socially modulated fear. A key strength is the use of two ethologically relevant threat paradigms - a transient looming stimulus and a sustained live predator, enabling a nuanced comparison of defensive behaviors. The experimental design is robust, systematically comparing animals tested alone versus with their cage mate to cleanly isolate social effects. The behavioral analysis is sophisticated, employing detailed transition maps that reveal how social context reshapes behavioral sequences, going beyond simple duration measurements. The finding that social modulation is rank-dependent adds significant depth, linking social hierarchy to adaptive defense strategies. Furthermore, the demonstration that threat exposure reciprocally enhances social cohesion provides a compelling systems-level perspective. Together, these elements establish a strong behavioral framework for future investigations into the neural circuits underlying socially modulated innate fear.

      Weaknesses:

      The study exhibits several limitations. The neural mechanism proposed is speculative, as the study provides no causal evidence.

    5. Author response:

      Public Reviews:

      Reviewer #1 (Public review):

      Summary: 

      This study presents an interesting behavioral paradigm and reveals interactive effects of social hierarchy and threat type on defensive behaviors. However, addressing the aforementioned points regarding methodological detail, rigor in behavioral classification, depth of result interpretation, and focus of the discussion is essential to strengthen the reliability and impact of the conclusions in a revised manuscript. 

      Strengths: 

      The paper is logically sound, featuring detailed classification and analysis of behaviors, with a focus on behavioral categories and transitions, thereby establishing a relatively robust research framework. 

      Weaknesses: 

      Several points require clarification or further revision. 

      (1) Methods and Terminology Regarding Social Hierarchy: 

      The study uses the tube test to determine subordinate status, but the methodological description is quite brief. Please provide a more detailed account of the experimental procedure and the criteria used for determination. 

      We will add more details about how the tube test was performed in the revised manuscript.

      The dominance hierarchy is established based on pairs of mice. However, the use of terms like "group cohesion" - typically applied to larger groups - to describe dyadic interactions seems overstated. Please revise the terminology to more accurately reflect the pairwise experimental setup.

      Thanks for the comment. We agree that the term “group cohesion” can be misleading and will replace it with “social engagement”.

      (2) Criteria and Validity of Behavioral Classification: 

      The criteria for classifying mouse behaviors (e.g., passive defense, active defense) are not sufficiently clear. Please explicitly state the operational definitions and distinguishing features for each behavioral category. 

      Passive defense was defined as an immobility-based defensive strategy characterized by suppression of locomotor activity. This category included freezing and tail rattling, which in our study involved minimal body displacement aside from rapid tail vibration. Active defense was defined as movement- or posture-dependent defensive strategy, encompassing behaviors that involved locomotor engagement or spatial repositioning relative to the threat, including approach, investigation, withdrawal, and stretch-attend. We will clarify this in the revised manuscript.

      How was the meaningfulness and distinctness of these behavioral categories ensured to avoid overlap? For instance, based on Figure 3E, is "active defense" synonymous with "investigative defense," involving movement to the near region followed by return to the far region? This requires clearer delineation. 

      Defensive behaviors in the rat exposure paradigm were grouped into two categories: passive and active defense, each comprising distinct behaviors. All the manually annotated behaviors were mutually exclusive; that is, each video frame was assigned a single behavioral label to avoid overlap across behaviors. Active defense includes four behaviors: approach, investigation, withdrawal, and stretch-attend. We will clarify these points in the revised manuscript.

      The current analysis focuses on a few core behaviors, while other recorded behaviors appear less relevant. Please clarify the principles for selecting or categorizing all recorded behaviors.

      Thank you for pointing this out. In the current study, we focused primarily on defensive and social behaviors. We also included several neutral solitary behaviors related to anxiety and defensive state, such as sniffing, grooming, and rearing, which were consistently expressed across animals and closely linked to our main findings. We will clarify this rationale in the revised manuscript.

      (3) Interpretation of Key Findings and Mechanistic Insights:

      Looming exposure increased the proportion of proactive bouts in the dominant zone but decreased it in the subordinate zone (Figure 4G), with a similar trend during rat exposure. Please provide a potential explanation for this consistent pattern. Does this consistency arise from shared neural mechanisms, or do different behavioral strategies converge to produce similar outputs under both threats?

      Thanks for bringing up this important question. The consistent increase in proactive bouts in dominant mice across both paradigms suggests a consistent rank-dependent reorganization of dyadic interaction under threats. We propose that this convergence reflects a shared neural mechanism that links defensive state with social-rank information, potentially mediated by overlapping hypothalamic and prefrontal circuits. We will expand the Discussion to incorporate this explanation.

      (4) Support for Claims and Study Limitations:

      The manuscript states that this work addresses a gap by showing defensive responses are jointly shaped by threat type and social rank, emphasizing survival-critical behaviors over fear or stress alone. However, it is possible that the behavioral differences stem from varying degrees of danger perception rather than purely strategic choices. This warrants a clear description and a deeper discussion to address this possibility.

      We thank the reviewer for this insightful comment. We agree that, in principle, behavioral differences could arise from variations in perceived danger rather than strategic choice. In humans, decisions can sometimes reflect value-based strategies that override perceived danger. In contrast, under naturalistic threat conditions, mice likely rely predominantly on danger perception to make behavioral decisions, and such responses are expected to be consistent with value-based strategies shaped by natural selection. In the revised manuscript, we will expand the Discussion to address the role of threat perception and its relationship to decision-making in our behavioral paradigms.

      The Discussion section proposes numerous brain regions potentially involved in fear and social regulation. As this is a behavioral study, the extensive speculation on specific neural circuitry involvement, without supporting neuroscience data, appears insufficiently grounded and somewhat vague. It is recommended to focus the discussion more on the implications of the behavioral findings themselves or to explicitly frame these neural hypotheses as directions for future research.

      We will revise the Discussion to focus more directly on behavioral findings and add explicit neural hypotheses as potential future directions.

      Reviewer #2 (Public review):

      Summary:

      The authors investigate how dominance hierarchy shapes defensive strategies in mice under two naturalistic threats: a transient visual looming stimulus and a sustained live rat. By comparing single versus paired testing, they report that social presence attenuates fear and that dominant and subordinate mice exhibit different patterns of defensive and social behaviors depending on threat type. The work provides a rich behavioral dataset and a potentially useful framework for studying hierarchical modulation of innate fear.

      Strengths:

      (1) The study uses two ecologically meaningful threat paradigms, allowing comparison across transient and sustained threat contexts.

      (2) Behavioral quantification is detailed, with manual annotation of multiple behavior types and transition-matrix level analysis.

      (3) The comparison of dominant versus subordinate pairs is novel in the context of innate fear.

      (4) The manuscript is well-organized and clearly written.

      (5) Figures are visually informative and support major claims.

      Weaknesses:

      Lack of neural mechanism insights.

      The current study focused on behavior. In the revised manuscript, we will incorporate a discussion of potential neural mechanisms and highlight this as an important direction for future work.

      Reviewer #3 (Public review):

      Summary:

      This study examines how dominance hierarchy influences innate defensive behaviors in pair-housed male mice exposed to two types of naturalistic threats: a transient looming stimulus and a sustained live rat. The authors show that social presence reduces fear-related behaviors and promotes active defense, with dominant mice benefiting more prominently. They also demonstrate that threat exposure reinforces social roles and increases group cohesion. The work highlights the bidirectional interaction between social structure and defensive behavior.

      Strengths:

      This study makes a valuable contribution to behavioral neuroscience through its well-designed examination of socially modulated fear. A key strength is the use of two ethologically relevant threat paradigms - a transient looming stimulus and a sustained live predator, enabling a nuanced comparison of defensive behaviors. The experimental design is robust, systematically comparing animals tested alone versus with their cage mate to cleanly isolate social effects. The behavioral analysis is sophisticated, employing detailed transition maps that reveal how social context reshapes behavioral sequences, going beyond simple duration measurements. The finding that social modulation is rank-dependent adds significant depth, linking social hierarchy to adaptive defense strategies. Furthermore, the demonstration that threat exposure reciprocally enhances social cohesion provides a compelling systems-level perspective. Together, these elements establish a strong behavioral framework for future investigations into the neural circuits underlying socially modulated innate fear.

      Weaknesses:

      The study exhibits several limitations. The neural mechanism proposed is speculative, as the study provides no causal evidence.

      Establishing causal evidence for neural mechanisms is beyond the scope of the current behavioral study. We highlight this as an important direction for future work.

    1. eLife Assessment

      This valuable study tests whether prediction error or prediction uncertainty controls how the brain segments continuous experience into events. The paper uses validated models that predict human behavior to analyze multivariate neural pattern changes during naturalistic movie watching. The authors provide solid evidence that there are overlapping but partially distinct brain dynamics for each signal.

    2. Reviewer #1 (Public review):

      Summary:

      This paper investigates the control signals that drive event model updating during continuous experience. The authors apply predictions from previously published computational models to fMRI data acquired while participants watched naturalistic video stimuli. They first examine the time course of BOLD pattern changes around human-annotated event boundaries, revealing pattern changes preceding the boundary in anterior temporal and then parietal regions, followed by pattern stabilization across many regions. The authors then analyze time courses around boundaries generated by a model that updates event models based on prediction error and another that uses prediction uncertainty. These analyses reveal overlapping but partially distinct dynamics for each boundary type, suggesting that both signals may contribute to event segmentation processes in the brain.

      Strengths:

      The question addressed by this paper is of high interest to researchers working on event cognition, perception, and memory. There has been considerable debate about what kinds of signals drive event boundaries, and this paper directly engages with that debate by comparing prediction error and prediction uncertainty as candidate control signals.

      The authors use computational models that explain significant variance in human boundary judgments, and they report the variance explained clearly in the paper.

      The authors' method of using computational models to generate predictions about when event model updating should occur is a valuable mechanistic alternative to methods like HMM or GSBS, which are data-driven.

      The paper utilizes an analysis framework that characterizes how multivariate BOLD pattern dissimilarity evolves before and after boundaries. This approach offers an advance over previous work focused on just the boundary or post-boundary points.

