WorldWideScience

Sample records for security checkpoints

  1. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  2. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Adrian J., E-mail: ajlee@citeri.or [Central Illinois Technology and Education Research Institute, 2312 Connie Drive, Springfield, IL 62704-8722 (United States); Jacobson, Sheldon H., E-mail: shj@illinois.ed [Department of Computer Science, University of Illinois at Urbana-Champaign, 201 N. Goodwin Ave. M/C 258, Urbana, IL 61801-2302 (United States)

    2011-08-15

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  3. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    International Nuclear Information System (INIS)

    Lee, Adrian J.; Jacobson, Sheldon H.

    2011-01-01

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  4. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2018-03-01

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  5. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  6. Detection of total hip prostheses at airport security checkpoints: how has heightened security affected patients?

    Science.gov (United States)

    Johnson, Aaron J; Naziri, Qais; Hooper, Hasan A; Mont, Michael A

    2012-04-04

    The sensitivity of airport security screening measures has increased substantially during the past decade, but few reports have examined how this affects patients who have undergone hip arthroplasty. The purpose of this study was to determine the experiences of patients who had hip prostheses and who passed through airport security screenings. A consecutive series of 250 patients who presented to the office of a high-volume surgeon were asked whether they had had a hip prosthesis for at least one year and, if so, whether they had flown on a commercial airline within the past year. Patients who responded affirmatively to both questions were asked to complete a written survey that included questions about which joint(s) had been replaced, the number of encounters with airport security, the frequency and location of metal detector activation, any additional screening procedures that were utilized, whether security officials requested documentation regarding the prosthesis, the degree of inconvenience, and other relevant information. Of the 143 patients with hip replacements who traveled by air, 120 (84%) reported triggering the alarm and required wanding with a handheld detector. Twenty-five of these patients reported subsequently having to undergo further inspection, including additional wanding, being patted down, and in two cases having to undress in a private room to show the incision. Ninety-nine (69%) of the 143 patients reported that the prosthetic joint caused an inconvenience while traveling. This study provides interesting and critical information that allows physicians to understand the real-world implications of implanted orthopaedic devices for patients who are traveling where there has been heightened security since September 11, 2001. Patients should be counseled that they should expect delays and be prepared for such inconveniences, but that these are often only momentary. This information could relieve some anxiety and concerns that patients may have

  7. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  8. Efficient Incremental Checkpointing of Java Programs

    DEFF Research Database (Denmark)

    Lawall, Julia Laetitia; Muller, Gilles

    2000-01-01

    This paper investigates the optimization of language-level checkpointing of Java programs. First, we describe how to systematically associate incremental checkpoints with Java classes. While being safe, the genericness of this solution induces substantial execution overhead. Second, to solve...

  9. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  10. Checkpointing for a hybrid computing node

    Science.gov (United States)

    Cher, Chen-Yong

    2016-03-08

    According to an aspect, a method for checkpointing in a hybrid computing node includes executing a task in a processing accelerator of the hybrid computing node. A checkpoint is created in a local memory of the processing accelerator. The checkpoint includes state data to restart execution of the task in the processing accelerator upon a restart operation. Execution of the task is resumed in the processing accelerator after creating the checkpoint. The state data of the checkpoint are transferred from the processing accelerator to a main processor of the hybrid computing node while the processing accelerator is executing the task.

  11. Checkpoint inhibitors in breast cancer

    DEFF Research Database (Denmark)

    Polk, Anne; Svane, Inge-Marie; Andersson, Michael

    2018-01-01

    INTRODUCTION: An increasing number of compounds directed against immune checkpoints are currently under clinical development. In this review we summarize current research in breast cancer. MATERIAL AND METHODS: A computer-based literature search was carried out using PubMed and EMBASE; data...... reported at international meetings and clinicaltrials.gov were included as well. RESULTS: The obtained overall response rate of PD-1/PD-L1 monotherapy varied from 5 to 30% in heavily pretreated triple negative breast cancer (TNBC). The median duration of progression free survival and overall survival were...... and induce long standing anti-tumor immunity in a subgroup of breast cancer patients. However, the identification of predictive biomarkers is crucial for further development of this treatment modality....

  12. Asynchronous Checkpoint Migration with MRNet in the Scalable Checkpoint / Restart Library

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, K; Moody, A; de Supinski, B R

    2012-03-20

    Applications running on today's supercomputers tolerate failures by periodically saving their state in checkpoint files on stable storage, such as a parallel file system. Although this approach is simple, the overhead of writing the checkpoints can be prohibitive, especially for large-scale jobs. In this paper, we present initial results of an enhancement to our Scalable Checkpoint/Restart Library (SCR). We employ MRNet, a tree-based overlay network library, to transfer checkpoints from the compute nodes to the parallel file system asynchronously. This enhancement increases application efficiency by removing the need for an application to block while checkpoints are transferred to the parallel file system. We show that the integration of SCR with MRNet can reduce the time spent in I/O operations by as much as 15x. However, our experiments exposed new scalability issues with our initial implementation. We discuss the sources of the scalability problems and our plans to address them.

  13. Molecular Mechanisms of DNA Replication Checkpoint Activation

    Directory of Open Access Journals (Sweden)

    Bénédicte Recolin

    2014-03-01

    Full Text Available The major challenge of the cell cycle is to deliver an intact, and fully duplicated, genetic material to the daughter cells. To this end, progression of DNA synthesis is monitored by a feedback mechanism known as replication checkpoint that is untimely linked to DNA replication. This signaling pathway ensures coordination of DNA synthesis with cell cycle progression. Failure to activate this checkpoint in response to perturbation of DNA synthesis (replication stress results in forced cell division leading to chromosome fragmentation, aneuploidy, and genomic instability. In this review, we will describe current knowledge of the molecular determinants of the DNA replication checkpoint in eukaryotic cells and discuss a model of activation of this signaling pathway crucial for maintenance of genomic stability.

  14. Transparent checkpointing and process migration in a distributed system

    OpenAIRE

    2004-01-01

    A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging p...

  15. Multiple functions of the S-phase checkpoint mediator.

    Science.gov (United States)

    Tanaka, Katsunori

    2010-01-01

    There is mounting evidence that replication defects are the major source of spontaneous genomic instability in cells, and that S-phase checkpoints are the principal defense against such instability. The S-phase checkpoint mediator protein Mrc1/Claspin mediates the checkpoint response to replication stress by facilitating phosphorylation of effector kinase by a sensor kinase. In this review, the multiple functions and the regulation of the S-phase checkpoint mediator are discussed.

  16. Checkpointing and Recovery in Distributed and Database Systems

    Science.gov (United States)

    Wu, Jiang

    2011-01-01

    A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the results of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to…

  17. Targeting the Checkpoint to Kill Cancer Cells

    Czech Academy of Sciences Publication Activity Database

    Benada, Jan; Macůrek, Libor

    2015-01-01

    Roč. 6, č. 3 (2015), s. 1912-1937 ISSN 2218-273X R&D Projects: GA ČR(CZ) GA14-34264S Institutional support: RVO:68378050 Keywords : checkpoint * DNA damage response * cancer Subject RIV: EB - Genetics ; Molecular Biology

  18. Immune mediated neuropathy following checkpoint immunotherapy.

    Science.gov (United States)

    Gu, Yufan; Menzies, Alexander M; Long, Georgina V; Fernando, S L; Herkes, G

    2017-11-01

    Checkpoint immunotherapy has revolutionised cancer therapy and is now standard treatment for many malignancies including metastatic melanoma. Acute inflammatory neuropathies, often labelled as Guillain-Barre syndrome, are an uncommon but potentially severe complication of checkpoint immunotherapy with individual cases described but never characterised as a group. We describe a case of acute sensorimotor and autonomic neuropathy following a single dose of combination ipilimumab and nivolumab for metastatic melanoma. A literature search was performed, identifying 14 other cases of acute neuropathy following checkpoint immunotherapy, with the clinical, electrophysiological and laboratory features summarised. Most cases described an acute sensorimotor neuropathy (92%) with hyporeflexia (92%) that could occur from induction up till many weeks after the final dose of therapy. In contrast to Guillain-Barre syndrome, the cerebrospinal fluid (CSF) analysis often shows a lymphocytic picture (50%) and the electrophysiology showed an axonal pattern (55%). Treatment was variable and often in combination. 11 cases received steroid therapy with only 1 death within this group, whereas of the 4 patients who did not receive steroid therapy there were 3 deaths. In conclusion checkpoint immunotherapy - induced acute neuropathies are distinct from and progress differently to Guillain-Barre syndrome. As with other immunotherapy related adverse events corticosteroid therapy should be initiated in addition to usual therapy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Detailed Modeling and Evaluation of a Scalable Multilevel Checkpointing System

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, Kathryn [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Moody, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bronevetsky, Greg [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); de Supinski, Bronis R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-01

    High-performance computing (HPC) systems are growing more powerful by utilizing more components. As the system mean time before failure correspondingly drops, applications must checkpoint frequently to make progress. But, at scale, the cost of checkpointing becomes prohibitive. A solution to this problem is multilevel checkpointing, which employs multiple types of checkpoints in a single run. Moreover, lightweight checkpoints can handle the most common failure modes, while more expensive checkpoints can handle severe failures. We designed a multilevel checkpointing library, the Scalable Checkpoint/Restart (SCR) library, that writes lightweight checkpoints to node-local storage in addition to the parallel file system. We present probabilistic Markov models of SCR's performance. We show that on future large-scale systems, SCR can lead to a gain in machine efficiency of up to 35 percent, and reduce the load on the parallel file system by a factor of two. In addition, we predict that checkpoint scavenging, or only writing checkpoints to the parallel file system on application termination, can reduce the load on the parallel file system by 20 × on today's systems and still maintain high application efficiency.

  20. Extending the Binomial Checkpointing Technique for Resilience

    Energy Technology Data Exchange (ETDEWEB)

    Walther, Andrea; Narayanan, Sri Hari Krishna

    2016-10-10

    In terms of computing time, adjoint methods offer a very attractive alternative to compute gradient information, re- quired, e.g., for optimization purposes. However, together with this very favorable temporal complexity result comes a memory requirement that is in essence proportional with the operation count of the underlying function, e.g., if algo- rithmic differentiation is used to provide the adjoints. For this reason, checkpointing approaches in many variants have become popular. This paper analyzes an extension of the so-called binomial approach to cover also possible failures of the computing systems. Such a measure of precaution is of special interest for massive parallel simulations and adjoint calculations where the mean time between failure of the large scale computing system is smaller than the time needed to complete the calculation of the adjoint information. We de- scribe the extensions of standard checkpointing approaches required for such resilience, provide a corresponding imple- mentation and discuss numerical results.

  1. Immune checkpoint inhibitors for metastatic bladder cancer.

    Science.gov (United States)

    Massari, Francesco; Di Nunno, Vincenzo; Cubelli, Marta; Santoni, Matteo; Fiorentino, Michelangelo; Montironi, Rodolfo; Cheng, Liang; Lopez-Beltran, Anto; Battelli, Nicola; Ardizzoni, Andrea

    2018-03-01

    Chemotherapy has represented the standard therapy for unresectable or metastatic urothelial carcinoma for more than 20 years. The growing knowledge of the interaction between tumour and immune system has led to the advent of new classes of drugs, the immune-checkpoints inhibitors, which are intended to change the current scenario. To date, immunotherapy is able to improve the overall responses and survival. Moreover, thanks to its safety profile immune-checkpoint inhibitors could be proposed also to patients unfit for standard chemotherapy. No doubts that these agents have started a revolution expected for years, but despite this encouraging results it appears clear that not all subjects respond to these agents and requiring the development of reliable predictive response factors able to isolate patients who can more benefit from these treatments as well as new strategies aimed to improve immunotherapy clinical outcome. In this review we describe the active or ongoing clinical trials involving Programmed Death Ligand 1 (PD-L1), Programmed Death receptor 1 (PD-1) and Cytotoxic-T Lymphocyte Antigen 4 (CTLA 4) inhibitors in urothelial carcinoma focusing our attention on the developing new immune-agents and combination strategies with immune-checkpoint inhibitors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Advances of Immune Checkpoint Inhibitors in Tumor Immunotherapy

    Science.gov (United States)

    Guo, Qiao

    2018-01-01

    Immune checkpoints are cell surface molecules that can fine-tune the immune responses, they are crucial for modulating the duration and amplitude of immune reactions while maintaining self-tolerance in order to minimize autoimmune responses. Numerous studies have demonstrated that tumors cells can directly express immune-checkpoint molecules, or induce many inhibitory molecules expression in the tumor microenvironment to inhibit the anti-tumor immunity. Releasing these brakes has emerged as an exciting strategy to cure cancer. In the past few years, clinical trials with therapeutic antibodies targeting to the checkpoint molecules CTLA-4 and PD-1 have rekindled the hope for cancer immunotherapy. In contrast to the conventional treatment, checkpoint inhibitors induce broad and durable antitumor responses. In the future, treatment may involve combination therapy to target different checkpoint molecules and stages of the adaptive immune responses. In this review, we summarized the recent advances of the study and development of other checkpoint molecules in tumor immunotherapy.

  3. Template based parallel checkpointing in a massively parallel computer system

    Science.gov (United States)

    Archer, Charles Jens [Rochester, MN; Inglett, Todd Alan [Rochester, MN

    2009-01-13

    A method and apparatus for a template based parallel checkpoint save for a massively parallel super computer system using a parallel variation of the rsync protocol, and network broadcast. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system. Embodiments are directed to a parallel computer system with nodes arranged in a cluster with a high speed interconnect that can perform broadcast communication. The checkpoint contains a set of actual small data blocks with their corresponding checksums from all nodes in the system. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.

  4. Enhancing Immune Checkpoint Inhibitor Therapy in Kidney Cancer

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-15-1-0141 TITLE: Enhancing Immune Checkpoint Inhibitor therapy in Kidney Cancer PRINCIPAL INVESTIGATOR: Hans-Joerg Hammers...SUBTITLE Enhancing Immune Checkpoint Inhibitor therapy in Kidney Cancer 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH- 15-1-0141 5c. PROGRAM ELEMENT NUMBER...immune checkpoint inhibition in kidney cancer . The work is designed to test different strategies to induce or enhance the abscopal in a kidney cancer

  5. Hypoxia‐induced alterations of G2 checkpoint regulators

    OpenAIRE

    Hasvold, Grete; Lund-Andersen, Christin; Lando, Malin; Patzke, Sebastian; Hauge, Sissel; Suo, ZhenHe; Lyng, Heidi; Syljuåsen, Randi G.

    2016-01-01

    Hypoxia promotes an aggressive tumor phenotype with increased genomic instability, partially due to downregulation of DNA repair pathways. However, genome stability is also surveilled by cell cycle checkpoints. An important issue is therefore whether hypoxia also can influence the DNA damage‐induced cell cycle checkpoints. Here, we show that hypoxia (24 h 0.2% O2) alters the expression of several G2 checkpoint regulators, as examined by microarray gene expression analysis and immunoblotting o...

  6. Checkpoint independence of most DNA replication origins in fission yeast

    OpenAIRE

    Mickle, Katie L; Ramanathan, Sunita; Rosebrock, Adam; Oliva, Anna; Chaudari, Amna; Yompakdee, Chulee; Scott, Donna; Leatherwood, Janet; Huberman, Joel A

    2007-01-01

    Abstract Background In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU), which limits the pool of deoxyribonucleo...

  7. Anaphase onset before complete DNA replication with intact checkpoint responses

    DEFF Research Database (Denmark)

    Torres-Rosell, Jordi; De Piccoli, Giacomo; Cordon-Preciado, Violeta

    2007-01-01

    Cellular checkpoints prevent mitosis in the presence of stalled replication forks. Whether checkpoints also ensure the completion of DNA replication before mitosis is unknown. Here, we show that in yeast smc5-smc6 mutants, which are related to cohesin and condensin, replication is delayed, most...

  8. PD-1 Checkpoint Inhibitor Associated Autoimmune Encephalitis

    Directory of Open Access Journals (Sweden)

    Stephanie Schneider

    2017-05-01

    Full Text Available Objective: To report first-hand narrative experience of autoimmune encephalitis and to briefly review currently available evidence of autoimmune encephalitis in cancer patients treated with immune checkpoint inhibitors. Setting: A case study is presented on the management of a patient who developed autoimmune encephalitis during nivolumab monotherapy occurring after 28 weeks on anti-PD-1 monotherapy (nivolumab 3 mg/kg every 2 weeks for non-small cell lung cancer. Results: No substantial improvement was observed by antiepileptic treatment. After administration of 80 mg methylprednisolone, neurologic symptoms disappeared within 24 h and the patient fully recovered. Conclusions: Immune checkpoint inhibitor treatment can lead to autoimmune encephalitis. Clinical trial data indicate a frequency of autoimmune encephalitis of ≥0.1 to <1% with a higher probability during combined or sequential anti-CTLA-4/anti-PD-1 therapy than during anti-PD-1 or anti-PD-L1 monotherapy. Further collection of evidence and translational research is warranted.

  9. PD-1 checkpoint inhibition: Toxicities and management.

    Science.gov (United States)

    Hahn, Andrew W; Gill, David M; Agarwal, Neeraj; Maughan, Benjamin L

    2017-12-01

    With the recent approval of 5 PD-1/PD-L1 inhibitors for a number of malignancies, PD-1 axis inhibition is drastically changing the treatment landscape of immunotherapy in cancer. As PD-1/PD-L1 are involved in peripheral immune tolerance, inhibition of this immune checkpoint has led to novel immune-related adverse events including colitis, hepatitis, pneumonitis, rash, and endocrinopathies among many others. In this seminar, we will analyze the incidence of immune-related adverse events for nivolumab, pembrolizumab, atezolizumab, durvalumab, and avelumab. Then, we will discuss the specific management of the most common immune-mediated adverse events including colitis, hepatitis, pneumonitis, rash, endocrinopathies, nephritis, and neurologic toxicities. Immune-related adverse events are frequently treated with immunosuppressive medication such as steroids and mycofenolate mofetil. There are specific immune-related adverse events which are frequently seen by the treating oncologist from checkpoint inhibitors. It is essential to understand the recommended treatment options to minimize toxicity and mortality from this important class of anti-neoplastic therapies. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Newly Emerging Immune Checkpoints: Promises for Future Cancer Therapy

    Directory of Open Access Journals (Sweden)

    Robert J. Torphy

    2017-12-01

    Full Text Available Cancer immunotherapy has been a great breakthrough, with immune checkpoint inhibitors leading the way. Despite the clinical effectiveness of certain immune checkpoint inhibitors, the overall response rate remains low, and the effectiveness of immunotherapies for many tumors has been disappointing. There is substantial interest in looking for additional immune checkpoint molecules that may act as therapeutic targets for cancer. Recent advances during the last decade have identified several novel immune checkpoint targets, including lymphocyte activation gene-3 (LAG-3, B and T lymphocyte attenuator (BTLA, programmed death-1 homolog (PD-1H, T-cell immunoglobulin and immunoreceptor tyrosine-based inhibitory motif domain (TIM-3/carcinoembryonic antigen cell adhesion molecule 1 (CEACAM1, and the poliovirus receptor (PVR-like receptors. The investigations into these molecules have generated promising results in preclinical studies. Herein, we will summarize our current progress and understanding of these newly-characterized immune checkpoints and their potential application in cancer immunotherapy.

  11. "Isogaba Maware": quality control of genome DNA by checkpoints.

    Science.gov (United States)

    Kitazono, A; Matsumoto, T

    1998-05-01

    Checkpoints maintain the interdependency of cell cycle events by permitting the onset of an event only after the completion of the preceding event. The DNA replication checkpoint induces a cell cycle arrest until the completion of the DNA replication. Similarly, the DNA damage checkpoint arrests cell cycle progression if DNA repair is incomplete. A number of genes that play a role in the two checkpoints have been identified through genetic studies in yeasts, and their homologues have been found in fly, mouse, and human. They form signaling cascades activated by a DNA replication block or DNA damage and subsequently generate the negative constraints on cell cycle regulators. The failure of these signaling cascades results in producing offspring that carry mutations or that lack a portion of the genome. In humans, defects in the checkpoints are often associated with cancer-prone diseases. Focusing mainly on the studies in budding and fission yeasts, we summarize the recent progress.

  12. Checkpoint independence of most DNA replication origins in fission yeast.

    Science.gov (United States)

    Mickle, Katie L; Ramanathan, Sunita; Rosebrock, Adam; Oliva, Anna; Chaudari, Amna; Yompakdee, Chulee; Scott, Donna; Leatherwood, Janet; Huberman, Joel A

    2007-12-19

    In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU), which limits the pool of deoxyribonucleoside triphosphates (dNTPs) and activates the replication checkpoint. The checkpoint-mutant cells carried deletions either of rad3 (which encodes the fission yeast homologue of ATR) or cds1 (which encodes the fission yeast homologue of Chk2). Our microarray results proved to be largely consistent with those independently obtained and recently published by three other laboratories. However, we were able to reconcile differences between the previous studies regarding the extent to which fission yeast replication origins are affected by the replication checkpoint. We found (consistent with the three previous studies after appropriate interpretation) that, in surprising contrast to budding yeast, most fission yeast origins, including both early- and late-firing origins, are not significantly affected by checkpoint mutations during replication in the presence of HU. A few origins (approximately 3%) behaved like those in budding yeast: they replicated earlier in the checkpoint mutants than in wild type. These were located primarily in the heterochromatic subtelomeric regions of chromosomes 1 and 2. Indeed, the subtelomeric regions defined by the strongest checkpoint restraint correspond precisely to previously mapped subtelomeric heterochromatin. This observation implies that subtelomeric heterochromatin in fission yeast differs from heterochromatin at centromeres, in the mating type region, and in ribosomal DNA, since these regions replicated at least as efficiently in wild-type cells as in checkpoint

  13. Checkpoint independence of most DNA replication origins in fission yeast

    Science.gov (United States)

    Mickle, Katie L; Ramanathan, Sunita; Rosebrock, Adam; Oliva, Anna; Chaudari, Amna; Yompakdee, Chulee; Scott, Donna; Leatherwood, Janet; Huberman, Joel A

    2007-01-01

    Background In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU), which limits the pool of deoxyribonucleoside triphosphates (dNTPs) and activates the replication checkpoint. The checkpoint-mutant cells carried deletions either of rad3 (which encodes the fission yeast homologue of ATR) or cds1 (which encodes the fission yeast homologue of Chk2). Results Our microarray results proved to be largely consistent with those independently obtained and recently published by three other laboratories. However, we were able to reconcile differences between the previous studies regarding the extent to which fission yeast replication origins are affected by the replication checkpoint. We found (consistent with the three previous studies after appropriate interpretation) that, in surprising contrast to budding yeast, most fission yeast origins, including both early- and late-firing origins, are not significantly affected by checkpoint mutations during replication in the presence of HU. A few origins (~3%) behaved like those in budding yeast: they replicated earlier in the checkpoint mutants than in wild type. These were located primarily in the heterochromatic subtelomeric regions of chromosomes 1 and 2. Indeed, the subtelomeric regions defined by the strongest checkpoint restraint correspond precisely to previously mapped subtelomeric heterochromatin. This observation implies that subtelomeric heterochromatin in fission yeast differs from heterochromatin at centromeres, in the mating type region, and in ribosomal DNA, since these regions replicated at least as efficiently in wild-type cells as in

  14. Checkpoint independence of most DNA replication origins in fission yeast

    Directory of Open Access Journals (Sweden)

    Scott Donna

    2007-12-01

    Full Text Available Abstract Background In budding yeast, the replication checkpoint slows progress through S phase by inhibiting replication origin firing. In mammals, the replication checkpoint inhibits both origin firing and replication fork movement. To find out which strategy is employed in the fission yeast, Schizosaccharomyces pombe, we used microarrays to investigate the use of origins by wild-type and checkpoint-mutant strains in the presence of hydroxyurea (HU, which limits the pool of deoxyribonucleoside triphosphates (dNTPs and activates the replication checkpoint. The checkpoint-mutant cells carried deletions either of rad3 (which encodes the fission yeast homologue of ATR or cds1 (which encodes the fission yeast homologue of Chk2. Results Our microarray results proved to be largely consistent with those independently obtained and recently published by three other laboratories. However, we were able to reconcile differences between the previous studies regarding the extent to which fission yeast replication origins are affected by the replication checkpoint. We found (consistent with the three previous studies after appropriate interpretation that, in surprising contrast to budding yeast, most fission yeast origins, including both early- and late-firing origins, are not significantly affected by checkpoint mutations during replication in the presence of HU. A few origins (~3% behaved like those in budding yeast: they replicated earlier in the checkpoint mutants than in wild type. These were located primarily in the heterochromatic subtelomeric regions of chromosomes 1 and 2. Indeed, the subtelomeric regions defined by the strongest checkpoint restraint correspond precisely to previously mapped subtelomeric heterochromatin. This observation implies that subtelomeric heterochromatin in fission yeast differs from heterochromatin at centromeres, in the mating type region, and in ribosomal DNA, since these regions replicated at least as efficiently in wild

  15. Neuromuscular complications of immune checkpoint inhibitor therapy.

    Science.gov (United States)

    Kolb, Noah A; Trevino, Christopher R; Waheed, Waqar; Sobhani, Fatemeh; Landry, Kara K; Thomas, Alissa A; Hehir, Mike

    2018-01-17

    Immune checkpoint inhibitor (ICPI) therapy unleashes the body's natural immune system to fight cancer. ICPIs improve overall cancer survival, however, the unbridling of the immune system may induce a variety of immune-related adverse events. Neuromuscular immune complications are rare but they can be severe. Myasthenia gravis and inflammatory neuropathy are the most common neuromuscular adverse events but a variety of others including inflammatory myopathy are reported. The pathophysiologic mechanism of these autoimmune disorders may differ from that of non-ICPI-related immune diseases. Accordingly, while the optimal treatment for ICPI-related neuromuscular disorders generally follows a traditional paradigm, there are important novel considerations in selecting appropriate immunosuppressive therapy. This review presents 2 new cases, a summary of neuromuscular ICPI complications, and an approach to the diagnosis and treatment of these disorders. Muscle Nerve, 2018. © 2018 Wiley Periodicals, Inc.

  16. Keeping checkpoint/restart viable for exascale systems.

    Energy Technology Data Exchange (ETDEWEB)

    Riesen, Rolf E.; Bridges, Patrick G. (IBM Research, Ireland, Mulhuddart, Dublin); Stearley, Jon R.; Laros, James H., III; Oldfield, Ron A.; Arnold, Dorian (University of New Mexico, Albuquerque, NM); Pedretti, Kevin Thomas Tauke; Ferreira, Kurt Brian; Brightwell, Ronald Brian

    2011-09-01

    Next-generation exascale systems, those capable of performing a quintillion (10{sup 18}) operations per second, are expected to be delivered in the next 8-10 years. These systems, which will be 1,000 times faster than current systems, will be of unprecedented scale. As these systems continue to grow in size, faults will become increasingly common, even over the course of small calculations. Therefore, issues such as fault tolerance and reliability will limit application scalability. Current techniques to ensure progress across faults like checkpoint/restart, the dominant fault tolerance mechanism for the last 25 years, are increasingly problematic at the scales of future systems due to their excessive overheads. In this work, we evaluate a number of techniques to decrease the overhead of checkpoint/restart and keep this method viable for future exascale systems. More specifically, this work evaluates state-machine replication to dramatically increase the checkpoint interval (the time between successive checkpoint) and hash-based, probabilistic incremental checkpointing using graphics processing units to decrease the checkpoint commit time (the time to save one checkpoint). Using a combination of empirical analysis, modeling, and simulation, we study the costs and benefits of these approaches on a wide range of parameters. These results, which cover of number of high-performance computing capability workloads, different failure distributions, hardware mean time to failures, and I/O bandwidths, show the potential benefits of these techniques for meeting the reliability demands of future exascale platforms.

  17. Prevention of DNA Rereplication Through a Meiotic Recombination Checkpoint Response

    Directory of Open Access Journals (Sweden)

    Nicole A. Najor

    2016-12-01

    Full Text Available In the budding yeast Saccharomyces cerevisiae, unnatural stabilization of the cyclin-dependent kinase inhibitor Sic1 during meiosis can trigger extra rounds of DNA replication. When programmed DNA double-strand breaks (DSBs are generated but not repaired due to absence of DMC1, a pathway involving the checkpoint gene RAD17 prevents this DNA rereplication. Further genetic analysis has now revealed that prevention of DNA rereplication also requires MEC1, which encodes a protein kinase that serves as a central checkpoint regulator in several pathways including the meiotic recombination checkpoint response. Downstream of MEC1, MEK1 is required through its function to inhibit repair between sister chromatids. By contrast, meiotic recombination checkpoint effectors that regulate gene expression and cyclin-dependent kinase activity are not necessary. Phosphorylation of histone H2A, which is catalyzed by Mec1 and the related Tel1 protein kinase in response to DSBs, and can help coordinate activation of the Rad53 checkpoint protein kinase in the mitotic cell cycle, is required for the full checkpoint response. Phosphorylation sites that are targeted by Rad53 in a mitotic S phase checkpoint response are also involved, based on the behavior of cells containing mutations in the DBF4 and SLD3 DNA replication genes. However, RAD53 does not appear to be required, nor does RAD9, which encodes a mediator of Rad53, consistent with their lack of function in the recombination checkpoint pathway that prevents meiotic progression. While this response is similar to a checkpoint mechanism that inhibits initiation of DNA replication in the mitotic cell cycle, the evidence points to a new variation on DNA replication control.

  18. Combination approaches with immune checkpoint blockade in cancer therapy

    Directory of Open Access Journals (Sweden)

    Maarten Swart

    2016-11-01

    Full Text Available In healthy individuals, immune checkpoint molecules prevent autoimmune responses and limit immune cell-mediated tissue damage. Tumors frequently exploit these molecules to evade eradication by the immune system. Over the past years, immune checkpoint blockade of cytotoxic T lymphocyte antigen-4 (CTLA-4 and programmed death-1 (PD-1 emerged as promising strategies to activate anti-tumor cytotoxic T cell responses. Although complete regression and long-term survival is achieved in some patients, not all patients respond. This review describes promising, novel combination approaches involving immune checkpoint blockade, aimed at increasing response-rates to the single treatments.

  19. Radiotherapy and immune checkpoint blockades: a snapshot in 2016

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Tae Yool [Dept. of Radiation Oncology, Hallym University Chuncheon Sacred Heart Hospital, Chuncheon (Korea, Republic of); Kim, In Ah [Dept. of Radiation Oncology, Seoul National University College of Medicine, Seoul (Korea, Republic of)

    2016-12-15

    Immune checkpoint blockades including monoclonal antibodies (mAbs) of cytotoxic T-lymphocyte antigen-4 (CTLA-4), programmed death-1 (PD-1), and programmed death-ligand 1 (PD-L1) have been emerged as a promising anticancer therapy. Several immune checkpoint blockades have been approved by US Food and Drug Administration (FDA), and have shown notable success in clinical trials for patients with advanced melanoma and non-small cell lung cancer. Radiotherapy is a promising combination partner of immune checkpoint blockades due to its potent pro-immune effect. This review will cover the current issue and the future perspectives for combined with radiotherapy and immune checkpoint blockades based upon the available preclinical and clinical data.

  20. A New Adaptive Checkpointing Strategy for Mobile Computing

    Institute of Scientific and Technical Information of China (English)

    MENChaoguang; ZUODecheng; YANGXiaozong

    2005-01-01

    Adaptive checkpointing strategy is an efficient recovery scheme, which is suitable for mobile computing system. However, all existing adaptive checkpointing schemes are not correct to recover system when failure occurs in some special period. In this paper, the issues that will lead to system inconsistency are first discussed and then a new adaptive strategy that can recover system to correct consistent state is proposed. Our algorithm improves system recovery performance because only failure process needs rollback through logging.

  1. Role of the Checkpoint Clamp in DNA Damage Response

    Directory of Open Access Journals (Sweden)

    Mihoko Kai

    2013-01-01

    Full Text Available DNA damage occurs during DNA replication, spontaneous chemical reactions, and assaults by external or metabolism-derived agents. Therefore, all living cells must constantly contend with DNA damage. Cells protect themselves from these genotoxic stresses by activating the DNA damage checkpoint and DNA repair pathways. Coordination of these pathways requires tight regulation in order to prevent genomic instability. The checkpoint clamp complex consists of Rad9, Rad1 and Hus1 proteins, and is often called the 9-1-1 complex. This PCNA (proliferating cell nuclear antigen-like donut-shaped protein complex is a checkpoint sensor protein that is recruited to DNA damage sites during the early stage of the response, and is required for checkpoint activation. As PCNA is required for multiple pathways of DNA metabolism, the checkpoint clamp has also been implicated in direct roles in DNA repair, as well as in coordination of the pathways. Here we discuss roles of the checkpoint clamp in DNA damage response (DDR.

  2. Checkpoint blockade in combination with cancer vaccines.

    Science.gov (United States)

    Morse, Michael A; Lyerly, H Kim

    2015-12-16

    Checkpoint blockade, prevention of inhibitory signaling that limits activation or function of tumor antigen-specific T cells responses, is revolutionizing the treatment of many poor prognosis malignancies. Indeed monoclonal antibodies that modulate signaling through the inhibitory molecules CTLA-4 and PD-1 are now clinically available; however, many tumors, demonstrate minimal response suggesting the need for combinations with other therapeutic strategies. Because an inadequate frequency of activated tumor antigen-specific T cells in the tumor environment, the so-called non-inflamed phenotype, is observed in some malignancies, other rationale partners are modalities that lead to enhanced T cell activation (vaccines, cytokines, toll-like receptor agonists, and other anticancer therapies such as chemo-, radio- or targeted therapies that lead to release of antigen from tumors). This review will focus on preclinical and clinical data supporting the use of cancer vaccines with anti-CTLA-4 and anti-PD-1/PD-L1 antibodies. Preliminary preclinical data demonstrate enhanced antitumor activity although the results in human studies are less clear. Broader combinations of multiple immune modulators are now under study. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Phosphorylation of Minichromosome Maintenance 3 (MCM3) by Checkpoint Kinase 1 (Chk1) Negatively Regulates DNA Replication and Checkpoint Activation.

