244 research outputs found

    High resolution mapping of a novel late blight resistance gene Rpi-avll, from the wild Bolivian species Solanum avilesii

    Get PDF
    Both Mexico and South America are rich in Solanum species that might be valuable sources of resistance (R) genes to late blight (Phytophthora infestans). Here, we focus on an R gene present in the diploid Bolivian species S. avilesii. The genotype carrying the R gene was resistant to eight out of 10 Phytophthora isolates of various provenances. The identification of a resistant phenotype and the generation of a segregating population allowed the mapping of a single dominant R gene, Rpi-avl1, which is located in an R gene cluster on chromosome 11. This R gene cluster is considered as an R gene “hot spot”, containing R genes to at least five different pathogens. High resolution mapping of the Rpi-avl1 gene revealed a marker co-segregating in 3890 F1 individuals, which may be used for marker assisted selection in breeding programs and for further cloning of Rpi-avl

    Apical Ischemia Is a Universal Feature of Apical Hypertrophic Cardiomyopathy

    Get PDF
    BACKGROUND: Apical hypertrophic cardiomyopathy (ApHCM) accounts for ≈10% of hypertrophic cardiomyopathy cases and is characterized by apical hypertrophy, apical cavity obliteration, and tall ECG R waves with ischemic-looking deep T-wave inversion. These may be present even with <15 mm apical hypertrophy (relative ApHCM). Microvascular dysfunction is well described in hypertrophic cardiomyopathy. We hypothesized that apical perfusion defects would be common in ApHCM. METHODS: A 2-center study using cardiovascular magnetic resonance short- and long-axis quantitative adenosine vasodilator stress perfusion mapping. One hundred patients with ApHCM (68 overt hypertrophy [≄15 mm] and 32 relative ApHCM) were compared with 50 patients with asymmetrical septal hypertrophy hypertrophic cardiomyopathy and 40 healthy volunteer controls. Perfusion was assessed visually and quantitatively as myocardial blood flow and myocardial perfusion reserve. RESULTS: Apical perfusion defects were present in all overt ApHCM patients (100%), all relative ApHCM patients (100%), 36% of asymmetrical septal hypertrophy hypertrophic cardiomyopathy, and 0% of healthy volunteers (P<0.001). In 10% of patients with ApHCM, perfusion defects were sufficiently apical that conventional short-axis views missed them. In 29%, stress myocardial blood flow fell below rest values. Stress myocardial blood flow was most impaired subendocardially, with greater hypertrophy or scar, and with apical aneurysms. Impaired apical myocardial blood flow was most strongly predicted by thicker apical segments (ÎČ-coefficient, -0.031 mL/g per min [CI, -0.06 to -0.01]; P=0.013), higher ejection fraction (-0.025 mL/g per min [CI, -0.04 to -0.01]; P<0.005), and ECG maximum R-wave height (-0.023 mL/g per min [CI, -0.04 to -0.01]; P<0.005). CONCLUSIONS: Apical perfusion defects are universally present in ApHCM at all stages. Its ubiquitous presence along with characteristic ECG suggests ischemia may play a disease-defining role in ApHCM

    Information security: Listening to the perspective of organisational insiders

    Get PDF
    Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they interpret them, and how they turn such interpretations into strategic actions. The study takes a qualitative case study approach, and participants are employees at the Research & Development department of a multinational original brand manufacturer. The article makes an important contribution to organisational information security management. It addresses the behaviour of organisational insiders – a group whose role in the prevention, response and mitigation of information security incidents is critical. The article identifies a set of organisational insiders’ perceived components of effective information security practices (organisational mission statement; common understanding of information security; awareness of threats; knowledge of information security incidents, routines and policy; relationships between employees; circulation of stories; role of punishment provisions; and training), based on which more successful information security strategies can be developed

    Wage insurance within German firms : do institutions matter?

    Full text link
    Using a large linked employer-employee data set, this paper studies the extent to which employers insure workers against transitory and permanent firm-level shocks. Particular emphasis is given to the question of whether the amount of wage insurance depends on the nature of industrial relations. Adopting the identification strategy proposed by Guiso et al. (2005), it is shown that wage insurance is particularly apparent for individuals subject to collective wage agreements. While collective contracts alone are sufficient to fully insure workers against transitory shocks in small plants, they provide only partial insurance in medium-sized and large plants. At large employers, the joint existence of collective contracts and works councils helps to provide full insurance against transitory shocks, but provides only partial insurance against permanent shocks. This finding is consistent with the amount of insurance against permanent shocks being constrained by the possibility of considerable job losses and bankruptcy

    Pharmaceutical Particle Engineering via Spray Drying

    Full text link
    • 

    corecore