      Weaknesses:

      Boundaries derived from prediction error and uncertainty are correlated for the naturalistic stimuli. This raises some concerns about how well their distinct contributions to brain activity can be separated. While the authors attempt to look at the unique variance, there is a limit to how effectively this can be done without experimentally dissociating prediction error and uncertainty.

      The authors reports an average event length of ~20 seconds, and they also look +20 and -20 seconds around each event boundary. Thus, it's unclear how often pre- and post-boundary timepoints are part of adjacent events. This complicates the interpretations of the reported timecourses.

    3. Reviewer #2 (Public review):

      Summary:

      Tan et al. examined how multivoxel patterns shift in time windows surrounding event boundaries caused by both prediction errors and prediction uncertainty. They observed that some regions of the brain show earlier pattern shifts than others, followed by periods of increased stability. The authors combine their recent computational model to estimate event boundaries that are based on prediction error vs. uncertainty and use this to examine the moment-to-moment dynamics of pattern changes. I believe this is a meaningful contribution that will be of interest to memory, attention, and complex cognition research.

      Strengths:

      The authors have shown exceptional transparency in terms of sharing their data, code, and stimuli which is beneficial to the field for future examinations and to the reproduction of findings. The manuscript is well written with clear figures. The study starts from a strong theoretical background to understand how the brain represents events and have used a well-curated set of stimuli. Overall, the authors extend the event segmentation theory beyond prediction error to include prediction uncertainty which is an important theoretical shift that has implications in episodic memory encoding, use of semantic and schematic knowledge and to attentional processing.

      Weaknesses:

      (1) I am not fully satisfied with the author's explanation of pattern shifts occurring 11.9s prior to event boundaries. The average length of time for an event was 21.4 seconds. The window around the identified event boundaries was 20 seconds on either side. The earliest identified pattern shift peaks occur at 11.9s prior to the actual event boundary. This would mean on average, a pattern shift is occurring approximately at the midway point of the event (11.9s prior to a boundary of a 21.4s event is approx. the middle of an event). The authors offer up an explanation in which top down regions signal an update that propagates to lower order regions closer to the boundary. To make this interpretation concrete, they added an example: "in a narrative where a goal is reached midway-for instance, a mystery solved before the story formally ends-higher-order regions may update the event representation at that point, and this updated model then cascades down to shape processing in lower-level regions". This might make sense in a one-off case of irregular storytelling, but it is odd to think this would generalize. If an event is occurring and a given collection of regions represent that event, it doesn't follow the accepted convention of multivariate representational analysis that that set of regions would undergo such a large shift in patterns in the middle of an event. The stabilization of these patterns taking so long is also odd to me. I suspect some of these findings may be due to the stimuli used in this experiment and I am not confident this would generalize and invite the authors to disagree and explain. In the case of the exercise routine video, I try to imagine going from the push-up event to the jumping jack event. The actor stops doing pushups, stands up, and moves minimally for 16 seconds (these lulls are not uncommon). At that point they start doing jumping jacks. It is immediately evident from that moment on that jumping jacks will be the kind of event you are perceiving which may explain the long delay in event pattern stabilisation. Then about 11.9s prior to the end of the event, when the person is still performing jumping jacks (at this point they have been performing jumping jacks for 6 seconds), I would expect the brain to still be expecting this " jumping jacks event". For some reason at this point multivariate patterns in higher order regions shift. I do not understand what kind of top down processing is happening here and the reviewers need to be more concrete in their explanation because as of right now it is ill-defined. I also recognize that being specific to jumping jacks is maybe unfair, but this would apply to the push-ups, granola bar eating, or table cleaning events in the same manner. I suspect one possibility is that the participants realize that the stereotyped action of jumping jacks is going to continue and, thus, mindwander to other thoughts while waiting for novel, informative information to be presented. This explanation would challenge the more active top down processing assumed by the authors.

      I had provided a set of concerns to the authors that were not part of the public review and were not addressed. I was unaware of the exact format of the eLife approach, but I think they are worth open discussion so I am adding them here for consideration. Apologies for any confusion.

      (2) Why did the authors not examine event boundary activity magnitude differences from the uncertainty vs error boundaries? I see that the authors have provided the data on the openneuro. However, it seems like the difference in activity maps would not only provide extra contextualization of the findings, but also be fairly trivial. Just by eye-balling the plots, it appears as though there may be activity differences in the mPFC occurring shortly after a boundary between the two. Given this regions role in prediction error and schema, it would be important to understand whether this difference is merely due to thresholding effects or is statistically meaningful.

      (3) Further, the authors omitted all subcortical regions some of which would be especially interesting such as the hippocampus, basal ganglia, ventral tegmental area. These regions have a rich and deep background in event boundary activity, and prediction error. Univariate effects in these regions may provide interesting effects that might contextualize some of the pattern shifts in the cortex.

      (3) I see that field maps were collected, but the fmriprep methods state that susceptibility distortion correction was not performed. Is there a reason to omit this?

      (4) How many events were present in the stimuli?

    4. Reviewer #3 (Public review):

      Summary:

      The aim of this study was to investigate the temporal progression of the neural response to event boundaries in relation to uncertainty and error. Specifically, the authors asked 1. How neural activity changes before and after event boundaries 2. If uncertainty and error both contribute to explaining the occurrence of event boundaries and 3. If uncertainty and error have unique contributions to explaining the temporal progression of neural activity.

      Strengths:

      One strength of this paper is that it builds on an already validated computational model. It relies on straightforward and interpretable analysis techniques to answer the main question, with a smart combination of pattern similarity metrics and FIR. This combination of methods may also be an inspiration to other researchers in the field working on similar questions. The paper is well written and easy to follow. The paper convincingly shows that 1. There is a temporal progression of neural activity change before and after an event boundary 2. Event boundaries are predicted best by the combination of uncertainty and error signals.

      Weaknesses:

      Regarding question 3, the results are less convincing. Although the analyses in Figure S1 show that there are some unique contributions of uncertainty and error, it is unclear to what extent the results in Figure 7 are driven by shared variance. Therefore, it is not clear to what extent the main claim in the abstract is due to shared or unique variance. More specific comments are provided below.

      The other issue is the distance between events is short compared to the pre-onset effects that are observed. Halfway the distance between two events there are already neural signatures of change relating to the upcoming event boundary. I wonder if methodological issues could explain this effect and if not, what could allow participants to notice the impending event boundary.

      Impact:

      If these comments can be addressed sufficiently, I expect that this work will impact the field in its thinking on what drives event boundaries and spur interest in understanding the mechanisms behind the temporal progression of neural activity around these boundaries.

      Comments

      (1) The correlation between uncertainly and prediction error is very high, which makes it challenging to disentangle the effects of both on the neural response. The analysis in Figure S1 shows that the two predictors indeed have dissociable contributions. However, the results mainly reported in the discussion section and abstract still rely on models where only one of these factors is included at a time. This makes it debatable whether these specific networks mentioned really reflect unique contributions of each of these components. I specifically refer to this statement in the abstract: "Error-driven boundaries were associated with early pattern shifts in ventrolateral prefrontal areas, followed by pattern stabilization in prefrontal and temporal areas. Uncertainty-driven boundaries were linked to shifts in parietal regions within the dorsal attention network, with minimal subsequent stabilization. ". I would encourage repeating all analyses (also the ones in figure 7) with a models that includes both predictors and showing both results in the manuscript, so it is clear which regions really show unique variance related to one of the predictors. I also wonder why it is necessary to look at model comparisons between the combined and unique models, rather than simply reporting the significance of each predictor in the combined model.

      (2) The distance between event boundaries ranges between 20 and 30 seconds. The early pre-boundary effect that are observed in the manuscript occur at -12 seconds. This means that these effects occur roughly halfway between the previous and current event. This seems much earlier than expected. That is why I worry that the FIR analyses might not be able to distinguish effects of the previous event from effects of the upcoming event. What evidence is there that the FIR analyses can actually properly show the return to baseline? One way to address this might be to randomize the locations of the event boundaries while preserving the distance between them and rerun the models. This will give a null-model with the same event distances and should be able to distinguish this temporal overlap from the true effects of event boundaries.

      (3) If the analyses in point 2 confirm that there is indeed an event-boundary related change that occurs 12 seconds before event onset, it is important to consider what might cause these changes. Are there cues in the movie that indicate that an event boundary is coming? It would be interesting to investigate whether uncertainty and error are higher than expected at 12 seconds pre-onset.

    5. Author response:

      The following is the authors’ response to the original reviews.

      Public Reviews:

      Reviewer #1 (Public review):

      Summary:

      This paper investigates the control signals that drive event model updating during continuous experience. The authors apply predictions from previously published computational models to fMRI data acquired while participants watched naturalistic video stimuli. They first examine the time course of BOLD pattern changes around human-annotated event boundaries, revealing pattern changes preceding the boundary in anterior temporal and then parietal regions, followed by pattern stabilization across many regions. The authors then analyze time courses around boundaries generated by a model that updates event models based on prediction error and another that uses prediction uncertainty. These analyses reveal overlapping but partially distinct dynamics for each boundary type, suggesting that both signals may contribute to event segmentation processes in the brain.

      Strengths:

      (1) The question addressed by this paper is of high interest to researchers working on event cognition, perception, and memory. There has been considerable debate about what kinds of signals drive event boundaries, and this paper directly engages with that debate by comparing prediction error and prediction uncertainty as candidate control signals.

      (2) The authors use computational models that explain significant variance in human boundary judgments, and they report the variance explained clearly in the paper.

      (3) The authors' method of using computational models to generate predictions about when event model updating should occur is a valuable mechanistic alternative to methods like HMM or GSBS, which are data-driven.

      (4) The paper utilizes an analysis framework that characterizes how multivariate BOLD pattern dissimilarity evolves before and after boundaries. This approach offers an advance over previous work focused on just the boundary or post-boundary points.

      We appreciate this reviewer’s recognition of the significance of this research problem, and of the value of the approach taken by this paper.

      Weaknesses:

      (1) While the paper raises the possibility that both prediction error and uncertainty could serve as control signals, it does not offer a strong theoretical rationale for why the brain would benefit from multiple (empirically correlated) signals. What distinct advantages do these signals provide? This may be discussed in the authors' prior modeling work, but is left too implicit in this paper.