    Science.gov (United States)

    Han, Xiangzi; Mayca Pozo, Franklin; Wisotsky, Jacob N; Wang, Benlian; Jacobberger, James W; Zhang, Youwei

    2015-05-08

    Mechanisms controlling DNA replication and replication checkpoint are critical for the maintenance of genome stability and the prevention or treatment of human cancers. Checkpoint kinase 1 (Chk1) is a key effector protein kinase that regulates the DNA damage response and replication checkpoint. The heterohexameric minichromosome maintenance (MCM) complex is the core component of mammalian DNA helicase and has been implicated in replication checkpoint activation. Here we report that Chk1 phosphorylates the MCM3 subunit of the MCM complex at Ser-205 under normal growth conditions. Mutating the Ser-205 of MCM3 to Ala increased the length of DNA replication track and shortened the S phase duration, indicating that Ser-205 phosphorylation negatively controls normal DNA replication. Upon replicative stress treatment, the inhibitory phosphorylation of MCM3 at Ser-205 was reduced, and this reduction was accompanied with the generation of single strand DNA, the key platform for ataxia telangiectasia mutated and Rad3-related (ATR) activation. As a result, the replication checkpoint is activated. Together, these data provide significant insights into the regulation of both normal DNA replication and replication checkpoint activation through the novel phosphorylation of MCM3 by Chk1. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  4. Checkpoint responses to replication stalling: inducing tolerance and preventing mutagenesis

    Energy Technology Data Exchange (ETDEWEB)

    Kai, Mihoko; Wang, Teresa S.-F

    2003-11-27

    Replication mutants often exhibit a mutator phenotype characterized by point mutations, single base frameshifts, and the deletion or duplication of sequences flanked by homologous repeats. Mutation in genes encoding checkpoint proteins can significantly affect the mutator phenotype. Here, we use fission yeast (Schizosaccharomyces pombe) as a model system to discuss the checkpoint responses to replication perturbations induced by replication mutants. Checkpoint activation induced by a DNA polymerase mutant, aside from delay of mitotic entry, up-regulates the translesion polymerase DinB (Pol{kappa}). Checkpoint Rad9-Rad1-Hus1 (9-1-1) complex, which is loaded onto chromatin by the Rad17-Rfc2-5 checkpoint complex in response to replication perturbation, recruits DinB onto chromatin to generate the point mutations and single nucleotide frameshifts in the replication mutator. This chain of events reveals a novel checkpoint-induced tolerance mechanism that allows cells to cope with replication perturbation, presumably to make possible restarting stalled replication forks. Fission yeast Cds1 kinase plays an essential role in maintaining DNA replication fork stability in the face of DNA damage and replication fork stalling. Cds1 kinase is known to regulate three proteins that are implicated in maintaining replication fork stability: Mus81-Eme1, a hetero-dimeric structure-specific endonuclease complex; Rqh1, a RecQ-family helicase involved in suppressing inappropriate recombination during replication; and Rad60, a protein required for recombinational repair during replication. These Cds1-regulated proteins are thought to cooperatively prevent mutagenesis and maintain replication fork stability in cells under replication stress. These checkpoint-regulated processes allow cells to survive replication perturbation by preventing stalled replication forks from degenerating into deleterious DNA structures resulting in genomic instability and cancer development.

  5. Checkpoint responses to replication stalling: inducing tolerance and preventing mutagenesis

    International Nuclear Information System (INIS)

    Kai, Mihoko; Wang, Teresa S.-F.

    2003-01-01

    Replication mutants often exhibit a mutator phenotype characterized by point mutations, single base frameshifts, and the deletion or duplication of sequences flanked by homologous repeats. Mutation in genes encoding checkpoint proteins can significantly affect the mutator phenotype. Here, we use fission yeast (Schizosaccharomyces pombe) as a model system to discuss the checkpoint responses to replication perturbations induced by replication mutants. Checkpoint activation induced by a DNA polymerase mutant, aside from delay of mitotic entry, up-regulates the translesion polymerase DinB (Polκ). Checkpoint Rad9-Rad1-Hus1 (9-1-1) complex, which is loaded onto chromatin by the Rad17-Rfc2-5 checkpoint complex in response to replication perturbation, recruits DinB onto chromatin to generate the point mutations and single nucleotide frameshifts in the replication mutator. This chain of events reveals a novel checkpoint-induced tolerance mechanism that allows cells to cope with replication perturbation, presumably to make possible restarting stalled replication forks. Fission yeast Cds1 kinase plays an essential role in maintaining DNA replication fork stability in the face of DNA damage and replication fork stalling. Cds1 kinase is known to regulate three proteins that are implicated in maintaining replication fork stability: Mus81-Eme1, a hetero-dimeric structure-specific endonuclease complex; Rqh1, a RecQ-family helicase involved in suppressing inappropriate recombination during replication; and Rad60, a protein required for recombinational repair during replication. These Cds1-regulated proteins are thought to cooperatively prevent mutagenesis and maintain replication fork stability in cells under replication stress. These checkpoint-regulated processes allow cells to survive replication perturbation by preventing stalled replication forks from degenerating into deleterious DNA structures resulting in genomic instability and cancer development

  6. Berkeley lab checkpoint/restart (BLCR) for Linux clusters

    International Nuclear Information System (INIS)

    Hargrove, Paul H; Duell, Jason C

    2006-01-01

    This article describes the motivation, design and implementation of Berkeley Lab Checkpoint/Restart (BLCR), a system-level checkpoint/restart implementation for Linux clusters that targets the space of typical High Performance Computing applications, including MPI. Application-level solutions, including both checkpointing and fault-tolerant algorithms, are recognized as more time and space efficient than system-level checkpoints, which cannot make use of any application-specific knowledge. However, system-level checkpointing allows for preemption, making it suitable for responding to ''fault precursors'' (for instance, elevated error rates from ECC memory or network CRCs, or elevated temperature from sensors). Preemption can also increase the efficiency of batch scheduling; for instance reducing idle cycles (by allowing for shutdown without any queue draining period or reallocation of resources to eliminate idle nodes when better fitting jobs are queued), and reducing the average queued time (by limiting large jobs to running during off-peak hours, without the need to limit the length of such jobs). Each of these potential uses makes BLCR a valuable tool for efficient resource management in Linux clusters

  7. Developmental checkpoints and feedback circuits time insect maturation

    DEFF Research Database (Denmark)

    Rewitz, Kim Furbo; Yamanaka, Naoki; O'Connor, Michael B.

    2013-01-01

    as external cues, to time production and release of ecdysone. Based on results discussed here, we suggest that developmental progression to adulthood is controlled by checkpoints that regulate the genetic timing program enabling it to adapt to different environmental conditions. These checkpoints utilize...... a number of signaling pathways to modulate ecdysone production in the prothoracic gland. Release of ecdysone activates an autonomous cascade of both feedforward and feedback signals that determine the duration of the ecdysone pulse at each developmental transitions. Conservation of the genetic mechanisms...... that coordinate the juvenile-adult transition suggests that insights from the fruit fly Drosophila will provide a framework for future investigation of developmental timing in metazoans....

  8. The Dynamical Mechanisms of the Cell Cycle Size Checkpoint

    International Nuclear Information System (INIS)

    Feng Shi-Fu; Yang Ling; Yan Jie; Liu Zeng-Rong

    2012-01-01

    Cell division must be tightly coupled to cell growth in order to maintain cell size, whereas the mechanisms of how initialization of mitosis is regulated by cell size remain to be elucidated. We develop a mathematical model of the cell cycle, which incorporates cell growth to investigate the dynamical properties of the size checkpoint in embryos of Xenopus laevis. We show that the size checkpoint is naturally raised from a saddle-node bifurcation, and in a mutant case, the cell loses its size control ability due to the loss of this saddle-node point

  9. ATM and checkpoint responses to DNA double strand breaks

    International Nuclear Information System (INIS)

    Khanna, K.K.

    2003-01-01

    DNA damage checkpoints can be classified into G1/S, intra-S and G2/M checkpoints, so named according to the cell cycle transitions that they regulate. DNA damage incurred during the G1 or G2 phase of the cell cycle leads to growth arrest at the G1/S and G2/M phase boundaries, respectively, whereas genotoxic stress during S phase results in the transient suppression of DNA synthesis. In mammals, ATM (ataxia-telangiectasia mutated) is a protein kinase that controls all checkpoint responses to DNA damage. ATM is a versatile kinase which uses various means to regulate a given checkpoint pathway. It has been shown to act upon several proteins within the same pathway, many times controlling several different modifications of the same protein or using several different targets to arrive at the same end point. Some of the ATM targets act as adaptors by recruiting additional substrates for ATM. ATM controls two types of responses in G1. The p53-dependent responses inhibit Cyclin/Cdk activity by transcriptional induction of p21, whereas p53-independent responses inhibit CDKs through degradation of Cdc25A to maintain CdK2 inhibitory phosphorylation. In regulating p53, ATM directly phosphorylates p53 on Ser15, which likely causes p53 transcriptional activation, concurrently activating other kinases that phosphorylate p53 at other sites such as Ser20, which reduces the ability of MDM2 to bind p53, thus promoting its stability. ATM further ensures p53 stability by phosphorylating MDM2. At least six ATM targets, namely CHK2, CHK1, NBS1, BRCA1, SMC1 and FANCD2, have been implicated in the control of S-phase checkpoint. Cdc25A is the downstream effector of CHK1 and CHK2, though the underlying mechanism for control of intra S-phase checkpoint by other targets remain obscure. G2 checkpoint prevents mitotic entry solely through inhibitory phosphorylation of Cdc2/Cdk1. Several ATM targets including CHK1, CHK2, BRCA1, MDC1 and p53BP1 have been implicated in the control of G2/M

  10. The DNA Replication Checkpoint Directly Regulates MBF-Dependent G1/S Transcription▿

    OpenAIRE

    Dutta, Chaitali; Patel, Prasanta K.; Rosebrock, Adam; Oliva, Anna; Leatherwood, Janet; Rhind, Nicholas

    2008-01-01

    The DNA replication checkpoint transcriptionally upregulates genes that allow cells to adapt to and survive replication stress. Our results show that, in the fission yeast Schizosaccharomyces pombe, the replication checkpoint regulates the entire G1/S transcriptional program by directly regulating MBF, the G1/S transcription factor. Instead of initiating a checkpoint-specific transcriptional program, the replication checkpoint targets MBF to maintain the normal G1/S transcriptional program du...

  11. Cell cycle checkpoints: reversible when possible, irreversible when needed

    NARCIS (Netherlands)

    Krenning, L.

    2015-01-01

    Cell cycle checkpoints are reversible in nature, and can prevent progression into the next cell cycle phase if needed. In the case of DNA damage, cells can prevent progression from G1 into S phase, and from G2 into mitosis in the presence of DNA double strand breaks. Following DNA repair, these

  12. Development of cell-cycle checkpoint therapy for solid tumors.

    Science.gov (United States)

    Tamura, Kenji

    2015-12-01

    Cellular proliferation is tightly controlled by several cell-cycle checkpoint proteins. In cancer, the genes encoding these proteins are often disrupted and cause unrestrained cancer growth. The proteins are over-expressed in many malignancies; thus, they are potential targets for anti-cancer therapies. These proteins include cyclin-dependent kinase, checkpoint kinase, WEE1 kinase, aurora kinase and polo-like kinase. Cyclin-dependent kinase inhibitors are the most advanced cell-cycle checkpoint therapeutics available. For instance, palbociclib (PD0332991) is a first-in-class, oral, highly selective inhibitor of CDK4/6 and, in combination with letrozole (Phase II; PALOMA-1) or with fulvestrant (Phase III; PALOMA-3), it has significantly prolonged progression-free survival, in patients with metastatic estrogen receptor-positive, HER2-negative breast cancer, in comparison with that observed in patients using letrozole, or fulvestrant alone, respectively. In this review, we provide an overview of the current compounds available for cell-cycle checkpoint protein-directed therapy for solid tumors. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Immune-Checkpoint Blockade and Active Immunotherapy for Glioma

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Brian J. [Department of Immunology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Brain Tumor Program, University of Pittsburgh Cancer Institute, Pittsburgh, PA 15213 (United States); Pollack, Ian F. [Brain Tumor Program, University of Pittsburgh Cancer Institute, Pittsburgh, PA 15213 (United States); Department of Neurological Surgery, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Okada, Hideho, E-mail: okadah@upmc.edu [Department of Immunology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Brain Tumor Program, University of Pittsburgh Cancer Institute, Pittsburgh, PA 15213 (United States); Department of Neurological Surgery, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States); Department of Surgery, University of Pittsburgh School of Medicine, Pittsburgh, PA 15213 (United States)

    2013-11-01

    Cancer immunotherapy has made tremendous progress, including promising results in patients with malignant gliomas. Nonetheless, the immunological microenvironment of the brain and tumors arising therein is still believed to be suboptimal for sufficient antitumor immune responses for a variety of reasons, including the operation of “immune-checkpoint” mechanisms. While these mechanisms prevent autoimmunity in physiological conditions, malignant tumors, including brain tumors, actively employ these mechanisms to evade from immunological attacks. Development of agents designed to unblock these checkpoint steps is currently one of the most active areas of cancer research. In this review, we summarize recent progresses in the field of brain tumor immunology with particular foci in the area of immune-checkpoint mechanisms and development of active immunotherapy strategies. In the last decade, a number of specific monoclonal antibodies designed to block immune-checkpoint mechanisms have been developed and show efficacy in other cancers, such as melanoma. On the other hand, active immunotherapy approaches, such as vaccines, have shown encouraging outcomes. We believe that development of effective immunotherapy approaches should ultimately integrate those checkpoint-blockade agents to enhance the efficacy of therapeutic approaches. With these agents available, it is going to be quite an exciting time in the field. The eventual success of immunotherapies for brain tumors will be dependent upon not only an in-depth understanding of immunology behind the brain and brain tumors, but also collaboration and teamwork for the development of novel trials that address multiple layers of immunological challenges in gliomas.

  14. Immune checkpoint inhibitors for nonsmall cell lung cancer treatment

    Directory of Open Access Journals (Sweden)

    Yuh-Min Chen

    2017-01-01

    Full Text Available Immune checkpoint inhibition with blocking antibodies that target cytotoxic T-lymphocyte antigen-4 (CTLA-4 and the programmed cell death protein 1 (PD-1 pathway [PD-1/programmed death-ligand 1 (PD-L1] have demonstrated promise in a variety of malignancies. While ipilimumab has been approved as a CTLA-4 blocking antibody by the US Food and Drug Administration for the treatment of advanced melanoma, it is still not approved for lung cancer treatment. In contrast, nivolumab and pembrolizumab, both PD-1 blocking antibodies, have been approved for second-line treatment of nonsmall cell lung cancer in 2015 because of their high potency and long-lasting effects in some patient subgroups. Other PD-1 and PD-L1 monoclonal antibodies are also in active development phase. Treatment with such immune checkpoint inhibitors is associated with a unique pattern of immune-related adverse events or side effects. Combination approaches involving CTLA-4 and PD-1/PD-L1 blockade or checkpoint inhibitors with chemotherapy or radiotherapy are being investigated to determine whether they may enhance the efficacy of treatment. Despite many challenges ahead, immunotherapy with checkpoint inhibitors has already become a new and important treatment modality for lung cancer in the last decade following the discovery of targeted therapy.

  15. Immune-Checkpoint Blockade and Active Immunotherapy for Glioma

    International Nuclear Information System (INIS)

    Ahn, Brian J.; Pollack, Ian F.; Okada, Hideho

    2013-01-01

    Cancer immunotherapy has made tremendous progress, including promising results in patients with malignant gliomas. Nonetheless, the immunological microenvironment of the brain and tumors arising therein is still believed to be suboptimal for sufficient antitumor immune responses for a variety of reasons, including the operation of “immune-checkpoint” mechanisms. While these mechanisms prevent autoimmunity in physiological conditions, malignant tumors, including brain tumors, actively employ these mechanisms to evade from immunological attacks. Development of agents designed to unblock these checkpoint steps is currently one of the most active areas of cancer research. In this review, we summarize recent progresses in the field of brain tumor immunology with particular foci in the area of immune-checkpoint mechanisms and development of active immunotherapy strategies. In the last decade, a number of specific monoclonal antibodies designed to block immune-checkpoint mechanisms have been developed and show efficacy in other cancers, such as melanoma. On the other hand, active immunotherapy approaches, such as vaccines, have shown encouraging outcomes. We believe that development of effective immunotherapy approaches should ultimately integrate those checkpoint-blockade agents to enhance the efficacy of therapeutic approaches. With these agents available, it is going to be quite an exciting time in the field. The eventual success of immunotherapies for brain tumors will be dependent upon not only an in-depth understanding of immunology behind the brain and brain tumors, but also collaboration and teamwork for the development of novel trials that address multiple layers of immunological challenges in gliomas

  16. A checkpoint compression study for high-performance computing systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibtesham, Dewan [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Computer Science; Ferreira, Kurt B. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States). Scalable System Software Dept.; Arnold, Dorian [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Computer Science

    2015-02-17

    As high-performance computing systems continue to increase in size and complexity, higher failure rates and increased overheads for checkpoint/restart (CR) protocols have raised concerns about the practical viability of CR protocols for future systems. Previously, compression has proven to be a viable approach for reducing checkpoint data volumes and, thereby, reducing CR protocol overhead leading to improved application performance. In this article, we further explore compression-based CR optimization by exploring its baseline performance and scaling properties, evaluating whether improved compression algorithms might lead to even better application performance and comparing checkpoint compression against and alongside other software- and hardware-based optimizations. Our results highlights are: (1) compression is a very viable CR optimization; (2) generic, text-based compression algorithms appear to perform near optimally for checkpoint data compression and faster compression algorithms will not lead to better application performance; (3) compression-based optimizations fare well against and alongside other software-based optimizations; and (4) while hardware-based optimizations outperform software-based ones, they are not as cost effective.

  17. CHECKPOINT INHIBITOR IMMUNE THERAPY: Systemic Indications and Ophthalmic Side Effects.

    Science.gov (United States)

    Dalvin, Lauren A; Shields, Carol L; Orloff, Marlana; Sato, Takami; Shields, Jerry A

    2018-06-01

    To review immune checkpoint inhibitor indications and ophthalmic side effects. A literature review was performed using a PubMed search for publications between 1990 and 2017. Immune checkpoint inhibitors are designed to treat system malignancies by targeting one of three ligands, leading to T-cell activation for attack against malignant cells. These ligands (and targeted drug) include cytotoxic T-lymphocyte antigen-4 (CTLA-4, ipilimumab), programmed death protein 1 (PD-1, pembrolizumab, nivolumab), and programmed death ligand-1 (PD-L1, atezolizumab, avelumab, durvalumab). These medications upregulate the immune system and cause autoimmune-like side effects. Ophthalmic side effects most frequently manifest as uveitis (1%) and dry eye (1-24%). Other side effects include myasthenia gravis (n = 19 reports), inflammatory orbitopathy (n = 11), keratitis (n = 3), cranial nerve palsy (n = 3), optic neuropathy (n = 2), serous retinal detachment (n = 2), extraocular muscle myopathy (n = 1), atypical chorioretinal lesions (n = 1), immune retinopathy (n = 1), and neuroretinitis (n = 1). Most inflammatory side effects are managed with topical or periocular corticosteroids, but advanced cases require systemic corticosteroids and cessation of checkpoint inhibitor therapy. Checkpoint inhibitors enhance the immune system by releasing inhibition on T cells, with risk of autoimmune-like side effects. Ophthalmologists should include immune-related adverse events in their differential when examining cancer patients with new ocular symptoms.

  18. Checkpointing for graceful degradation in distributed embedded systems

    Science.gov (United States)

    Sababha, Belal Hussein

    Graceful degradation is an approach to developing dependable safety-critical embedded applications, where redundant active or standby resources are used to cope with faults through a system reconfiguration at run-time. Compared to traditional hardware and software redundancy, it is a promising technique that may achieve dependability with a significant reduction in cost, size, weight, and power requirements. Reconfiguration at run-time necessitates using proper checkpointing protocols to support state reservation to ensure correct task restarts after a system reconfiguration. One of the most common checkpointing protocols are communication induced checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This work implements and evaluates some of the most common CIC protocols in a periodic resource constrained distributed embedded system for graceful degradation purposes. A test-bed has been developed and used for the evaluation of the various protocols. The implemented protocols are thoroughly studied and performances are contrasted. Specifically the periodicity property and how it benefits checkpointing in embedded systems is investigated. This work introduces a unique effort of CIC protocol implementation and evaluation in the field of distributed embedded systems. Other than providing a test-bed for graceful degradation support, this work shows that some checkpointing protocols that are not efficient in large information systems and supercomputers perform well in embedded systems. We show that a simple index-based CIC protocol, such as the BCS protocol, is more appropriate in embedded system applications compared to other protocols that piggyback a significant amount of information to reduce the number of forced checkpoints. Finally, this work proposes a whole graceful degradation approach to achieve fault tolerance in resource constrained

  19. Checkpoint inhibitors in endometrial cancer: preclinical rationale and clinical activity.

    Science.gov (United States)

    Mittica, Gloria; Ghisoni, Eleonora; Giannone, Gaia; Aglietta, Massimo; Genta, Sofia; Valabrega, Giorgio

    2017-10-27

    Treatment of advanced and recurrent endometrial cancer (EC) is still an unmet need for oncologists and gynecologic oncologists. The Cancer Genome Atlas Research Network (TCGA) recently provided a new genomic classification, dividing EC in four subgroups. Two types of EC, the polymerase epsilon (POLE)-ultra-mutated and the microsatellite instability-hyper-mutated (MSI-H), are characterized by a high mutation rate providing the rationale for a potential activity of checkpoint inhibitors. We analyzed all available evidence supporting the role of tumor microenvironment (TME) in EC development and the therapeutic implications offered by immune checkpoint inhibitors in this setting. We performed a review on Pubmed with Mesh keywords 'endometrial cancer' and the name of each checkpoint inhibitor discussed in the article. The same search was operated on clinicaltrial.gov to identify ongoing clinical trials exploring PD-1/PD-L1 and CTLA-4 axis in EC, particularly focusing on POLE-ultra-muted and MSI-H cancer types. POLE-ultra-mutated and MSI-H ECs showed an active TME expressing high number of neo-antigens and an elevated amount of tumor infiltrating lymphocytes (TILs). Preliminary results from a phase-1 clinical trial (KEYNOTE-028) demonstrated antitumor activity of Pembrolizumab in EC. Moreover, both Pembrolizumab and Nivolumab reported durable clinical responses in POLE-ultra-mutated patients. Immune checkpoint inhibitors are an attractive option in POLE-ultra-mutated and MSI-H ECs. Future investigations in these subgroups include combinations of checkpoints inhibitors with chemotherapy and small tyrosine kinase inhibitors (TKIs) to enhance a more robust intra-tumoral immune response.

  20. Cell size checkpoint control by the retinoblastoma tumor suppressor pathway.

    Science.gov (United States)

    Fang, Su-Chiung; de los Reyes, Chris; Umen, James G

    2006-10-13

    Size control is essential for all proliferating cells, and is thought to be regulated by checkpoints that couple cell size to cell cycle progression. The aberrant cell-size phenotypes caused by mutations in the retinoblastoma (RB) tumor suppressor pathway are consistent with a role in size checkpoint control, but indirect effects on size caused by altered cell cycle kinetics are difficult to rule out. The multiple fission cell cycle of the unicellular alga Chlamydomonas reinhardtii uncouples growth from division, allowing direct assessment of the relationship between size phenotypes and checkpoint function. Mutations in the C. reinhardtii RB homolog encoded by MAT3 cause supernumerous cell divisions and small cells, suggesting a role for MAT3 in size control. We identified suppressors of an mat3 null allele that had recessive mutations in DP1 or dominant mutations in E2F1, loci encoding homologs of a heterodimeric transcription factor that is targeted by RB-related proteins. Significantly, we determined that the dp1 and e2f1 phenotypes were caused by defects in size checkpoint control and were not due to a lengthened cell cycle. Despite their cell division defects, mat3, dp1, and e2f1 mutants showed almost no changes in periodic transcription of genes induced during S phase and mitosis, many of which are conserved targets of the RB pathway. Conversely, we found that regulation of cell size was unaffected when S phase and mitotic transcription were inhibited. Our data provide direct evidence that the RB pathway mediates cell size checkpoint control and suggest that such control is not directly coupled to the magnitude of periodic cell cycle transcription.

  1. Covering Resilience: A Recent Development for Binomial Checkpointing

    Energy Technology Data Exchange (ETDEWEB)

    Walther, Andrea; Narayanan, Sri Hari Krishna

    2016-09-12

    In terms of computing time, adjoint methods offer a very attractive alternative to compute gradient information, required, e.g., for optimization purposes. However, together with this very favorable temporal complexity result comes a memory requirement that is in essence proportional with the operation count of the underlying function, e.g., if algorithmic differentiation is used to provide the adjoints. For this reason, checkpointing approaches in many variants have become popular. This paper analyzes an extension of the so-called binomial approach to cover also possible failures of the computing systems. Such a measure of precaution is of special interest for massive parallel simulations and adjoint calculations where the mean time between failure of the large scale computing system is smaller than the time needed to complete the calculation of the adjoint information. We describe the extensions of standard checkpointing approaches required for such resilience, provide a corresponding implementation and discuss first numerical results.

  2. Implementing forward recovery using checkpointing in distributed systems

    Science.gov (United States)

    Long, Junsheng; Fuchs, W. K.; Abraham, Jacob A.

    1991-01-01

    The paper describes the implementation of a forward recovery scheme using checkpoints and replicated tasks. The implementation is based on the concept of lookahead execution and rollback validation. In the experiment, two tasks are selected for the normal execution and one for rollback validation. It is shown that the recovery strategy has nearly error-free execution time and an average redundancy lower than TMR.

  3. Analysis of Drug Development Paradigms for Immune Checkpoint Inhibitors.

    Science.gov (United States)

    Jardim, Denis L; de Melo Gagliato, Débora; Giles, Francis J; Kurzrock, Razelle

    2018-04-15

    Immune checkpoint inhibitors have unique toxicities and response kinetics compared with cytotoxic and gene-targeted anticancer agents. We investigated the impact of innovative/accelerated immunotherapy drug development/approval models on the accuracy of safety and efficacy assessments by searching the FDA website. Initial phase I trials for each agent were reviewed and safety and efficacy data compared with that found in later trials leading to regulatory approvals of the same agents. As of June 2017, the FDA approved six checkpoint inhibitors for a variety of cancer types. All checkpoint inhibitors received a priority review status and access to at least two additional FDA special access programs, more often breakthrough therapy designation and accelerated approval. Median clinical development time (investigational new drug application to approval) was 60.77 months [avelumab had the shortest timeline (52.33 months)]. Response rates during early phase I trials (median = 16%) are higher than for phase I trials of other agents (with the exception of gene-targeted agents tested with a biomarker). Doses approved were usually not identical to doses recommended on phase I trials. Approximately 50% of types of immune-related and 43% of types of clinically relevant toxicities from later trials were identified in early-phase trials. Even so, treatment-related mortality remains exceedingly low in later studies (0.33% of patients). In conclusion, efficacy and safety of immune checkpoint inhibitors appear to be reasonably predicted from the dose-finding portion of phase I trials, indicating that the fast-track development of these agents is safe and justified. Clin Cancer Res; 24(8); 1785-94. ©2017 AACR . ©2017 American Association for Cancer Research.

  4. Spindle assembly checkpoint acquisition at the mid-blastula transition.

    Directory of Open Access Journals (Sweden)

    Maomao Zhang

    Full Text Available The spindle assembly checkpoint (SAC maintains the fidelity of chromosome segregation during mitosis. Nonpathogenic cells lacking the SAC are typically only found in cleavage stage metazoan embryos, which do not acquire functional checkpoints until the mid-blastula transition (MBT. It is unclear how proper SAC function is acquired at the MBT, though several models exist. First, SAC acquisition could rely on transcriptional activity, which increases dramatically at the MBT. Embryogenesis prior to the MBT relies primarily on maternally loaded transcripts, and if SAC signaling components are not maternally supplied, the SAC would depend on zygotic transcription at the MBT. Second, checkpoint acquisition could depend on the Chk1 kinase, which is activated at the MBT to elongate cell cycles and is required for the SAC in somatic cells. Third, SAC function could depend on a threshold nuclear to cytoplasmic (N:C ratio, which increases during pre-MBT cleavage cycles and dictates several MBT events like zygotic transcription and cell cycle remodeling. Finally, the SAC could by regulated by a timer mechanism that coincides with other MBT events but is independent of them. Using zebrafish embryos we show that SAC acquisition at the MBT is independent of zygotic transcription, indicating that the checkpoint program is maternally supplied. Additionally, by precociously lengthening cleavage cycles with exogenous Chk1 activity, we show that cell cycle lengthening and Chk1 activity are not sufficient for SAC acquisition. Furthermore, we find that SAC acquisition can be uncoupled from the N:C ratio. Together, our findings indicate that SAC acquisition is regulated by a maternally programmed developmental timer.

  5. The final checkpoint. Cancer as an adaptive evolutionary mechanism

    Directory of Open Access Journals (Sweden)

    Rumena Petkova

    2016-05-01

    Full Text Available The mechanisms for identification of DNA damage and repair usually manage DNA damage very efficiently. If damaged cells manage to bypass the checkpoints where the integrity of the genome is assessed and the decisions whether to proceed with the cell cycle are made, they may evade the imperative to stop dividing and to die. As a result, cancer may develop. Warding off the potential sequence-altering effects of DNA damage during the life of the individual or the existence span of the species is controlled by a set of larger checkpoints acting on a progressively increasing scale, from systematic removal of damaged cells from the proliferative pool by means of repair of DNA damage/programmed cell death through ageing to, finally, cancer. They serve different purposes and act at different levels of the life cycle, safeguarding the integrity of the genetic backup of the individual, the genetic diversity of the population, and, finally, the survival of the species and of life on Earth. In the light of the theory that cancer is the final checkpoint or the nature's manner to prevent complex organisms from living forever at the expense of genetic stagnation, the eventual failure of modern anti-cancer treatments is only to be expected. Nevertheless, the medicine of today and the near future has enough potential to slow down the progression to terminal cancer so that the life expectancy and the quality of life of cancer-affected individuals may be comparable to those of healthy aged individuals.

  6. Sobriety checkpoints in Thailand: a review of effectiveness and developments over time.

    Science.gov (United States)

    Ditsuwan, Vallop; Veerman, J Lennert; Bertram, Melanie; Vos, Theo

    2015-03-01

    This review describes the legal basis for and implementation of sobriety checkpoints in Thailand and identifies factors that influenced their historical development and effectiveness. The first alcohol and traffic injury control law in Thailand was implemented in 1934. The 0.05 g/100 mL blood alcohol concentration limit was set in 1994. Currently, 3 types of sobriety checkpoints are used: general police checkpoints, selective breath testing, and special event sobriety checkpoints. The authors found few reports on the strategies, frequencies, and outcomes for any of these types of checkpoints, despite Thailand having devoted many resources to their implementation. In Thailand and other low-middle income countries, it is necessary to address the country-specific barriers to successful enforcement (including political and logistical issues, lack of equipment, and absence of other supportive alcohol harm reduction measures) before sobriety checkpoints can be expected to be as effective as reported in high-income countries. © 2011 APJPH.

  7. Emodnet Med Sea Check-Point - Indicators for decision- maker

    Science.gov (United States)

    Besnard, Sophie; Claverie, Vincent; Blanc, Frédérique

    2015-04-01

    The Emodnet Checkpoint projects aim is to assess the cost-effectiveness, reliability and utility of the existing monitoring at the sea basin level. This involves the development of monitoring system indicators and a GIS Platform to perform the assessment and make it available. Assessment or production of Check-Point information is made by developing targeted products based on the monitoring data and determining whether the products are meeting the needs of industry and public authorities. Check-point users are the research community, the 'institutional' policy makers for IMP and MSFD implementation, the 'intermediate users', i.e., users capable to understand basic raw data but that benefit from seeing the Checkpoint targeted products and the assessment of the fitness for purpose. We define assessment criteria aimed to characterize/depict the input datasets in terms of 3 territories capable to show performance and gaps of the present monitoring system, appropriateness, availability and fitness for purpose. • Appropriateness: What is made available to users? What motivate/decide them to select this observation rather than this one. • Availability: How this is made available to the user? Place to understand the readiness and service performance of the EU infrastructure • Fitness for use / fitness for purpose: Ability for non-expert user to appreciate the data exploitability (feedback on efficiency & reliability of marine data) For each territory (appropriateness, Availability and Fitness for purpose / for use), we define several indicators. For example, for Availability we define Visibility, Accessibility and Performance. And Visibility is itself defined by "Easily found" and "EU service". So these indicators can be classified according to their territory and sub-territory as seen above, but also according to the complexity to build them. Indicators are built from raw descriptors in 3 stages:  Stage 1: to give a neutral and basic status directly computed from

  8. The spindle assembly checkpoint: More than just keeping track of the spindle.

    OpenAIRE

    Lawrence, KS; Engebrecht, J

    2015-01-01

    Genome stability is essential for cell proliferation and survival. Consequently, genome integrity is monitored by two major checkpoints, the DNA damage response (DDR) and the spindle assembly checkpoint (SAC). The DDR monitors DNA lesions in G1, S, and G2 stages of the cell cycle and the SAC ensures proper chromosome segregation in M phase. There have been extensive studies characterizing the roles of these checkpoints in response to the processes for which they are named; however, emerging e...

