1,466 research outputs found

    Inhibition of the growth of Bacillus subtilis DSM10 by a newly discovered antibacterial protein from the soil metagenome

    No full text
    A functional metagenomics based approach exploiting the microbiota of suppressive soils from an organic field site has succeeded in the identification of a clone with the ability to inhibit the growth of Bacillus subtilis DSM10. Sequencing of the fosmid identified a putative β-lactamase-like gene abgT. Transposon mutagenesis of the abgT gene resulted in a loss in ability to inhibit the growth of B. subtilis DSM10. Further analysis of the deduced amino acid sequence of AbgT revealed moderate homology to esterases, suggesting that the protein may possess hydrolytic activity. Weak lipolytic activity was detected; however the clone did not appear to produce any β-lactamase activity. Phylogenetic analysis revealed the protein is a member of the family VIII group of lipase/esterases and clusters with a number of proteins of metagenomic origin. The abgT gene was sub-cloned into a protein expression vector and when introduced into the abgT transposon mutant clones restored the ability of the clones to inhibit the growth of B. subtilis DSM10, clearly indicating that the abgT gene is involved in the antibacterial activity. While the precise role of this protein has yet to fully elucidated, it may be involved in the generation of free fatty acid with antibacterial properties. Thus functional metagenomic approaches continue to provide a significant resource for the discovery of novel functional proteins and it is clear that hydrolytic enzymes, such as AbgT, may be a potential source for the development of future antimicrobial therapies

    The last line effect explained

    Get PDF
    Micro-clones are tiny duplicated pieces of code; they typically comprise only few statements or lines. In this paper, we study the “Last Line Effect,” the phenomenon that the last line or statement in a micro-clone is much more likely to contain an error than the previous lines or statements. We do this by analyzing 219 open source projects and reporting on 263 faulty micro-clones and interviewing six authors of real-world faulty micro-clones. In an interdisciplinary collaboration, we examine the underlying psychological mechanisms for the presence of these relatively trivial errors. Based on the interviews and further technical analyses, we suggest that so-called “action slips” play a pivotal role for the existence of the last line effect: Developers’ attention shifts away at the end of a micro-clone creation task due to noise and the routine nature of the task. Moreover, all micro-clones whose origin we could determine were introduced in unusually large commits. Practitioners benefit from this knowledge twofold: 1) They can spot situations in which they are likely to introduce a faulty micro-clone and 2) they can use PVS-Studio, our automated micro-clone detector, to help find erroneous micro-clones

    The last line effect explained

    Get PDF

    Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

    Get PDF
    Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: “Passive Attacks” and “Active Attacks”. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology

    Epithelial damage and tissue γδ T cells promote a unique tumor-protective IgE response

    Get PDF
    IgE is an ancient and conserved immunoglobulin isotype with potent immunological function. Nevertheless, the regulation of IgE responses remains an enigma, and evidence of a role for IgE in host defense is limited. Here we report that topical exposure to a common environmental DNA-damaging xenobiotic initiated stress surveillance by γδTCR+ intraepithelial lymphocytes that resulted in class switching to IgE in B cells and the accumulation of autoreactive IgE. High-throughput antibody sequencing revealed that γδ T cells shaped the IgE repertoire by supporting specific variable-diversity-joining (VDJ) rearrangements with unique characteristics of the complementarity-determining region CDRH3. This endogenous IgE response, via the IgE receptor FcεRI, provided protection against epithelial carcinogenesis, and expression of the gene encoding FcεRI in human squamous-cell carcinoma correlated with good disease prognosis. These data indicate a joint role for immunosurveillance by T cells and by B cells in epithelial tissues and suggest that IgE is part of the host defense against epithelial damage and tumor development
    corecore