      We added a brief discussion in the introduction highlighting the complementary advantages of prediction error and prediction uncertainty, and cited prior theoretical work that elaborates on this point. Specifically, we now note that prediction error can act as a reactive trigger, signaling when the current event model is no longer sufficient (Zacks et al., 2007). In contrast, prediction uncertainty is framed as proactive, allowing the system to prepare for upcoming changes even before they occur (Baldwin & Kosie, 2021; Kuperberg, 2021). Together, this makes clearer why these two signals could each provide complementary benefits for effective event model updating.

      "One potential signal to control event model updating is prediction error—the difference between the system’s prediction and what actually occurs. A transient increase in prediction error is a valid indicator that the current model no longer adequately captures the current activity. Event Segmentation Theory (EST; Zacks et al., 2007) proposes that event models are updated when prediction error increases beyond a threshold, indicating that the current model no longer adequately captures ongoing activity. A related but computationally distinct proposal is that prediction uncertainty (also termed "unpredictability") can serve as a control signal (Baldwin & Kosie, 2021). The advantage of relying on prediction uncertainty to detect event boundaries is that it is inherently proactive: the cognitive system can start looking for cues about what might come next before the next event starts (Baldwin & Kosie, 2021; Kuperberg, 2021). "

      (2) Boundaries derived from prediction error and uncertainty are correlated for the naturalistic stimuli. This raises some concerns about how well their distinct contributions to brain activity can be separated. The authors should consider whether they can leverage timepoints where the models make different predictions to make a stronger case for brain regions that are responsive to one vs the other.

      We addressed this concern by adding an analysis that explicitly tests the unique contributions of prediction error– and prediction uncertainty–driven boundaries to neural pattern shifts. In the revised manuscript, we describe how we fit a combined FIR model that included both boundary types as predictors and then compared this model against versions with only one predictor. This allowed us to identify the variance explained by each boundary type over and above the other. The results revealed two partially dissociable sets of brain regions sensitive to error- versus uncertainty-driven boundaries (see Figure S1), strengthening our argument that these signals make distinct contributions.

      "To account for the correlation between uncertainty-driven boundaries and error-driven boundaries, we also fitted a FIR model that predicted pattern dissimilarity from both types of boundaries (combined FIR) for each parcel. Then, we performed two likelihood ratio tests: combined FIR to error FIR, which measures the unique contribution of uncertainty boundaries to pattern dissimilarity, and combined FIR to uncertainty FIR, which measures the unique contribution of error boundaries to pattern dissimilarity. The analysis also revealed two dissociable sets of brain regions associated with each boundary type (see Figure S1)."

      (3) The authors refer to a baseline measure of pattern dissimilarity, which their dissimilarity measure of interest is relative to, but it's not clear how this baseline is computed. Since the interpretation of increases or decreases in dissimilarity depends on this reference point, more clarity is needed.

      We clarified how the FIR baseline is estimated in the methods section. Specifically, we now explain that the FIR coefficients should be interpreted relative to a reference level, which reflects the expected dissimilarity when timepoints are far from an event boundary. This makes it clear what serves as the comparison point for observed increases or decreases in dissimilarity.

      "The coefficients from the FIR model indicate changes relative to baseline, which can be conceptualized as the expected value when far from event boundaries."

      (4) The authors report an average event length of ~20 seconds, and they also look at +20 and -20 seconds around each event boundary. Thus, it's unclear how often pre- and post-boundary timepoints are part of adjacent events. This complicates the interpretations of the reported time courses.

      This is related to reviewer's 2 comment, and it will be addressed below.

      (5) The authors describe a sequence of neural pattern shifts during each type of boundary, but offer little setup of what pattern shifts we might expect or why. They also offer little discussion of what cognitive processes these shifts might reflect. The paper would benefit from a more thorough setup for the neural results and a discussion that comments on how the results inform our understanding of what these brain regions contribute to event models.

      We thank the reviewer for this advice on how better to set the context for the different potential outcomes of the study. We expanded both the introduction and discussion to better set up expectations for neural pattern shifts and to interpret what these shifts may reflect. In the introduction, we now describe prior findings showing that sensory regions tend to update more quickly than higher-order multimodal regions (Baldassano et al., 2017; Geerligs et al., 2021, 2022), and we highlight that it remains unclear whether higher-order updates precede or follow those in lower-order regions. We also note that our analytic approach is well-suited to address this open question. In the discussion, we then interpret our results in light of this framework. Specifically, we describe how we observed early shifts in higher-order areas such as anterior temporal and prefrontal cortex, followed by shifts in parietal and dorsal attention regions closer to event boundaries. This pattern runs counter to the traditional bottom-up temporal hierarchy view and instead supports a model of top-down updating, where high-level representations are updated first and subsequently influence lower-level processing (Friston, 2005; Kuperberg, 2021). To make this interpretation concrete, we added an example: in a narrative where a goal is reached midway—for instance, a mystery solved before the story formally ends—higher-order regions may update the event representation at that point, and this updated model then cascades down to shape processing in lower-level regions. Finally, we note that the widespread stabilization of neural patterns after boundaries may signal the establishment of a new event model.

      Excerpt from Introduction:

      “More recently, multivariate approaches have provided insights into neural representations during event segmentation. One prominent approach uses hidden Markov models (HMMs) to detect moments when the brain switches from one stable activity pattern to another (Baldassano et al., 2017) during movie viewing; these periods of relative stability were referred to as "neural states" to distinguish them from subjectively perceived events. Sensory regions like visual and auditory cortex showed faster transitions between neural states. Multi-modal regions like the posterior medial cortex, angular gyrus, and intraparietal sulcus showed slower neural state shifts, and these shifts aligned with subjectively reported event boundaries. Geerligs et al. (2021, 2022) employed a different analytical approach called Greedy State Boundary Search (GSBS) to identify neural state boundaries. Their findings echoed the HMM results: short-lived neural states were observed in early sensory areas (visual, auditory, and somatosensory cortex), while longer-lasting states appeared in multi-modal regions, including the angular gyrus, posterior middle/inferior temporal cortex, precuneus, anterior temporal pole, and anterior insula. Particularly prolonged states were found in higher-order regions such as lateral and medial prefrontal cortex.

      The previous evidence about evoked responses at event boundaries indicates that these are dynamic phenomena evolving over many seconds, with different brain areas showing different dynamics (Ben-Yakov & Henson, 2018; Burunat et al., 2024; Kurby & Zacks, 2018; Speer et al., 2007; Zacks, 2010). Less is known about the dynamics of pattern shifts at event boundaries (e.g. whether shifts observed in higher-order regions precedes or follow shifts observed in lower-level regions), because the HMM and GSBS analysis methods do not directly provide moment-by-moment measures of pattern shifts. Both the spatial and temporal aspects of evoked responses and pattern shifts at event boundaries have the potential to provide evidence about two potential control processes (error-driven and uncertainty-driven) for event model updating.”

      Excerpt from Discussion:

      “We first characterized the neural signatures of human event segmentation by examining both univariate activity changes and multivariate pattern changes around subjectively identified event boundaries. Using multivariate pattern dissimilarity, we observed a structured progression of neural reconfiguration surrounding human-identified event boundaries. The largest pattern shifts were observed near event boundaries (~4.5s before) in dorsal attention and parietal regions; these correspond with regions identified by Geerligs et. al as shifting their patterns on a fast to intermediate timescale (2022). We also observed smaller pattern shifts roughly 12 seconds prior to event boundaries in higher-order regions within anterior temporal cortex and prefrontal cortex, and these are slow-changing regions identified by Geerligs et. al (2022). This is puzzling. One prevalent proposal, based on the idea of a cortical hierarchy of increasing temporal receptive windows (TRWs), suggests that higher-order regions should update representations after lower-order regions do (Chang et al., 2021). In this view, areas with shorter TRWs (e.g., word-level processors) pass information upward, where it is integrated into progressively larger narrative units (phrases, sentences, events). This proposal predicts neural shifts in higher-order regions to follow those in lower-order regions. By contrast, our findings indicate the opposite sequence. Our findings suggest that the brain might engage in top-down event representation updating, with changes in coarser-grain representations propagating downward to influence finer-grain representations. (Friston, 2005; Kuperberg, 2021). For example, in a narrative where the main goal is achieved midway—such as a detective solving a mystery before the story formally ends—higher-order regions might update the overarching event representation at that point, and this updated model could then cascade down to reconfigure how lower-level regions process the remaining sensory and contextual details. In the period after a boundary (around +12 seconds), we found widespread stabilization of neural patterns across the brain, suggesting the establishment of a new event model. Future work could focus on understanding the mechanisms behind the temporal progression of neural pattern changes around event boundaries.”

      Reviewer #2 (Public review):

      Summary:

      Tan et al. examined how multivoxel patterns shift in time windows surrounding event boundaries caused by both prediction errors and prediction uncertainty. They observed that some regions of the brain show earlier pattern shifts than others, followed by periods of increased stability. The authors combine their recent computational model to estimate event boundaries that are based on prediction error vs. uncertainty and use this to examine the moment-to-moment dynamics of pattern changes. I believe this is a meaningful contribution that will be of interest to memory, attention, and complex cognition research.

      Strengths:

      The authors have shown exceptional transparency in terms of sharing their data, code, and stimuli, which is beneficial to the field for future examinations and to the reproduction of findings. The manuscript is well written with clear figures. The study starts from a strong theoretical background to understand how the brain represents events and has used a well-curated set of stimuli. Overall, the authors extend the event segmentation theory beyond prediction error to include prediction uncertainty, which is an important theoretical shift that has implications in episodic memory encoding, the use of semantic and schematic knowledge, and attentional processing.

      We thank the reader for their support for our use of open science practices, and for their appreciation of the importance of incorporating prediction uncertainty into models of event comprehension.

      Weaknesses:

      The data presented is limited to the cortex, and subcortical contributions would be interesting to explore. Further, the temporal window around event boundaries of 20 seconds is approximately the length of the average event (21.4 seconds), and many of the observed pattern effects occur relatively distal from event boundaries themselves, which makes the link to the theoretical background challenging. Finally, while multivariate pattern shifts were examined at event boundaries related to either prediction error or prediction uncertainty, there was no exploration of univariate activity differences between these two different types of boundaries, which would be valuable.