  9. The DNA replication checkpoint directly regulates MBF-dependent G1/S transcription.

    Science.gov (United States)

    Dutta, Chaitali; Patel, Prasanta K; Rosebrock, Adam; Oliva, Anna; Leatherwood, Janet; Rhind, Nicholas

    2008-10-01

    The DNA replication checkpoint transcriptionally upregulates genes that allow cells to adapt to and survive replication stress. Our results show that, in the fission yeast Schizosaccharomyces pombe, the replication checkpoint regulates the entire G(1)/S transcriptional program by directly regulating MBF, the G(1)/S transcription factor. Instead of initiating a checkpoint-specific transcriptional program, the replication checkpoint targets MBF to maintain the normal G(1)/S transcriptional program during replication stress. We propose a mechanism for this regulation, based on in vitro phosphorylation of the Cdc10 subunit of MBF by the Cds1 replication-checkpoint kinase. Replacement of two potential phosphorylation sites with phosphomimetic amino acids suffices to promote the checkpoint transcriptional program, suggesting that Cds1 phosphorylation directly regulates MBF-dependent transcription. The conservation of MBF between fission and budding yeast, and recent results implicating MBF as a target of the budding yeast replication checkpoint, suggests that checkpoint regulation of the MBF transcription factor is a conserved strategy for coping with replication stress. Furthermore, the structural and regulatory similarity between MBF and E2F, the metazoan G(1)/S transcription factor, suggests that this checkpoint mechanism may be broadly conserved among eukaryotes.

  10. Action-oriented use of ergonomic checkpoints for healthy work design in different settings.

    Science.gov (United States)

    Kogi, Kazutaka

    2007-12-01

    Recent experiences in the action-oriented use of ergonomic checkpoints in different work settings are reviewed. The purpose is to know what features are useful for healthy work design adjusted to each local situation. Based on the review results, common features of ergonomic checkpoints used in participatory training programs for improving workplace conditions in small enterprises, construction sites, home work and agriculture in industrially developing countries in Asia are discussed. These checkpoints generally compile practical improvement options in a broad range of technical areas, such as materials handling, workstation design, physical environment and work organization. Usually, "action checklists" comprising the tiles of the checkpoints are used together. A clear focus is placed on readily applicable low-cost options. Three common features of these various checkpoints appear to be important. First, the checkpoints represent typical good practices in multiple areas. Second, each how-to section of these checkpoints presents simple improvements reflecting basic ergonomic principles. Examples of these principles include easy reach, fewer and faster transport, elbow-level work, coded displays, isolated or screened hazards and shared teamwork. Third, the illustrated checkpoints accompanied by corresponding checklists are used as group work tools in short-term training courses. Many practical improvements achieved are displayed in websites for inter-country work improvement networks. It is suggested to promote the use of locally adjusted checkpoints in various forms of participatory action-oriented training in small-scale workplaces and in agriculture particularly in industrially developing countries.

  11. The DNA Replication Checkpoint Directly Regulates MBF-Dependent G1/S Transcription▿

    Science.gov (United States)

    Dutta, Chaitali; Patel, Prasanta K.; Rosebrock, Adam; Oliva, Anna; Leatherwood, Janet; Rhind, Nicholas

    2008-01-01

    The DNA replication checkpoint transcriptionally upregulates genes that allow cells to adapt to and survive replication stress. Our results show that, in the fission yeast Schizosaccharomyces pombe, the replication checkpoint regulates the entire G1/S transcriptional program by directly regulating MBF, the G1/S transcription factor. Instead of initiating a checkpoint-specific transcriptional program, the replication checkpoint targets MBF to maintain the normal G1/S transcriptional program during replication stress. We propose a mechanism for this regulation, based on in vitro phosphorylation of the Cdc10 subunit of MBF by the Cds1 replication-checkpoint kinase. Replacement of two potential phosphorylation sites with phosphomimetic amino acids suffices to promote the checkpoint transcriptional program, suggesting that Cds1 phosphorylation directly regulates MBF-dependent transcription. The conservation of MBF between fission and budding yeast, and recent results implicating MBF as a target of the budding yeast replication checkpoint, suggests that checkpoint regulation of the MBF transcription factor is a conserved strategy for coping with replication stress. Furthermore, the structural and regulatory similarity between MBF and E2F, the metazoan G1/S transcription factor, suggests that this checkpoint mechanism may be broadly conserved among eukaryotes. PMID:18662996

  12. Multiple Duties for Spindle Assembly Checkpoint Kinases in Meiosis

    Science.gov (United States)

    Marston, Adele L.; Wassmann, Katja

    2017-01-01

    Cell division in mitosis and meiosis is governed by evolutionary highly conserved protein kinases and phosphatases, controlling the timely execution of key events such as nuclear envelope breakdown, spindle assembly, chromosome attachment to the spindle and chromosome segregation, and cell cycle exit. In mitosis, the spindle assembly checkpoint (SAC) controls the proper attachment to and alignment of chromosomes on the spindle. The SAC detects errors and induces a cell cycle arrest in metaphase, preventing chromatid separation. Once all chromosomes are properly attached, the SAC-dependent arrest is relieved and chromatids separate evenly into daughter cells. The signaling cascade leading to checkpoint arrest depends on several protein kinases that are conserved from yeast to man. In meiosis, haploid cells containing new genetic combinations are generated from a diploid cell through two specialized cell divisions. Though apparently less robust, SAC control also exists in meiosis. Recently, it has emerged that SAC kinases have additional roles in executing accurate chromosome segregation during the meiotic divisions. Here, we summarize the main differences between mitotic and meiotic cell divisions, and explain why meiotic divisions pose special challenges for correct chromosome segregation. The less-known meiotic roles of the SAC kinases are described, with a focus on two model systems: yeast and mouse oocytes. The meiotic roles of the canonical checkpoint kinases Bub1, Mps1, the pseudokinase BubR1 (Mad3), and Aurora B and C (Ipl1) will be discussed. Insights into the molecular signaling pathways that bring about the special chromosome segregation pattern during meiosis will help us understand why human oocytes are so frequently aneuploid. PMID:29322045

  13. Multiple Duties for Spindle Assembly Checkpoint Kinases in Meiosis

    Directory of Open Access Journals (Sweden)

    Adele L. Marston

    2017-12-01

    Full Text Available Cell division in mitosis and meiosis is governed by evolutionary highly conserved protein kinases and phosphatases, controlling the timely execution of key events such as nuclear envelope breakdown, spindle assembly, chromosome attachment to the spindle and chromosome segregation, and cell cycle exit. In mitosis, the spindle assembly checkpoint (SAC controls the proper attachment to and alignment of chromosomes on the spindle. The SAC detects errors and induces a cell cycle arrest in metaphase, preventing chromatid separation. Once all chromosomes are properly attached, the SAC-dependent arrest is relieved and chromatids separate evenly into daughter cells. The signaling cascade leading to checkpoint arrest depends on several protein kinases that are conserved from yeast to man. In meiosis, haploid cells containing new genetic combinations are generated from a diploid cell through two specialized cell divisions. Though apparently less robust, SAC control also exists in meiosis. Recently, it has emerged that SAC kinases have additional roles in executing accurate chromosome segregation during the meiotic divisions. Here, we summarize the main differences between mitotic and meiotic cell divisions, and explain why meiotic divisions pose special challenges for correct chromosome segregation. The less-known meiotic roles of the SAC kinases are described, with a focus on two model systems: yeast and mouse oocytes. The meiotic roles of the canonical checkpoint kinases Bub1, Mps1, the pseudokinase BubR1 (Mad3, and Aurora B and C (Ipl1 will be discussed. Insights into the molecular signaling pathways that bring about the special chromosome segregation pattern during meiosis will help us understand why human oocytes are so frequently aneuploid.

  14. Predictors of responses to immune checkpoint blockade in advanced melanoma

    DEFF Research Database (Denmark)

    Jacquelot, N; Roberti, M P; Enot, D P

    2017-01-01

    Immune checkpoint blockers (ICB) have become pivotal therapies in the clinical armamentarium against metastatic melanoma (MMel). Given the frequency of immune related adverse events and increasing use of ICB, predictors of response to CTLA-4 and/or PD-1 blockade represent unmet clinical needs....... Using a systems biology-based approach to an assessment of 779 paired blood and tumor markers in 37 stage III MMel patients, we analyzed association between blood immune parameters and the functional immune reactivity of tumor-infiltrating cells after ex vivo exposure to ICB. Based on this assay, we...

  15. Central Tolerance Blockade to Augment Checkpoint Immunotherapy in Melanoma

    Science.gov (United States)

    2017-09-01

    expressed at higher levels in medullary thymic epithelial cells (mTECs) than in cortical thymic epithelial cells (cTECs), addition of anti-RANKL antibody...relative Aire expression by quantitative RT-PCR in cultured thymic tissue . 12-15 90% Subtask 3. Culture human thymus sections with OPG-Fc or vehicle...PCR in cultured thymic tissue . 15-18 90% ACURO approval 13-14 100% Major Task 1. Effect of concurrent anti-RANKL and checkpoint inhibitor

  16. Conformation-specific anti-Mad2 monoclonal antibodies for the dissection of checkpoint signaling

    DEFF Research Database (Denmark)

    Sedgwick, Garry G; Larsen, Marie Sofie Yoo; Lischetti, Tiziana

    2016-01-01

    The spindle assembly checkpoint (SAC) ensures accurate chromosome segregation during mitosis by delaying the activation of the anaphase-promoting complex/cyclosome (APC/C) in response to unattached kinetochores. The Mad2 protein is essential for a functional checkpoint because it binds directly t...

  17. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Science.gov (United States)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  18. Rituximab does not reset defective early B cell tolerance checkpoints

    Science.gov (United States)

    Chamberlain, Nicolas; Massad, Christopher; Oe, Tyler; Cantaert, Tineke; Herold, Kevan C.; Meffre, Eric

    2015-01-01

    Type 1 diabetes (T1D) patients show abnormalities in early B cell tolerance checkpoints, resulting in the accumulation of large numbers of autoreactive B cells in their blood. Treatment with rituximab, an anti-CD20 mAb that depletes B cells, has been shown to preserve β cell function in T1D patients and improve other autoimmune diseases, including rheumatoid arthritis and multiple sclerosis. However, it remains largely unknown how anti–B cell therapy thwarts autoimmunity in these pathologies. Here, we analyzed the reactivity of Abs expressed by single, mature naive B cells from 4 patients with T1D before and 52 weeks after treatment to determine whether rituximab resets early B cell tolerance checkpoints. We found that anti–B cell therapy did not alter the frequencies of autoreactive and polyreactive B cells, which remained elevated in the blood of all patients after rituximab treatment. Moreover, the limited proliferative history of autoreactive B cells after treatment revealed that these clones were newly generated B cells and not self-reactive B cells that had escaped depletion and repopulated the periphery through homeostatic expansion. We conclude that anti–B cell therapy may provide a temporary dampening of autoimmune processes through B cell depletion. However, repletion with autoreactive B cells may explain the relapse that occurs in many autoimmune patients after anti–B cell therapy. PMID:26642366

  19. Immunotherapy targeting immune check-point(s) in brain metastases.

    Science.gov (United States)

    Di Giacomo, Anna Maria; Valente, Monica; Covre, Alessia; Danielli, Riccardo; Maio, Michele

    2017-08-01

    Immunotherapy with monoclonal antibodies (mAb) directed to different immune check-point(s) is showing a significant clinical impact in a growing number of human tumors of different histotype, both in terms of disease response and long-term survival patients. In this rapidly changing scenario, treatment of brain metastases remains an high unmeet medical need, and the efficacy of immunotherapy in these highly dismal clinical setting remains to be largely demonstrated. Nevertheless, up-coming observations are beginning to suggest a clinical potential of cancer immunotherapy also in brain metastases, regardless the underlying tumor histotype. These observations remain to be validated in larger clinical trials eventually designed also to address the efficacy of therapeutic mAb to immune check-point(s) within multimodality therapies for brain metastases. Noteworthy, the initial proofs of efficacy on immunotherapy in central nervous system metastases are already fostering clinical trials investigating its therapeutic potential also in primary brain tumors. We here review ongoing immunotherapeutic approaches to brain metastases and primary brain tumors, and the foreseeable strategies to overcome their main biologic hurdles and clinical challenges. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Avelumab: combining immune checkpoint inhibition and antibody-dependent cytotoxicity.

    Science.gov (United States)

    Hamilton, Gerhard; Rath, Barbara

    2017-04-01

    Immune checkpoint inhibition holds great promise for selected tumors. The human monoclonal antibody (mAB) avelumab is directed to programmed death ligand-1 (PD-L1) and is supposed to inhibit the immunosuppressive PD-L1/PD-1 interaction and, furthermore, effect antibody-dependent cytotoxicity (ADCC) lysis of tumor cells. Areas covered: This article presents an overview of the current means to activate the antitumor immune defense by targeting PD-1 or PD-L1 with mABs and their possible role in ADCC-mediated tumor cell elimination. Expert opinion: Avelumab contains a Fc region which can bind cognate receptors on immune effector cells and induce ADCC-mediated tumor cell lysis, in contrast to other mABs directed to PD-1/PD-L1 which lack the ability to trigger ADCC due to belonging to the IgG4 subclass or possessing a mutated Fc region. Preclinical and clinical data indicate that avelumab can be safely administered to cancer patients with a toxicity profile comparable to other mABs and without lysis of PD-L1-positive activated immune cells. This antibody yielded durable responses in a phase II trial in advanced Merkel cell carcinoma patients. Tumor cell lysis by avelumab prevents cells from resorting to alternative checkpoints as shown by targeting PD-1 and the upregulation of TIM-3.

  1. Cenp-meta is required for sustained spindle checkpoint

    Directory of Open Access Journals (Sweden)

    Thomas Rubin

    2014-05-01

    Full Text Available Cenp-E is a kinesin-like motor protein required for efficient end-on attachment of kinetochores to the spindle microtubules. Cenp-E immunodepletion in Xenopus mitotic extracts results in the loss of mitotic arrest and massive chromosome missegregation, whereas its depletion in mammalian cells leads to chromosome segregation defects despite the presence of a functional spindle assembly checkpoint (SAC. Cenp-meta has previously been reported to be the Drosophila homolog of vertebrate Cenp-E. In this study, we show that cenp-metaΔ mutant neuroblasts arrest in mitosis when treated with colchicine. cenp-metaΔ mutant cells display a mitotic delay. Yet, despite the persistence of the two checkpoint proteins Mad2 and BubR1 on unattached kinetochores, these cells eventually enter anaphase and give rise to highly aneuploid daughter cells. Indeed, we find that cenp-metaΔ mutant cells display a slow but continuous degradation of cyclin B, which eventually triggers the mitotic exit observed. Thus, our data provide evidence for a role of Cenp-meta in sustaining the SAC response.

  2. Parallelization and checkpointing of GPU applications through program transformation

    Energy Technology Data Exchange (ETDEWEB)

    Solano-Quinde, Lizandro Damian [Iowa State Univ., Ames, IA (United States)

    2012-01-01

    GPUs have emerged as a powerful tool for accelerating general-purpose applications. The availability of programming languages that makes writing general-purpose applications for running on GPUs tractable have consolidated GPUs as an alternative for accelerating general purpose applications. Among the areas that have benefited from GPU acceleration are: signal and image processing, computational fluid dynamics, quantum chemistry, and, in general, the High Performance Computing (HPC) Industry. In order to continue to exploit higher levels of parallelism with GPUs, multi-GPU systems are gaining popularity. In this context, single-GPU applications are parallelized for running in multi-GPU systems. Furthermore, multi-GPU systems help to solve the GPU memory limitation for applications with large application memory footprint. Parallelizing single-GPU applications has been approached by libraries that distribute the workload at runtime, however, they impose execution overhead and are not portable. On the other hand, on traditional CPU systems, parallelization has been approached through application transformation at pre-compile time, which enhances the application to distribute the workload at application level and does not have the issues of library-based approaches. Hence, a parallelization scheme for GPU systems based on application transformation is needed. Like any computing engine of today, reliability is also a concern in GPUs. GPUs are vulnerable to transient and permanent failures. Current checkpoint/restart techniques are not suitable for systems with GPUs. Checkpointing for GPU systems present new and interesting challenges, primarily due to the natural differences imposed by the hardware design, the memory subsystem architecture, the massive number of threads, and the limited amount of synchronization among threads. Therefore, a checkpoint/restart technique suitable for GPU systems is needed. The goal of this work is to exploit higher levels of parallelism and

  3. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  4. EMODnet MedSea Checkpoint for sustainable Blue Growth

    Science.gov (United States)

    Moussat, Eric; Pinardi, Nadia; Manzella, Giuseppe; Blanc, Frederique

    2016-04-01

    The EMODNET checkpoint is a wide monitoring system assessment activity aiming to support the sustainable Blue Growth at the scale of the European Sea Basins by: 1) Clarifying the observation landscape of all compartments of the marine environment including Air, Water, Seabed, Biota and Human activities, pointing out to the existing programs, national, European and international 2) Evaluating fitness for use indicators that will show the accessibility and usability of observation and modeling data sets and their roles and synergies based upon selected applications by the European Marine Environment Strategy 3) Prioritizing the needs to optimize the overall monitoring Infrastructure (in situ and satellite data collection and assembling, data management and networking, modeling and forecasting, geo-infrastructure) and release recommendations for evolutions to better meet the application requirements in view of sustainable Blue Growth The assessment is designed for : - Institutional stakeholders for decision making on observation and monitoring systems - Data providers and producers to know how their data collected once for a given purpose could fit other user needs - End-users interested in a regional status and possible uses of existing monitoring data Selected end-user applications are of paramount importance for: (i) the blue economy sector (offshore industries, fisheries); (ii) marine environment variability and change (eutrophication, river inputs and ocean climate change impacts); (iii) emergency management (oil spills); and (iv) preservation of natural resources and biodiversity (Marine Protected Areas). End-user applications generate innovative products based on the existing observation landscape. The fitness for use assessment is made thanks to the comparison of the expected product specifications with the quality of the product derived from the selected data. This involves the development of checkpoint information and indicators based on Data quality and

  5. Acute inflammatory thyromegaly following checkpoint inhibition: A new imaging entity?

    Directory of Open Access Journals (Sweden)

    Erik H. Middlebrooks, MD

    2018-02-01

    Full Text Available Immune checkpoint blockade (CPB utilizing such agents as ipilimumab, nivolumab, or pembrolizumab has revolutionized melanoma therapy and has seen continued utilization in numerous other malignancies in recent years. However, these agents come at the price of inflammatory immune-related adverse events. Despite the increasing recognition of biochemical thyroid dysfunction associated with CPB, information regarding potential imaging findings is sparse. We describe the first 2 cases of acute thyroiditis following CPB presenting as diffuse thyromegaly documented by computed tomography, ultrasound, and iodine uptake imaging. Given the rise in the use of CPB, it is important for radiologists to recognize potential imaging manifestations of therapy immune-related adverse events to avoid erroneous diagnosis and to prompt the biochemical investigation of thyroid function.

  6. The CD47-SIRPα signaling axis as an innate immune checkpoint in cancer.

    Science.gov (United States)

    Matlung, Hanke L; Szilagyi, Katka; Barclay, Neil A; van den Berg, Timo K

    2017-03-01

    Immune checkpoint inhibitors, including those targeting CTLA-4/B7 and the PD-1/PD-L1 inhibitory pathways, are now available for clinical use in cancer patients, with other interesting checkpoint inhibitors being currently in development. Most of these have the purpose to promote adaptive T cell-mediated immunity against cancer. Here, we review another checkpoint acting to potentiate the activity of innate immune cells towards cancer. This innate immune checkpoint is composed of what has become known as the 'don't-eat me' signal CD47, which is a protein broadly expressed on normal cells and often overexpressed on cancer cells, and its counter-receptor, the myeloid inhibitory immunoreceptor SIRPα. Blocking CD47-SIRPα interactions has been shown to promote the destruction of cancer cells by phagocytes, including macrophages and neutrophils. Furthermore, there is growing evidence that targeting of the CD47-SIRPα axis may also promote antigen-presenting cell function and thereby stimulate adaptive T cell-mediated anti-cancer immunity. The development of CD47-SIRPα checkpoint inhibitors and the potential side effects that these may have are discussed. Collectively, this identifies the CD47-SIRPα axis as a promising innate immune checkpoint in cancer, and with data of the first clinical studies with CD47-SIRPα checkpoint inhibitors expected within the coming years, this is an exciting and rapidly developing field. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. Role of Immune Checkpoint Inhibitors in Small Cell Lung Cancer.

    Science.gov (United States)

    Cooper, Maryann R; Alrajhi, Abdullah M; Durand, Cheryl R

    Small cell lung cancer (SCLC) accounts for approximately 13% of all lung cancer diagnoses each year. SCLC is characterized by a rapid doubling time, early metastatic spread, and an unfavorable prognosis overall. Most patients with SCLC will respond to initial treatment; however, the majority will experience a disease recurrence and response to second-line therapies is poor. Immune checkpoint inhibitors may be an option given the success in other diseases. A literature search was conducted using Medline (1946-July week 1, 2017) and Embase (1996-2017 week 28) with the search terms small cell lung cancer combined with nivolumab or ipilimumab or pembrolizumab or atezolizumab or tremelimumab or durvalumab. Five clinical trials, including extended follow-up for 2, that evaluated immune checkpoint inhibitors in limited stage or extensive stage SCLC were included. In 2 phase 2 trials, ipilimumab was added to upfront chemotherapy. In both trials, an improvement in progression-free survival was seen. Toxicity, when combined with a platinum and etoposide, was significant. In a confirmatory phase 3 trial, ipilimumab did not prolong overall survival when added to first-line chemotherapy. Overall, response rates were similar between the placebo and ipilimumab groups. A phase 1/2 trial evaluated nivolumab alone or in combination with ipilimumab in recurrent SCLC. Results revealed that nivolumab monotherapy and the combination of nivolumab and ipilimumab were relatively safe and had antitumor activity. Pembrolizumab has been evaluated in a multicohort, phase 1b trial. Preliminary data showed a durable response in the second-line setting. Given the lack of overall survival data and significant toxicity associated with the combination of ipilimumab with first-line chemotherapy, this treatment is not a reasonable option at this time. Nivolumab alone or in combination with ipilimumab is a valid option for recurrent SCLC.

  8. The pachytene checkpoint and its relationship to evolutionary patterns of polyploidization and hybrid sterility.

    Science.gov (United States)

    Li, X C; Barringer, B C; Barbash, D A

    2009-01-01

    Sterility is a commonly observed phenotype in interspecific hybrids. Sterility may result from chromosomal or genic incompatibilities, and much progress has been made toward understanding the genetic basis of hybrid sterility in various taxa. The underlying mechanisms causing hybrid sterility, however, are less well known. The pachytene checkpoint is a meiotic surveillance system that many organisms use to detect aberrant meiotic products, in order to prevent the production of defective gametes. We suggest that activation of the pachytene checkpoint may be an important mechanism contributing to two types of hybrid sterility. First, the pachytene checkpoint may form the mechanistic basis of some gene-based hybrid sterility phenotypes. Second, the pachytene checkpoint may be an important mechanism that mediates chromosomal-based hybrid sterility phenotypes involving gametes with non-haploid (either non-reduced or aneuploid) chromosome sets. Studies in several species suggest that the strength of the pachytene checkpoint is sexually dimorphic, observations that warrant future investigation into whether such variation may contribute to differences in patterns of sterility between male and female interspecific hybrids. In addition, plants seem to lack the pachytene checkpoint, which correlates with increased production of unreduced gametes and a higher incidence of polyploid species in plants versus animals. Although the pachytene checkpoint occurs in many animals and in fungi, at least some of the genes that execute the pachytene checkpoint are different among organisms. This finding suggests that the penetrance of the pachytene checkpoint, and even its presence or absence can evolve rapidly. The surprising degree of evolutionary flexibility in this meiotic surveillance system may contribute to the observed variation in patterns of hybrid sterility and in rates of polyploidization.

  9. NEK11: linking CHK1 and CDC25A in DNA damage checkpoint signaling

    DEFF Research Database (Denmark)

    Sørensen, Claus Storgaard; Melixetian, Marina; Klein, Ditte Kjaersgaard

    2010-01-01

    The DNA damage induced G(2)/M checkpoint is an important guardian of the genome that prevents cell division when DNA lesions are present. The checkpoint prevents cells from entering mitosis by degrading CDC25A, a key CDK activator. CDC25A proteolysis is controlled by direct phosphorylation events...... is required for beta-TrCP mediated CDC25A polyubiquitylation and degradation. The activity of NEK11 is in turn controlled by CHK1 that activates NEK11 via phosphorylation on serine 273. Since inhibition of NEK11 activity forces checkpoint-arrested cells into mitosis and cell death, NEK11 is, like CHK1...

  10. An origin-deficient yeast artificial chromosome triggers a cell cycle checkpoint.

    Science.gov (United States)

    van Brabant, A J; Buchanan, C D; Charboneau, E; Fangman, W L; Brewer, B J

    2001-04-01

    Checkpoint controls coordinate entry into mitosis with the completion of DNA replication. Depletion of nucleotide precursors by treatment with the drug hydroxyurea triggers such a checkpoint response. However, it is not clear whether the signal for this hydroxyurea-induced checkpoint pathway is the presence of unreplicated DNA, or rather the persistence of single-stranded or damaged DNA. In a yeast artificial chromosome (YAC) we have engineered an approximately 170 kb region lacking efficient replication origins that allows us to explore the specific effects of unreplicated DNA on cell cycle progression. Replication of this YAC extends the length of S phase and causes cells to engage an S/M checkpoint. In the absence of Rad9 the YAC becomes unstable, undergoing deletions within the origin-free region.

  11. Top3 processes recombination intermediates and modulates checkpoint activity after DNA damage

    DEFF Research Database (Denmark)

    Mankouri, Hocine W; Hickson, Ian D

    2006-01-01

    Mutation of TOP3 in Saccharomyces cerevisiae causes poor growth, hyperrecombination, and a failure to fully activate DNA damage checkpoints in S phase. Here, we report that overexpression of a dominant-negative allele of TOP3, TOP3(Y356F), which lacks the catalytic (decatenation) activity of Top3......, the catalytic activity of Top3 is not required for DNA damage checkpoint activation, but it is required for normal S-phase progression after DNA damage. We also present evidence that the checkpoint-mediated cell cycle delay and persistence of X-shaped DNA molecules resulting from overexpression of TOP3(Y356F......) are downstream of Rad51 function. We propose that Top3 functions in S phase to both process homologous recombination intermediates and modulate checkpoint activity....

  12. An ATM-independent S-phase checkpoint response involves CHK1 pathway

    Science.gov (United States)

    Zhou, Xiang-Yang; Wang, Xiang; Hu, Baocheng; Guan, Jun; Iliakis, George; Wang, Ya

    2002-01-01

    After exposure to genotoxic stress, proliferating cells actively slow down the DNA replication through a S-phase checkpoint to provide time for repair. We report that in addition to the ataxia-telangiectasia mutated (ATM)-dependent pathway that controls the fast response, there is an ATM-independent pathway that controls the slow response to regulate the S-phase checkpoint after ionizing radiation in mammalian cells. The slow response of S-phase checkpoint, which is resistant to wortmannin, sensitive to caffeine and UCN-01, and related to cyclin-dependent kinase phosphorylation, is much stronger in CHK1 overexpressed cells, and it could be abolished by Chk1 antisense oligonucleotides. These results provide evidence that the ATM-independent slow response of S-phase checkpoint involves CHK1 pathway.

  13. Immune-checkpoint inhibitors in the era of precision medicine: What radiologists should know

    Energy Technology Data Exchange (ETDEWEB)

    Braschi-Amirfarzan, Marta; Tirumani, Sree Harsha; Hodi, Frank Stephan Jr; Nishno, Mizuki [Dept. of Radiology, Brigham and Women' s Hospital and Dana Farber Cancer Institute, Boston (United States)

    2017-01-15

    Over the past five years immune-checkpoint inhibitors have dramatically changed the therapeutic landscape of advanced solid and hematologic malignancies. The currently approved immune-checkpoint inhibitors include antibodies to cytotoxic T-lymphocyte antigen-4, programmed cell death (PD-1), and programmed cell death ligand (PD-L1 and PD-L2). Response to immune-checkpoint inhibitors is evaluated on imaging using the immune-related response criteria. Activation of immune system results in a unique toxicity profile termed immune-related adverse events. This article will review the molecular mechanism, clinical applications, imaging of immune-related response patterns and adverse events associated with immune-checkpoint inhibitors.

  14. Implication of the G2 checkpoint in the maintenance of genome integrity

    International Nuclear Information System (INIS)

    Piette, J.; Munoz, P.

    2000-01-01

    Checkpoints are surveillance mechanisms that block transitions, for instance in response to DNA damage. We summarize here here recent progress in the molecular characterization of the G 2 checkpoint which controls the entry into mitosis, and review new evidence which implicates de-regulated expression of checkpoint proteins and proteins involved in DNA damage repair in cancer development. These now exists good evidence that individuals who inherited mutations in genes involved in G 2 checkpoint and DNA damage repair are predisposed to the development of various types of cancer, their cells having a strong tendency to accumulate additional mutations. However, the occurrence of mutations of most of these genes in sporadic tumors has yet to be analysed more accurately. (authors)

  15. Immune-checkpoint inhibitors in the era of precision medicine: What radiologists should know

    International Nuclear Information System (INIS)

    Braschi-Amirfarzan, Marta; Tirumani, Sree Harsha; Hodi, Frank Stephan Jr; Nishno, Mizuki

    2017-01-01

    Over the past five years immune-checkpoint inhibitors have dramatically changed the therapeutic landscape of advanced solid and hematologic malignancies. The currently approved immune-checkpoint inhibitors include antibodies to cytotoxic T-lymphocyte antigen-4, programmed cell death (PD-1), and programmed cell death ligand (PD-L1 and PD-L2). Response to immune-checkpoint inhibitors is evaluated on imaging using the immune-related response criteria. Activation of immune system results in a unique toxicity profile termed immune-related adverse events. This article will review the molecular mechanism, clinical applications, imaging of immune-related response patterns and adverse events associated with immune-checkpoint inhibitors

  16. Orchestration of DNA Damage Checkpoint Dynamics across the Human Cell Cycle.

    Science.gov (United States)

    Chao, Hui Xiao; Poovey, Cere E; Privette, Ashley A; Grant, Gavin D; Chao, Hui Yan; Cook, Jeanette G; Purvis, Jeremy E

    2017-11-22

    Although molecular mechanisms that prompt cell-cycle arrest in response to DNA damage have been elucidated, the systems-level properties of DNA damage checkpoints are not understood. Here, using time-lapse microscopy and simulations that model the cell cycle as a series of Poisson processes, we characterize DNA damage checkpoints in individual, asynchronously proliferating cells. We demonstrate that, within early G1 and G2, checkpoints are stringent: DNA damage triggers an abrupt, all-or-none cell-cycle arrest. The duration of this arrest correlates with the severity of DNA damage. After the cell passes commitment points within G1 and G2, checkpoint stringency is relaxed. By contrast, all of S phase is comparatively insensitive to DNA damage. This checkpoint is graded: instead of halting the cell cycle, increasing DNA damage leads to slower S phase progression. In sum, we show that a cell's response to DNA damage depends on its exact cell-cycle position and that checkpoints are phase-dependent, stringent or relaxed, and graded or all-or-none. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  18. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  19. Resistance to checkpoint blockade therapy through inactivation of antigen presentation.

    Science.gov (United States)

    Sade-Feldman, Moshe; Jiao, Yunxin J; Chen, Jonathan H; Rooney, Michael S; Barzily-Rokni, Michal; Eliane, Jean-Pierre; Bjorgaard, Stacey L; Hammond, Marc R; Vitzthum, Hans; Blackmon, Shauna M; Frederick, Dennie T; Hazar-Rethinam, Mehlika; Nadres, Brandon A; Van Seventer, Emily E; Shukla, Sachet A; Yizhak, Keren; Ray, John P; Rosebrock, Daniel; Livitz, Dimitri; Adalsteinsson, Viktor; Getz, Gad; Duncan, Lyn M; Li, Bo; Corcoran, Ryan B; Lawrence, Donald P; Stemmer-Rachamimov, Anat; Boland, Genevieve M; Landau, Dan A; Flaherty, Keith T; Sullivan, Ryan J; Hacohen, Nir

    2017-10-26

    Treatment with immune checkpoint blockade (CPB) therapies often leads to prolonged responses in patients with metastatic melanoma, but the common mechanisms of primary and acquired resistance to these agents remain incompletely characterized and have yet to be validated in large cohorts. By analyzing longitudinal tumor biopsies from 17 metastatic melanoma patients treated with CPB therapies, we observed point mutations, deletions or loss of heterozygosity (LOH) in beta-2-microglobulin (B2M), an essential component of MHC class I antigen presentation, in 29.4% of patients with progressing disease. In two independent cohorts of melanoma patients treated with anti-CTLA4 and anti-PD1, respectively, we find that B2M LOH is enriched threefold in non-responders (~30%) compared to responders (~10%) and associated with poorer overall survival. Loss of both copies of B2M is found only in non-responders. B2M loss is likely a common mechanism of resistance to therapies targeting CTLA4 or PD1.

  20. Identification of a novel EGF-sensitive cell cycle checkpoint

    International Nuclear Information System (INIS)

    Walker, Francesca; Zhang Huihua; Burgess, Antony W.

    2007-01-01

    The site of action of growth factors on mammalian cell cycle has been assigned to the boundary between the G1 and S phases. We show here that Epidermal Growth Factor (EGF) is also required for mitosis. BaF/3 cells expressing the EGFR (BaF/wtEGFR) synthesize DNA in response to EGF, but arrest in S-phase. We have generated a cell line (BaF/ERX) with defective downregulation of the EGFR and sustained activation of EGFR signalling pathways: these cells undergo mitosis in an EGF-dependent manner. The transit of BaF/ERX cells through G2/M strictly requires activation of EGFR and is abolished by AG1478. This phenotype is mimicked by co-expression of ErbB2 in BaF/wtEGFR cells, and abolished by inhibition of the EGFR kinase, suggesting that sustained signalling of the EGFR, through impaired downregulation of the EGFR or heterodimerization, is required for completion of the cycle. We have confirmed the role of EGFR signalling in the G2/M phase of the cell cycle using a human tumor cell line which overexpresses the EGFR and is dependent on EGFR signalling for growth. These findings unmask an EGF-sensitive checkpoint, helping to understand the link between sustained EGFR signalling, proliferation and the acquisition of a radioresistant phenotype in cancer cells

  1. Loss of the Greatwall Kinase Weakens the Spindle Assembly Checkpoint.

    Directory of Open Access Journals (Sweden)

    M Kasim Diril

    2016-09-01

    Full Text Available The Greatwall kinase/Mastl is an essential gene that indirectly inhibits the phosphatase activity toward mitotic Cdk1 substrates. Here we show that although Mastl knockout (MastlNULL MEFs enter mitosis, they progress through mitosis without completing cytokinesis despite the presence of misaligned chromosomes, which causes chromosome segregation defects. Furthermore, we uncover the requirement of Mastl for robust spindle assembly checkpoint (SAC maintenance since the duration of mitotic arrest caused by microtubule poisons in MastlNULL MEFs is shortened, which correlates with premature disappearance of the essential SAC protein Mad1 at the kinetochores. Notably, MastlNULL MEFs display reduced phosphorylation of a number of proteins in mitosis, which include the essential SAC kinase MPS1. We further demonstrate that Mastl is required for multi-site phosphorylation of MPS1 as well as robust MPS1 kinase activity in mitosis. In contrast, treatment of MastlNULL cells with the phosphatase inhibitor okadaic acid (OKA rescues the defects in MPS1 kinase activity, mislocalization of phospho-MPS1 as well as Mad1 at the kinetochore, and premature SAC silencing. Moreover, using in vitro dephosphorylation assays, we demonstrate that Mastl promotes persistent MPS1 phosphorylation by inhibiting PP2A/B55-mediated MPS1 dephosphorylation rather than affecting Cdk1 kinase activity. Our findings establish a key regulatory function of the Greatwall kinase/Mastl->PP2A/B55 pathway in preventing premature SAC silencing.

  2. Loss of the Greatwall Kinase Weakens the Spindle Assembly Checkpoint.

    Science.gov (United States)

    Diril, M Kasim; Bisteau, Xavier; Kitagawa, Mayumi; Caldez, Matias J; Wee, Sheena; Gunaratne, Jayantha; Lee, Sang Hyun; Kaldis, Philipp

    2016-09-01

    The Greatwall kinase/Mastl is an essential gene that indirectly inhibits the phosphatase activity toward mitotic Cdk1 substrates. Here we show that although Mastl knockout (MastlNULL) MEFs enter mitosis, they progress through mitosis without completing cytokinesis despite the presence of misaligned chromosomes, which causes chromosome segregation defects. Furthermore, we uncover the requirement of Mastl for robust spindle assembly checkpoint (SAC) maintenance since the duration of mitotic arrest caused by microtubule poisons in MastlNULL MEFs is shortened, which correlates with premature disappearance of the essential SAC protein Mad1 at the kinetochores. Notably, MastlNULL MEFs display reduced phosphorylation of a number of proteins in mitosis, which include the essential SAC kinase MPS1. We further demonstrate that Mastl is required for multi-site phosphorylation of MPS1 as well as robust MPS1 kinase activity in mitosis. In contrast, treatment of MastlNULL cells with the phosphatase inhibitor okadaic acid (OKA) rescues the defects in MPS1 kinase activity, mislocalization of phospho-MPS1 as well as Mad1 at the kinetochore, and premature SAC silencing. Moreover, using in vitro dephosphorylation assays, we demonstrate that Mastl promotes persistent MPS1 phosphorylation by inhibiting PP2A/B55-mediated MPS1 dephosphorylation rather than affecting Cdk1 kinase activity. Our findings establish a key regulatory function of the Greatwall kinase/Mastl->PP2A/B55 pathway in preventing premature SAC silencing.

  3. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  4. Smurf2 as a novel mitotic regulator: From the spindle assembly checkpoint to tumorigenesis

    Directory of Open Access Journals (Sweden)

    Moore Finola E

    2009-07-01

    Full Text Available Abstract The execution of the mitotic program with high fidelity is dependent upon precise spatiotemporal regulation of posttranslational protein modifications. For example, the timely polyubiquitination of critical mitotic regulators by Anaphase Promoting Complex/Cyclosome (APC/C is essential for the metaphase to anaphase transition and mitotic exit. The spindle assembly checkpoint prevents unscheduled activity of APC/C-Cdc20 in early mitosis, allowing bipolar attachment of kinetochores to mitotic spindle and facilitating equal segregation of sister chromatids. The critical effector of the spindle checkpoint, Mitotic arrest deficient 2 (Mad2, is recruited to unattached kinetochores forming a complex with other regulatory proteins to efficiently and cooperatively inhibit APC/C-Cdc20. A weakened and/or dysfunctional spindle checkpoint has been linked to the development of genomic instability in both cell culture and animal models, and evidence suggests that aberrant regulation of the spindle checkpoint plays a critical role in human carcinogenesis. Recent studies have illuminated a network of both degradative and non-degradative ubiquitination events that regulate the metaphase to anaphase transition and mitotic exit. Within this context, our recent work showed that the HECT (Homologous to E6-AP C-terminus-family E3 ligase Smurf2 (Smad specific ubiquitin regulatory factor 2, known as a negative regulator of transforming growth factor-beta (TGF-β signaling, is required for a functional spindle checkpoint by promoting the functional localization and stability of Mad2. Here we discuss putative models explaining the role of Smurf2 as a new regulator in the spindle checkpoint. The dynamic mitotic localization of Smurf2 to the centrosome and other critical mitotic structures provides implications about mitotic checkpoint control dependent on various ubiquitination events. Finally, deregulated Smurf2 activity may contribute to carcinogenesis by

  5. Bir1 Deletion Causes Malfunction of the Spindle Assembly Checkpoint and Apoptosis in Yeast

    International Nuclear Information System (INIS)

    Ren, Qun; Liou, Liang-Chun; Gao, Qiuqiang; Bao, Xiaoming; Zhang, Zhaojie

    2012-01-01

    Cell division in yeast is a highly regulated and well studied event. Various checkpoints are placed throughout the cell cycle to ensure faithful segregation of sister chromatids. Unexpected events, such as DNA damage or oxidative stress, cause the activation of checkpoint(s) and cell cycle arrest. Malfunction of the checkpoints may induce cell death. We previously showed that under oxidative stress, the budding yeast cohesin Mcd1, a homolog of human Rad21, was cleaved by the caspase-like protease Esp1. The cleaved Mcd1 C-terminal fragment was then translocated to mitochondria, causing apoptotic cell death. In the present study, we demonstrated that Bir1 plays an important role in spindle assembly checkpoint and cell death. Similar to H 2 O 2 treatment, deletion of BIR1 using a BIR1-degron strain caused degradation of the securin Pds1, which binds and inactivates Esp1 until metaphase-anaphase transition in a normal cell cycle. BIR1 deletion caused an increase level of ROS and mis-location of Bub1, a major protein for spindle assembly checkpoint. In wild type, Bub1 was located at the kinetochores, but was primarily in the cytoplasm in bir1 deletion strain. When BIR1 was deleted, addition of nocodazole was unable to retain the Bub1 localization on kinetochores, further suggesting that Bir1 is required to activate and maintain the spindle assembly checkpoint. Our study suggests that the BIR1 function in cell cycle regulation works in concert with its anti-apoptosis function.

  6. The amount of DNA damage needed to activate the radiation-induced G2 checkpoint varies between single cells

    International Nuclear Information System (INIS)

    Tkacz-Stachowska, Kinga; Lund-Andersen, Christin; Velissarou, Angeliki; Myklebust, June H.; Stokke, Trond; Syljuåsen, Randi G.

    2011-01-01

    Background and purpose: The radiation-induced G2 checkpoint helps facilitate DNA repair before cell division. However, recent work has revealed that human cells often escape the G2 checkpoint with unrepaired DNA breaks. The purpose was to explore whether G2 checkpoint activation occurs according to a threshold level of DNA damage. Materials and methods: G2 checkpoint activation was assayed at 75–90 min and 24–48 h after X-ray irradiation of BJ diploid fibroblasts and U2OS osteosarcoma cells. Multiparameter flow cytometry with pacific blue barcoding, and flow cytometry-based sorting of phospho-H3 positive cells to microscope slides, were used to examine the DNA damage marker γ-H2AX in individual mitotic cells that had escaped the G2 checkpoint. Results: For all radiation doses and times tested, the number of γ-H2AX foci varied between individual mitotic cells. At 75 min the median levels of γ-H2AX in mitotic cells increased with higher radiation doses. At 24–48 h, following a prolonged G2 checkpoint, cells were more resistant to checkpoint re-activation by a second dose of radiation. Conclusion: Our results suggest that different amounts of DNA damage are needed to activate the G2 checkpoint in individual cells. Such single cell variation in checkpoint activation may potentially contribute to radiation-induced genomic instability.

  7. Asynchronous Two-Level Checkpointing Scheme for Large-Scale Adjoints in the Spectral-Element Solver Nek5000

    Energy Technology Data Exchange (ETDEWEB)

    Schanen, Michel; Marin, Oana; Zhang, Hong; Anitescu, Mihai

    2016-01-01

    Adjoints are an important computational tool for large-scale sensitivity evaluation, uncertainty quantification, and derivative-based optimization. An essential component of their performance is the storage/recomputation balance in which efficient checkpointing methods play a key role. We introduce a novel asynchronous two-level adjoint checkpointing scheme for multistep numerical time discretizations targeted at large-scale numerical simulations. The checkpointing scheme combines bandwidth-limited disk checkpointing and binomial memory checkpointing. Based on assumptions about the target petascale systems, which we later demonstrate to be realistic on the IBM Blue Gene/Q system Mira, we create a model of the expected performance of our checkpointing approach and validate it using the highly scalable Navier-Stokes spectralelement solver Nek5000 on small to moderate subsystems of the Mira supercomputer. In turn, this allows us to predict optimal algorithmic choices when using all of Mira. We also demonstrate that two-level checkpointing is significantly superior to single-level checkpointing when adjoining a large number of time integration steps. To our knowledge, this is the first time two-level checkpointing had been designed, implemented, tuned, and demonstrated on fluid dynamics codes at large scale of 50k+ cores.

  8. Casein kinase II is required for the spindle assembly checkpoint by regulating Mad2p in fission yeast

    International Nuclear Information System (INIS)

    Shimada, Midori; Yamamoto, Ayumu; Murakami-Tonami, Yuko; Nakanishi, Makoto; Yoshida, Takashi; Aiba, Hirofumi; Murakami, Hiroshi

    2009-01-01

    The spindle checkpoint is a surveillance mechanism that ensures the fidelity of chromosome segregation in mitosis. Here we show that fission yeast casein kinase II (CK2) is required for this checkpoint function. In the CK2 mutants mitosis occurs in the presence of a spindle defect, and the spindle checkpoint protein Mad2p fails to localize to unattached kinetochores. The CK2 mutants are sensitive to the microtubule depolymerising drug thiabendazole, which is counteracted by ectopic expression of mad2 + . The level of Mad2p is low in the CK2 mutants. These results suggest that CK2 has a role in the spindle checkpoint by regulating Mad2p.

  9. In-silico modeling of the mitotic spindle assembly checkpoint.

    Directory of Open Access Journals (Sweden)

    Bashar Ibrahim

    2008-02-01

    Full Text Available The Mitotic Spindle Assembly Checkpoint ((MSAC is an evolutionary conserved mechanism that ensures the correct segregation of chromosomes by restraining cell cycle progression from entering anaphase until all chromosomes have made proper bipolar attachments to the mitotic spindle. Its malfunction can lead to cancer.We have constructed and validated for the human (MSAC mechanism an in silico dynamical model, integrating 11 proteins and complexes. The model incorporates the perspectives of three central control pathways, namely Mad1/Mad2 induced Cdc20 sequestering based on the Template Model, MCC formation, and APC inhibition. Originating from the biochemical reactions for the underlying molecular processes, non-linear ordinary differential equations for the concentrations of 11 proteins and complexes of the (MSAC are derived. Most of the kinetic constants are taken from literature, the remaining four unknown parameters are derived by an evolutionary optimization procedure for an objective function describing the dynamics of the APC:Cdc20 complex. MCC:APC dissociation is described by two alternatives, namely the "Dissociation" and the "Convey" model variants. The attachment of the kinetochore to microtubuli is simulated by a switching parameter silencing those reactions which are stopped by the attachment. For both, the Dissociation and the Convey variants, we compare two different scenarios concerning the microtubule attachment dependent control of the dissociation reaction. Our model is validated by simulation of ten perturbation experiments.Only in the controlled case, our models show (MSAC behaviour at meta- to anaphase transition in agreement with experimental observations. Our simulations revealed that for (MSAC activation, Cdc20 is not fully sequestered; instead APC is inhibited by MCC binding.

  10. Acute symptomatic hypocalcemia from immune checkpoint therapy-induced hypoparathyroidism.

    Science.gov (United States)

    Win, Myint Aung; Thein, Kyaw Zin; Qdaisat, Aiham; Yeung, Sai-Ching Jim

    2017-07-01

    Ipilimumab (a monoclonal antibody against CTLA-4) and nivolumab (a humanized antibody against PD-1) target these immune checkpoint pathways and are used for treatment of melanoma and an increasing number of other cancers. However, they may cause immune-related adverse effects (IRAEs). Although many endocrinopathies are known to be IRAEs, primary hypoparathyroidism with severe hypocalcemia has never been reported. This is the first case of hypoparathyroidism as an IRAE presenting to an Emergency Department with acute hypocalcemia. A 73-year-old man with metastatic melanoma presented to the Emergency Department for the chief complaints of imbalance, general muscle weakness, abdominal pain and tingling in extremities. He had wide spread metastasis, and begun immunotherapy with concurrent ipilimumab and nivolumab 1.5months ago. At presentation, he had ataxia, paresthesia in the hands and feet, and abdominal cramping. Magnetic resonance imaging of the brain was unremarkable. He was found to be hypocalcemic with undetectable plasma parathyroid hormone. He was admitted for treatment of symptomatic hypocalcemia and was diagnosed with primary hypoparathyroidism. Shortly afterwards, he had thyrotoxicosis manifesting as tachycardia and anxiety, followed by development of primary hypothyroidism. At 4months after the Emergency Department visit, his parathyroid function and thyroid function had not recovered, and required continued thyroid hormone replacement and calcium and vitamin D treatment for hypocalcemia. Primary hypoparathyroidism caused by ipilimumab and nivolumab may acute manifest with severe symptomatic hypocalcemia. Emergency care providers should be aware of hypoparathyroidism as a new IRAE in this new era of immuno-oncology. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Calreticulin reveals a critical Ca2+ checkpoint in cardiac myofibrillogenesis

    Science.gov (United States)

    Li, Jian; Pucéat, Michel; Perez-Terzic, Carmen; Mery, Annabelle; Nakamura, Kimitoshi; Michalak, Marek; Krause, Karl-Heinz; Jaconi, Marisa E.

    2002-01-01

    Calreticulin (crt) is an ubiquitously expressed and multifunctional Ca2+-binding protein that regulates diverse vital cell functions, including Ca2+ storage in the ER and protein folding. Calreticulin deficiency in mice is lethal in utero due to defects in heart development and function. Herein, we used crt − / − embryonic stem (ES) cells differentiated in vitro into cardiac cells to investigate the molecular mechanisms underlying heart failure of knockout embryos. After 8 d of differentiation, beating areas were prominent in ES-derived wild-type (wt) embryoid bodies (EBs), but not in ES-derived crt − / − EBs, despite normal expression levels of cardiac transcription factors. Crt − / − EBs exhibited a severe decrease in expression and a lack of phosphorylation of ventricular myosin light chain 2 (MLC2v), resulting in an impaired organization of myofibrils. Crt − / − phenotype could be recreated in wt cells by chelating extracellular or cytoplasmic Ca2+ with EGTA or BAPTA, or by inhibiting Ca2+/calmodulin-dependent kinases (CaMKs). An imposed ionomycin-triggered cystolic-free Ca2+ concentration ([Ca2+]c) elevation restored the expression, phosphorylation, and insertion of MLC2v into sarcomeric structures and in turn the myofibrillogenesis. The transcription factor myocyte enhancer factor C2 failed to accumulate into nuclei of crt − / − cardiac cells in the absence of ionomycin-triggered [Ca2+]c increase. We conclude that the absence of calreticulin interferes with myofibril formation. Most importantly, calreticulin deficiency revealed the importance of a Ca2+-dependent checkpoint critical for early events during cardiac myofibrillogenesis. PMID:12105184

  12. Caffeine stabilizes Cdc25 independently of Rad3 in S chizosaccharomyces pombe contributing to checkpoint override

    Science.gov (United States)

    Alao, John P; Sjölander, Johanna J; Baar, Juliane; Özbaki-Yagan, Nejla; Kakoschky, Bianca; Sunnerhagen, Per

    2014-01-01

    Cdc25 is required for Cdc2 dephosphorylation and is thus essential for cell cycle progression. Checkpoint activation requires dual inhibition of Cdc25 and Cdc2 in a Rad3-dependent manner. Caffeine is believed to override activation of the replication and DNA damage checkpoints by inhibiting Rad3-related proteins in both S chizosaccharomyces pombe and mammalian cells. In this study, we have investigated the impact of caffeine on Cdc25 stability, cell cycle progression and checkpoint override. Caffeine induced Cdc25 accumulation in S . pombe independently of Rad3. Caffeine delayed cell cycle progression under normal conditions but advanced mitosis in cells treated with replication inhibitors and DNA-damaging agents. In the absence of Cdc25, caffeine inhibited cell cycle progression even in the presence of hydroxyurea or phleomycin. Caffeine induces Cdc25 accumulation in S . pombe by suppressing its degradation independently of Rad3. The induction of Cdc25 accumulation was not associated with accelerated progression through mitosis, but rather with delayed progression through cytokinesis. Caffeine-induced Cdc25 accumulation appears to underlie its ability to override cell cycle checkpoints. The impact of Cdc25 accumulation on cell cycle progression is attenuated by Srk1 and Mad2. Together our findings suggest that caffeine overrides checkpoint enforcement by inducing the inappropriate nuclear localization of Cdc25. PMID:24666325

  13. Checkpoint inhibitors in advanced melanoma: effect on the field of immunotherapy.

    Science.gov (United States)

    O'reilly, Aine; Larkin, James

    2017-07-01

    The success of the immune checkpoint inhibitors in melanoma has reinvigorated the field of immunotherapy. Immune checkpoint inhibitors are now the standard of care in multiple cancer types including lung cancer, head and neck cancer, urothelial cancer and renal cell cancer. The field of immunotherapy is currently expanding rapidly and will be a focus of research and development for decades to come. Areas covered: This review covers the early development of immune checkpoint inhibitors and the changes that occurred in the drug development paradigm to facilitate the development of immunotherapy. The review will summarise the areas into which immune checkpoint inhibitors have been adopted and will review the data that supported this. Furthermore, we will discuss future developments in immunotherapy and the current landscape regarding maximising the potential of immunotherapy in clinical practice. Expert commentary: In the author's opinion, the potential of immunotherapy is vast. To date immune checkpoint inhibition has already delivered durable responses in a proportion of patients with cancer types which were previously universally lethal. The future of immunotherapy will rely upon the intelligent application of translational research to clinical practice, such that immunotherapy can be effective for a wider population and maintain its current growth.

  14. Beyond CTLA-4 and PD-1, the generation Z of negative checkpoint regulators.

    Directory of Open Access Journals (Sweden)

    Isabelle eLe Mercier

    2015-08-01

    Full Text Available In the last two years, clinical trials with blocking antibodies to the negative checkpoint regulators CTLA-4 and PD-1 have rekindled the hope for cancer immunotherapy. Multiple negative checkpoint regulators protect the host against autoimmune reactions but also restrict the ability of T cells to effectively attack tumors. Releasing these brakes has emerged as an exciting strategy for cancer treatment. Conversely, these pathways can be manipulated to achieve durable tolerance for treatment of autoimmune diseases and transplantation. In the future, treatment may involve combination therapy to target multiple cell types and stages of the adaptive immune responses. In this review, we describe the current knowledge on the recently discovered negative checkpoint regulators, future targets for immunotherapy.

  15. Beyond CTLA-4 and PD-1, the Generation Z of Negative Checkpoint Regulators.

    Science.gov (United States)

    Le Mercier, Isabelle; Lines, J Louise; Noelle, Randolph J

    2015-01-01

    In the last two years, clinical trials with blocking antibodies to the negative checkpoint regulators CTLA-4 and PD-1 have rekindled the hope for cancer immunotherapy. Multiple negative checkpoint regulators protect the host against autoimmune reactions but also restrict the ability of T cells to effectively attack tumors. Releasing these brakes has emerged as an exciting strategy for cancer treatment. Conversely, these pathways can be manipulated to achieve durable tolerance for treatment of autoimmune diseases and transplantation. In the future, treatment may involve combination therapy to target multiple cell types and stages of the adaptive immune responses. In this review, we describe the current knowledge on the recently discovered negative checkpoint regulators, future targets for immunotherapy.

  16. Blocking CHK1 Expression Induces Apoptosis and Abrogates the G2 Checkpoint Mechanism

    Directory of Open Access Journals (Sweden)

    Yan Luo

    2001-01-01

    Full Text Available Checkpoint kinase 1 (Chki is a checkpoint gene that is activated after DNA damage. It phosphorylates and inactivates the Cdc2 activating phosphatase Cdc25C. This in turn inactivates Cdc2, which leads to G2/M arrest. We report that blocking Chki expression by antisense or ribozymes in mammalian cells induces apoptosis and interferes with the G2/M arrest induced by adriamycin. The Chki inhibitor UCN-01 also blocks the G2 arrest after DNA damage and renders cells more susceptible to adriamycin. These results indicate that Chki is an essential gene for the checkpoint mechanism during normal cell proliferation as well as in the DNA damage response.

  17. A tumor suppressor role of the Bub3 spindle checkpoint protein after apoptosis inhibition

    Science.gov (United States)

    Moutinho-Santos, Tatiana

    2013-01-01

    Most solid tumors contain aneuploid cells, indicating that the mitotic checkpoint is permissive to the proliferation of chromosomally aberrant cells. However, mutated or altered expression of mitotic checkpoint genes accounts for a minor proportion of human tumors. We describe a Drosophila melanogaster tumorigenesis model derived from knocking down spindle assembly checkpoint (SAC) genes and preventing apoptosis in wing imaginal discs. Bub3-deficient tumors that were also deficient in apoptosis displayed neoplastic growth, chromosomal aneuploidy, and high proliferative potential after transplantation into adult flies. Inducing aneuploidy by knocking down CENP-E and preventing apoptosis does not induce tumorigenesis, indicating that aneuploidy is not sufficient for hyperplasia. In this system, the aneuploidy caused by a deficient SAC is not driving tumorigenesis because preventing Bub3 from binding to the kinetochore does not cause hyperproliferation. Our data suggest that Bub3 has a nonkinetochore-dependent function that is consistent with its role as a tumor suppressor. PMID:23609535

  18. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  19. The anaphase inhibitor of Saccharomyces cerevisiae Pds1p is a target of the DNA damage checkpoint pathway

    International Nuclear Information System (INIS)

    Cohen-Fix, O.; Koshland, D.

    1997-01-01

    Inhibition of DNA replication and physical DNA damage induce checkpoint responses that arrest cell cycle progression at two different stages. In Saccharomyces cerevisiae, the execution of both checkpoint responses requires the Mec1 and Rad53 proteins. This observation led to the suggestion that these checkpoint responses are mediated through a common signal transduction pathway. However, because the checkpoint-induced arrests occur at different cell cycle stages, the downstream effectors mediating these arrests are likely to be distinct. We have previously shown that the S. cerevisiae protein Pds1p is an anaphase inhibitor and is essential for cell cycle arrest in mitosis in the presence DNA damage. Herein we show that DNA damage, but not inhibition of DNA replication, induces the phosphorylation of Pds1p. Analyses of Pds1p phosphorylation in different checkpoint mutants reveal that in the presence of DNA damage, Pds1p is phosphorylated in a Mec1p- and Rad9p-dependent hut Rad53p-independent manner. Our data place Pds1p and Rad53p on parallel branches of the DNA damage checkpoint pathway. We suggest that Pds1p is a downstream target of the DNA damage checkpoint pathway and that it is involved in implementing the DNA damage checkpoint arrest specifically in mitosis

  20. Use of common time base for checkpointing and rollback recovery in a distributed system

    Science.gov (United States)

    Ramanathan, Parameswaran; Shin, Kang G.

    1993-01-01

    An approach to checkpointing and rollback recovery in a distributed computing system using a common time base is proposed. A common time base is established in the system using a hardware clock synchronization algorithm. This common time base is coupled with the idea of pseudo-recovery points to develop a checkpointing algorithm that has the following advantages: reduced wait for commitment for establishing recovery lines, fewer messages to be exchanged, and less memory requirement. These advantages are assessed quantitatively by developing a probabilistic model.

  1. Cyclin F suppresses B-Myb activity to promote cell cycle checkpoint control

    DEFF Research Database (Denmark)

    Klein, Ditte Kjærsgaard; Hoffmann, Saskia; Ahlskog, Johanna K

    2015-01-01

    an important role in checkpoint control following ionizing radiation. Cyclin F-depleted cells initiate checkpoint signalling after ionizing radiation, but fail to maintain G2 phase arrest and progress into mitosis prematurely. Importantly, cyclin F suppresses the B-Myb-driven transcriptional programme...... that promotes accumulation of crucial mitosis-promoting proteins. Cyclin F interacts with B-Myb via the cyclin box domain. This interaction is important to suppress cyclin A-mediated phosphorylation of B-Myb, a key step in B-Myb activation. In summary, we uncover a regulatory mechanism linking the F-box protein...

  2. Interprofessional Collaboration with Immune Checkpoint Inhibitor Therapy: the Roles of Gastroenterology, Endocrinology and Neurology.

    Science.gov (United States)

    Seery, Virginia

    2017-11-01

    To discuss immune checkpoint inhibitor therapy and identify opportunities for interprofessional collaboration in the management of toxicities in the areas of gastroenterology, endocrinology, and neurology. Published research and education articles in oncology, nursing, and various specialties. The use of immune checkpoint inhibitors is expanding; timely management of toxicity is critical for positive patient outcomes. There are many opportunities for interprofessional collaboration in the diagnosis and treatment of immune-related adverse events. Nurses play key roles in recognizing immune-related adverse events, providing patient education, and helping to facilitate interprofessional collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Genetic variation in the major mitotic checkpoint genes associated with chromosomal aberrations in healthy humans

    Czech Academy of Sciences Publication Activity Database

    Försti, A.; Frank, Ch.; Smolková, B.; Kazimírová, A.; Barančoková, M.; Vymetálková, Veronika; Kroupa, M.; Naccarati, Alessio; Vodičková, Ludmila; Buchancová, J.; Dusinská, M.; Musak, L.; Vodička, Pavel; Hemminki, K.

    2016-01-01

    Roč. 380, č. 2 (2016), s. 442-446 ISSN 0304-3835 R&D Projects: GA ČR(CZ) GA15-14789S Institutional support: RVO:68378041 Keywords : chromosomal integrity * cytogenetics * spindle checkpoint Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 6.375, year: 2016

  4. Synthesis of Fault-Tolerant Embedded Systems with Checkpointing and Replication

    DEFF Research Database (Denmark)

    Izosimov, Viacheslav; Pop, Paul; Eles, Petru

    2006-01-01

    We present an approach to the synthesis of fault-tolerant hard real-time systems for safety-critical applications. We use checkpointing with rollback recovery and active replication for tolerating transient faults. Processes are statically scheduled and communications are performed using the time...

  5. Constitutive Cdk2 activity promotes aneuploidy while altering the spindle assembly and tetraploidy checkpoints

    DEFF Research Database (Denmark)

    Jahn, Stephan C; Corsino, Patrick E; Davis, Bradley J

    2013-01-01

    instability. Expression of these complexes in the MCF10A cell line leads to retinoblastoma protein (Rb) hyperphosphorylation, a subsequent increase in proliferation rate, and increased expression of the spindle assembly checkpoint protein Mad2. This results in a strengthening of the spindle assembly...

  6. A phospho-proteomic screen identifies substrates of the checkpoint kinase Chk1

    DEFF Research Database (Denmark)

    Blasius, Melanie; Forment, Josep V; Thakkar, Neha

    2011-01-01

    BACKGROUND: The cell-cycle checkpoint kinase Chk1 is essential in mammalian cells due to its roles in controlling processes such as DNA replication, mitosis and DNA-damage responses. Despite its paramount importance, how Chk1 controls these functions remains unclear, mainly because very few Chk1...

  7. Localization of spindle checkpoint proteins in cells undergoing mitosis with unreplicated genomes.

    Science.gov (United States)

    Johnson, Mary Kathrine; Cooksey, Amanda M; Wise, Dwayne A

    2008-11-01

    CHO cells can be arrested with hydoxyurea at the beginning of the DNA synthesis phase of the cell cycle. Subsequent treatment with the xanthine, caffeine, induces cells to bypass the S-phase checkpoint and enter unscheduled mitosis [Schlegel and Pardee,1986, Science 232:1264-1266]. These treated cells build a normal spindle and distribute kinetochores, unattached to chromosomes, to their daughter cells [Brinkley et al.,1988, Nature 336:251-254; Zinkowski et al.,1991, J Cell Biol 113:1091-1110; Wise and Brinkley,1997, Cell Motil Cytoskeleton 36:291-302; Balczon et al.,2003, Chromosoma 112:96-102]. To investigate how these cells distribute kinetochores to daughter cells, we analyzed the spindle checkpoint components, Mad2, CENP-E, and the 3F3 phosphoepitope, using immunofluorescence and digital microscopy. Even though the kinetochores were unpaired and DNA was fragmented, the tension, alignment, and motor components of the checkpoint were found to be present and localized as predicted in prometaphase and metaphase. This unusual mitosis proves that a cell can successfully localize checkpoint proteins and divide even when kinetochores are unpaired and fragmented. (c) 2008 Wiley-Liss, Inc.

  8. The point of no return: The poly(A)-associated elongation checkpoint.

    Science.gov (United States)

    Tellier, Michael; Ferrer-Vicens, Ivan; Murphy, Shona

    2016-01-01

    Cyclin-dependent kinases play critical roles in transcription by RNA polymerase II (pol II) and processing of the transcripts. For example, CDK9 regulates transcription of protein-coding genes, splicing, and 3' end formation of the transcripts. Accordingly, CDK9 inhibitors have a drastic effect on the production of mRNA in human cells. Recent analyses indicate that CDK9 regulates transcription at the early-elongation checkpoint of the vast majority of pol II-transcribed genes. Our recent discovery of an additional CDK9-regulated elongation checkpoint close to poly(A) sites adds a new layer to the control of transcription by this critical cellular kinase. This novel poly(A)-associated checkpoint has the potential to powerfully regulate gene expression just before a functional polyadenylated mRNA is produced: the point of no return. However, many questions remain to be answered before the role of this checkpoint becomes clear. Here we speculate on the possible biological significance of this novel mechanism of gene regulation and the players that may be involved.