      The fact that we observed neural pattern shifts well before boundaries was indeed unexpected, and we now offer a more extensive interpretation in the discussion section. Specifically, we added text noting that shifts emerged in higher-order anterior temporal and prefrontal regions roughly 12 seconds before boundaries, whereas shifts occurred in lower-level dorsal attention and parietal regions closer to boundaries. This sequence contrasts with the traditional bottom-up temporal hierarchy view and instead suggests a possible top-down updating mechanism, in which higher-order representations reorganize first and propagate changes to lower-level areas (Friston, 2005; Kuperberg, 2021). (See excerpt for Reviewer 1’s comment #5.)

      With respect to univariate activity, we did not find strong differences between error-driven and uncertainty-driven boundaries. This makes the multivariate analyses particularly informative for detecting differences in neural pattern dynamics. To support further exploration, we have also shared the temporal progression of univariate BOLD responses on OpenNeuro (BOLD_coefficients_brain_animation_pe_SEM_bold.html and BOLD_coefficients_brain_animation_uncertainty_SEM_bold.html in the derivatives/figures/brain_maps_and_timecourses/ directory; https://doi.org/10.18112/openneuro.ds005551.v1.0.4) for interested researchers.

      Reviewer #3 (Public review):

      Summary:

      The aim of this study was to investigate the temporal progression of the neural response to event boundaries in relation to uncertainty and error. Specifically, the authors asked (1) how neural activity changes before and after event boundaries, (2) if uncertainty and error both contribute to explaining the occurrence of event boundaries, and (3) if uncertainty and error have unique contributions to explaining the temporal progression of neural activity.

      Strengths:

      One strength of this paper is that it builds on an already validated computational model. It relies on straightforward and interpretable analysis techniques to answer the main question, with a smart combination of pattern similarity metrics and FIR. This combination of methods may also be an inspiration to other researchers in the field working on similar questions. The paper is well written and easy to follow. The paper convincingly shows that (1) there is a temporal progression of neural activity change before and after an event boundary, and (2) event boundaries are predicted best by the combination of uncertainty and error signals.

      We thank the reviewer for their thoughtful and supportive comments, particularly regarding the use of the computational model and the analysis approaches.

      Weaknesses:

      (1) The current analysis of the neural data does not convincingly show that uncertainty and prediction error both contribute to the neural responses. As both terms are modelled in separate FIR models, it may be that the responses we see for both are mostly driven by shared variance. Given that the correlation between the two is very high (r=0.49), this seems likely. The strong overlap in the neural responses elicited by both, as shown in Figure 6, also suggests that what we see may mainly be shared variance. To improve the interpretability of these effects, I think it is essential to know whether uncertainty and error explain similar or unique parts of the variance. The observation that they have distinct temporal profiles is suggestive of some dissociation,but not as convincing as adding them both to a single model.

      We appreciate this point. It is closely related to Reviewer 1's comment 2; please refer to our response above.

      (2) The results for uncertainty and error show that uncertainty has strong effects before or at boundary onset, while error is related to more stabilization after boundary onset. This makes me wonder about the temporal contribution of each of these. Could it be the case that increases in uncertainty are early indicators of a boundary, and errors tend to occur later?

      We also share the intuition that increases in uncertainty are early indicators of a boundary, and errors tend to occur later. If that is the case, we would expect some lags between prediction uncertainty and prediction error. We examined lagged correlation between prediction uncertainty and prediction error, and the optimal lag is 0 for both uncertainty-driven and error-driven models. This indicates that when prediction uncertainty rises, prediction error also simultaneously rises.

      Author response image 1.

      (3) Given that there is a 24-second period during which the neural responses are shaped by event boundaries, it would be important to know more about the average distance between boundaries and the variability of this distance. This will help establish whether the FIR model can properly capture a return to baseline.

      We have added details about the distribution of event lengths. Specifically, we now report that the mean length of subjectively identified events was 21.4 seconds (median 22.2 s, SD 16.1 s). For model-derived boundaries, the average event lengths were 28.96 seconds for the uncertainty-driven model and 24.7 seconds for the error-driven model.

      " For each activity, a separate group of 30 participants had previously segmented each movie to identify fine-grained event boundaries (Bezdek et al., 2022). The mean event length was 21.4 s (median 22.2 s, SD 16.1 s). Mean event lengths for uncertainty-driven model and error-driven model were 28.96s, and 24.7s, respectively (Nguyen et al., 2024)."

      (4) Given that there is an early onset and long-lasting response of the brain to these event boundaries, I wonder what causes this. Is it the case that uncertainty or errors already increase at 12 seconds before the boundaries occur? Or if there are other makers in the movie that the brain can use to foreshadow an event boundary? And if uncertainty or errors do increase already 12 seconds before an event boundary, do you see a similar neural response at moments with similar levels of error or uncertainty, which are not followed by a boundary? This would reveal whether the neural activity patterns are specific to event boundaries or whether these are general markers of error and uncertainty.

      We appreciate this point; it is similar to reviewer 2’s comment 2. Please see our response to that comment above.

      (5) It is known that different brain regions have different delays of their BOLD response. Could these delays contribute to the propagation of the neural activity across different brain areas in this study?

      Our analyses use ±20 s FIR windows, and the key effects we report include shifts ~12s before boundaries in higher-order cortex and ~4.5s pre-boundary in dorsal attention/parietal areas. Given the literature above, region-dependent BOLD delays are much smaller (~1–2s) than the temporal structure we observe (Taylor et al., 2018), making it unlikely that HRF lag alone explains our multi-second, region-specific progression.

      (6) In the FIR plots, timepoints -12, 0, and 12 are shown. These long intervals preclude an understanding of the full temporal progression of these effects.

      For page length purposes, we did not include all timepoints. We uploaded a brain animation of all timepoints and coefficients for each parcel in Openneuro (PATTERN_coefficients_brain_animation_human_fine_pattern.html and PATTERN_coefficients_lines_human_fine.html in the derivatives/figures/brain_maps_and_timecourses/ directory; https://doi.org/10.18112/openneuro.ds005551.v1.0.4) for interested researchers.

      References

      Taylor, A. J., Kim, J. H., & Ress, D. (2018). Characterization of the hemodynamic response function across the majority of human cerebral cortex. NeuroImage, 173, 322–331. https://doi.org/10.1016/j.neuroimage.2018.02.061

    1. SpaceX 'bought' xAI for 250 billion USD. xAI previously 'bought' Twitter in March 2025. SpaceX is expected to go public this or next year. Iow, Musk is combining everything to a) inflate overall value b) externalise all risks to investors c) get his biggest payday yet

      Grok will be live tweeting nudified astro-pics from every launch and starlink satellite burning up in the atmosphere

    1. De Duitse investering zorgt ervoor dat Tennet niet langer zelf het merendeel van de aandelen heeft van de Duitse activiteiten. De Nederlandse pensioenuitvoerder APG, een Noors staatsoliefonds en een Singaporees staatsinvesteringsfonds bezitten samen ongeveer 46 procent."TenneT Holding zal minimaal 28,9 procent van de aandelen in TenneT Duitsland behouden", schrijft het bedrijf. "Hierdoor beschikt TenneT Holding over volledige betrokkenheid bij belangrijke besluiten."

      The shares of Tennet Germany are: Tennet Holding 28,9% German state: 25% APG (Dutch pensionfund), Norwegian state oil fund, Singapore state investment fund (huh?), together the remaining 46%. This seems to leave TenneT a minority but still largest shareholder.

    1. eLife Assessment

      This study presents valuable analyses of single neuron activity in the subthalamic nucleus (STN) of monkeys performing a decision-making task that manipulates both perceptual evidence and reward. In particular, the study shows convincing evidence of multiple decision variables being represented in the STN. However, the evidence for sub-populations in STN with distinct involvements in decision-making is incomplete at this stage and requires either further efforts to provide stronger support or refinement of that conclusion.

    2. Reviewer #1 (Public review):

      Summary:

      This manuscript offers a careful and technically impressive dissection of how subpopulations within the subthalamic nucleus support reward‑biased decision‑making. The authors recorded from STN neurons in monkeys performing an asymmetric‑reward version of a visual motion discrimination task and combined single‑unit analyses, regression modeling, and drift‑diffusion framework fitting to reveal functionally distinct clusters of neurons. Each subpopulation demonstrated unique relationships to decision variables - such as the evidence‑accumulation rate, decision bound, and non‑decision processes - as well as to post‑decision evaluative signals like choice accuracy and reward expectation. Together, these findings expand our understanding of the computational diversity of STN activity during complex, multi‑attribute choices.

      Strengths:

      (1) The use of an asymmetric‑reward paradigm enables a clean separation between perceptual and reward influences, making it possible to identify how STN neurons blend these different sources of information.

      (2) The dataset is extensive and well‑controlled, with careful alignment between behavioral and neural analyses.

      (3) Relating neuronal cluster activity to drift‑diffusion model parameters provides an interpretable computational link between neural population signals and observed behavior.

      (4) The clustering analyses, validated across multiple parameters and distance metrics, reveal robust functional subgroups within STN. The differentiation of clusters with respect to both evidence and reward coding is an important advance over treating the STN as a unitary structure.

      (5) By linking neural activity to predicted choice accuracy and reward expectation, the study extends the discussion of the STN beyond decision formation to include outcome monitoring and post‑decision evaluation.

      Weaknesses:

      (1) The inferred relationships between neural clusters and specific drift‑diffusion parameters (e.g., bound height, scaling factor, non‑decision time) are intriguing but inherently correlational. The authors should clarify that these associations do not necessarily establish distinct computational mechanisms.

      (2) While the k‑means approach is well described, it remains somewhat heuristic. Including additional cross‑validation (e.g., cluster reproducibility across monkeys or sessions) would strengthen confidence in the four‑cluster interpretation.

      (3) The functional dissociations across clusters are clearly described, but how these subgroups interact within the STN or through downstream basal‑ganglia circuits remains speculative.

      (4) A natural next step would be to construct a generative multi‑cluster model of STN activity, in which each cluster is treated as a computational node (e.g., evidence integrator, bound controller, urgency or evaluative signal).