  9. The point of no return: The poly(A)-associated elongation checkpoint

    Science.gov (United States)

    Tellier, Michael; Ferrer-Vicens, Ivan; Murphy, Shona

    2016-01-01

    abstract Cyclin-dependent kinases play critical roles in transcription by RNA polymerase II (pol II) and processing of the transcripts. For example, CDK9 regulates transcription of protein-coding genes, splicing, and 3′ end formation of the transcripts. Accordingly, CDK9 inhibitors have a drastic effect on the production of mRNA in human cells. Recent analyses indicate that CDK9 regulates transcription at the early-elongation checkpoint of the vast majority of pol II-transcribed genes. Our recent discovery of an additional CDK9-regulated elongation checkpoint close to poly(A) sites adds a new layer to the control of transcription by this critical cellular kinase. This novel poly(A)-associated checkpoint has the potential to powerfully regulate gene expression just before a functional polyadenylated mRNA is produced: the point of no return. However, many questions remain to be answered before the role of this checkpoint becomes clear. Here we speculate on the possible biological significance of this novel mechanism of gene regulation and the players that may be involved. PMID:26853452

  10. Immune Checkpoint Inhibitors in the Treatment of Patients with Neuroendocrine Neoplasia.

    Science.gov (United States)

    Weber, Matthias M; Fottner, Christian

    2018-01-01

    Well-differentiated neuroendocrine neoplasms (NENs) are usually controlled by antiproliferative, local ablative and/or radionuclide therapies, whereas poorly differentiated NENs generally require cytotoxic chemotherapy. However, treatment options for patients with advanced/metastatic high-grade NENs remain limited. Review of the literature and international congress abstracts on the efficacy and safety of immunotherapy by checkpoint inhibition in advanced/metastatic NENs. Evidence points to an important role of immune phenomena in the pathogenesis and treatment of neuroendocrine tumors (NETs). Programmed cell death 1 (PD-1) protein and its ligand are mainly expressed in poorly differentiated NENs. Microsatellite instability and high mutational load are more pronounced in high-grade NENs and may predict response to immunotherapy. Clinical experience of immune checkpoint blockade mainly exists for Merkel cell carcinoma, a high-grade cutaneous neuroendocrine carcinoma (NEC), which has led to approval of the anti-PD-1 antibody avelumab. In addition, there is anecdotal evidence for the efficacy of checkpoint inhibitors in large-cell lung NECs, ovarian NECs and others, including gastroenteropancreatic NENs. Currently, phase II studies investigate PDR001, pembrolizumab, combined durvalumab and tremelimumab, and avelumab treatment in patients with advanced/metastatic NENs. Immune checkpoint inhibitors are a promising therapeutic option, especially in progressive NECs or high-grade NETs with high tumor burden, microsatellite instability, and/or mutational load. © 2018 S. Karger GmbH, Freiburg.

  11. Cells bearing chromosome aberrations lacking one telomere are selectively blocked at the G2/M checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, Pilar [Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Barquinero, Joan Francesc [Unitat d' Antropologia Biologica, Departament de Biologia Animal, Biologia Vegetal i Ecologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Duran, Assumpta [Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Caballin, Maria Rosa [Unitat d' Antropologia Biologica, Departament de Biologia Animal, Biologia Vegetal i Ecologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain); Ribas, Montserrat [Servei de Radiofisica i Radioproteccio de l' Hospital de la Santa Creu i Sant Pau, 08025 Barcelona (Spain); Barrios, Leonardo, E-mail: Lleonard.Barrios@uab.cat [Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia, Universitat Autonoma de Barcelona, 08193 Bellaterra (Spain)

    2009-11-02

    Cell cycle checkpoints are part of the cellular mechanisms to maintain genomic integrity. After ionizing radiation exposure, the cells can show delay or arrest in their progression through the cell cycle, as well as an activation of the DNA repair machinery in order to reduce the damage. The G2/M checkpoint prevents G2 cells entering mitosis until the DNA damage has been reduced. The present study evaluates which G0 radiation-induced chromosome aberrations are negatively selected in the G2/M checkpoint. For this purpose, peripheral blood samples were irradiated at 1 and 3 Gy of {gamma}-rays, and lymphocytes were cultured for 48 h. Calyculin-A and Colcemid were used to analyze, in the same slide, cells in G2 and M. Chromosome spreads were consecutively analyzed by solid stain, pancentromeric and pantelomeric FISH and mFISH. The results show that the frequency of incomplete chromosome elements, those lacking a telomeric signal at one end, decreases abruptly from G2 to M. This indicates that cells with incomplete chromosome elements can progress from G0 to G2, but at the G2/M checkpoint suffer a strong negative selection.

  12. Cells bearing chromosome aberrations lacking one telomere are selectively blocked at the G2/M checkpoint

    International Nuclear Information System (INIS)

    Rodriguez, Pilar; Barquinero, Joan Francesc; Duran, Assumpta; Caballin, Maria Rosa; Ribas, Montserrat; Barrios, Leonardo

    2009-01-01

    Cell cycle checkpoints are part of the cellular mechanisms to maintain genomic integrity. After ionizing radiation exposure, the cells can show delay or arrest in their progression through the cell cycle, as well as an activation of the DNA repair machinery in order to reduce the damage. The G2/M checkpoint prevents G2 cells entering mitosis until the DNA damage has been reduced. The present study evaluates which G0 radiation-induced chromosome aberrations are negatively selected in the G2/M checkpoint. For this purpose, peripheral blood samples were irradiated at 1 and 3 Gy of γ-rays, and lymphocytes were cultured for 48 h. Calyculin-A and Colcemid were used to analyze, in the same slide, cells in G2 and M. Chromosome spreads were consecutively analyzed by solid stain, pancentromeric and pantelomeric FISH and mFISH. The results show that the frequency of incomplete chromosome elements, those lacking a telomeric signal at one end, decreases abruptly from G2 to M. This indicates that cells with incomplete chromosome elements can progress from G0 to G2, but at the G2/M checkpoint suffer a strong negative selection.

  13. Myasthenia triggered by immune checkpoint inhibitors: New case and literature review.

    Science.gov (United States)

    Gonzalez, Natalia L; Puwanant, Araya; Lu, Angela; Marks, Stanley M; Živković, Saša A

    2017-03-01

    Immune checkpoint molecules are potent regulators of immunologic homeostasis that prevent the development of autoimmunity while maintaining self-tolerance. Inhibitors of immune checkpoint molecules are used as immunotherapy in the treatment of melanoma and different types of refractory cancer, and can trigger various autoimmune complications including myositis and myasthenia gravis. We describe a case of generalized myasthenia gravis induced by pembrolizumab and review 11 other cases. Five patients also had elevated serum CK levels ranging from 1200 to 8729 IU/L, and biopsy showed myositis in one. Severity was highly variable as symptoms normalized spontaneously in one patient, but three others developed myasthenic crisis (including two with fatal outcomes). Steroids have been recommended as a preferred treatment of autoimmune complications of immune-checkpoint inhibitors. Myasthenia gravis should be considered when weakness, diplopia or bulbar symptoms are seen after treatment with immune checkpoint inhibitors, and additional studies are needed to characterize association with hyperCKemia. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. rad-Dependent response of the chk1-encoded protein kinase at the DNA damage checkpoint

    NARCIS (Netherlands)

    Walworth, N.C.; Bernards, R.A.

    1996-01-01

    Exposure of eukaryotic cells to agents that generate DNA damage results in transient arrest of progression through the cell cycle. In fission yeast, the DNA damage checkpoint associated with cell cycle arrest before mitosis requires the protein kinase p56chk1. DNA damage induced by ultraviolet

  15. Differential impact of diverse anticancer chemotherapeutics on the Cdc25A-degradation checkpoint pathway

    International Nuclear Information System (INIS)

    Agner, Jeppe; Falck, Jacob; Lukas, Jiri; Bartek, Jiri

    2005-01-01

    When exposed to DNA-damaging insults such as ionizing radiation (IR) or ultraviolet light (UV), mammalian cells activate checkpoint pathways to halt cell cycle progression or induce cell death. Here we examined the ability of five commonly used anticancer drugs with different mechanisms of action to activate the Chk1/Chk2-Cdc25A-CDK2/cyclin E cell cycle checkpoint pathway, previously shown to be induced by IR or UV. Whereas exposure of human cells to topoisomerase inhibitors camptothecin, etoposide, or adriamycin resulted in rapid (within 1 h) activation of the pathway including degradation of the Cdc25A phosphatase and inhibition of cyclin E/CDK2 kinase activity, taxol failed to activate this checkpoint even after a prolonged treatment. Unexpectedly, although the alkylating agent cisplatin also induced degradation of Cdc25A (albeit delayed, after 8-12 h), cyclin E/CDK2 activity was elevated and DNA synthesis continued, a phenomena that correlated with increased E2F1 protein levels and consequently enhanced expression of cyclin E. These results reveal a differential impact of various classes of anticancer chemotherapeutics on the Cdc25A-degradation pathway, and indicate that the kinetics of checkpoint induction, and the relative balance of key components within the DNA damage response network may dictate whether the treated cells arrest their cell cycle progression

  16. Immunogenic Chemotherapy Sensitizes Renal Cancer to Immune Checkpoint Blockade Therapy in Preclinical Models.

    Science.gov (United States)

    Cui, Shujin

    2017-07-11

    BACKGROUND Renal cell carcinoma (RCC) is among the most common malignant cancers of males worldwide. For advanced RCC patients, there still is no effective therapy. Immune checkpoint blockade therapies have shown benefits for many cancers, but previous clinical trials of immune checkpoint blockade therapies in RCC patients achieved only modest results. MATERIAL AND METHODS We explored the effects of combining chemotherapy with immune checkpoint blockade therapy in RCC xenograft mouse models. We also studied the potential mechanisms by which chemotherapy might enhance the efficacy of immune checkpoint blockade therapy, both in vitro and in vivo. RESULTS Our results showed that many commonly used chemotherapy agents can induce immunogenic marker release in RCC cell lines. Importantly, the RCC xenograft mouse model mice who received the combination treatment of 5-fluorouracil (5-FU) and anti-programmed cell death-ligand 1 (PD-L1) antibodies (Abs) had longer survival times compared to those who received 5-FU or anti-PD-L1 Abs alone. Also, increased key cytokines that promote tumor immunity, such as IL-2, IFN-γ, and TNF-α, as well as tumor-infiltrating cytotoxic T cells, were also increased after the combination treatment. CONCLUSIONS We conclude that 5-FU can sensitize RCC to anti-PD-L1 treatment by releasing the immune suppression in the tumor microenvironment.

  17. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  18. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  19. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  20. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  1. The emerging role of immune checkpoint based approaches in AML and MDS.

    Science.gov (United States)

    Boddu, Prajwal; Kantarjian, Hagop; Garcia-Manero, Guillermo; Allison, James; Sharma, Padmanee; Daver, Naval

    2018-04-01

    The development of immune checkpoint inhibitors represents a major breakthrough in the field of cancer therapeutics. Pursuant to their success in melanoma and numerous solid tumor malignancies, these agents are being investigated in hematological malignancies including acute myelogenous leukemia (AML) and myelodysplastic syndromes (MDS). Although AML/MDS have traditionally been considered to be less immunogenic than solid tumor malignancies, recent pre-clinical models suggest a therapeutic role for immune checkpoint inhibition in these diseases. CTLA-4 inhibition may be especially effective in treating late post-allogeneic stem cell transplant relapse of AML in patients with limited or no graft versus host disease. Immune checkpoint inhibition, specifically PD-1 inhibition, demonstrated limited single agent efficacy in patients with relapsed AML and with MDS post-hypomethylating therapy. Rationally designed combinations of PD-1 inhibitors with standard anti-leukemic therapy are needed. Hypomethylating agents such as azacitidine, up-regulate PD-1, PD-L1, and PD-L2 in patients with AML/MDS and up-regulation of these genes was associated with the emergence of resistance. The combination of azacitidine and PD-1/PD-L1 inhibition may be a potential mechanism to prevent or overcome resistance to 5-azacitidine. A number of such combinations are being evaluated in clinical trials with early encouraging results. Immune checkpoint inhibition is also an attractive option to improve relapse-free survival or eliminate minimal residual disease post induction and consolidation by enhancing T-cell surveillance in patients with high-risk AML. The ongoing clinical trials with checkpoint inhibitors in AML/MDS will improve our understanding of the immunobiology of these diseases and guide us to the most appropriate application of these agents in the therapy of AML/MDS.

  2. [Sea urchin embryo, DNA-damaged cell cycle checkpoint and the mechanisms initiating cancer development].

    Science.gov (United States)

    Bellé, Robert; Le Bouffant, Ronan; Morales, Julia; Cosson, Bertrand; Cormier, Patrick; Mulner-Lorillon, Odile

    2007-01-01

    Cell division is an essential process for heredity, maintenance and evolution of the whole living kingdom. Sea urchin early development represents an excellent experimental model for the analysis of cell cycle checkpoint mechanisms since embryonic cells contain a functional DNA-damage checkpoint and since the whole sea urchin genome is sequenced. The DNA-damaged checkpoint is responsible for an arrest in the cell cycle when DNA is damaged or incorrectly replicated, for activation of the DNA repair mechanism, and for commitment to cell death by apoptosis in the case of failure to repair. New insights in cancer biology lead to two fundamental concepts about the very first origin of cancerogenesis. Cancers result from dysfunction of DNA-damaged checkpoints and cancers appear as a result of normal stem cell (NCS) transformation into a cancer stem cell (CSC). The second aspect suggests a new definition of "cancer", since CSC can be detected well before any clinical evidence. Since early development starts from the zygote, which is a primary stem cell, sea urchin early development allows analysis of the early steps of the cancerization process. Although sea urchins do not develop cancers, the model is alternative and complementary to stem cells which are not easy to isolate, do not divide in a short time and do not divide synchronously. In the field of toxicology and incidence on human health, the sea urchin experimental model allows assessment of cancer risk from single or combined molecules long before any epidemiologic evidence is available. Sea urchin embryos were used to test the worldwide used pesticide Roundup that contains glyphosate as the active herbicide agent; it was shown to activate the DNA-damage checkpoint of the first cell cycle of development. The model therefore allows considerable increase in risk evaluation of new products in the field of cancer and offers a tool for the discovery of molecular markers for early diagnostic in cancer biology

  3. Caenorhabditis elegans histone methyltransferase MET-2 shields the male X chromosome from checkpoint machinery and mediates meiotic sex chromosome inactivation.

    Directory of Open Access Journals (Sweden)

    Paula M Checchi

    2011-09-01

    Full Text Available Meiosis is a specialized form of cellular division that results in the precise halving of the genome to produce gametes for sexual reproduction. Checkpoints function during meiosis to detect errors and subsequently to activate a signaling cascade that prevents the formation of aneuploid gametes. Indeed, asynapsis of a homologous chromosome pair elicits a checkpoint response that can in turn trigger germline apoptosis. In a heterogametic germ line, however, sex chromosomes proceed through meiosis with unsynapsed regions and are not recognized by checkpoint machinery. We conducted a directed RNAi screen in Caenorhabditis elegans to identify regulatory factors that prevent recognition of heteromorphic sex chromosomes as unpaired and uncovered a role for the SET domain histone H3 lysine 9 histone methyltransferase (HMTase MET-2 and two additional HMTases in shielding the male X from checkpoint machinery. We found that MET-2 also mediates the transcriptional silencing program of meiotic sex chromosome inactivation (MSCI but not meiotic silencing of unsynapsed chromatin (MSUC, suggesting that these processes are distinct. Further, MSCI and checkpoint shielding can be uncoupled, as double-strand breaks targeted to an unpaired, transcriptionally silenced extra-chromosomal array induce checkpoint activation in germ lines depleted for met-2. In summary, our data uncover a mechanism by which repressive chromatin architecture enables checkpoint proteins to distinguish between the partnerless male X chromosome and asynapsed chromosomes thereby shielding the lone X from inappropriate activation of an apoptotic program.

  4. The Pch2 AAA+ ATPase promotes phosphorylation of the Hop1 meiotic checkpoint adaptor in response to synaptonemal complex defects.

    Science.gov (United States)

    Herruzo, Esther; Ontoso, David; González-Arranz, Sara; Cavero, Santiago; Lechuga, Ana; San-Segundo, Pedro A

    2016-09-19

    Meiotic cells possess surveillance mechanisms that monitor critical events such as recombination and chromosome synapsis. Meiotic defects resulting from the absence of the synaptonemal complex component Zip1 activate a meiosis-specific checkpoint network resulting in delayed or arrested meiotic progression. Pch2 is an evolutionarily conserved AAA+ ATPase required for the checkpoint-induced meiotic block in the zip1 mutant, where Pch2 is only detectable at the ribosomal DNA array (nucleolus). We describe here that high levels of the Hop1 protein, a checkpoint adaptor that localizes to chromosome axes, suppress the checkpoint defect of a zip1 pch2 mutant restoring Mek1 activity and meiotic cell cycle delay. We demonstrate that the critical role of Pch2 in this synapsis checkpoint is to sustain Mec1-dependent phosphorylation of Hop1 at threonine 318. We also show that the ATPase activity of Pch2 is essential for its checkpoint function and that ATP binding to Pch2 is required for its localization. Previous work has shown that Pch2 negatively regulates Hop1 chromosome abundance during unchallenged meiosis. Based on our results, we propose that, under checkpoint-inducing conditions, Pch2 also possesses a positive action on Hop1 promoting its phosphorylation and its proper distribution on unsynapsed chromosome axes. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  5. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  6. Participation of SRM5/CDC28, SRM8/NET1 and SRM12/HF11 genes in activation of checkpoints of Yeast Saccharomyces Cerevisiae

    International Nuclear Information System (INIS)

    Kadyshevskaya, E.Yu.; Koltovaya, N.A.

    2007-01-01

    It is known that there are about twenty checkpoint genes in yeast Saccharomyces cerevisiae. We study participation of SRM genes selected as genes affecting genetic stability and radiosensitivity. It has been shown that srm5/cdc28-srm, srm8/net1-srm, srm12/hfil-srm mutations prevent checkpoint activation by DNA damage, particularly G0/S-checkpoint (srm5, srm8), G1/S-checkpoint (srm5, srm8, srm12), S-checkpoint (srm5, srm12) and G2-checkpoint (srm5). These data indicate, at least in budding yeast, CDC28/SRM5, HF11/ADA1/SRM12 and NET1/SRM8 genes mediate cellular response induced by DNA damage including checkpoint control

  7. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  8. Optimization of airport security lanes

    Science.gov (United States)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  9. Casein kinase II is required for the spindle assembly checkpoint by regulating Mad2p in fission yeast

    Energy Technology Data Exchange (ETDEWEB)

    Shimada, Midori [Department of Biochemistry and Cell Biology, Graduate School of Medicine, Nagoya City University, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Yamamoto, Ayumu [Department of Chemistry, Shizuoka University, 836 Ohya, Suruga-ku, Sizuoka 422-8529 (Japan); Murakami-Tonami, Yuko; Nakanishi, Makoto; Yoshida, Takashi [Department of Biochemistry and Cell Biology, Graduate School of Medicine, Nagoya City University, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Aiba, Hirofumi [Laboratory of Molecular Microbiology, School of Agriculture, Nagoya University, Chikusa-ku, Nagoya 464-8601 (Japan); Murakami, Hiroshi, E-mail: hmura@med.nagoya-cu.ac.jp [Department of Biochemistry and Cell Biology, Graduate School of Medicine, Nagoya City University, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan)

    2009-10-23

    The spindle checkpoint is a surveillance mechanism that ensures the fidelity of chromosome segregation in mitosis. Here we show that fission yeast casein kinase II (CK2) is required for this checkpoint function. In the CK2 mutants mitosis occurs in the presence of a spindle defect, and the spindle checkpoint protein Mad2p fails to localize to unattached kinetochores. The CK2 mutants are sensitive to the microtubule depolymerising drug thiabendazole, which is counteracted by ectopic expression of mad2{sup +}. The level of Mad2p is low in the CK2 mutants. These results suggest that CK2 has a role in the spindle checkpoint by regulating Mad2p.

  10. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  11. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  12. RNA interference regulates the cell cycle checkpoint through the RNA export factor, Ptr1, in fission yeast

    Energy Technology Data Exchange (ETDEWEB)

    Iida, Tetsushi, E-mail: tiida@nig.ac.jp [Division of Cytogenetics, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); The Graduate University for Advanced Studies, Sokendai, Mishima, 1111 Yata, Mishima 411-8540 (Japan); Precursory Research for Embryonic Science and Technology (PRESTO), Japan Science and Technology Agency (JST), 4-1-8, Honcho, Kawaguchi-shi, Saitama 332-0012 (Japan); Iida, Naoko [Division of Mutagenesis, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); Tsutsui, Yasuhiro [Department of Life Science, Graduate School of Bioscience and Biotechnology, Tokyo Institute of Technology, Nagatsuda-cho, Midori-ku, Yokohama 226-8501 (Japan); Yamao, Fumiaki [Division of Mutagenesis, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); The Graduate University for Advanced Studies, Sokendai, Mishima, 1111 Yata, Mishima 411-8540 (Japan); Kobayashi, Takehiko [Division of Cytogenetics, National Institute of Genetics, Mishima, 1111 Yata, Mishima 411-8540 (Japan); The Graduate University for Advanced Studies, Sokendai, Mishima, 1111 Yata, Mishima 411-8540 (Japan)

    2012-10-12

    Highlights: Black-Right-Pointing-Pointer RNAi is linked to the cell cycle checkpoint in fission yeast. Black-Right-Pointing-Pointer Ptr1 co-purifies with Ago1. Black-Right-Pointing-Pointer The ptr1-1 mutation impairs the checkpoint but does not affect gene silencing. Black-Right-Pointing-Pointer ago1{sup +} and ptr1{sup +} regulate the cell cycle checkpoint via the same pathway. Black-Right-Pointing-Pointer Mutations in ago1{sup +} and ptr1{sup +} lead to the nuclear accumulation of poly(A){sup +} RNAs. -- Abstract: Ago1, an effector protein of RNA interference (RNAi), regulates heterochromatin silencing and cell cycle arrest in fission yeast. However, the mechanism by which Ago1 controls cell cycle checkpoint following hydroxyurea (HU) treatment has not been elucidated. In this study, we show that Ago1 and other RNAi factors control cell cycle checkpoint following HU treatment via a mechanism independent of silencing. While silencing requires dcr1{sup +}, the overexpression of ago1{sup +} alleviated the cell cycle defect in dcr1{Delta}. Ago1 interacted with the mRNA export factor, Ptr1. The ptr1-1 mutation impaired cell cycle checkpoint but gene silencing was unaffected. Genetic analysis revealed that the regulation of cell cycle checkpoint by ago1{sup +} is dependent on ptr1{sup +}. Nuclear accumulation of poly(A){sup +} RNAs was detected in mutants of ago1{sup +} and ptr1{sup +}, suggesting there is a functional link between the cell cycle checkpoint and RNAi-mediated RNA quality control.

  13. Immune Checkpoint Inhibitors: A New Opportunity in the Treatment of Ovarian Cancer?

    Directory of Open Access Journals (Sweden)

    Gloria Mittica

    2016-07-01

    Full Text Available Epithelial ovarian cancer (EOC is the leading cause of death for gynecological cancer. The standard treatment for advanced stage is the combination of optimal debulking surgery and platinum-based chemotherapy. Nevertheless, recurrence is frequent (around 70% and prognosis is globally poor. New therapeutic agents are needed to improve survival. Since EOC is strongly immunogenic, immune checkpoint inhibitors are under evaluation for their capacity to contrast the “turn off” signals expressed by the tumor to escape the immune system and usually responsible for self-tolerance maintenance. This article reviews the literature on anti-cytotoxic T-lymphocyte-associated protein 4 (CTLA-4, anti-PD-1, anti-PD-L1, and anti-PD-L2 antibodies in EOC and highlights their possible lines of development. Further studies are needed to better define the prognostic role of the immune checkpoint inhibitors, to identify predictors of response and the optimal clinical setting in EOC.

  14. Immune Checkpoint Inhibitors: An Innovation in Immunotherapy for the Treatment and Management of Patients with Cancer.

    Science.gov (United States)

    Dine, Jennifer; Gordon, RuthAnn; Shames, Yelena; Kasler, Mary Kate; Barton-Burke, Margaret

    2017-01-01

    Cancer survival rates are generally increasing in the United States. These trends have been partially attributed to improvement in therapeutic strategies. Cancer immunotherapy is an example of one of the newer strategies used to fight cancer, which primes or activates the immune system to produce antitumor effects. The first half of this review paper concisely describes the cell mechanisms that control antitumor immunity and the major immunotherapeutic strategies developed to target these mechanisms. The second half of the review discusses in greater depth immune checkpoint inhibitors that have recently demonstrated tremendous promise for the treatment of diverse solid tumor types, including melanoma, non-small cell lung cancer, and others. More specifically, the mechanisms of action, side effects, and patient and family management and education concerns are discussed to provide oncology nurses up-to-date information relevant to caring for cancer-affected patients treated with immune checkpoint inhibitors. Future directions for cancer immunotherapy are considered.

  15. The fission yeast spindle orientation checkpoint: a model that generates tension?

    Science.gov (United States)

    Gachet, Yannick; Reyes, Céline; Goldstone, Sherilyn; Tournier, Sylvie

    2006-10-15

    In all eukaryotes, the alignment of the mitotic spindle with the axis of cell polarity is essential for accurate chromosome segregation as well as for the establishment of cell fate, and thus morphogenesis, during development. Studies in invertebrates, higher eukaryotes and yeast suggest that astral microtubules interact with the cell cortex to position the spindle. These microtubules are thought to impose pushing or pulling forces on the spindle poles to affect the rotation or movement of the spindle. In the fission yeast model, where cell division is symmetrical, spindle rotation is dependent on the interaction of astral microtubules with the cortical actin cytoskeleton. In these cells, a bub1-dependent mitotic checkpoint, the spindle orientation checkpoint (SOC), is activated when the spindles fail to align with the cell polarity axis. In this paper we review the mechanism that orientates the spindle during mitosis in fission yeast, and discuss the consequences of misorientation on metaphase progression. Copyright 2006 John Wiley & Sons, Ltd.

  16. Cloud object store for checkpoints of high performance computing applications using decoupling middleware

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-04-19

    Cloud object storage is enabled for checkpoints of high performance computing applications using a middleware process. A plurality of files, such as checkpoint files, generated by a plurality of processes in a parallel computing system are stored by obtaining said plurality of files from said parallel computing system; converting said plurality of files to objects using a log structured file system middleware process; and providing said objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  17. A Comprehensive Review of US FDA-Approved Immune Checkpoint Inhibitors in Urothelial Carcinoma

    Directory of Open Access Journals (Sweden)

    Fu-Shun Hsu

    2017-01-01

    Full Text Available Few effective treatment options are available for patients with advanced or metastatic urothelial carcinoma (UC after unsuccessful first-line platinum-based chemotherapy. To date, immune checkpoint inhibitors are novel therapeutic agents for UC treatment. From May 2016 to May 2017, five anti-PD-1/PD-L1 monoclonal antibodies received accelerated or regular approval from the US Food and Drug Administration (FDA for the treatment of patients with locally advanced or metastatic UC. The present comprehensive review presents the background information of these five US FDA-approved anticancer agents to provide a basic but concise understanding of these agents for advanced studies. We summarize their immune checkpoint mechanisms, clinical efficacy, recommended usage protocols, adverse events, and the limitations of the PD-L1 biomarker assays.

  18. Dynein Light Intermediate Chain 2 Facilitates the Metaphase to Anaphase Transition by Inactivating the Spindle Assembly Checkpoint.

    Directory of Open Access Journals (Sweden)

    Sagar P Mahale

    Full Text Available The multi-functional molecular motor cytoplasmic dynein performs diverse essential roles during mitosis. The mechanistic importance of the dynein Light Intermediate Chain homologs, LIC1 and LIC2 is unappreciated, especially in the context of mitosis. LIC1 and LIC2 are believed to exist in distinct cytoplasmic dynein complexes as obligate subunits. LIC1 had earlier been reported to be required for metaphase to anaphase progression by inactivating the kinetochore-microtubule attachment-sensing arm of the spindle assembly checkpoint (SAC. However, the functional importance of LIC2 during mitosis remains elusive. Here we report prominent novel roles for the LIC2 subunit of cytoplasmic dynein in regulating the spindle assembly checkpoint. LIC2 depletion in mammalian cells led to prolonged metaphase arrest in the presence of an active SAC and also to stretched kinetochores, thus implicating it in SAC inactivation. Quantitative fluorescence microscopy of SAC components revealed accumulation of both attachment- and tension-sensing checkpoint proteins at metaphase kinetochores upon LIC2 depletion. These observations support a stronger and more diverse role in checkpoint inactivation for LIC2 in comparison to its close homolog LIC1. Our study uncovers a novel functional hierarchy during mitotic checkpoint inactivation between the closely related but homologous LIC subunits of cytoplasmic dynein. These subtle functional distinctions between dynein subpopulations could be exploited to study specific aspects of the spindle assembly checkpoint, which is a key mediator of fidelity in eukaryotic cell division.

  19. A novel ATM-dependent checkpoint defect distinct from loss of function mutation promotes genomic instability in melanoma.

    Science.gov (United States)

    Spoerri, Loredana; Brooks, Kelly; Chia, KeeMing; Grossman, Gavriel; Ellis, Jonathan J; Dahmer-Heath, Mareike; Škalamera, Dubravka; Pavey, Sandra; Burmeister, Bryan; Gabrielli, Brian

    2016-05-01

    Melanomas have high levels of genomic instability that can contribute to poor disease prognosis. Here, we report a novel defect of the ATM-dependent cell cycle checkpoint in melanoma cell lines that promotes genomic instability. In defective cells, ATM signalling to CHK2 is intact, but the cells are unable to maintain the cell cycle arrest due to elevated PLK1 driving recovery from the arrest. Reducing PLK1 activity recovered the ATM-dependent checkpoint arrest, and over-expressing PLK1 was sufficient to overcome the checkpoint arrest and increase genomic instability. Loss of the ATM-dependent checkpoint did not affect sensitivity to ionizing radiation demonstrating that this defect is distinct from ATM loss of function mutations. The checkpoint defective melanoma cell lines over-express PLK1, and a significant proportion of melanomas have high levels of PLK1 over-expression suggesting this defect is a common feature of melanomas. The inability of ATM to impose a cell cycle arrest in response to DNA damage increases genomic instability. This work also suggests that the ATM-dependent checkpoint arrest is likely to be defective in a higher proportion of cancers than previously expected. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  20. Lyn tyrosine kinase promotes silencing of ATM-dependent checkpoint signaling during recovery from DNA double-strand breaks

    International Nuclear Information System (INIS)

    Fukumoto, Yasunori; Kuki, Kazumasa; Morii, Mariko; Miura, Takahito; Honda, Takuya; Ishibashi, Kenichi; Hasegawa, Hitomi; Kubota, Sho; Ide, Yudai; Yamaguchi, Noritaka; Nakayama, Yuji; Yamaguchi, Naoto

    2014-01-01

    Highlights: • Inhibition of Src family kinases decreased γ-H2AX signal. • Inhibition of Src family increased ATM-dependent phosphorylation of Chk2 and Kap1. • shRNA-mediated knockdown of Lyn increased phosphorylation of Kap1 by ATM. • Ectopic expression of Src family kinase suppressed ATM-mediated Kap1 phosphorylation. • Src is involved in upstream signaling for inactivation of ATM signaling. - Abstract: DNA damage activates the DNA damage checkpoint and the DNA repair machinery. After initial activation of DNA damage responses, cells recover to their original states through completion of DNA repair and termination of checkpoint signaling. Currently, little is known about the process by which cells recover from the DNA damage checkpoint, a process called checkpoint recovery. Here, we show that Src family kinases promote inactivation of ataxia telangiectasia mutated (ATM)-dependent checkpoint signaling during recovery from DNA double-strand breaks. Inhibition of Src activity increased ATM-dependent phosphorylation of Chk2 and Kap1. Src inhibition increased ATM signaling both in G2 phase and during asynchronous growth. shRNA knockdown of Lyn increased ATM signaling. Src-dependent nuclear tyrosine phosphorylation suppressed ATM-mediated Kap1 phosphorylation. These results suggest that Src family kinases are involved in upstream signaling that leads to inactivation of the ATM-dependent DNA damage checkpoint

  1. Disruption of spindle checkpoint function in rats following 28 days of repeated administration of renal carcinogens.

    Science.gov (United States)

    Kimura, Masayuki; Mizukami, Sayaka; Watanabe, Yousuke; Hasegawa-Baba, Yasuko; Onda, Nobuhiko; Yoshida, Toshinori; Shibutani, Makoto

    2016-02-01

    We previously reported that 28-day exposure to hepatocarcinogens that facilitate cell proliferation specifically alters the expression of G1/S checkpoint-related genes and proteins, induces aberrant early expression of ubiquitin D (UBD) at the G2 phase, and increases apoptosis in the rat liver, indicating G1/S and spindle checkpoint dysfunction. The present study aimed to determine the time of onset of carcinogen-specific cell-cycle disruption after repeated administration of renal carcinogens for up to 28 days. Rats were orally administered the renal carcinogens nitrofurantoin (NFT), 1-amino-2,4-dibromoantraquinone (ADAQ), and 1,2,3-trichloropropane (TCP) or the non-carcinogenic renal toxicants 1-chloro-2-propanol, triamterene, and carboxin for 3, 7 or 28 days. Both immunohistochemical single-molecule analysis and real-time RT-PCR analysis revealed that carcinogen-specific expression changes were not observed after 28 days of administration. However, the renal carcinogens ADAQ and TCP specifically reduced the number of cells expressing phosphorylated-histone H3 at Ser10 in both UBD(+) cells and proliferating cells, suggestive of insufficient UBD expression at the M phase and early transition of proliferating cells from the M phase, without increasing apoptosis, after 28 days of administration. In contrast, NFT, which has marginal carcinogenic potential, did not induce such cellular responses. These results suggest that it may take 28 days to induce spindle checkpoint dysfunction by renal carcinogens; however, induction of apoptosis may not be essential. Thus, induction of spindle checkpoint dysfunction may be dependent on carcinogenic potential of carcinogen examined, and marginal carcinogens may not exert sufficient responses even after 28 days of administration.

  2. CDC28, NETI, and HFII are required for checkpoints in Saccharomyces cerevisiae

    International Nuclear Information System (INIS)

    Koltovaya, N.A.; Kadyshevskaya, E.Yu.; Roshina, M.P.; Devin, A.B.

    2009-01-01

    The involvement of SRM genes selected as genes affecting genetic stability and radiosensitivity in a cell cycle arrest under the action of damaging agents was studied. It was shown that the srm5/cdc28-srm, srm8/netI-srm, and srmI2/hfiI-srm mutations prevent checkpoint activation by DNA damage, particularly the G 0 /S (srm5, srm8), G 1 /S (srm5, srm8, srm12), S (srm8, srm12) and S/G 2 (srm5) checkpoints. It seems that in budding yeast the CDC28, HFII/ADAI, and NETI genes mediate cellular response induced by DNA damage with checkpoint control. The well-known checkpoint-genes RAD9, RAD17, RAD24, and RAD53, and the genes CDC28, and NETI have been found to belong to one epistasis group named RAD9-group as regards cell sensitivity to γ radiation. An analysis of the radiosensitivity of double mutants has revealed that the mutation cdc-28-srm is hypostatic to each of mutations rad9Δ, and rad24Δ, and additive to rad17Δ. The mutation netI-srm is hypostatic to the mutations rad9Δ but additive to rad17Δ, rad24Δ, and rad53. The mutation hfiI-srm has an additive effect in compound with the mutations rad24Δ and rad9Δ. So, investigations of epistatic interactions have demonstrated a branched RAD9-dependent pathway. The analyzed genes can also participate in a minor mechanism involved in determining cell radiation sensitivity independently of the mentioned RAD9-dependent pathway

  3. Oncogene-induced senescence is part of the tumorigenesis barrier imposed by DNA damage checkpoints

    DEFF Research Database (Denmark)

    Bartkova, Jirina; Rezaei, Nousin; Liontos, Michalis

    2006-01-01

    Recent studies have indicated the existence of tumorigenesis barriers that slow or inhibit the progression of preneoplastic lesions to neoplasia. One such barrier involves DNA replication stress, which leads to activation of the DNA damage checkpoint and thereby to apoptosis or cell cycle arrest...... and senescence markers cosegregate closely. Thus, senescence in human preneoplastic lesions is a manifestation of oncogene-induced DNA replication stress and, together with apoptosis, provides a barrier to malignant progression....

  4. SPARC: Demonstrate burst-buffer-based checkpoint/restart on ATS-1.

    Energy Technology Data Exchange (ETDEWEB)

    Oldfield, Ron A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ulmer, Craig D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Widener, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ward, H. Lee [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2018-01-01

    Recent high-performance computing (HPC) platforms such as the Trinity Advanced Technology System (ATS-1) feature burst buffer resources that can have a dramatic impact on an application’s I/O performance. While these non-volatile memory (NVM) resources provide a new tier in the storage hierarchy, developers must find the right way to incorporate the technology into their applications in order to reap the benefits. Similar to other laboratories, Sandia is actively investigating ways in which these resources can be incorporated into our existing libraries and workflows without burdening our application developers with excessive, platform-specific details. This FY18Q1 milestone summaries our progress in adapting the Sandia Parallel Aerodynamics and Reentry Code (SPARC) in Sandia’s ATDM program to leverage Trinity’s burst buffers for checkpoint/restart operations. We investigated four different approaches with varying tradeoffs in this work: (1) simply updating job script to use stage-in/stage out burst buffer directives, (2) modifying SPARC to use LANL’s hierarchical I/O (HIO) library to store/retrieve checkpoints, (3) updating Sandia’s IOSS library to incorporate the burst buffer in all meshing I/O operations, and (4) modifying SPARC to use our Kelpie distributed memory library to store/retrieve checkpoints. Team members were successful in generating initial implementation for all four approaches, but were unable to obtain performance numbers in time for this report (reasons: initial problem sizes were not large enough to stress I/O, and SPARC refactor will require changes to our code). When we presented our work to the SPARC team, they expressed the most interest in the second and third approaches. The HIO work was favored because it is lightweight, unobtrusive, and should be portable to ATS-2. The IOSS work is seen as a long-term solution, and is favored because all I/O work (including checkpoints) can be deferred to a single library.

  5. A Review of Immune Checkpoint Inhibitors for the Management of Locally Advanced or Metastatic Urothelial Carcinoma.

    Science.gov (United States)

    Hanna, Kirollos S

    2017-11-01

    Urothelial carcinoma (UC) is the second most common malignancy of the genitourinary system and the sixth most common cancer in the United States. The overall incidence of UC appears to be on the decline, but death rates have remained stable. Stage IV metastatic disease is associated with only a 5% survival rate at 5 years. Gemcitabine and cisplatin combinations or dose-dense methotrexate, vinblastine, doxorubicin, and cisplatin are the preferred regimens for individuals with advance, metastatic disease and a good performance status and organ function. Second-line therapies in this setting are limited. During the course of 1 year, five immune checkpoint inhibitors were approved for treatment of cancers in the locally advanced or metastatic setting: atezolizumab, nivolumab, durvalumab, avelumab, and pembrolizumab. Immunotherapies have played a significant role in the treatment of various cancers and have continued to expand. It is of utmost importance that practitioners include checkpoint inhibitors as treatment options for UC. Based on the limited data, pembrolizumab and atezolizumab may be the drugs of choice, as they are supported by the most influential data to date; however, further research is warranted. Ongoing clinical trials will further assess the benefits of inducing cellular immunity in the treatment of UC. These therapies mark a new landscape in the treatment of UC. In this article, the available data on immune checkpoint inhibitors for the treatment of locally advanced or metastatic UC and their place in therapy are reviewed. © 2017 Pharmacotherapy Publications, Inc.

  6. Biological significance of the focus on DNA damage checkpoint factors remained after irradiation of ionizing radiation

    International Nuclear Information System (INIS)

    Yamauchi, Motohiro; Suzuki, Keiji

    2005-01-01

    This paper reviews recent reports on the focus formation and participation to checkpoint of (such phosphorylated (P-d) as below) ATM and H2AX, MDC1, 53BP1 and NBS1, and discusses their role in DNA damage checkpoint induction mainly around authors' studies. When the cell is irradiated by ionizing radiation, the subtype histone like H2AX is P-d and the formed focus', seen in the nucleus on immuno-fluorographic observation, represents the P-d H2AX at the damaged site of DNA. The role of P-d ATM (the product of causative gene of ataxia-telangiectasia mutation, a protein kinase) has been first shown by laser beam irradiation. Described are discussions on the roles and functions after irradiation in focus formation and DNA damage checkpoint of P-d H2AX (a specific histone product by the radiation like γ-ray as above), P-d ATM, MDC1 (a mediator of DNA damage check point protein 1), 53BP1, (a p53 binding protein) and NBS1 (the product of the causative gene of Nijmegen Breakage Syndrome). Authors have come to point out the remained focal size increase as implications of the efficient repair of damaged DNA, and the second cycled p53 accumulation, of tumor suppression. Thus evaluation of biological significance of these aspects, scarcely noted hitherto, is concluded important. (S.I.)

  7. Measures to detect and control radioactive contaminated metallurgical scrap at border checkpoints in Poland

    International Nuclear Information System (INIS)

    Smagala, G.

    1999-01-01

    The issue of radioactive contaminated metallurgical scrap has never received a high priority in Poland and in the international community. Since the dissolution of the former Soviet Union a higher attention has been given to the problem. Poland which is located between the West and East Europe has the obligation to develop and implement an effective prevention and detection system. The reasons to increase national control and detection system at the border checkpoints in Poland are to avoid the following risks: post Chernobyl contamination transports of commodities; transport of contaminated metal scrap; transfer of radioactive waste for their disposal or utilization; high risk of becoming a transit country of illicit trafficking of nuclear materials and radioactive sources. In order to avoid the above-mentioned risks, Poland initiated in 1990, a deployment of the portable radiation devices at the border checkpoints and, as of 1998, the number of installed instruments exceeded a hundred. This paper presents Poland's activities to detect contaminated scrap at its border checkpoints. (author)

  8. Immune checkpoint blockade therapy: The 2014 Tang prize in biopharmaceutical science

    Directory of Open Access Journals (Sweden)

    Ya-Shan Chen

    2015-02-01

    Full Text Available The first Tang Prize for Biopharmaceutical Science has been awarded to Prof. James P. Allison and Prof. Tasuku Honjo for their contributions leading to an entirely new way to treat cancer by blocking the molecules cytotoxic T lymphocyte-associated antigen 4 (CTLA-4 and programmed cell death protein 1 (PD-1 that turn off immune response. The treatment, called "immune checkpoint blockade therapy," has opened a new therapeutic era. Here the discoveries of the immune checkpoints and how they contribute to the maintenance of self-tolerance, as well as how to protect tissues from the excess immune responses causing damage are reviewed. The efforts made by Prof. Allison and Prof. Honjo for developing the most promising approaches to activate therapeutic antitumor immunity are also summarized. Since these certain immune checkpoint pathways appear to be one of the major mechanisms resulting in immune escape of tumors, the presence of anti-CTLA-4 and/or anti-PD-1 should contribute to removal of the inhibition signals for T cell activation. Subsequently, it will enhance specific T cell activation and, therefore, strengthen antitumor immunity.

  9. TAM receptor tyrosine kinases as emerging targets of innate immune checkpoint blockade for cancer therapy.

    Science.gov (United States)

    Akalu, Yemsratch T; Rothlin, Carla V; Ghosh, Sourav

    2017-03-01

    Cancer immunotherapy utilizing T-cell checkpoint inhibitors has shown tremendous clinical success. Yet, this mode of treatment is effective in only a subset of patients. Unresponsive patients tend to have non-T-cell-inflamed tumors that lack markers associated with the activation of adaptive anti-tumor immune responses. Notably, elimination of cancer cells by T cells is critically dependent on the optimal activity of innate immune cells. Therefore, identifying new targets that regulate innate immune cell function and promote the engagement of adaptive tumoricidal responses is likely to lead to the development of improved therapies against cancer. Here, we review the TAM receptor tyrosine kinases-TYRO3, AXL, and MERTK-as an emerging class of innate immune checkpoints that participate in key steps of anti-tumoral immunity. Namely, TAM-mediated efferocytosis, negative regulation of dendritic cell activity, and dysregulated production of chemokines collectively favor the escape of malignant cells. Hence, disabling TAM signaling may promote engagement of adaptive immunity and complement T-cell checkpoint blockade. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. Unique cytologic features of thyroiditis caused by immune checkpoint inhibitor therapy for malignant melanoma

    Directory of Open Access Journals (Sweden)

    Trevor E. Angell

    2018-03-01

    Full Text Available Blockade of immune checkpoint molecules to reverse cancer-induced immune suppression can improve anti-tumor immune responses in cancer patients. Monoclonal antibodies targeting two such molecules, Programmed cell death protein 1 (PD-1 and cytotoxic T-lymphocyte associated protein 4 (CTLA-4 have shown clinical benefit in the treatment of advanced malignancies, including metastatic melanoma. Adverse effects of these immune checkpoint inhibitors include immune-related adverse events (irAE, of which one of the most common is autoimmune thyroiditis. Though thyroiditis is increasingly recognized, there are no reports of the pathological findings that occur in immunotherapy-induced thyroiditis. We present a case of immunotherapy-induced thyroiditis demonstrating its unique cytopathologic features. A 51-year-old woman with metastatic melanoma was found to have a suppressed TSH and elevated free thyroxine concentration 14 days after starting treatment with nivolumab (PD-1 antagonist plus ipilimumab (CTLA-4 antagonist therapy. A thyroid biopsy was performed based on ultrasound findings and cytopathology revealed unique features including abundant clusters of necrotic cells, lymphocytes and CD163-positive histiocytes. This case reports cytopathologic features found in immune checkpoint inhibitor related thyroiditis. These appear to be unique findings and may help inform future research regarding the pathophysiology and mechanisms of this condition.

  11. Cdk2 is required for p53-independent G2/M checkpoint control.

    Directory of Open Access Journals (Sweden)

    Jon H Chung

    2010-02-01

    Full Text Available The activation of phase-specific cyclin-dependent kinases (Cdks is associated with ordered cell cycle transitions. Among the mammalian Cdks, only Cdk1 is essential for somatic cell proliferation. Cdk1 can apparently substitute for Cdk2, Cdk4, and Cdk6, which are individually dispensable in mice. It is unclear if all functions of non-essential Cdks are fully redundant with Cdk1. Using a genetic approach, we show that Cdk2, the S-phase Cdk, uniquely controls the G(2/M checkpoint that prevents cells with damaged DNA from initiating mitosis. CDK2-nullizygous human cells exposed to ionizing radiation failed to exclude Cdk1 from the nucleus and exhibited a marked defect in G(2/M arrest that was unmasked by the disruption of P53. The DNA replication licensing protein Cdc6, which is normally stabilized by Cdk2, was physically associated with the checkpoint regulator ATR and was required for efficient ATR-Chk1-Cdc25A signaling. These findings demonstrate that Cdk2 maintains a balance of S-phase regulatory proteins and thereby coordinates subsequent p53-independent G(2/M checkpoint activation.

  12. Loss of p53 induces M-phase retardation following G2 DNA damage checkpoint abrogation.

    Science.gov (United States)

    Minemoto, Yuzuru; Uchida, Sanae; Ohtsubo, Motoaki; Shimura, Mari; Sasagawa, Toshiyuki; Hirata, Masato; Nakagama, Hitoshi; Ishizaka, Yukihito; Yamashita, Katsumi

    2003-04-01

    Most cell lines that lack functional p53 protein are arrested in the G2 phase of the cell cycle due to DNA damage. When the G2 checkpoint is abrogated, these cells are forced into mitotic catastrophe. A549 lung adenocarcinoma cells, in which p53 was eliminated with the HPV16 E6 gene, exhibited efficient arrest in the G2 phase when treated with adriamycin. Administration of caffeine to G2-arrested cells induced a drastic change in cell phenotype, the nature of which depended on the status of p53. Flow cytometric and microscopic observations revealed that cells that either contained or lacked p53 resumed their cell cycles and entered mitosis upon caffeine treatment. However, transit to the M phase was slower in p53-negative cells than in p53-positive cells. Consistent with these observations, CDK1 activity was maintained at high levels, along with stable cyclin B1, in p53-negative cells. The addition of butyrolactone I, which is an inhibitor of CDK1 and CDK2, to the p53-negative cells reduced the floating round cell population and induced the disappearance of cyclin B1. These results suggest a relationship between the p53 pathway and the ubiquitin-mediated degradation of mitotic cyclins and possible cross-talk between the G2-DNA damage checkpoint and the mitotic checkpoint.

  13. Immune checkpoint inhibitors: the new frontier in non–small cell lung cancer treatment

    Directory of Open Access Journals (Sweden)

    El-Osta HE

    2016-08-01

    Full Text Available Hazem El-Osta, Kamran Shahid, Glenn M Mills, Prakash Peddi Department of Medicine, Division of Hematology-Oncology, Louisiana State University Health Sciences Center, Shreveport, LA, USA Abstract: Lung cancer is the major cause for cancer-related death in the US. Although advances in chemotherapy and targeted therapy have improved the outcome of metastatic non-small-cell lung cancer, its prognosis remains dismal. A deeper understanding of the complex interaction between the immune system and tumor microenvironment has identified immune checkpoint inhibitors as new avenue of immunotherapy. Rather than acting directly on the tumor, these therapies work by removing the inhibition exerted by tumor cell or other immune cells on the immune system, promoting antitumoral immune response. To date, two programmed death-1 inhibitors, namely nivolumab and pembrolizumab, have received the US Food and Drug Administration approval for the treatment of advanced non-small-cell lung cancer that failed platinum-based chemotherapy. This manuscript provides a brief overview of the pathophysiology of cancer immune evasion, summarizes pertinent data on completed and ongoing clinical trials involving checkpoint inhibitors, discusses the different strategies to optimize their function, and outlines various challenges that are faced in this promising yet evolving field. Keywords: checkpoint inhibitors, immunotherapy, nivolumab, non-small-cell lung cancer, pembrolizumab, programmed death-1, programmed death ligand-1

  14. Evidence for a transketolase-mediated metabolic checkpoint governing biotrophic growth in rice cells by the blast fungus Magnaporthe oryzae.

    Directory of Open Access Journals (Sweden)

    Jessie Fernandez

    2014-09-01

    Full Text Available The blast fungus Magnaporthe oryzae threatens global food security through the widespread destruction of cultivated rice. Foliar infection requires a specialized cell called an appressorium that generates turgor to force a thin penetration hypha through the rice cuticle and into the underlying epidermal cells, where the fungus grows for the first days of infection as a symptomless biotroph. Understanding what controls biotrophic growth could open new avenues for developing sustainable blast intervention programs. Here, using molecular genetics and live-cell imaging, we dismantled M. oryzae glucose-metabolizing pathways to reveal that the transketolase enzyme, encoded by TKL1, plays an essential role in facilitating host colonization during rice blast disease. In the absence of transketolase, Δtkl1 mutant strains formed functional appressoria that penetrated rice cuticles successfully and developed invasive hyphae (IH in rice cells from primary hyphae. However, Δtkl1 could not undertake sustained biotrophic growth or cell-to-cell movement. Transcript data and observations using fluorescently labeled histone H1:RFP fusion proteins indicated Δtkl1 mutant strains were alive in host cells but were delayed in mitosis. Mitotic delay could be reversed and IH growth restored by the addition of exogenous ATP, a metabolite depleted in Δtkl1 mutant strains. We show that ATP might act via the TOR signaling pathway, and TOR is likely a downstream target of activation for TKL1. TKL1 is also involved in controlling the migration of appressorial nuclei into primary hyphae in host cells. When taken together, our results indicate transketolase has a novel role in mediating--via ATP and TOR signaling--an in planta-specific metabolic checkpoint that controls nuclear migration from appressoria into primary hyphae, prevents mitotic delay in early IH and promotes biotrophic growth. This work thus provides new information about the metabolic strategies employed by M

  15. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  16. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  17. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  18. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  19. Dpb11/TopBP1 plays distinct roles in DNA replication, checkpoint response and homologous recombination

    DEFF Research Database (Denmark)

    Germann, Susanne Manuela; Østergaard, Vibe Hallundbæk; Haas, Caroline

    2011-01-01

    DPB11/TopBP1 is an essential evolutionarily conserved gene involved in initiation of DNA replication and checkpoint signaling. Here, we show that Saccharomyces cerevisiae Dpb11 forms nuclear foci that localize to sites of DNA damage in G1, S and G2 phase, a recruitment that is conserved for its...... and Tel1, and of the checkpoint mediator Rad9. In a site-directed mutagenesis screen, we identify a separation-of-function mutant, dpb11-PF, that is sensitive to DSB-inducing agents yet remains proficient for DNA replication and the S-phase checkpoint at the permissive temperature. The dpb11-PF mutant...... homologue TopBP1 in Gallus gallus. Damage-induced Dpb11 foci are distinct from Sld3 replication initiation foci. Further, Dpb11 foci are dependent on the checkpoint proteins Mec3 (9-1-1 complex) and Rad24, and require the C-terminal domain of Dpb11. Dpb11 foci are independent of the checkpoint kinases Mec1...

  20. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  1. Drosophila MOF controls Checkpoint protein2 and regulates genomic stability during early embryogenesis.

    Science.gov (United States)

    Pushpavalli, Sreerangam N C V L; Sarkar, Arpita; Ramaiah, M Janaki; Chowdhury, Debabani Roy; Bhadra, Utpal; Pal-Bhadra, Manika

    2013-01-24

    In Drosophila embryos, checkpoints maintain genome stability by delaying cell cycle progression that allows time for damage repair or to complete DNA synthesis. Drosophila MOF, a member of MYST histone acetyl transferase is an essential component of male X hyperactivation process. Until recently its involvement in G2/M cell cycle arrest and defects in ionizing radiation induced DNA damage pathways was not well established. Drosophila MOF is highly expressed during early embryogenesis. In the present study we show that haplo-insufficiency of maternal MOF leads to spontaneous mitotic defects like mitotic asynchrony, mitotic catastrophe and chromatid bridges in the syncytial embryos. Such abnormal nuclei are eliminated and digested in the yolk tissues by nuclear fall out mechanism. MOF negatively regulates Drosophila checkpoint kinase 2 tumor suppressor homologue. In response to DNA damage the checkpoint gene Chk2 (Drosophila mnk) is activated in the mof mutants, there by causing centrosomal inactivation suggesting its role in response to genotoxic stress. A drastic decrease in the fall out nuclei in the syncytial embryos derived from mof¹/+; mnkp⁶/+ females further confirms the role of DNA damage response gene Chk2 to ensure the removal of abnormal nuclei from the embryonic precursor pool and maintain genome stability. The fact that mof mutants undergo DNA damage has been further elucidated by the increased number of single and double stranded DNA breaks. mof mutants exhibited genomic instability as evidenced by the occurance of frequent mitotic bridges in anaphase, asynchronous nuclear divisions, disruption of cytoskeleton, inactivation of centrosomes finally leading to DNA damage. Our findings are consistent to what has been reported earlier in mammals that; reduced levels of MOF resulted in increased genomic instability while total loss resulted in lethality. The study can be further extended using Drosophila as model system and carry out the interaction of MOF

  2. Drosophila MOF controls Checkpoint protein2 and regulates genomic stability during early embryogenesis

    Directory of Open Access Journals (Sweden)

    Pushpavalli Sreerangam NCVL

    2013-01-01

    Full Text Available Abstract Background In Drosophila embryos, checkpoints maintain genome stability by delaying cell cycle progression that allows time for damage repair or to complete DNA synthesis. Drosophila MOF, a member of MYST histone acetyl transferase is an essential component of male X hyperactivation process. Until recently its involvement in G2/M cell cycle arrest and defects in ionizing radiation induced DNA damage pathways was not well established. Results Drosophila MOF is highly expressed during early embryogenesis. In the present study we show that haplo-insufficiency of maternal MOF leads to spontaneous mitotic defects like mitotic asynchrony, mitotic catastrophe and chromatid bridges in the syncytial embryos. Such abnormal nuclei are eliminated and digested in the yolk tissues by nuclear fall out mechanism. MOF negatively regulates Drosophila checkpoint kinase 2 tumor suppressor homologue. In response to DNA damage the checkpoint gene Chk2 (Drosophila mnk is activated in the mof mutants, there by causing centrosomal inactivation suggesting its role in response to genotoxic stress. A drastic decrease in the fall out nuclei in the syncytial embryos derived from mof1/+; mnkp6/+ females further confirms the role of DNA damage response gene Chk2 to ensure the removal of abnormal nuclei from the embryonic precursor pool and maintain genome stability. The fact that mof mutants undergo DNA damage has been further elucidated by the increased number of single and double stranded DNA breaks. Conclusion mof mutants exhibited genomic instability as evidenced by the occurance of frequent mitotic bridges in anaphase, asynchronous nuclear divisions, disruption of cytoskeleton, inactivation of centrosomes finally leading to DNA damage. Our findings are consistent to what has been reported earlier in mammals that; reduced levels of MOF resulted in increased genomic instability while total loss resulted in lethality. The study can be further extended using

  3. T cells in chronic lymphocytic leukemia display dysregulated expression of immune checkpoints and activation markers.

    Science.gov (United States)

    Palma, Marzia; Gentilcore, Giusy; Heimersson, Kia; Mozaffari, Fariba; Näsman-Glaser, Barbro; Young, Emma; Rosenquist, Richard; Hansson, Lotta; Österborg, Anders; Mellstedt, Håkan

    2017-03-01

    Chronic lymphocytic leukemia is characterized by impaired immune functions largely due to profound T-cell defects. T-cell functions also depend on co-signaling receptors, inhibitory or stimulatory, known as immune checkpoints, including cytotoxic T-lymphocyte-associated antigen-4 (CTLA-4) and programmed death-1 (PD-1). Here we analyzed the T-cell phenotype focusing on immune checkpoints and activation markers in chronic lymphocytic leukemia patients (n=80) with different clinical characteristics and compared them to healthy controls. In general, patients had higher absolute numbers of CD3 + cells and the CD8 + subset was particularly expanded in previously treated patients. Progressive patients had higher numbers of CD4 + and CD8 + cells expressing PD-1 compared to healthy controls, which was more pronounced in previously treated patients ( P =0.0003 and P =0.001, respectively). A significant increase in antigen-experienced T cells was observed in patients within both the CD4 + and CD8 + subsets, with a significantly higher PD-1 expression. Higher numbers of CD4 + and CD8 + cells with intracellular CTLA-4 were observed in patients, as well as high numbers of proliferating (Ki67 + ) and activated (CD69 + ) CD4 + and CD8 + cells, more pronounced in patients with active disease. The numbers of Th1, Th2, Th17 and regulatory T cells were substantially increased in patients compared to controls ( P leukemia T cells display increased expression of immune checkpoints, abnormal subset distribution, and a higher proportion of proliferating cells compared to healthy T cells. Disease activity and previous treatment shape the T-cell profile of chronic lymphocytic leukemia patients in different ways. Copyright© Ferrata Storti Foundation.

  4. Checkpoint Inhibition: Programmed Cell Death 1 and Programmed Cell Death 1 Ligand Inhibitors in Hodgkin Lymphoma.

    Science.gov (United States)

    Villasboas, Jose Caetano; Ansell, Stephen

    2016-01-01

    Hodgkin lymphoma (HL) is a lymphoid malignancy characterized by a reactive immune infiltrate surrounding relatively few malignant cells. In this scenario, active immune evasion seems to play a central role in allowing tumor progression. Immune checkpoint inhibitor pathways are normal mechanisms of T-cell regulation that suppress immune effector function following an antigenic challenge. Hodgkin lymphoma cells are able to escape immune surveillance by co-opting these mechanisms. The programmed cell death 1 (PD-1) pathway in particular is exploited in HL as the malignant Hodgkin and Reed-Sternberg cells express on their surface cognate ligands (PD-L1/L2) for the PD-1 receptor and thereby dampen the T-cell-mediated antitumoral response. Monoclonal antibodies that interact with and disrupt the PD-1:PD-L1/L2 axis have now been developed and tested in early-phase clinical trials in patients with advanced HL with encouraging results. The remarkable clinical activity of PD-1 inhibitors in HL highlights the importance of immune checkpoint pathways as therapeutic targets in HL. In this review, we discuss the rationale for targeting PD-1 and PD-L1 in the treatment of HL. We will evaluate the published clinical data on the different agents and highlight the safety profile of this class of agents. We discuss the available evidence on the use of biomarkers as predictors of response to checkpoint blockade and summarize the areas under active investigation in the use of PD-1/PD-L1 inhibitors for the treatment of HL.

  5. Immuno-oncologic Approaches: CAR-T Cells and Checkpoint Inhibitors.

    Science.gov (United States)

    Gay, Francesca; D'Agostino, Mattia; Giaccone, Luisa; Genuardi, Mariella; Festuccia, Moreno; Boccadoro, Mario; Bruno, Benedetto

    2017-08-01

    Advances in understanding myeloma biology have shown that disease progression is not only the consequence of intrinsic tumor changes but also of interactions between the tumor and the microenvironment in which the cancer grows. The immune system is an important component of the tumor microenvironment in myeloma, and acting on the immune system is an appealing new treatment strategy. There are 2 ways to act toward immune cells and boost antitumor immunity: (1) to increase antitumor activity (acting on T and NK cytotoxic cells), and (2) to reduce immunosuppression (acting on myeloid-derived stem cells and T regulatory cells). Checkpoint inhibitors and adoptive cell therapy (ACT) are 2 of the main actors, together with monoclonal antibodies and immunomodulatory agents, in the immune-oncologic approach. The aim of checkpoint inhibitors is to release the brakes that block the action of the immune system against the tumor. Anti-programmed death-1 (PD-1) and PD-1-Ligand, as well as anti-CTLA4 and KIR are currently under evaluation, as single agents or in combination, with the best results achieved so far with combination of anti-PD-1 and immunomodulatory agents. The aim of ACT is to create an immune effector specific against the tumor. Preliminary results on chimeric antigen receptor (CAR) T cells, first against CD19, and more recently against B-cell maturation antigen, have shown to induce durable responses in heavily pretreated patients. This review focuses on the most recent clinical results available on the use of checkpoint inhibitors and CAR-T cells in myeloma, in the context of the new immune-oncologic approach. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Requirement for PLK1 kinase activity in the maintenance of a robust spindle assembly checkpoint

    Directory of Open Access Journals (Sweden)

    Aisling O'Connor

    2016-01-01

    Full Text Available During mitotic arrest induced by microtubule targeting drugs, the weakening of the spindle assembly checkpoint (SAC allows cells to progress through the cell cycle without chromosome segregation occurring. PLK1 kinase plays a major role in mitosis and emerging evidence indicates that PLK1 is also involved in establishing the checkpoint and maintaining SAC signalling. However, mechanistically, the role of PLK1 in the SAC is not fully understood, with several recent reports indicating that it can cooperate with either one of the major checkpoint kinases, Aurora B or MPS1. In this study, we assess the role of PLK1 in SAC maintenance. We find that in nocodazole-arrested U2OS cells, PLK1 activity is continuously required for maintaining Aurora B protein localisation and activity at kinetochores. Consistent with published data we find that upon PLK1 inhibition, phosphoThr3-H3, a marker of Haspin activity, is reduced. Intriguingly, Aurora B inhibition causes PLK1 to relocalise from kinetochores into fewer and much larger foci, possibly due to incomplete recruitment of outer kinetochore proteins. Importantly, PLK1 inhibition, together with partial inhibition of Aurora B, allows efficient SAC override to occur. This phenotype is more pronounced than the phenotype observed by combining the same PLK1 inhibitors with partial MPS1 inhibition. We also find that PLK1 inhibition does not obviously cooperate with Haspin inhibition to promote SAC override. These results indicate that PLK1 is directly involved in maintaining efficient SAC signalling, possibly by cooperating in a positive feedback loop with Aurora B, and that partially redundant mechanisms exist which reinforce the SAC.

  7. Mutant p53 perturbs DNA replication checkpoint control through TopBP1 and Treslin.

    Science.gov (United States)

    Liu, Kang; Lin, Fang-Tsyr; Graves, Joshua D; Lee, Yu-Ju; Lin, Weei-Chin

    2017-05-09

    Accumulating evidence supports the gain-of-function of mutant forms of p53 (mutp53s). However, whether mutp53 directly perturbs the DNA replication checkpoint remains unclear. Previously, we have demonstrated that TopBP1 forms a complex with mutp53s and mediates their gain-of-function through NF-Y and p63/p73. Akt phosphorylates TopBP1 and induces its oligomerization, which inhibits its ATR-activating function. Here we show that various contact and conformational mutp53s bypass Akt to induce TopBP1 oligomerization and attenuate ATR checkpoint response during replication stress. The effect on ATR response caused by mutp53 can be exploited in a synthetic lethality strategy, as depletion of another ATR activator, DNA2, in mutp53-R273H-expressing cancer cells renders cells hypersensitive to cisplatin. Expression of mutp53-R273H also makes cancer cells more sensitive to DNA2 depletion or DNA2 inhibitors. In addition to ATR-activating function during replication stress, TopBP1 interacts with Treslin in a Cdk-dependent manner to initiate DNA replication during normal growth. We find that mutp53 also interferes with TopBP1 replication function. Several contact, but not conformational, mutp53s enhance the interaction between TopBP1 and Treslin and promote DNA replication despite the presence of a Cdk2 inhibitor. Together, these data uncover two distinct mechanisms by which mutp53 enhances DNA replication: ( i ) Both contact and conformational mutp53s can bind TopBP1 and attenuate the checkpoint response to replication stress, and ( ii ) during normal growth, contact (but not conformational) mutp53s can override the Cdk2 requirement to promote replication by facilitating the TopBP1/Treslin interaction.