      (5) Such a low‑dimensional, coupled model could reproduce the observed diversity of firing patterns and predict how interactions among clusters shape decision variables and behavior.

      (6) Population‑level modeling of this kind would move the interpretation beyond correlational mapping and serve as an intermediate framework between single‑unit analysis and in‑vivo perturbation.

      (7) Causal inference gap - Without perturbation data, it is difficult to determine whether the identified neural modulations are necessary or sufficient for the observed behavioral effects. A brief discussion of this limitation - and how future causal manipulations could test these cluster functions - would be valuable.

    3. Reviewer #2 (Public review):

      This study uses monkey single-unit recordings to examine the role of the STN in combining noisy sensory information with reward bias during decision-making between saccade directions. Using multiple linear regressions and k-means clustering approaches, the authors overall show that a highly heterogeneous activity in the STN reflects almost all aspects of the task, including choice direction, stimulus coherence, reward context and expectation, choice evaluation, and their interactions. The authors report in particular how, here too, in a very heterogeneous way, four classes of neurons map to different decision processes evaluated via the fitting of a drift-diffusion model. Overall, the study provides evidence for functionally diverse populations of STN neurons, supporting multiple roles in perceptual and reward-based decision-making.

      This study follows up on work conducted in previous years by the same team and complements it. Extracellular recordings in monkeys trained to perform a complex decision-making task remain a remarkable achievement, particularly in brain structures that are difficult to target, such as the subthalamic nucleus. The authors conducted numerous rigorous and systematic analyses of STN activities, using sophisticated statistical approaches and functional computational modeling.

      One criticism I would make is that the authors sometimes seem to assume that readers are familiar with their previous work. Indeed, the motivation and choices behind some analyses are not clearly explained. It might be interesting to provide a little more context and insight into these methodological choices. The same is true for the description of certain results, such as the behavioral results, which I find insufficiently detailed, especially since the two animals do not perform exactly the same way in the task.

      Another criticism is the difficulty in following and absorbing all the presented results, given their heterogeneity. This heterogeneity stems from analytical choices that include defining multiple time windows over which activities are studied, multiple task-related or monkey behavioral factors that can influence them, multiple parameters underlying the decision-making phenomena to be captured, and all this without any a priori hypotheses. The overall impression is of an exploratory description that is sometimes difficult to digest, from which it is hard to extract precise information beyond the very general message that multiple subpopulations of neurons exist and therefore that the STN is probably involved in multiple roles during decision-making.

      It would also have been interesting to have information regarding the location of the different identified subpopulations of neurons in the STN and their level of segregation within this nucleus. Indeed, since the STN is one of the preferred targets of electrical stimulation aimed at improving the condition of patients suffering from various neurological disorders, it would be interesting to know whether a particular stimulation location could preferentially affect a specific subpopulation of neurons, with the associated specific behavioral consequences.

      Therefore, this paper is interesting because it complements other work from the same team and other studies that demonstrate the likely important role of the STN in decision-making. This will be of interest to the decision-making neuroscience community, but it may leave a sense of incompleteness due to the difficulty in connecting the conclusions of these different studies. For example, in the discussion section, the authors attempt to relate the different neuronal populations identified in their study and describe some relatively consistent results, but others less so.

    4. Reviewer #3 (Public review):

      Summary:

      In this study, the authors investigate single neuron activity in the subthalamic nucleus (STN) of two monkeys performing a perceptual decision-making task in which both perceptual evidence and reward were manipulated. They find rich representations of decision variables (such as choice, perceptual evidence and reward) in neural activity, and following prior work, cluster a subset of these neurons into subpopulations with varying activity profiles. Further, they relate the activity of neurons within these clusters to parameters of drift diffusion models (DDMs) fit to animal behaviour on trial subsets by neural firing rates, finding heterogeneous and temporally varying relationships between different clusters and DDM parameters, suggesting that STN neurons may play multiple roles in decision formation and evaluation.

      Strengths:

      The behavioural task used by the authors is rich and affords disambiguation between decision variables such as perceptual evidence, value and choice, by independently manipulating stimulus strength and reward size. Both their monkeys show good performance on the task, and their population of ~150 neurons across monkeys reveals a rich repertoire of decision-related activity in single neurons, with individual neurons showing strong tuning to choice, stimulus strength and reward bias. There is little doubt that neurons in the STN are tuned to several decision variables and show heterogeneous tuning profiles.

      Weaknesses:

      The primary weakness of the paper lies in the claim that STN contains multiple sub-populations with distinct involvements in decision making, which is inadequately supported by the paper's methods and analyses.

      First, while it is clear that the ~150 recorded neurons across 2 monkeys (91, 59 respectively) display substantial heterogeneity in their activity profiles across time and across stimulus/reward conditions, the claim of sub-populations largely rests on clustering a *subset of less than half the population - 66 neurons (48, 15 respectively) - chosen manually by visual inspection*. The full population seems to contain far more decision-modulated neurons, whose response profiles seem to interpolate between clusters. Moreover, it is unclear if the 4 clusters hold for each of the 2 monkeys, and the choice of 4-5 clusters does not seem well supported by metrics such as silhouette score, etc, that peak at 3 (1 or 2 were not attempted). From the data, it is easier to draw the conclusion that the STN population contains neurons with heterogeneous response profiles that smoothly vary in their tuning to different decision variables, rather than distinct sub-populations.

      Second, assuming the existence of sub-populations, it is unclear how their time- and condition-varying relationship with DDM parameters is to be interpreted. These relationships are inferred by splitting trials based on individual neurons' firing rates in different task epochs and reward contexts, and regressing onto the parameters of separate DDMs fit to those subsets of trials. The result is that different sub-populations show heterogeneous relationships to different DDM parameters over time - a result that, while interesting, leaves the computational involvement of these sub-populations/implementation of the decision process unclear.

      Outlook:

      This is a paper with a rich dataset of neural activity in the STN in a rich perceptual decision-making task, and convincing evidence of heterogeneity in choice, value and evidence tuning across the STN, suggesting the STN may be involved in several aspects of decision-making. However, the authors' specific claims about sub-populations in the STN, each having distinct relationships to decision processes, are not adequately supported by their analyses.

    1. eLife Assessment

      This work represents a valuable finding of how single-trial functional connectivity may be used to infer different cognitive states involved in speech perception and production. Although the data and analyses are overall convincing, the theoretical advance and novelty of the finding are less clear. With a clearer idea of the functional significance of the connectivity data, the paper would be of interest to those interested in brain networks and communication.

    2. Reviewer #1 (Public review):

      In this study, the authors took advantage of a powerful method (iEEG) in a large participant cohort (N=42) to demonstrate specific functional connectivity signatures associated with speech. The results highlight the complementary utility of functional connectivity analysis to the more traditional iEEG approaches of characterizing local neural activity.

      Strengths:

      This is an interesting study on the important topic of cortical mechanisms of speech perception and production in humans. The authors provide strong evidence for specific functional connectivity signatures of speech-related cortical activity.

      Weaknesses:

      A potential issue of the work is the interpretation of the five studied experimental conditions as representing distinct cognitive states, where "task conditions" or "behavioral states" would have been more appropriate.

    3. Reviewer #2 (Public review):

      Summary:

      This study, conducted by Esmaeili and colleagues, investigates the functional connectivity signatures of different auditory, visual, and motor states in 42 ECoG patients. Patients performed three tasks: picture naming, visual word reading, and auditory word repetition. They use an SVM classifier on correlation patterns across electrodes during these tasks, separating speech production from sensory perception, and incorporating baseline silence as another state. They find that it is possible to classify five states (auditory perception, picture viewing, word reading, speech production, and baseline) based on their connectivity patterns alone. Furthermore, they find a sparser set of "discriminative connections" for each state that can be used to predict each of these states. They then relate these connectivity matrices to high-gamma evoked data, and show largely overlapping relationships between the discriminative connections and the active high-gamma electrodes. However, there are still some connectivity nodes that are important in discriminating states, but that do not show high evoked activity, and vice versa. Overall, the study has a large number of patients, and the ability to decode cognitive state is compelling. The main weaknesses of the work are in placing the findings into a wider context for what additional information the connectivity analysis provides about brain processing of speech, since, as it stands, the analysis mostly reidentifies areas already known to be important for speaking, listening, naming, and visual processing.

      Strengths:

      (1) The authors were able to assess their connectivity analysis on a large cohort of patients with wide coverage across speech and language areas.

      (2) The use of controlled tasks for picture naming, visual word reading, and auditory word repetition allows for parcellating specific components of stimulus perception and speech production.

      (3) The authors chose not to restrict their connectivity analysis to previously identified high amplitude responses, which allowed them to find regions that are discriminative between different states in their speech tasks, but not necessarily highly active.

      Weaknesses:

      (1) Although the work identifies some clear connectivity between brain areas during speech perception and production, it is not clear whether this approach allows us to learn anything new about brain systems for speech. The areas that are identified have been shown in other studies and are largely unsurprising - the auditory cortex is involved in hearing words, picture naming involves frontal and visual cortical interactions, and overt movements include the speech motor cortex. The temporal pole is a new area that shows up, but (see below) it is important to show that this region is not affected by artifacts. Overall, it would help if the authors could expand upon the novelty of their approach.

      (2) Because the connectivity is derived from single trials, it is possible that some of the sparse connectivity seen in noncanonical areas is due to a common artifact across channels. The authors do employ a common average reference, which should help to reduce common-mode noise across all channels, but not smaller subsets. Could the authors include more information to show that this is not the case in their dataset? For example, the temporal pole electrodes show strong functional connectivity, but these areas can tend to include more EMG artifact or ocular artifact. Showing single-trial traces for some of these example pairs of electrodes and their FC measures could help in interpreting how robust the findings are.

      (3) The connectivity matrices are defined by taking the correlation between all pairs of electrodes across 500-ms epochs for each cognitive state, presumably for electrodes that are time-aligned. However, it is likely that different areas will interact with different time delays - for example, activity in one area may lead to activity in another. It might be helpful to include some time lags between different brain areas if the authors are interested in dynamics between areas that are not simultaneous.

      (4) In Figure 3, the baseline is most commonly confused with other categories (most notably, speech production, 22% of the time). Is there any intuition for why this might be? Could some of this confusion be due to task-irrelevant speech occurring during the baseline / have the authors verified that all pre-stimulus time periods were indeed silent?

      (5) How similar are discriminative connections across participants? Do they tend to reflect the same sparse anatomical connections? It is not clear how similar the results are across participants.

      (6) The results in Figure 5F are interesting and show that frontal electrodes are often highly functionally connected, but have low evoked activity. What do the authors believe this might reflect? What are these low-evoked activity electrodes potentially doing? Some (even speculative) mention might be helpful.

      (7) One comparison that seems to be missing, if the authors would like to claim the utility of functional connectivity over evoked measures, is to directly compare a classifier based on the high gamma activity patterns alone, rather than the pairwise connectivity. Does the FC metric outperform simply using evoked activity?

    4. Reviewer #3 (Public review):

      I read this manuscript with great interest. The purpose of this paper is to use human intracranial recordings in patients undergoing routine epilepsy surgery evaluation to investigate speech production and perception during five specific and controlled tasks (auditory perception, picture perception, reading perception, speech production, and baseline). Linear classifiers were used to decode specific states with a mean accuracy of 64.4%. The interpretation of these findings is that the classifiers reveal distinct network signatures "underlying auditory and visual perception as well as speech production." Perhaps the most interesting finding is that the network signatures, including both regions with robust local neuronal activity and those without. Further, this study addresses an important gap by examining functional connectivity during overt speech production.

      The abbreviation ECoG is used throughout the manuscript, and the methods state that grids and strips were placed, though many epilepsy centers now employ intracerebral recordings. Does this manuscript only include patients with surface electrodes? Or are depth electrodes also included? The rendering maps show only the cortical surface, but depth recordings could be very interesting, given that this is a connectivity analysis.

      Also interesting, given both the picture and reading task, is whether there is coverage of the occipitotemporal sulcus?

      A major strength of the chosen paradigm is the combination of both perception (auditory or visual) and production (speech). Have the authors considered oculomotor EMG artifacts that can be associated with the change in visual stimuli during the task (see Abel et al. for an example PMID: 27075536, but see also PMID: 19234780 and PMID: 20696256).

      I'm very interested in the findings in Figure 4D, with regard to the temporal pole. I would recommend that the authors unpack what it means that the ratio of electrodes with the strongest connections is highest, but active and discriminative is perhaps the lowest. We (I think many groups!) are interested in this region as a multimodal hub that provides feedback in various contexts (like auditory or visual perception).

      Given the varieties of tasks and the fact that electrodes are always placed based on clinical necessity, are there concerns about electrode sampling bias?

      This manuscript makes an important contribution by demonstrating that functional connectivity analysis reveals task-specific network signatures beyond what is captured by local neuronal activity measures (LFP). The finding that low-activity regions are engaged in task-specific classifications has important implications for future human LFP connectivity work.

    1. Yet you, the murderer, look as bright, as clear, 1074  As yonder Venus in her glimmering sphere.

      This simile stood out to me. Once again, the characters in this story are comparing a woman to something in space. First is was through the use of moons and now it is through the use of Venus. Not sure the significance of it?

    1. while DNA as a storage medium has fundamental differences from traditional storage, many of the data transformations and error processing considerations for DNA data storage have analogies to transmitting data through “traditional” network/storage electrical channels pos quote 5

    2. Synthesis DNA synthesis has historically been implemented with large machines, using hoses, valves, and plastic containers known in the life sciences as well plates. Hoses and valves will not disappear; however, advances in the semiconductor industry have enabled silicon technology-based implementations that miniaturize the synthesis device and can achieve higher write throughput by synthesizing more sequences in parallel (thousands in well plates versus billions on chips). For example, chips akin to static RAM arrays have been used to synthesize sequences of DNA, one sequence per array position8 (Figure 6)

      pos quote 3

    1. One of the things you can do as an individual to better protect yourself against hacking is to enable 2-factor authentication on your accounts.

      I was talking about this exact topic earlier with a professor in HCDE casually during my DRG. What happens when a phone is stolen and someone can no longer get into their account? In the case we were talking about, a UW student had their phone stolen and was then locked out of accessing essentially anything connected to the UW Net ID. They tried going to IT (could not contact them since they could not log into their UW Email), and not much could be done at the time. While this does help a lot, it could be slightly dangerous since someone with your device could potentially then get access to major information commonly stored on a device (ex. banking information).

    2. But while that is the proper security for storing passwords. So for example, Facebook stored millions of Instagram passwords in plain text, meaning the passwords weren’t encrypted and anyone with access to the database could simply read everyone’s passwords. And Adobe encrypted their passwords improperly and then hackers leaked their password database of 153 million users.

      I have heard multiple cases/instances of this happening but never heard of any follow up about this, at least in the cases of social media. Were people's accounts then hacked? What came from this? I'm aware it's bad to generalize based on your own experiences, but I was only ever hacked once on instagram (my account started posting scam advertisements and changed my profile picture), but I just changed my password and the problem went away. Was it a similar case for different users? Did anything serious come from these cases?

    3. While we have our concerns about the privacy of our information, we often share it with social media platforms under the understanding that they will hold that information securely. But social media companies often fail at keeping our information secure.

      What feels most concerning in these examples is that users don’t really have a way to verify whether companies are following proper security practices. We’re asked to trust platforms with highly sensitive information, but when breaches happen, the consequences mostly fall on users rather than the companies. This creates a serious imbalance in responsibility and risk.

    1. Datasets can be poisoned unintentionally. For example, many scientists posted online surveys that people can get paid to take. Getting useful results depended on a wide range of people taking them. But when one TikToker’s video about taking them went viral, the surveys got filled out with mostly one narrow demographic, preventing many of the datasets from being used as intended.

      This example shows how datasets can be unintentionally poisoned by social dynamics rather than malicious intent. When a single TikTok video goes viral, it can dramatically change who participates in a survey, skewing the data toward one narrow demographic. Even though the data may look large and complete, it no longer represents the population the researchers originally intended to study. This highlights how data collection is shaped by platforms and visibility, and why researchers must think carefully about how and where their data is gathered.

    1. It turns out that if you look at a lot of data, it is easy to discover spurious correlations where two things look like they are related, but actually aren’t. Instead, the appearance of being related may be due to chance or some other cause. For example:

      When working with large data sets, it becomes clear how easy it is to find patterns that are misleading. Two variables may appear to move together, but this relationship can be caused by chance or by other hidden factors. Psychology has a similar idea captured by the phrase “correlation does not imply causation.” This reminds me that seeing a pattern in data is not the same as understanding why it exists, and that conclusions should be made carefully rather than based on surface-level relationships.

    2. 8.3.1. Spurious Correlations# One thing to note in the above case of candle reviews and COVID is that just because something appears to be correlated, doesn’t mean that it is connected in the way it looks like. In the above, the correlation might be due mostly to people buying and reviewing candles in the fall, and diseases, like COVID, spreading most during the fall. It turns out that if you look at a lot of data, it is easy to discover spurious correlations where two things look like they are related, but actually aren’t. Instead, the appearance of being related may be due to chance or some other cause. For example:

      I think this is a good reminder that just because two things look related in data doesn’t mean one causes the other. The candle review and COVID example is kind of funny, because it makes sense once you realize both just happen more in the fall. When there’s a lot of data, it feels easy to find patterns that aren’t actually meaningful. This part made me think we should slow down and question what the data is really showing.

    1. Такс идея связнная с сортировкой не сработает. Так как необходимо вернуть массив в том же порядке, а сортировка этот порядок уничтожает.

      тогда что я могу сделать не меняя порядок и при этом проверить? сделать просто O(N^2), брав каждый элемент, и ходить по всему массиву для подсчтёта? звучит долго.

      может быть использовать ведро - в целом звучит как рабочий способ ограничеие в 500 элементов, таким образом всё получиться и будет работать.

      порядок нарушен не будет, так как мы просто будет менять изначальный массив. и его же использовать для адрессации.

      nums[i] = bucket[i], где в bucket количество цифр меньше.

      как будто это самое оптимальное решение и сейчас я других не вижу

    1. We might want to avoid the consequences of something we’ve done (whether ethically good or bad), so we keep the action or our identity private

      The idea of context collapse really stood out to me here. Even when we don’t feel like we’re hiding anything unethical, we still expect different parts of our lives to stay in different social contexts. Social media often removes that boundary, which can make normal behavior feel risky or embarrassing once it’s exposed to a wider audience.

    1. repository open issue .md .pdf Data From the Reddit API 8.2. Data From the Reddit API# When we’ve been accessing Reddit through Python and the “PRAW” code library. The praw code library works by sending requests across the internet to Reddit, using what is called an “application programming interface” or API for short. APIs have a set of rules for what requests you can make, what happens when you make the request, and what information you can get back. If you are interested in learning more about what you can do with praw and what information you can get back, you can look at the official documentation for those. But be warned they are not organized in a friendly way for newcomers and take some getting used to to figure out what these documentation pages are talking about. So, if you are interested, you can look at the praw library documentation to find out what the library can do (again, not organized in a beginner-friendly way). You can learn a little more by clicking on the praw models and finding a list of the types of data for each of the models, and a list of functions (i.e., actions) you can do with them. You can also look up information on the data that you can get from the Reddit API by looking at the Reddit API Documentation. The Reddit API lets you access just some of the data that Reddit tracks, but Reddit and other social media platforms track much more than they let you have access to.

      This section helped me better understand what the Reddit API actually is and how PRAW works behind the scenes. I didn’t really think about the fact that it’s just sending requests to Reddit and getting specific data back based on rules. The warning about the documentation being hard to read feels very accurate, because most official docs are kind of confusing for beginners. It was also interesting to realize that Reddit collects way more data than what the API lets us see.

    1. One critic has said that the idea that “the West has some unique historical advantage, some special quality of race or culture or environment or mind or spirit, which gave this human community a permanent superiority over all other communities”

      Eurocentrism is such an easy answer to such an interesting question. Looking past the blatant racism it takes a really interesting question. Like how did Europe advance so fast while the rest of the world lagged behind and turns it into something boring. It is our place as historians depict historians to dig as far into history and events and seeing every aspect of the past.