  8. Effect of salt-inducible kinase 2 on checkpoint in response to γ-ray irradiation

    International Nuclear Information System (INIS)

    Yin Jiaojiao; Zhou Lijun; Wang Yu; Liu Xiaodan; Gu Yongqing; Zhou Pingkun

    2014-01-01

    Objective: To investigate the effect of salt-induced kinase 2 (SIK2) in the G_2/M checkpoint in response to ionizing radiation and the possible mechanism. Methods: HeLa cells were irradiated with "6"0Co γ-rays. The cell model of knockdown SIK2 expression was constrcuted by transfecting HeLa cells with a pSicoR-based lentivirus vector of expressing SIK2 shRNA by lipofectamin 2000. Western blot and flow cytometry were performed to measure the changes of SIK2 protein level and cell cycle distribution. The phosphorylated histone protein H3 on Ser 10 was used as a molecular marker of mitotic cells for detecting the function of G2/M checkpoint. Results: The expression level of SIK2 protein increased in HeLa cells after "6"0Co γ-ray irradiation. A cell model of knockdown SIK2 expression was successfully generated by transfecting the specific shRNA against SIK2. Depression of SIK2 significantly increased the cellular sensitivity at 1, 2, 4, 6 Gy post-irradiation (t = -3.445, -2.581, -3.251, -2.553, P < 0.05), and led cells to release earlier from the G_2/M boundary arrest compared to control cells at 5, 6 h post-irradiation(t = 4.341, 6.500, P < 0.05). Western blot analysis indicated that the irradiation-induced phosphorylated CHK2/T68 in SIK2 knock-down cells was earlier than that in control cells. Conclusions: salt-induced kinase 2 (SIK2) participates in the regulation of G_2/M checkpoint induced by ionizing radiation and affects cellular radiosensitivity. (authors)

  9. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  10. Rad9 contribution to radiosensitivity and the G2 checkpoint in a DT40 cell line

    Energy Technology Data Exchange (ETDEWEB)

    Kumano, Tomoyasu [Kanazawa Univ. (Japan). Graduate School of Medical Science

    2002-12-01

    In fission yeast, the rad9 (radiation sensitive) gene was cloned from a mutant that is sensitive to ionizing radiation, ultraviolet and hydroxyurea. This gene has also been shown to be required for a DNA damage checkpoint. Orthologues of the rad9 gene have recently been identified in higher eukaryote cells including human. Here we generated Rad9 knockout (Rad9-/-) cells from the chicken B lymphocyte line DT40 to examine the role of Rad9 in higher eukaryotes. First we isolated a part of the chicken Rad9 gene which was 54% identical with human Rad9 at the amino acid sequence level. Next we isolated genomic clones, determined exons and introns, and constructed targeting vectors designed to disrupt exon 1-3 of the chicken Rad9 gene by replacement with a drug-resistant gene. Successful targeted integration was verified by Southern blot analysis and the disruption of the Rad9 gene was confirmed by reverse transcription polymerase chain reaction (RT-PCR). To analyze the radiosensitivity of these Rad9-/- cells, we monitored the clonogenic survival after various degrees of X-ray irradiation. Rad9-/- cells were more sensitive to X-rays than wild type cells at all dosages. However, these cells were less sensitive than ATM knockout (ATM-/-) cells that are known to be X-ray sensitive and that showed a defective checkpoint control. In contrast, Rad9-/- cells were markedly more sensitive to ultraviolet and hydroxyruea. In addition, we assessed the G2 checkpoint by measurement of the mitotic index that is the fraction of the accumulating number of cells in mitosis at various times after X-ray irradiation. While the number of mitotic wild type cells did not increase until 2 hrs after X-ray irradiation, the number of mitotic Rad9-/- cells showed an increase similar to that of ATM-/- cells. These results suggest that just as in fission yeast, in higher eukaryotes Rad9 also contributes to X-ray, ultraviolet and hydroxyurea sensitivity, and plays an important role in the G2 checkpoint

  11. Rad9 contribution to radiosensitivity and the G2 checkpoint in a DT40 cell line

    International Nuclear Information System (INIS)

    Kumano, Tomoyasu

    2002-01-01

    In fission yeast, the rad9 (radiation sensitive) gene was cloned from a mutant that is sensitive to ionizing radiation, ultraviolet and hydroxyurea. This gene has also been shown to be required for a DNA damage checkpoint. Orthologues of the rad9 gene have recently been identified in higher eukaryote cells including human. Here we generated Rad9 knockout (Rad9-/-) cells from the chicken B lymphocyte line DT40 to examine the role of Rad9 in higher eukaryotes. First we isolated a part of the chicken Rad9 gene which was 54% identical with human Rad9 at the amino acid sequence level. Next we isolated genomic clones, determined exons and introns, and constructed targeting vectors designed to disrupt exon 1-3 of the chicken Rad9 gene by replacement with a drug-resistant gene. Successful targeted integration was verified by Southern blot analysis and the disruption of the Rad9 gene was confirmed by reverse transcription polymerase chain reaction (RT-PCR). To analyze the radiosensitivity of these Rad9-/- cells, we monitored the clonogenic survival after various degrees of X-ray irradiation. Rad9-/- cells were more sensitive to X-rays than wild type cells at all dosages. However, these cells were less sensitive than ATM knockout (ATM-/-) cells that are known to be X-ray sensitive and that showed a defective checkpoint control. In contrast, Rad9-/- cells were markedly more sensitive to ultraviolet and hydroxyruea. In addition, we assessed the G2 checkpoint by measurement of the mitotic index that is the fraction of the accumulating number of cells in mitosis at various times after X-ray irradiation. While the number of mitotic wild type cells did not increase until 2 hrs after X-ray irradiation, the number of mitotic Rad9-/- cells showed an increase similar to that of ATM-/- cells. These results suggest that just as in fission yeast, in higher eukaryotes Rad9 also contributes to X-ray, ultraviolet and hydroxyurea sensitivity, and plays an important role in the G2 checkpoint

  12. Monitoring of scrap loads at Gorzia border checkpoints: A thirty months experience and some suggestions

    International Nuclear Information System (INIS)

    Fabretto, M.

    1999-01-01

    The following topics are highlighted: personnel training, assistance from foreign scrap suppliers, and computerized database. It is suggested that when selecting personnel for this job, major attention should be paid to their attitudes; the personnel should be given very good training, teaching them also how to make controls manually; expert physicist' support should be available within a very short time; each monitoring checkpoint should have its local electronic database; periodical exchange and updating of information should be practised on the standardization of methods of detection, of levels of attention and alarm, of statistics among the people in charge of EU and non-EU countries. (P.A.)

  13. Strategies to overcome HBV-specific T cell exhaustion: checkpoint inhibitors and metabolic re-programming.

    Science.gov (United States)

    Fisicaro, Paola; Boni, Carolina; Barili, Valeria; Laccabue, Diletta; Ferrari, Carlo

    2018-01-29

    HBV-specific T cells play a key role in antiviral protection and failure to control HBV is associated with severely dysfunctional T cell responses. Therefore, functional T cell reconstitution represents a potential way to treat chronically infected patients. The growing understanding of the dysregulated transcriptional/epigenetic and metabolic programs underlying T cell exhaustion allows to envisage functional T cell reconstitution strategies based on the combined/sequential use of compounds able to induce decline of antigen load, checkpoint modulation, metabolic and epigenetic reprogramming with possible boosting of functionally restored responses by specific vaccines. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  16. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  17. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  18. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  19. In vitro analysis of the role of replication protein A (RPA) and RPA phosphorylation in ATR-mediated checkpoint signaling.

    Science.gov (United States)

    Lindsey-Boltz, Laura A; Reardon, Joyce T; Wold, Marc S; Sancar, Aziz

    2012-10-19

    Replication protein A (RPA) plays essential roles in DNA metabolism, including replication, checkpoint, and repair. Recently, we described an in vitro system in which the phosphorylation of human Chk1 kinase by ATR (ataxia telangiectasia mutated and Rad3-related) is dependent on RPA bound to single-stranded DNA. Here, we report that phosphorylation of other ATR targets, p53 and Rad17, has the same requirements and that RPA is also phosphorylated in this system. At high p53 or Rad17 concentrations, RPA phosphorylation is inhibited and, in this system, RPA with phosphomimetic mutations cannot support ATR kinase function, whereas a non-phosphorylatable RPA mutant exhibits full activity. Phosphorylation of these ATR substrates depends on the recruitment of ATR and the substrates by RPA to the RPA-ssDNA complex. Finally, mutant RPAs lacking checkpoint function exhibit essentially normal activity in nucleotide excision repair, revealing RPA separation of function for checkpoint and excision repair.

  20. In Vitro Analysis of the Role of Replication Protein A (RPA) and RPA Phosphorylation in ATR-mediated Checkpoint Signaling*

    Science.gov (United States)

    Lindsey-Boltz, Laura A.; Reardon, Joyce T.; Wold, Marc S.; Sancar, Aziz

    2012-01-01

    Replication protein A (RPA) plays essential roles in DNA metabolism, including replication, checkpoint, and repair. Recently, we described an in vitro system in which the phosphorylation of human Chk1 kinase by ATR (ataxia telangiectasia mutated and Rad3-related) is dependent on RPA bound to single-stranded DNA. Here, we report that phosphorylation of other ATR targets, p53 and Rad17, has the same requirements and that RPA is also phosphorylated in this system. At high p53 or Rad17 concentrations, RPA phosphorylation is inhibited and, in this system, RPA with phosphomimetic mutations cannot support ATR kinase function, whereas a non-phosphorylatable RPA mutant exhibits full activity. Phosphorylation of these ATR substrates depends on the recruitment of ATR and the substrates by RPA to the RPA-ssDNA complex. Finally, mutant RPAs lacking checkpoint function exhibit essentially normal activity in nucleotide excision repair, revealing RPA separation of function for checkpoint and excision repair. PMID:22948311

  1. Targeting Tumor-Associated Macrophages as a Potential Strategy to Enhance the Response to Immune Checkpoint Inhibitors.

    Science.gov (United States)

    Cassetta, Luca; Kitamura, Takanori

    2018-01-01

    Inhibition of immune checkpoint pathways in CD8 + T cell is a promising therapeutic strategy for the treatment of solid tumors that has shown significant anti-tumor effects and is now approved by the FDA to treat patients with melanoma and lung cancer. However the response to this therapy is limited to a certain fraction of patients and tumor types, for reasons still unknown. To ensure success of this treatment, CD8 + T cells, the main target of the checkpoint inhibitors, should exert full cytotoxicity against tumor cells. However recent studies show that tumor-associated macrophages (TAM) can impede this process by different mechanisms. In this mini-review we will summarize recent studies showing the effect of TAM targeting on immune checkpoint inhibitors efficacy. We will also discuss on the limitations of the current strategies as well on the future scientific challenges for the progress of the tumor immunology field.

  2. Autonomy and manual operation in a small robotic system for under-vehicle inspections at security checkpoints

    Science.gov (United States)

    Smuda, William; Muench, Paul L.; Gerhart, Grant R.; Moore, Kevin L.

    2002-07-01

    Unmanned ground vehicle (UGV) technology can be used in a number of ways to assist in counter-terrorism activities. In addition to the conventional uses of tele-operated robots for unexploded ordinance handling and disposal, water cannons and other crowd control devices, robots can also be employed for a host of terrorism deterrence and detection applications. In previous research USU developed a completely autonomous prototype robot for performing under- vehicle inspections in parking areas (ODIS). Testing of this prototype and discussions with the user community indicated that neither the technology nor the users are ready for complete autonomy. In this paper we present a robotic system based on ODIS that balances the users' desire/need for tele- operation with a limited level of autonomy that enhances the performance of the robot. The system can be used by both civilian law enforcement and military police to replace the traditional mirror on a stick system of looking under cars for bombs and contraband.

  3. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  4. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  5. Grp/DChk1 is required for G(2)-M checkpoint activation in Drosophila S2 cells, whereas Dmnk/DChk2 is dispensable

    NARCIS (Netherlands)

    de Vries, HI; Uyetake, L; Lemstra, W; Brunsting, JF; Su, TT; Kampinga, HH; Sibon, OCM

    2005-01-01

    Cell-cycle checkpoints are signal-transduction pathways required to maintain genomic stability in dividing cells. Previously, it was reported that two kinases essential for checkpoint signalling, Chk1 and Chk2 are structurally conserved. In contrast to yeast, Xenopus and mammals, the Chk1- and

  6. The Geography of Deterrence: Exploring the Small Area Effects of Sobriety Checkpoints on Alcohol-Impaired Collision Rates within a City

    Science.gov (United States)

    Nunn, Samuel; Newby, William

    2011-01-01

    This article examines alcohol-impaired collision metrics around nine sobriety checkpoint locations in Indianapolis, Indiana, before and after implementation of 22 checkpoints, using a pre/post examination, a pre/post nonequivalent comparison group analysis, and an interrupted time series approach. Traffic safety officials used geographical…

  7. Nek2A destruction marks APC/C activation at the prophase-to-prometaphase transition by spindle-checkpoint-restricted Cdc20.

    Science.gov (United States)

    Boekhout, Michiel; Wolthuis, Rob

    2015-04-15

    Nek2 isoform A (Nek2A) is a presumed substrate of the anaphase-promoting complex/cyclosome containing Cdc20 (APC/C(Cdc20)). Nek2A, like cyclin A, is degraded in mitosis while the spindle checkpoint is active. Cyclin A prevents spindle checkpoint proteins from binding to Cdc20 and is recruited to the APC/C in prometaphase. We found that Nek2A and cyclin A avoid being stabilized by the spindle checkpoint in different ways. First, enhancing mitotic checkpoint complex (MCC) formation by nocodazole treatment inhibited the degradation of geminin and cyclin A, whereas Nek2A disappeared at a normal rate. Second, depleting Cdc20 effectively stabilized cyclin A but not Nek2A. Nevertheless, Nek2A destruction crucially depended on Cdc20 binding to the APC/C. Third, in contrast to cyclin A, Nek2A was recruited to the APC/C before the start of mitosis. Interestingly, the spindle checkpoint very effectively stabilized an APC/C-binding mutant of Nek2A, which required the Nek2A KEN box. Apparently, in cells, the spindle checkpoint primarily prevents Cdc20 from binding destruction motifs. Nek2A disappearance marks the prophase-to-prometaphase transition, when Cdc20, regardless of the spindle checkpoint, activates the APC/C. However, Mad2 depletion accelerated Nek2A destruction, showing that spindle checkpoint release further increases APC/C(Cdc20) catalytic activity. © 2015. Published by The Company of Biologists Ltd.

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  10. Structural basis of a novel PD-L1 nanobody for immune checkpoint blockade.

    Science.gov (United States)

    Zhang, Fei; Wei, Hudie; Wang, Xiaoxiao; Bai, Yu; Wang, Pilin; Wu, Jiawei; Jiang, Xiaoyong; Wang, Yugang; Cai, Haiyan; Xu, Ting; Zhou, Aiwu

    2017-01-01

    The use of antibodies to target immune checkpoints, particularly PD-1/PD-L1, has made a profound impact in the field of cancer immunotherapy. Here, we identified KN035, an anti-PD-L1 nanobody that can strongly induce T-cell responses and inhibit tumor growth. The crystal structures of KN035 complexed with PD-L1 and free PD-L1, solved here at 1.7 and 2.7 Å resolution, respectively, show that KN035 competes with PD-1 (programmed death protein 1) for the same flat surface on PD-L1, mainly through a single surface loop of 21 amino acids. This loop forms two short helices and develops key hydrophobic and ionic interactions with PD-L1 residues, such as Ile54, Tyr56 and Arg113, which are also involved in PD-1 binding. The detailed mutagenesis study identified the hotspot residues of the PD-L1 surface and provides an explanation for the stronger (~1 000-fold) binding of KN035 to PD-L1 than PD-1 and its lack of binding to PD-L2. Overall, this study reveals how a single immunoglobulin-variable scaffold of KN035 or PD-1 can bind to a flat protein surface through either a single surface loop or beta-sheet strands; and provides a basis for designing new immune checkpoint blockers and generating bi-specific antibodies for combination therapy.

  11. Nucleotide Selectivity at a Preinsertion Checkpoint of T7 RNA Polymerase Transcription Elongation.

    Science.gov (United States)

    E, Chao; Duan, Baogen; Yu, Jin

    2017-04-20

    Nucleotide selection is crucial for transcription fidelity control, in particular, for viral T7 RNA polymerase (RNAP) lack of proofreading activity. It has been recognized that multiple kinetic checkpoints exist prior to full nucleotide incorporation. In this work, we implemented intensive atomistic molecular dynamics (MD) simulations to quantify how strong the nucleotide selection is at the initial checkpoint of an elongation cycle of T7 RNAP. The incoming nucleotides bind into a preinsertion site where a critical tyrosine residue locates nearby to assist the nucleotide selection. We calculated the relative binding free energy between a noncognate nucleotide and a cognate one at a preinsertion configuration via alchemical simulations, showing that a small selection free energy or the binding free energy difference (∼3 k B T) exists between the two nucleotides. Indeed, another preinsertion configuration favored by the noncognate nucleotides was identified, which appears to be off path for further nucleotide insertion and additionally assists the nucleotide selection. By chemical master equation (CME) approach, we show that the small selection free energy at the preinsertion site along with the off-path noncognate nucleotide filtering can help substantially to reduce the error rate and to maintain the elongation rate high in the T7 RNAP transcription.

  12. Checkpoint-dependent RNR induction promotes fork restart after replicative stress.

    Science.gov (United States)

    Morafraile, Esther C; Diffley, John F X; Tercero, José Antonio; Segurado, Mónica

    2015-01-20

    The checkpoint kinase Rad53 is crucial to regulate DNA replication in the presence of replicative stress. Under conditions that interfere with the progression of replication forks, Rad53 prevents Exo1-dependent fork degradation. However, although EXO1 deletion avoids fork degradation in rad53 mutants, it does not suppress their sensitivity to the ribonucleotide reductase (RNR) inhibitor hydroxyurea (HU). In this case, the inability to restart stalled forks is likely to account for the lethality of rad53 mutant cells after replication blocks. Here we show that Rad53 regulates replication restart through the checkpoint-dependent transcriptional response, and more specifically, through RNR induction. Thus, in addition to preventing fork degradation, Rad53 prevents cell death in the presence of HU by regulating RNR-expression and localization. When RNR is induced in the absence of Exo1 and RNR negative regulators, cell viability of rad53 mutants treated with HU is increased and the ability of replication forks to restart after replicative stress is restored.

  13. Immune checkpoint inhibitors for non-small-cell lung cancer: does that represent a 'new frontier'?

    Science.gov (United States)

    Pilotto, Sara; Kinspergher, Stefania; Peretti, Umberto; Calio, Anna; Carbognin, Luisa; Ferrara, Roberto; Brunelli, Matteo; Chilosi, Marco; Tortora, Giampaolo; Bria, Emilio

    2015-01-01

    Advances in the interpretation and understanding of cancer behaviour, particularly of its ability to evade the host immunosurveillance, deregulating the balance between inhibitory and stimulatory factors, led to the development of an innovative category of immunotherapeutic agents, currently under investigation. Although the disappointing data deriving from the employment of vaccines in non-small cell lung cancer (NSCLC), more promising results have been obtained in the early phase trials with immune checkpoint inhibitors, such as cytotoxic T-lymphocyte-associated antigen-4 (CTLA-4), programmed cell death protein-1 (PD-1) and programmed death-ligand 1 (PD-L1) inhibitors. This review delineates the main features of the available immunotherapeutic agents, focusing the discussion on immune checkpoint inhibitors, those that have already demonstrated a relevant clinical activity (such as Ipilimumab and Nivolumab) and those molecules still in early development phase. Moreover, we underline the possible emerging issues deriving from the progressive diffusion of Immuno-Oncology into the standard clinical practice. The careful and accurate identification and management of immune-related toxicities, the validation of more reliable immune response criteria and the increasing research of potential predictive biomarkers are key points of discussion. The perspective is that immunotherapy might represent an effective 'magic bullet', able to change the treatment paradigm of NSCLC, particularly of those subgroups featured by a heavily mutant cancer (squamous histology and smokers), where the immunologic agents contribute in cancer development and progression seems to be strong and, concurrently, the efficacy of standard therapies particularly limited.

  14. Preferential radiosensitization of G1 checkpoint--deficient cells by methylxanthines

    International Nuclear Information System (INIS)

    Russell, Kenneth J.; Wiens, Linda W.; Demers, G. William; Galloway, Denise A.; Le, Tiep; Rice, Glenn C.; Bianco, James A.; Singer, Jack W.; Groudine, Mark

    1996-01-01

    Purpose: To develop a checkpoint-based strategy for preferential radiosensitization of human tumors with deficient and/or mutant p53. Methods and Materials: A549 human lung adenocarcinoma cell lines differing in their expression of the p53 tumor suppressor gene were produced by transduction with the E6 oncogene from human papilloma virus type 16. The cells expressing E6 (E6+) lack a G1 arrest in response to ionizing radiation, are deficient in p53 and p21 expression, and exhibit a fivefold greater clonogenic survival following 10 Gy radiation. Results: Postirradiation incubation with millimolar concentrations of the methylxanthine pentoxifylline (PTX) results in preferential radiosensitization of the E6+ cells compared to the LXSN+ vector transduced controls. There is a threefold sensitization of the LXSN+ cells and a 15-fold sensitization of the E6+ cells, which results in equal clonogenic survival of the two lines. Flow cytometry reveals PTX abrogation of the radiation induced G2 arrest for both cell lines. PTX also prolongs G1 transit for both cell lines. Preliminary results are presented using a novel methylxanthine, lisofylline (LSF), which has similar cell cycle effects on G1 and G2 and achieves differential radiosensitization at micromolar concentrations that are sustainable in humans. Conclusions: This checkpoint-based strategy is a promising approach for achieving preferential radiosensitization of p53- tumors relative to p53+ normal tissues

  15. Hepatic neuregulin 4 signaling defines an endocrine checkpoint for steatosis-to-NASH progression

    Science.gov (United States)

    Guo, Liang; Chen, Zhimin; Xia, Houjun; Li, Siming; Zhang, Yanqiao; Kobberup, Sune; Zou, Weiping; Lin, Jiandie D.

    2017-01-01

    Nonalcoholic steatohepatitis (NASH) is characterized by progressive liver injury, inflammation, and fibrosis; however, the mechanisms that govern the transition from hepatic steatosis, which is relatively benign, to NASH remain poorly defined. Neuregulin 4 (Nrg4) is an adipose tissue–enriched endocrine factor that elicits beneficial metabolic effects in obesity. Here, we show that Nrg4 is a key component of an endocrine checkpoint that preserves hepatocyte health and counters diet-induced NASH in mice. Nrg4 deficiency accelerated liver injury, fibrosis, inflammation, and cell death in a mouse model of NASH. In contrast, transgenic expression of Nrg4 in adipose tissue alleviated diet-induced NASH. Nrg4 attenuated hepatocyte death in a cell-autonomous manner by blocking ubiquitination and proteasomal degradation of c-FLIPL, a negative regulator of cell death. Adeno-associated virus–mediated (AAV-mediated) rescue of hepatic c-FLIPL expression in Nrg4-deficent mice functionally restored the brake for steatosis to NASH transition. Thus, hepatic Nrg4 signaling serves as an endocrine checkpoint for steatosis-to-NASH progression by activating a cytoprotective pathway to counter stress-induced liver injury. PMID:29106384

  16. Molecular basis of APC/C regulation by the spindle assembly checkpoint

    Science.gov (United States)

    Zhang, Ziguo; Yang, Jing; Maslen, Sarah; Skehel, Mark; Barford, David

    2016-01-01

    In the dividing eukaryotic cell the spindle assembly checkpoint (SAC) ensures each daughter cell inherits an identical set of chromosomes. The SAC coordinates the correct attachment of sister chromatid kinetochores to the mitotic spindle with activation of the anaphase-promoting complex/cyclosome (APC/C), the E3 ubiquitin ligase that initiates chromosome separation. In response to unattached kinetochores, the SAC generates the mitotic checkpoint complex (MCC), a multimeric assembly that inhibits the APC/C, delaying chromosome segregation. Here, using cryo-electron microscopy we determined the near-atomic resolution structure of an APC/C-MCC complex (APC/CMCC). We reveal how degron-like sequences of the MCC subunit BubR1 block degron recognition sites on Cdc20, the APC/C coactivator subunit (Cdc20APC/C) responsible for substrate interactions. BubR1 also obstructs binding of UbcH10 (APC/C’s initiating E2) to repress APC/C ubiquitination activity. Conformational variability of the complex allows for UbcH10 association, and we show from a structure of APC/CMCC in complex with UbcH10 how the Cdc20 subunit intrinsic to the MCC (Cdc20MCC) is ubiquitinated, a process that results in APC/C reactivation when the SAC is silenced. PMID:27509861

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  20. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  1. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  2. Centromere replication timing determines different forms of genomic instability in Saccharomyces cerevisiae checkpoint mutants during replication stress.

    Science.gov (United States)

    Feng, Wenyi; Bachant, Jeff; Collingwood, David; Raghuraman, M K; Brewer, Bonita J

    2009-12-01

    Yeast replication checkpoint mutants lose viability following transient exposure to hydroxyurea, a replication-impeding drug. In an effort to understand the basis for this lethality, we discovered that different events are responsible for inviability in checkpoint-deficient cells harboring mutations in the mec1 and rad53 genes. By monitoring genomewide replication dynamics of cells exposed to hydroxyurea, we show that cells with a checkpoint deficient allele of RAD53, rad53K227A, fail to duplicate centromeres. Following removal of the drug, however, rad53K227A cells recover substantial DNA replication, including replication through centromeres. Despite this recovery, the rad53K227A mutant fails to achieve biorientation of sister centromeres during recovery from hydroxyurea, leading to secondary activation of the spindle assembly checkpoint (SAC), aneuploidy, and lethal chromosome segregation errors. We demonstrate that cell lethality from this segregation defect could be partially remedied by reinforcing bipolar attachment. In contrast, cells with the mec1-1 sml1-1 mutations suffer from severely impaired replication resumption upon removal of hydroxyurea. mec1-1 sml1-1 cells can, however, duplicate at least some of their centromeres and achieve bipolar attachment, leading to abortive segregation and fragmentation of incompletely replicated chromosomes. Our results highlight the importance of replicating yeast centromeres early and reveal different mechanisms of cell death due to differences in replication fork progression.

  3. Mad2 binding to Mad1 and Cdc20, rather than oligomerization, is required for the spindle checkpoint

    DEFF Research Database (Denmark)

    Sironi, L; Melixetian, M; Faretta, M

    2001-01-01

    Mad2 is a key component of the spindle checkpoint, a device that controls the fidelity of chromosome segregation in mitosis. The ability of Mad2 to form oligomers in vitro has been correlated with its ability to block the cell cycle upon injection into Xenopus embryos. Here we show that Mad2 forms...

  4. Structural Biology of the Immune Checkpoint Receptor PD-1 and Its Ligands PD-L1/PD-L2

    NARCIS (Netherlands)

    Zak, Krzysztof M.; Grudnik, Przemyslaw; Magiera, Katarzyna; Dömling, Alexander; Dubin, Grzegorz; Holak, Tad A.

    2017-01-01

    Cancer cells can avoid and suppress immune responses through activation of inhibitory immune checkpoint proteins, such as PD-1, PD-L1, and CTLA-4. Blocking the activities of these proteins with monoclonal antibodies, and thus restoring T cell function, has delivered breakthrough therapies against

  5. ATM/Wip1 activities at chromatin control Plk1 re-activation to determine G2 checkpoint duration

    Czech Academy of Sciences Publication Activity Database

    Jaiswal, H.; Benada, Jan; Müllers, E.; Akopyan, K.; Burdová, Kamila; Koolmeister, T.; Helleday, T.; Medema, R.H.; Macůrek, Libor; Lindqvist, A.

    2017-01-01

    Roč. 36, č. 14 (2017), s. 2161-2176 ISSN 0261-4189 R&D Projects: GA ČR GA13-18392S Institutional support: RVO:68378050 Keywords : ATM * ATR * checkpoint recovery * G2 * Pik1 Subject RIV: EB - Genetics ; Molecular Biology OBOR OECD: Cell biology Impact factor: 9.792, year: 2016

  6. Wip1 phosphatase is associated with chromatin and dephosphorylates gammaH2AX to promote checkpoint inhibition

    Czech Academy of Sciences Publication Activity Database

    Macůrek, Libor; Lindqvist, A.; Voets, O.; Kool, J.; Vos, H.R.; Medema, R.H.

    2010-01-01

    Roč. 29, č. 15 (2010), s. 2281-2291 ISSN 0950-9232 R&D Projects: GA ČR GPP305/10/P420 Institutional research plan: CEZ:AV0Z50520514 Keywords : DNA damage * checkpoint * phosphatase Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 7.414, year: 2010

  7. Design Optimization of Time- and Cost-Constrained Fault-Tolerant Embedded Systems with Checkpointing and Replication

    DEFF Research Database (Denmark)

    Pop, Paul; Izosimov, Viacheslav; Eles, Petru

    2009-01-01

    We present an approach to the synthesis of fault-tolerant hard real-time systems for safety-critical applications. We use checkpointing with rollback recovery and active replication for tolerating transient faults. Processes and communications are statically scheduled. Our synthesis approach deci...

  8. ProAtlantic - The Atlantic Checkpoint - Data Availability and Adequacy in the Atlantic Basin

    Science.gov (United States)

    McGrath, F.

    2017-12-01

    DG MAREs Atlantic Checkpoint is a basin scale wide monitoring system assessment activity based upon targeted end-user applications. It is designed to be a benchmark for the assessment of hydrographic, geological, habitat, climate and fisheries data existence and availability in the Atlantic basin. DG MAREs Atlantic Checkpoint service will be delivered by the ProAtlantic project. The objective of this project is to investigate, through appropriate methodologies in the framework of 11 key marine challenges, how current international and national data providers - e.g. EMODNet, Copernicus - meet the requirements of the stakeholders and deliver fit for purpose data. By so doing, the main thematic and geographic gaps will be readily identified in the Atlantic basin for future consideration by DG MARE. For each challenge, specific web products in the form of maps, metadata, spreadsheets and reports will be delivered. These products are not an end by themselves but rather a means of showing whether data were available, let alone accessible. For example, the Fisheries Impact Challenge outputs include data grids (VMS/Seabed) and data adequacy reports. Production of gridded data layers in order to show the extent of fisheries impact on the seafloor involved the identification, acquisition and collation of data sources for the required data types (VMS/Seabed/Habitats Data) in the Atlantic basin. The resulting spatial coverage of these grids indicates the relatively low level of data availability and adequacy across the Atlantic basin. Aside from the data delivered by programmes such as EMODNet and Copernicus, there are a lot of initiatives by regional bodies such as OSPAR and ICES that consist of assembling and disseminating data to address specific issues. Several international projects have delivered research, data collection, and networking around several of the Atlantic Checkpoint challenge topics, namely MPAs, renewable energy assessment, seabed mapping, oil spill

  9. Radiation-induced apoptosis and cell cycle checkpoints in human colorectal tumour cell lines

    International Nuclear Information System (INIS)

    Playle, L.C.

    2001-03-01

    The p53 tumour suppressor gene is mutated in 75% of colorectal carcinomas and is critical for DNA damage-induced G1 cell cycle arrest. Data presented in this thesis demonstrate that after treatment with Ionizing Radiation (IR), colorectal tumour cell lines with mutant p53 are unable to arrest at G1 and undergo cell cycle arrest at G2. The staurosporine derivative, UCN-01, was shown to abrogate the IR-induced G2 checkpoint in colorectal tumour cell lines. Furthermore, in some cell lines, abrogation of the G2 checkpoint was associated with radiosensitisation. Data presented in this study demonstrate that 2 out of 5 cell lines with mutant p53 were sensitised to IR by UCN-01. In order to determine whether radiosensitisation correlated with lack of functional p53, transfected derivatives of an adenoma-derived cell line were studied, in which endogenous wild type p53 was disrupted by expression of a dominant negative p53 mutant protein (and with a vector control). In both these cell lines UCN-01 abrogated the G2 arrest however this was not associated with radiosensitisation, indicating that radiosensitisation is a cell type-specific phenomenon. Although 2 colorectal carcinoma cell lines, with mutant p53, were sensitised to IR by UCN-01, the mechanisms of p53-independent IR-induced apoptosis in the colon are essentially unknown. The mitogen-activated protein kinase (MAPK) pathways (that is the JNK, p38 and ERK pathways) have been implicated in apoptosis in a range of cell systems and in IR-induced apoptosis in some cell types. Data presented in this study show that, although the MAPKs can be activated by the known activator anisomycin, there is no evidence of a role for MAPKs in IR-induced apoptosis in colorectal tumour cell lines, regardless of p53 status. In summary, some colorectal tumour cell lines with mutant p53 can be sensitised to IR-induced cell death by G2 checkpoint abrogation and this may be an important treatment strategy, however mechanisms of IR-induced p53

  10. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  11. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  12. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  13. Targeting cytokine signaling checkpoint CIS activates NK cells to protect from tumor initiation and metastasis

    Science.gov (United States)

    Putz, Eva M.; Guillerey, Camille; Kos, Kevin; Stannard, Kimberley; Miles, Kim; Delconte, Rebecca B.; Nicholson, Sandra E.; Huntington, Nicholas D.; Smyth, Mark J.

    2017-01-01

    ABSTRACT The cytokine-induced SH2-containing protein CIS belongs to the suppressor of cytokine signaling (SOCS) protein family. Here, we show the critical role of CIS in suppressing natural killer (NK) cell control of tumor initiation and metastasis. Cish-deficient mice were highly resistant to methylcholanthrene-induced sarcoma formation and protected from lung metastasis of B16F10 melanoma and RM-1 prostate carcinoma cells. In contrast, the growth of primary subcutaneous tumors, including those expressing the foreign antigen OVA, was unchanged in Cish-deficient mice. The combination of Cish deficiency and relevant targeted and immuno-therapies such as combined BRAF and MEK inhibitors, immune checkpoint blockade antibodies, IL-2 and type I interferon revealed further improved control of metastasis. The data clearly indicate that targeting CIS promotes NK cell antitumor functions and CIS holds great promise as a novel target in NK cell immunotherapy. PMID:28344878

  14. Clonal neoantigens elicit T cell immunoreactivity and sensitivity to immune checkpoint blockade

    Science.gov (United States)

    McGranahan, Nicholas; Furness, Andrew J. S.; Rosenthal, Rachel; Ramskov, Sofie; Lyngaa, Rikke; Saini, Sunil Kumar; Jamal-Hanjani, Mariam; Wilson, Gareth A.; Birkbak, Nicolai J.; Hiley, Crispin T.; Watkins, Thomas B. K.; Shafi, Seema; Murugaesu, Nirupa; Mitter, Richard; Akarca, Ayse U.; Linares, Joseph; Marafioti, Teresa; Henry, Jake Y.; Van Allen, Eliezer M.; Miao, Diana; Schilling, Bastian; Schadendorf, Dirk; Garraway, Levi A.; Makarov, Vladimir; Rizvi, Naiyer A.; Snyder, Alexandra; Hellmann, Matthew D.; Merghoub, Taha; Wolchok, Jedd D.; Shukla, Sachet A.; Wu, Catherine J.; Peggs, Karl S.; Chan, Timothy A.; Hadrup, Sine R.; Quezada, Sergio A.; Swanton, Charles

    2016-01-01

    As tumors grow, they acquire mutations, some of which create neoantigens that influence the response of patients to immune checkpoint inhibitors. We explored the impact of neoantigen intratumor heterogeneity (ITH) on antitumor immunity. Through integrated analysis of ITH and neoantigen burden, we demonstrate a relationship between clonal neoantigen burden and overall survival in primary lung adenocarcinomas. CD8+ tumor-infiltrating lymphocytes reactive to clonal neoantigens were identified in early-stage non–small cell lung cancer and expressed high levels of PD-1. Sensitivity to PD-1 and CTLA-4 blockade in patients with advanced NSCLC and melanoma was enhanced in tumors enriched for clonal neoantigens. T cells recognizing clonal neoantigens were detectable in patients with durable clinical benefit. Cytotoxic chemotherapy–induced subclonal neoantigens, contributing to an increased mutational load, were enriched in certain poor responders. These data suggest that neoantigen heterogeneity may influence immune surveillance and support therapeutic developments targeting clonal neoantigens. PMID:26940869

  15. Mitosis-specific phosphorylation of PML at T409 regulates spindle checkpoint.

    Science.gov (United States)

    Jin, J; Liu, J

    2016-08-31

    During mitosis, Promyelocytic leukemia nuclear bodies (PML NBs) change dramatically in morphology and composition, but little is known about function of PML in mitosis. Here, we show that PML is phosphorylated at T409 (PML p409) in a mitosis-specific manner. More importantly, PML p409 contributes to maintain the duration of pro-metaphase and regulates spindle checkpoint. Deficient PML p409 caused a shortening of pro-metaphase and challenged the nocodazole-triggered mitotic arrest. T409A mutation led to a higher frequency of misaligned chromosomes on metaphase plate, and subsequently death in late mitosis. In addition, inhibition of PML p409 repressed growth of tumor cells, suggesting that PML p409 is a potential target for cancer therapy. Collectively, our study demonstrated an important phosphorylated site of PML, which contributed to explore the role of PML in mitosis.