    2. To that extent, history would end

      The Idea that any aspect of history could end is so strange. Surly it was just wishful thinking for the future not an actual idea. Even if what he said would happen did happen every thing is so different that there would still be history to record.

    3. while much of Asia was in internal decline, European social theorists came to view the West as dynamic, forward looking, progressive, and free, and Asia as stagnating, backward, and despotic.

      How do we as historians depict history without being bias. Especially when the places we are looking at defiantly where not as advanced as other locations?

    4. why Europeans were perceived as exceptional

      This begs the question on why this is perceived this way, instead of concluding that Europe is perceived as exceptional and moving on. This dives deeper into something in history and asks the question of “why?” in order to investigate this mark in history.

    5. accident

      Accidents do happen within history, like something happening not on purpose, but truly history does not have many accidents. Everything has causes that go into every event. But even with a true 100% accident, there are many causes that come from it. Nothing can truly happen within history without flowers of reactions that bloomed from action of the event.

    6. can be found in other parts of the world

      More than just the surrounding area is affected by historical events. Everything has its effect and it has its consequences, which expand more than just the local area.

    7. Ecology mattered.

      This shows the environmental conditions play a larger role than we realize. More than just the “large” events or famous leaders play roles in historical events.

    1. The earth passes through this focusing cone at the end of November every year.

      What happens when the earth passes through this focusing cone? Lyman-alpha emissions? Is that what this is?

    1. ibraries and archivesreally have to keep our roles whole and moving forward because we have a verydifferent point of view than the commercial guys. Wil

      This idea directly connects to Besser’s argument that digital libraries should preserve traditional library values like access, ethics, and service, rather than becoming commercially driven platforms.

    2. ickly. The current digi

      How can we realistically preserve digital materials long-term if it requires constant attention, money, and people to keep updating them?

    3. o preservation means "make copies."

      Kahle is basically saying that the safest way to preserve digital material is to make multiple copies and share them, instead of trusting just one archive to protect everything.

    4. nclusion, I argue for univeris within our grasp financially. It'sour gr

      Kahle’s main argument is that universal access to knowledge is not just an ideal, it’s something we already have the tools, money, and systems to achieve if we choose to act on it.

    1. Whitney’s cotton-gin.[1] [2] A machine of this description was really the invention of a young colored man in Kentucky. [Mrs. Stowe’s note.]

      In this footnote, Stowe sets the historical record straight by acknowledging the true inventor of the cotton gin, a technology that increased the demand for slave labor. In doing so, she also makes a subtle but powerful commentary on the way that American history has ignored the achievements of African American slaves. Furthermore, this footnote challenges the reader to think critically about the way that slavery was used to both oppress and exploit African American ingenuity.

    2. “Sell him! No, you foolish girl! You know your master never deals with those southern traders, and never means to sell any of his servants, as long as they behave well.

      This piece of text shows how slave owners try to present themselves as in control of their slaves' lives while simultaneously giving them a sense of security. The emphasis is placed on obedience as a means of staying in one's place and being reminded that one's safety is not entirely in their own hands. This shows how fragile life as a slave really is and that no matter what you do, you are not entirely safe.

    3. “You mean honest, as niggers go,” said Haley, helping himself to a glass of brandy.

      This sentence reveals the racial prejudice that influences the evaluation of the goodness of the slaves. Haley’s comment means he believes that honesty among Black people is an unusual occurrence. Stowe uses this remark to comment on the prevalence of discrimination in society.

    1. So preservation means "make copies."

      Kahle is basically saying that the safest way to preserve digital material is to make multiple copies and share them, instead of trusting just one archive to protect everything.

    2. nclusion, I argue for univeris within our grasp financially. It'sour gra

      Kahle’s main argument is that universal access to knowledge is not just an ideal, it’s something we already have the tools, money, and systems to achieve if we choose to act on it.

    1. These six well-funded projects helped set in motion the popular definition of a "digital library." These projects were computer science experiments, primarily in the areas of architecture and information retrieval.

      Early digital libraries were primarily defined by technological experiments rather than by actual library needs. They prioritized system development over user support, research usability, and protecting information over time.

    2. But it would be a mistake to see digital libraries as primarily providing ways to access material more quickly or more easily, without having to visit a repository across the country.

      Besser argues that digital libraries are about new possibilities, not just things like speed or convenience.

    3. Libraries (either digital or brick-and-mortar) have both services and ethical traditions that are a critical part of the functions they serve.

      This highlights that libraries are defined not only by what they contain, but by how they serve users and uphold values like privacy and fairness.

    4. Digital libraries will be critical to future humanities scholarship. Not only will they provide access to a host of source materials that humanists need in order to do their work, but these libraries will also enable new forms of research that were difficult or impossible to undertake before.

      The author emphasizes that digital libraries aren’t just about easy access, they change how research can be done. It’s a shift from visiting a library to interacting with the material in new computational ways.

    1. This section on watershed has introduced the most basic features of an exceedingly complex type of natural system -- the physical template, and watershed structure and function. In closing, examine the graphic of watershed dynamics below and think particularly about all the interactions occurring even in this simplified example. It is truly important to appreciate the natural processes at work, and how they are beneficial to our communities as well as our ecosystems. Even more, it is crucial to recognize how change affects watersheds and can jeopardize these benefits in very costly ways, when a normal change becomes great enough to be a change of concern.

      Watersheds are natural systems that move water, nutrients, and energy. They support plants, animals, and people. Climate, geology, and the water cycle affect how they work, and small changes can impact ecosystems and our communities. it is important not to disrupte watershed if the water cycle because it can cause floods, low water, or harm plants and animals.

    1. Climatology, the science of climate and its causes, becomes important in understanding regional issues in watershed science (Figure 8.4.18.4.1). Though sometimes used synonymously with weather, climate is actually a distinct term with important ecological ramifications. Climate refers to an aggregate of both average and extreme conditions of temperature, humidity, and precipitation (including type and amount), winds, and cloud cover, measured over an extended period of time. Weather refers to present day environmental conditions; current temperatures and meteorological events make up weather, not climate. Long-term weather trends establish averages which become climatic regimes. Climate heavily influences watershed vegetation communities, stream flow magnitude and timing, water temperature, and many other key watershed characteristics. Geology is defined as the science centered around the study of various earth structures, processes, compositions, characteristics, and histories. Geomorphology, however, refers specifically to the study of the landforms on the earth and the processes that change them over time (Figure 5). Fluvial geomorphology, referring to structure and dynamics of stream and river corridors, is especially important to understanding the formation and alteration of the stream or river channel as well as the flood plain and associated upland transitional zone; this is a critical discipline for effective, long-term watershed management. Figure 3. The physical template determines watershed structure Figure 5. Geomorphology helps explain river and watershed form. Figure 4. Climatic factors One of the life-sustaining cycles we are most familiar with is the hydrologic cycle (Figure 8.4.28.4.2). This cycle is a natural, solar-driven process of evaporation, condensation, precipitation, and runoff.

      I was wondering about what could happen to a watershed if one part of the hydrologic cycle is changed. According to Google, changes in the water cycle can affect the whole watershed, like causing floods, low water, or harming plants and animals.

    1. Decomposition involves the reduction of energy-rich organic matter (detritus), mostly by microorganisms (fungi, bacteria, and protozoa) to CO2, H2O and inorganic nutrients. Through this process they both release nutrients available for other organisms and transform organic material into energy usable by other organisms. In lakes, much of the decomposition occurs in the waters prior to sedimentation. In the headwater reaches of streams, external sources of carbon from upland forests are a particularly important source of organic material for organisms and decomposition of microscopic particles occurs very rapidly. The bacteria and fungi modify the organic material through decomposition and make it an important food source for invertebrate and vertebrate detritivores, thereby reinserting these nutrients and materials into the watershed’s aquatic and terrestrial food webs. Decomposition is influenced by moisture, temperature, exposure, type of microbial substrate, vegetation, etc. Specifically, temperature and moisture affect the metabolic activity on the decomposing substrate. Nutritional value (as well as palatability) of the decomposing structure will also affect the time involved in complete breakdown and mineralization. Decomposition involves the following processes: The leaching of soluble compounds from dead organic matter Fragmentation Bacterial and fungal breakdown Consumption of bacterial and fungal organisms by animals Excretion of organic and inorganic compounds by animals Clustering of colloidal organic matter into larger particles The process of death and consumption, along with the leaching of soluble nutrients from the decomposing substrate, release minerals contained in the microbial and detrital biomass. This process is known as mineralization.

      This section explains how materials return into the ecosystem and support the food web through a decomposition process. It works by breaking down dead organic matter in a watershed. Microorganisms release nutrients and energy that other organisms can use.

    2. Transport and Storage. As matter physically moves through the watershed, there are a number of terms which arise relative to various stages of cycling. Availability refers not just to the presence of an element in a system, but also speaks to the usability of a given agent. For instance, nitrogen gas may be plentiful in and around dam spillways, but N2 is not a usable form for most aquatic organisms, and thus the availability of nitrogen is compromised. Detachment refers to the release of matter from an anchoring point, and its subsequent movement. Transport, a process most evident in stream channels, involves the movement of a material through a system. Deposition refers to a given endpoint within a cycle. Integration refers to the assimilation of matter into a site or organism following depositional processes (see Naiman and Bilby 1998). An example using these terms is included below.

      This paragraph defines key terms that describe how materials move and change within a watershed. It shows that matter moves through the watershed in stages. Materials must first be usable, then move, and finally become part of the ecosystem.

    1. But to himself so secret and so close, So far from sounding and discovery, 170As is the bud bit with an envious worm, Ere he can spread his sweet leaves to the air, Or dedicate his beauty to the sun.

      Based off of this quote, it sounds like Romeo is a very secretive and private person and doesn't like to express his feelings like how worms destroy plants before they blossom.

    1. Moreour on the third day of Aprill wee heard that after theis Rogues had gotten the Pynnace, and had taken all furnitures as peeces, sword, armour, Coat of male. Powder, shot and all the thinges that they had to trade withall, they killed the Captaine, and Cut of his head, and rowing with the taile of the boat formost they set vp a pole and put the Captaines head vpon it, and so rowed home, then the Deuill set them on againe, so that they furnished about 200 Canoes with aboue 1000 Indians, and came and thought to haue taken the shipp, but sheewas too quicke for them wch thing was very much talked of, for they alwayes feared a ship, but now the Rogues growe verie bold, and can vse peeces, some of them, as well or better then an Englishman, ffor an Indian did shoote with Mr Charles my Mrs Kindsman at a m

      April 3 letter - Indian victory and accelerating catastrophe: the Pinnace capture arms/ammunition, kill the captain, and muster 200 canoes with 1000 warriors. The English are outnumbered and outgunned. This escalation shows the colony is losing control and facing near-total annihilation.

    2. Loueing ffather I pray you to vse this man verie exceeding kindly for he hath done much for me, both on my Journy and since, I intreate you not to forget me, but by anie meanes redeeme me, for this day wee heare that there is 26 of English men slayne by the Indians, and they haue taken a Pinnace of Mr Pountis, and haue gotten peeces. Armour, sword, all thinges fitt for Warre, so that they may now steale vpon vs and wee Cannot know them from English, till it is too late, that they bee vpon vs, [and wee Cannot knowe them from English, till it is too late, that they bee vpon vs,] [sic] and then ther is no mercie, therefore if you loue or respect me, as your Child release me from this bondage, and saue my l

      P.S. escalates the urgency - news of 26 English deaths and Indians capturing weapons means the colony's vulnerability is increasing. Indians can now use English weapons and disguise themselves as English. Frethorne frames this as life-or-death urgency requiring immediate parental intervention.

    3. name there; good ffather doe not forget me, but haue m9cie and pittye my miserable Case. I know if you did but see me you would weepe to see me, for I haue but one suite, but it is a strange one, it is very well guarded, wherefore for God sake pittie me, I pray you to remember my loue my love to all my ffreind, and kindred, I hope all my Brothers and Sisters are in good health, and as for my part I have set downe my resolucon that certainelie Wilbe, that is, that the Answeare of this le

      Emotional climax of the letter - Frethorne explicitly states this letter determines life or death for him. The phrase 'the Answer of this letter wilbee life or death to me' shows he sees this as his last desperate hope for parental rescue/redemption from servitude and misery.

    4. but that Goodman Jackson pityed me & made me a Cabbin to lye in alwayes when I come vp, and he would giue me some poore JackC home with me wch Comforted mee more then pease, or water gruell. Oh they bee verie godlie folkes, and loue me verie well, and will doe

      Goodman Jackson represents human compassion in a harsh world - he treats Frethorne like a son/father, provides shelter and food. This contrast highlights both the cruelty of the system and the possibility of mercy. Jackson becomes Frethorne's lifeline and hope for redemption.

    5. Sunday before Shrovetyde, and wee tooke two alive, and make slaves of them, but it was by pollicie, for wee are in great danger, for our Plantacon is very weake, by reason of the dearth, and sicknes, of our Companie, for wee came but Twentie for the marchaunt, and they are halfe dead Just; and wee looke everie hower When two more should goe, yet there came some for other men yet to lyve with vs, of which ther is but one alive, and our Leiften^nt is dead, and his ffather, and his brother

      Military vulnerability and death - the colony is drastically weakened. Of the original 20 colonists and additional settlers, only a few survive. They captured two Indians but admit they are drastically outnumbered 32 to 3000, showing the precarious position of English colonists.

    6. Wee are not allowed to goe, and get yt, but must Worke hard both earelie, and late for a messe of water gruell, and a mouthful of bread, and beife, a mouthfull of

      Food shortage is critical - workers are given only pease, water gruel, bread, and beef. The description shows extreme rationing where one small loaf must feed four men, showing colonial inability to feed settlers adequately.

    7. Case by reason of the nature of the Country is such that it Causeth much sicknes, as the scurvie and the bloody flix, and divers other diseases, wch maketh the bod

      Disease is the primary crisis - scurvy and dysentery devastate the colony. Frethorne emphasizes this is the key reason for his misery, weakening the body with poor diet making conditions worse.

    8. it; But I haue nothing at all, no not a shirt to my backe,

      Frethorne emphasizes his extreme poverty - he literally has no possessions, not even basic clothing. This illustrates the desperate conditions colonists faced in Virginia.

    1. That this voyage will be a great bridle to the Indies of the king of Spaine and a means that we may arrest at our pleasure for the space of time

      Military/naval advantage - Hakluyt argues English colonies would allow England to control Spanish shipping and territorial ambitions. This is a strategic defensive argument that appeals to Elizabeth's concern for national security and dominance.

    2. That this enterprise will be for the manifold employment of numbers of idle men, and for breeding of many sufficient, and for utterance of the

      Employment solution - Hakluyt argues colonization will solve England's unemployment problem by employing idle men and creating demand for English goods. This appeals to Queen Elizabeth's interest in social stability and economic growth.

    3. That all other English trades are grown beggerly or dangerous, especially in all the king of Spain his Dominions, where our men are driven to fling their Bibles and prayer Books into the sea, and to forswear and renounce their religion and co

      Geopolitical threat from Spain - Hakluyt argues that existing English trades are unsafe under Spanish dominance, forcing English merchants to renounce their faith. Colonization becomes a way to compete with Spanish power and protect English interests.

    4. That this western discoverie will be greatly for the enlargement of the gospel of Christ whereunto the Princes of the reformed religion are chiefly bound amongst whom her Majestie is principally.

      Religious justification - Hakluyt appeals to spreading Christianity as a moral imperative. This frames colonization as a religious duty for Reformed Protestant princes, adding moral weight to the economic arguments.

    5. chapters, summarized here, Hakluyt emphasized the many benefits that England would receive by creating colonies in the Americas.

      Hakluyt's key argument: colonization benefits England economically and alleviates unemployment. This is the central persuasive strategy aimed at Queen Elizabeth I.

    1. Peer review can feel scary because you may feel uncomfortable sharing your writing at first, but remember that each writer is working toward the same goal:

      Peer review can feel scary because you may feel uncomfortable sharing your writing at first, but remember that each writer is working toward the same goal: improving their writing and creating the best final draft possible.

    1. they treated them (I speak of things which I was an Eye Witness of, without the least fallacy) not as Beasts, which I cordially wished they would, but as the most abject dung and filth of the Earth;

      Las Casas shows how the Spaniards viewed the Indigenous people as worthless. This helped us understand why they were so extremely cruel and violent.

    2. hat of Three Millions of Persons, which lived in Hispaniola itself, there is at present but the inconsiderable remnant of scarce Three Hundred.

      This shows that almost the entire population was wided out because of the Spanish's violence and abuse to the Native people.

    3. The Spaniards first assaulted the innocent Sheep, so qualified by the Almighty, like most cruel tigers, wolves, and lions, hunger-starved, studying nothing, for the space of Forty Years, after their first landing, but the Massacre of these Wretches,

      Las Casas says that the Native people were peaceful. They also said that the Spaniards attacked them badly like they were wild animals.

    4. The Spaniards attacked the musicians first, slashing at their hands and faces until they had killed all of them. The singers-and even the spectators- were also killed. This slaughter in the Sacred Patio went on for three hours.

      Helps show me the brutal massacre that was done by the Spanish. Knowing that the Aztecs were unarmed and participating in religious celebrations makes it even worse.

    5. You have come back to us; you have come down from the sky.

      The Aztecs used to view Cortès with amazement. People would even say he is Godly figure which helped impact the Spanish's influence.

    1. Each point you choose will be incorporated into the topic sentence for each body paragraph you write. Your primary supporting points are further supported by supporting details within the paragraphs.

      This section explains that strong primary support is the main point you use to prove your thesis. Each paragraph should have a clear topic sentence and then supporting details to strengthen the point.

    1. When you write, it is helpful when your ideas are presented in an order that makes sense. The writing you complete in all your courses exposes how analytically and critically your mind works. In some courses, the only direct contact you may have with your instructor is through the assignments you write for the course. You can make a good impression by spending time ordering your ideas.

      Organizing your ideas in writing is important because it helps your reader understand your point. It also shows your instructor that you put effort into your work and can think clearly.

    1. Evolutionary biologists could list many reasons why understanding phylogeny is important to everyday life in human society. For botanists, phylogeny acts as a guide to discovering new plants that can be used to benefit people.

      Understanding phylogeny is important because it helps scientists understand how living things are related and how they evolved over time. This can be useful in everyday life because it helps humans make better choices in science, medicine, and the environment. For botanists, phylogeny is especially helpful because it guides them in finding new plants that may have useful benefits for people, like medicine or food.

    2. For example, insects use wings to fly like bats and birds, but the wing structure and embryonic origin is completely different. These are analogous structures

      Insects, birds, and bats can all fly using wings, but their wings are not made the same way. Insect wings come from the insect’s outer body, while bird and bat wings are modified front limbs with bones. Even though the wings do the same job, they developed differently and do not share the same origin.

    1. Suarez starts by describing how downtown Tucson slowly slopes down toward the Santa Cruz River. Even though the neighborhood is called El Hoyo, it isn’t actually a hole; it’s just the river valley near downtown. This opening helps the reader get a clear picture of the area and understand where the barrio is located before learning more about the people who live there.

    1. This suggests that aging happened either quite rapidly in the victim within 24 h, or occurred through postmortem processes after death before sample taking. For comparison, when we analyzed the plasma samples of Japanese victims of the Tokyo Subway sarin attack, the expected O-isopropyl methylphosphonic BChE adduct was found [12]. We, therefore, consider the postmortem aging reaction as the most likely explanation for the presence of the MPA-BChE adduct.

      This is an interesting difference. Why did aging occur here and not in the Tokyo victims?

    1. These attacks began in Moscow some seventy-one years ago, in 1953, and were eventually privately admitted to by Soviet officials

      I don't consider past actions as sufficient evidence

    1. They afterward determined to establish themselves there for the winter, and they accordingly built a large house

      This help me see that Leif's crew saw the land that they discovered and viewed it as livable and resourceful. This helped me think that they saw this land as a place worthy of settling and not just exploring.

    2. This was a level wooded land; and there were broad stretches of white sand where they went, and the land was level by the sea. Then said Leif, “This land shall have a name after its nature; and we will call it Markland [land of forests].”

      It is crazy to see how Lief Erikson and his crew identified and named new lands based on the lands natural features.