  16. A direct role of Mad1 in the spindle assembly checkpoint beyond Mad2 kinetochore recruitment

    DEFF Research Database (Denmark)

    Kruse, Thomas; Larsen, Marie Sofie Yoo; Sedgwick, Garry G

    2014-01-01

    in the SAC beyond recruitment of C-Mad2 to kinetochores has not yet been addressed. Here, we show that Mad1 is required for mitotic arrest even when C-Mad2 is artificially recruited to kinetochores, indicating that it has indeed an additional function in promoting the checkpoint. The C-terminal globular...... domain of Mad1 and conserved residues in this region are required for this unexpected function of Mad1........ The conversion of O-Mad2 into C-Mad2 at unattached kinetochores is thought to be a key step in activating the SAC. The "template model" proposes that this is achieved by the recruitment of soluble O-Mad2 to C-Mad2 bound at kinetochores through its interaction with Mad1. Whether Mad1 has additional roles...

  17. The Aurora B kinase in chromosome biorientation and spindle checkpoint signalling

    Directory of Open Access Journals (Sweden)

    Veronica eKrenn

    2015-10-01

    Full Text Available Aurora B, a member of the Aurora family of serine/threonine protein kinases, is a key player in chromosome segregation. As part of a macromolecular complex known as the chromosome passenger complex, Aurora B concentrates early during mitosis in the proximity of centromeres and kinetochores, the sites of attachment of chromosomes to spindle microtubules. There, it contributes to a number of processes that impart fidelity to cell division, including kinetochore stabilization, kinetochore-microtubule attachment, and the regulation of a surveillance mechanism named the spindle assembly checkpoint. In the regulation of these processes, Aurora B is the fulcrum of a remarkably complex network of interactions that feed back on its localization and activation state. In this review we discuss the multiple roles of Aurora B during mitosis, focusing in particular on its role at centromeres and kinetochores. Many details of the network of interactions at these locations remain poorly understood, and we focus here on several crucial outstanding questions.

  18. Arabidopsis ARGONAUTE7 selects miR390 through multiple checkpoints during RISC assembly.

    Science.gov (United States)

    Endo, Yayoi; Iwakawa, Hiro-oki; Tomari, Yukihide

    2013-07-01

    Plant ARGONAUTE7 (AGO7) assembles RNA-induced silencing complex (RISC) specifically with miR390 and regulates the auxin-signalling pathway via production of TAS3 trans-acting siRNAs (tasiRNAs). However, how AGO7 discerns miR390 among other miRNAs remains unclear. Here, we show that the 5' adenosine of miR390 and the central region of miR390/miR390* duplex are critical for the specific interaction with AGO7. Furthermore, despite the existence of mismatches in the seed and central regions of the duplex, cleavage of the miR390* strand is required for maturation of AGO7-RISC. These findings suggest that AGO7 uses multiple checkpoints to select miR390, thereby circumventing promiscuous tasiRNA production.

  19. Immune checkpoint inhibitors and targeted therapies for metastatic melanoma: A network meta-analysis.

    Science.gov (United States)

    Pasquali, Sandro; Chiarion-Sileni, Vanna; Rossi, Carlo Riccardo; Mocellin, Simone

    2017-03-01

    Immune checkpoint inhibitors and targeted therapies, two new class of drugs for treatment of metastatic melanoma, have not been compared in randomized controlled trials (RCT). We quantitatively summarized the evidence and compared immune and targeted therapies in terms of both efficacy and toxicity. A comprehensive search for RCTs of immune checkpoint inhibitors and targeted therapies was conducted to August 2016. Using a network meta-analysis approach, treatments were compared with each other and ranked based on their effectiveness (as measured by the impact on progression-free survival [PFS]) and acceptability (the inverse of high grade toxicity). Twelve RCTs enrolling 6207 patients were included. Network meta-analysis generated 15 comparisons. Combined BRAF and MEK inhibitors were associated with longer PFS as compared to anti-CTLA4 (HR: 0.22; 95% confidence interval [CI]: 0.12-0.41) and anti-PD1 antibodies alone (HR: 0.38; CI: 0.20-0.72). However, anti-PD1 monoclonal antibodies were less toxic than anti-CTLA4 monoclonal antibodies (RR: 0.65; CI: 0.40-0.78) and their combination significantly increased toxicity compared to either single agent anti-CTLA4 (RR: 2.06; CI: 1.45-2.93) or anti-PD1 monoclonal antibodies (RR: 3.67; CI: 2.27-5.96). Consistently, ranking analysis suggested that the combination of targeted therapies is the most effective strategy, whereas single agent anti-PD1 antibodies have the best acceptability. The GRADE level of evidence quality for these findings was moderate to low. The simultaneous inhibition of BRAF and MEK appears the most effective treatment for melanomas harboring BRAF V600 mutation, although anti-PD1 antibodies appear to be less toxic. Further research is needed to increase the quality of evidence. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. An Archaeosome-Adjuvanted Vaccine and Checkpoint Inhibitor Therapy Combination Significantly Enhances Protection from Murine Melanoma

    Directory of Open Access Journals (Sweden)

    Felicity C. Stark

    2017-10-01

    Full Text Available Archaeosomes constitute archaeal lipid vesicle vaccine adjuvants that evoke a strong CD8+ T cell response to antigenic cargo. Therapeutic treatment of murine B16-ovalbumin (B16-OVA melanoma with archaeosome-OVA eliminates small subcutaneous solid tumors; however, they eventually resurge despite an increased frequency of circulating and tumor infiltrating OVA-CD8+ T cells. Herein, a number of different approaches were evaluated to improve responses, including dose number, interval, and the combination of vaccine with checkpoint inhibitors. Firstly, we found that tumor protection could not be enhanced by repetitive and/or delayed boosting to maximize the CD8+ T cell number and/or phenotype. The in vivo cytotoxicity of vaccine-induced OVA-CD8+ T cells was impaired in tumor-bearing mice. Additionally, tumor-infiltrating OVA-CD8+ T cells had an increased expression of programmed cell death protein-1 (PD-1 compared to other organ compartments, suggesting impaired function. Combination therapy of tumor-bearing mice with the vaccine archaeosome-OVA, and α-CTLA-4 administered concurrently as well as α-PD-1 and an α-PD-L1 antibody administered starting 9 days after tumor challenge given on a Q3Dx4 schedule (days 9, 12, 15 and 18, significantly enhanced survival. Following multi-combination therapy ~70% of mice had rapid tumor recession, with no detectable tumor mass after >80 days in comparison to a median survival of 17–22 days for untreated or experimental groups receiving single therapies. Overall, archaeosomes offer a powerful platform for delivering cancer antigens when used in combination with checkpoint inhibitor immunotherapies.

  1. The Checkpoint Kinase 1 Inhibitor Prexasertib Induces Regression of Preclinical Models of Human Neuroblastoma.

    Science.gov (United States)

    Lowery, Caitlin D; VanWye, Alle B; Dowless, Michele; Blosser, Wayne; Falcon, Beverly L; Stewart, Julie; Stephens, Jennifer; Beckmann, Richard P; Bence Lin, Aimee; Stancato, Louis F

    2017-08-01

    Purpose: Checkpoint kinase 1 (CHK1) is a key regulator of the DNA damage response and a mediator of replication stress through modulation of replication fork licensing and activation of S and G 2 -M cell-cycle checkpoints. We evaluated prexasertib (LY2606368), a small-molecule CHK1 inhibitor currently in clinical testing, in multiple preclinical models of pediatric cancer. Following an initial assessment of prexasertib activity, this study focused on the preclinical models of neuroblastoma. Experimental Design: We evaluated the antiproliferative activity of prexasertib in a panel of cancer cell lines; neuroblastoma cell lines were among the most sensitive. Subsequent Western blot and immunofluorescence analyses measured DNA damage and DNA repair protein activation. Prexasertib was investigated in several cell line-derived xenograft mouse models of neuroblastoma. Results: Within 24 hours, single-agent prexasertib promoted γH2AX-positive double-strand DNA breaks and phosphorylation of DNA damage sensors ATM and DNA-PKcs, leading to neuroblastoma cell death. Knockdown of CHK1 and/or CHK2 by siRNA verified that the double-strand DNA breaks and cell death elicited by prexasertib were due to specific CHK1 inhibition. Neuroblastoma xenografts rapidly regressed following prexasertib administration, independent of starting tumor volume. Decreased Ki67 and increased immunostaining of endothelial and pericyte markers were observed in xenografts after only 6 days of exposure to prexasertib, potentially indicating a swift reduction in tumor volume and/or a direct effect on tumor vasculature. Conclusions: Overall, these data demonstrate that prexasertib is a specific inhibitor of CHK1 in neuroblastoma and leads to DNA damage and cell death in preclinical models of this devastating pediatric malignancy. Clin Cancer Res; 23(15); 4354-63. ©2017 AACR . ©2017 American Association for Cancer Research.

  2. Genetic Control of the Trigger for the G2/M Checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Eric J. [Columbia University; Smilenov, Lubomir B. [Columbia University; Young, Erik F. [Columbia University

    2013-10-01

    The work undertaken in this project addressed two seminal areas of low dose radiation biology that are poorly understood and controversial. These areas are the challenge to the linear-no-threshold (LNT) paradigm at low doses of radiation and, the fundamental elements of radiation bystander effect biology Genetic contributions to low dose checkpoint engagement: The LNT paradigm is an extrapolation of known, measured cancer induction endpoints. Importantly, data for lower doses is often not available. Debatably, radiation protection standards have been introduced which are prudently contingent on the adherence of cancer risk to the established trend seen at higher doses. Intriguing findings from other labs have hinted at separate DNA damage response programs that engage at low or high levels of radiation. Individual radiation sensitivity commensurate with hemizygosity for a radiation sensitivity gene has been estimated at 1-2% in the U.S.. Careful interrogation of the DNA damage response at low doses of radiation became important and served as the basis for this grant. Several genes were tested in combinations to determine if combined haploinsufficiency for multiple radiosensitizing genes could render a cell more sensitive to lower levels of acute radiation exposure. We measured a classical radiation response endpoint, cell cycle arrest prior to mitosis. Mouse embryo fibroblasts were used and provided a uniform, rapidly dividing and genetically manipulable population of study. Our system did not report checkpoint engagement at acute doses of gamma rays below 100 mGy. The system did report checkpoint engagement reproducibly at 500 mGy establishing a threshold for activation between 100 and 500 mGy. Engagement of the checkpoint was ablated in cells nullizygous for ATM but was otherwise unperturbed in cells combinatorially haploinsufficient for ATM and Rad9, ATM and PTEN or PTEN and Rad9. Taken together, these experiments tell us that, in a sensitive fibroblast culture

  3. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  4. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  5. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  7. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  9. The subunits of the S-phase checkpoint complex Mrc1/Tof1/Csm3: dynamics and interdependence.

    Science.gov (United States)

    Uzunova, Sonya Dimitrova; Zarkov, Alexander Stefanov; Ivanova, Anna Marianova; Stoynov, Stoyno Stefanov; Nedelcheva-Veleva, Marina Nedelcheva

    2014-01-01

    The S-phase checkpoint aims to prevent cells from generation of extensive single-stranded DNA that predisposes to genome instability. The S. cerevisiae complex Tof1/Csm3/Mrc1 acts to restrain the replicative MCM helicase when DNA synthesis is prohibited. Keeping the replication machinery intact allows restart of the replication fork when the block is relieved. Although the subunits of the Tof1/Csm3/Mrc1 complex are well studied, the impact of every single subunit on the triple complex formation and function needs to be established. This work studies the cellular localization and the chromatin binding of GFP-tagged subunits when the complex is intact and when a subunit is missing. We demonstrate that the complex is formed in cell nucleus, not the cytoplasm, as Tof1, Csm3 and Mrc1 enter the nucleus independently from one another. Via in situ chromatin binding assay we show that a Tof1-Csm3 dimer formation and chromatin binding is required to ensure the attachment of Mrc1 to chromatin. Our study indicates that the translocation into the nucleus is not the process to regulate the timing of chromatin association of Mrc1. We also studied the nuclear behavior of Mrc1 subunit in the process of adaptation to the presence hydroxyurea. Our results indicate that after prolonged HU incubation, cells bypass the S-phase checkpoint and proceed throughout the cell cycle. This process is accompanied by Mrc1 chromatin detachment and Rad53 dephosphorylation. In S. cerevisiae the subunits of the S-phase checkpoint complex Mrc1/Tof1/Csm3 independently enter the cell nucleus, where a Tof1-Csm3 dimer is formed to ensure the chromatin binding of Mrc1 and favor DNA replication and S-phase checkpoint fork arrest. In the process of adaptation to the presence of hydroxyurea Mrc1 is detached from chromatin and Rad53 checkpoint activity is diminished in order to allow S-phase checkpoint escape and completion of the cell cycle.

  10. Comparative Analysis of Immune Checkpoint Molecules and Their Potential Role in the Transmissible Tasmanian Devil Facial Tumor Disease

    Directory of Open Access Journals (Sweden)

    Andrew S. Flies

    2017-05-01

    Full Text Available Immune checkpoint molecules function as a system of checks and balances that enhance or inhibit immune responses to infectious agents, foreign tissues, and cancerous cells. Immunotherapies that target immune checkpoint molecules, particularly the inhibitory molecules programmed cell death 1 and cytotoxic T-lymphocyte-associated protein 4 (CTLA-4, have revolutionized human oncology in recent years, yet little is known about these key immune signaling molecules in species other than primates and rodents. The Tasmanian devil facial tumor disease is caused by transmissible cancers that have resulted in a massive decline in the wild Tasmanian devil population. We have recently demonstrated that the inhibitory checkpoint molecule PD-L1 is upregulated on Tasmanian devil (Sarcophilus harrisii facial tumor cells in response to the interferon-gamma cytokine. As this could play a role in immune evasion by tumor cells, we performed a thorough comparative analysis of checkpoint molecule protein sequences among Tasmanian devils and eight other species. We report that many of the key signaling motifs and ligand-binding sites in the checkpoint molecules are highly conserved across the estimated 162 million years of evolution since the last common ancestor of placental and non-placental mammals. Specifically, we discovered that the CTLA-4 (MYPPPY ligand-binding motif and the CTLA-4 (GVYVKM inhibitory domain are completely conserved across all nine species used in our comparative analysis, suggesting that the function of CTLA-4 is likely conserved in these species. We also found that cysteine residues for intra- and intermolecular disulfide bonds were also highly conserved. For instance, all 20 cysteine residues involved in disulfide bonds in the human 4-1BB molecule were also present in devil 4-1BB. Although many key sequences were conserved, we have also identified immunoreceptor tyrosine-based inhibitory motifs (ITIMs and immunoreceptor tyrosine-based switch

  11. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  12. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    Science.gov (United States)

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  13. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  14. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  15. Clinical features, predictive correlates, and pathophysiology of immune-related adverse events in immune checkpoint inhibitor treatments in cancer: a short review

    OpenAIRE

    Yoest, Jennifer M

    2017-01-01

    Jennifer M Yoest Department of Pathology, University of Pittsburgh Medical Center, Pittsburgh, PA, USA Abstract: Identification and characterization of T-cell regulatory mechanisms, or checkpoints, have led to a wave of drug development aimed at inhibiting these targets to “remove the brakes” of the immune system. This class of anticancer therapeutics, termed immune checkpoint inhibitors (ICIs), has harnessed the potential of the body’s own immune system to reco...

  16. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  17. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  18. Using ergonomics checkpoints to support a participatory ergonomics intervention in an industrially developing country (IDC)--a case study.

    Science.gov (United States)

    Helali, Faramarz

    2009-01-01

    To achieve ergonomics awareness in 3 subsidiary companies, an intervention team was formed. The aims of this study were to implement basic ergonomics through a participatory ergonomics intervention process that can support a continuous learning process and lead to an improvement in health and safety as well as in the work systems in the organization. The findings of this study (i.e., method, continuous learning and integration) were key to making the participatory ergonomics intervention successful. Furthermore, 4 issues of the ergonomics checkpoints (i.e., work schedules, work tasks, healthy work organization and learning) for assessing the work system were found suitable for both changing work schedules and for improving the work system. This paper describes the result of this project and also the experiences gained and the conclusions reached from using the International Labour Office's ergonomics checkpoints in the industries of industrially developing country.

  19. Pharmacometrics and systems pharmacology of immune checkpoint inhibitor nivolumab in cancer translational medicine

    Directory of Open Access Journals (Sweden)

    Sujit Nair

    2016-02-01

    Full Text Available Nivolumab, a fully human immunoglobulin G4 (IgG4 monoclonal antibody (mAb that targets the programmed cell death-1 (PD-1 inhibitory receptor expressed on lymphocytes and dendritic cells, has been approved for metastatic melanoma, advanced squamous non-small cell lung cancer (NSCLC and metastatic renal cell carcinoma. In this review, pharmacology and pharmacometrics systems of this immunopharmaceutical are discussed. Mechanistic actions of T-cell biology with respect to both “priming phase” (anti-cytotoxic T-lymphocyte associated antigen 4 (anti-CTLA-4 mAb; ipilimumab and “effector phase” (anti-PD-1 mAb; nivolumab was discussed, respectively. Key pharmacometric variables in anticancer efficacy of nivolumab such as target engagement, metabolism, pharmacology systems and clearance are elucidated with an emphasis on current knowledge from pre-clinical as well as phase 1, 2 and 3 clinical trials information, including the data presented at the American Society of Clinical Oncology (ASCO 2015 and European Cancer Congress 2015. Nivolumab biomarkers, safety, and synergistic combination immunotherapies are delineated. Nivolumab, administered via intravenous infusion, has an acceptable safety profile and good efficacy. Indeed, the way forward to leverage maximum benefits for the cancer patient may be to synergize anti-PD-1 blockade with complementary targets in immune checkpoint pathways or other oncogenic signal transduction pathways. The encouraging results with nivolumab lend credence to the promise of immune checkpoint blockade as a therapeutic strategy that has been come-of-age in clinical oncology. Of necessity, the burden of “financial toxicity” on cancer patients and families must be factored in considering nivolumab therapy. The problem of ligand PD-L1 being a weak biomarker in clinical practice was discussed. Appropriate patient selection methods including immunopharmacogenomics may be used to identify those patients who are most

  20. The Fluke Security Project

    Science.gov (United States)

    2000-04-01

    be an extension of Utah’s nascent Quarks system, oriented to closely coupled cluster environments. However, the grant did not actually begin until... Intel x86, implemented ten virtual machine monitors and servers, including a virtual memory manager, a checkpointer, a process manager, a file server...Fluke, we developed a novel hierarchical processor scheduling frame- work called CPU inheritance scheduling [5]. This is a framework for scheduling

  1. Immune Checkpoint Inhibitor-Associated Type 1 Diabetes Mellitus: Case Series, Review of the Literature, and Optimal Management

    OpenAIRE

    Kapke, Jonathan; Shaheen, Zachary; Kilari, Deepak; Knudson, Paul; Wong, Stuart

    2017-01-01

    With the introduction of immune checkpoint inhibitors into clinical practice, various autoimmune toxicities have been described. Antibodies targeting the receptor:ligand pairing of programmed death receptor-1 (PD-1) and its cognate ligand programmed death-ligand 1 (PD-L1) in rare reports have been associated with autoimmune diabetes mellitus. We report 2 cases of rapid-onset, insulin-dependent, type 1 diabetes mellitus in the setting of administration of nivolumab, a fully human monoclonal an...

  2. Direct and indirect control of the initiation of meiotic recombination by DNA damage checkpoint mechanisms in budding yeast.

    Directory of Open Access Journals (Sweden)

    Bilge Argunhan

    Full Text Available Meiotic recombination plays an essential role in the proper segregation of chromosomes at meiosis I in many sexually reproducing organisms. Meiotic recombination is initiated by the scheduled formation of genome-wide DNA double-strand breaks (DSBs. The timing of DSB formation is strictly controlled because unscheduled DSB formation is detrimental to genome integrity. Here, we investigated the role of DNA damage checkpoint mechanisms in the control of meiotic DSB formation using budding yeast. By using recombination defective mutants in which meiotic DSBs are not repaired, the effect of DNA damage checkpoint mutations on DSB formation was evaluated. The Tel1 (ATM pathway mainly responds to unresected DSB ends, thus the sae2 mutant background in which DSB ends remain intact was employed. On the other hand, the Mec1 (ATR pathway is primarily used when DSB ends are resected, thus the rad51 dmc1 double mutant background was employed in which highly resected DSBs accumulate. In order to separate the effect caused by unscheduled cell cycle progression, which is often associated with DNA damage checkpoint defects, we also employed the ndt80 mutation which permanently arrests the meiotic cell cycle at prophase I. In the absence of Tel1, DSB formation was reduced in larger chromosomes (IV, VII, II and XI whereas no significant reduction was found in smaller chromosomes (III and VI. On the other hand, the absence of Rad17 (a critical component of the ATR pathway lead to an increase in DSB formation (chromosomes VII and II were tested. We propose that, within prophase I, the Tel1 pathway facilitates DSB formation, especially in bigger chromosomes, while the Mec1 pathway negatively regulates DSB formation. We also identified prophase I exit, which is under the control of the DNA damage checkpoint machinery, to be a critical event associated with down-regulating meiotic DSB formation.

  3. Clinical characteristics of patient selection and imaging predictors of outcome in solid tumors treated with checkpoint-inhibitors

    International Nuclear Information System (INIS)

    Rossi, Sabrina; Toschi, Luca; Castello, Angelo; Grizzi, Fabio; Mansi, Luigi; Lopci, Egesta

    2017-01-01

    The rapidly evolving knowledge on tumor immunology and the continuous implementation of immunotherapy in cancer have recently led to the FDA and EMA approval of several checkpoint inhibitors as immunotherapic agents in clinical practice. Anti-CTLA-4, anti-PD-1, and anti-PDL-1 antibodies are becoming standard of care in advanced melanoma, as well as in relapsed or metastatic lung and kidney cancer, demonstrating higher and longer response compared to standard chemotherapy. These encouraging results have fostered the evaluation of these antibodies either alone or in combination with other therapies in several dozen clinical trials for the treatment of multiple tumor types. However, not all patients respond to immune checkpoint inhibitors, hence, specific biomarkers are necessary to guide and monitor therapy. The utility of PD-L1 expression as a biomarker has varied in different clinical trials, but, to date, no consensus has been reached on whether PD-L1 expression is an ideal marker for response and patient selection; approximately 20-25% of patients will respond to immunotherapy with checkpoint inhibitors despite a negative PD-L1 staining. On the other hand, major issues concern the evaluation of objective response in patients treated with immunotherapy. Pure morphological criteria as commonly used in solid tumors (i.e. RECIST) are not sufficient because change in size is not an early and reliable marker of tumor response to biological therapies. Thus, the scientific community has required a continuous adaptation of immune-related response criteria (irRC) to overcome the problem. In this context, metabolic information and antibody-based imaging with positron emission tomography (PET) have been investigated, providing a powerful approach for an optimal stratification of patients at staging and during the evaluation of the response to therapy. In the present review we provide an overview on the clinical characteristics of patient selection when using imaging

  4. Clinical characteristics of patient selection and imaging predictors of outcome in solid tumors treated with checkpoint-inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Rossi, Sabrina; Toschi, Luca [Humanitas Clinical and Research Hospital, Medical Oncology, Rozzano (Italy); Castello, Angelo [Humanitas Clinical and Research Hospital, Nuclear Medicine, Rozzano (Italy); Grizzi, Fabio [Humanitas Clinical and Research Hospital, Immunology and Inflammation, Rozzano (Italy); Mansi, Luigi [Seconda Universita di Napoli, Nuclear Medicine, Naples (Italy); Lopci, Egesta [Humanitas Clinical and Research Hospital, Nuclear Medicine, Rozzano (Italy); Humanitas Cancer Center, Humanitas Clinical and Research Hospital, Nuclear Medicine, Rozzano, MI (Italy)

    2017-12-15

    The rapidly evolving knowledge on tumor immunology and the continuous implementation of immunotherapy in cancer have recently led to the FDA and EMA approval of several checkpoint inhibitors as immunotherapic agents in clinical practice. Anti-CTLA-4, anti-PD-1, and anti-PDL-1 antibodies are becoming standard of care in advanced melanoma, as well as in relapsed or metastatic lung and kidney cancer, demonstrating higher and longer response compared to standard chemotherapy. These encouraging results have fostered the evaluation of these antibodies either alone or in combination with other therapies in several dozen clinical trials for the treatment of multiple tumor types. However, not all patients respond to immune checkpoint inhibitors, hence, specific biomarkers are necessary to guide and monitor therapy. The utility of PD-L1 expression as a biomarker has varied in different clinical trials, but, to date, no consensus has been reached on whether PD-L1 expression is an ideal marker for response and patient selection; approximately 20-25% of patients will respond to immunotherapy with checkpoint inhibitors despite a negative PD-L1 staining. On the other hand, major issues concern the evaluation of objective response in patients treated with immunotherapy. Pure morphological criteria as commonly used in solid tumors (i.e. RECIST) are not sufficient because change in size is not an early and reliable marker of tumor response to biological therapies. Thus, the scientific community has required a continuous adaptation of immune-related response criteria (irRC) to overcome the problem. In this context, metabolic information and antibody-based imaging with positron emission tomography (PET) have been investigated, providing a powerful approach for an optimal stratification of patients at staging and during the evaluation of the response to therapy. In the present review we provide an overview on the clinical characteristics of patient selection when using imaging

  5. Silencing of poly(ADP-ribose) glycohydrolase sensitizes lung cancer cells to radiation through the abrogation of DNA damage checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Nakadate, Yusuke [Shien-Lab, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan); Department of Bioengineering, Graduate School of Engineering, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi-ku, Osaka 558-8585 (Japan); Kodera, Yasuo; Kitamura, Yuka [Shien-Lab, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan); Tachibana, Taro [Department of Bioengineering, Graduate School of Engineering, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi-ku, Osaka 558-8585 (Japan); Tamura, Tomohide [Division of Thoracic Oncology, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan); Koizumi, Fumiaki, E-mail: fkoizumi@ncc.go.jp [Division of Thoracic Oncology, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo 104-0045 (Japan)

    2013-11-29

    Highlights: •Radiosensitization by PARG silencing was observed in multiple lung cancer cells. •PAR accumulation was enhanced by PARG silencing after DNA damage. •Radiation-induced G2/M arrest and checkpoint activation were impaired by PARG siRNA. -- Abstract: Poly(ADP-ribose) glycohydrolase (PARG) is a major enzyme that plays a role in the degradation of poly(ADP-ribose) (PAR). PARG deficiency reportedly sensitizes cells to the effects of radiation. In lung cancer, however, it has not been fully elucidated. Here, we investigated whether PARG siRNA contributes to an increased radiosensitivity using 8 lung cancer cell lines. Among them, the silencing of PARG induced a radiosensitizing effect in 5 cell lines. Radiation-induced G2/M arrest was largely suppressed by PARG siRNA in PC-14 and A427 cells, which exhibited significantly enhanced radiosensitivity in response to PARG knockdown. On the other hand, a similar effect was not observed in H520 cells, which did not exhibit a radiosensitizing effect. Consistent with a cell cycle analysis, radiation-induced checkpoint signals were not well activated in the PC-14 and A427 cells when treated with PARG siRNA. These results suggest that the increased sensitivity to radiation induced by PARG knockdown occurs through the abrogation of radiation-induced G2/M arrest and checkpoint activation in lung cancer cells. Our findings indicate that PARG could be a potential target for lung cancer treatments when used in combination with radiotherapy.

  6. The effect of tributyltin chloride on Caenorhabditis elegans germline is mediated by a conserved DNA damage checkpoint pathway.

    Science.gov (United States)

    Cheng, Zhe; Tian, Huimin; Chu, Hongran; Wu, Jianjian; Li, Yingying; Wang, Yanhai

    2014-03-21

    Tributyltin (TBT), one of the environmental pollutants, has been shown to impact the reproduction of animals. However, due to the lack of appropriate animal model, analysis of the affected molecular pathways in germ cells is lagging and has been particularly challenging. In the present study, we investigated the effects of tributyltin chloride (TBTCL) on the nematode Caenorhabditis elegans germline. We show that exposure of C. elegans to TBTCL causes significantly elevated level of sterility and embryonic lethality. TBTCL exposure results in an increased number of meiotic DNA double-strand breaks in germ cells, subsequently leading to activated DNA damage checkpoint. Exposing C. elegans to TBTCL causes dose- and time-dependent germline apoptosis. This apoptotic response was blocked in loss-of-function mutants of hus-1 (op241), mrt-2 (e2663) and p53/cep-1 (gk138), indicating that checkpoints and p53 are essential for mediating TBTCL-induced germ cell apoptosis. Moreover, TBTCL exposure can inhibit germ cell proliferation, which is also mediated by the conserved checkpoint pathway. We thereby propose that TBT exhibits its effects on the germline by inducing DNA damage and impaired maintenance of genomic integrity. Copyright © 2014 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  7. The tumor suppressor homolog in fission yeast, myh1+, displays a strong interaction with the checkpoint gene rad1+

    International Nuclear Information System (INIS)

    Jansson, Kristina; Warringer, Jonas; Farewell, Anne; Park, Han-Oh; Hoe, Kwang-Lae; Kim, Dong-Uk; Hayles, Jacqueline; Sunnerhagen, Per

    2008-01-01

    The DNA glycosylase MutY is strongly conserved in evolution, and homologs are found in most eukaryotes and prokaryotes examined. This protein is implicated in repair of oxidative DNA damage, in particular adenine mispaired opposite 7,8-dihydro-8-oxoguanine. Previous investigations in Escherichia coli, fission yeast, and mammalian cells show an association of mutations in MutY homologs with a mutator phenotype and carcinogenesis. Eukaryotic MutY homologs physically associate with several proteins with a role in replication, DNA repair, and checkpoint signaling, specifically the trimeric 9-1-1 complex. In a genetic investigation of the fission yeast MutY homolog, myh1 + , we show that the myh1 mutation confers a moderately increased UV sensitivity alone and in combination with mutations in several DNA repair genes. The myh1 rad1, and to a lesser degree myh1 rad9, double mutants display a synthetic interaction resulting in enhanced sensitivity to DNA damaging agents and hydroxyurea. UV irradiation of myh1 rad1 double mutants results in severe chromosome segregation defects and visible DNA fragmentation, and a failure to activate the checkpoint. Additionally, myh1 rad1 double mutants exhibit morphological defects in the absence of DNA damaging agents. We also found a moderate suppression of the slow growth and UV sensitivity of rhp51 mutants by the myh1 mutation. Our results implicate fission yeast Myh1 in repair of a wider range of DNA damage than previously thought, and functionally link it to the checkpoint pathway

  8. The internal Cdc20 binding site in BubR1 facilitates both spindle assembly checkpoint signalling and silencing

    DEFF Research Database (Denmark)

    Lischetti, Tiziana; Zhang, Gang; Sedgwick, Garry G

    2014-01-01

    Improperly attached kinetochores activate the spindle assembly checkpoint (SAC) and by an unknown mechanism catalyse the binding of two checkpoint proteins, Mad2 and BubR1, to Cdc20 forming the mitotic checkpoint complex (MCC). Here, to address the functional role of Cdc20 kinetochore localization...... in the SAC, we delineate the molecular details of its interaction with kinetochores. We find that BubR1 recruits the bulk of Cdc20 to kinetochores through its internal Cdc20 binding domain (IC20BD). We show that preventing Cdc20 kinetochore localization by removal of the IC20BD has a limited effect...... on the SAC because the IC20BD is also required for efficient SAC silencing. Indeed, the IC20BD can disrupt the MCC providing a mechanism for its role in SAC silencing. We thus uncover an unexpected dual function of the second Cdc20 binding site in BubR1 in promoting both efficient SAC signalling and SAC...

  9. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  10. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  11. Is there a role for immune checkpoint blockade with ipilimumab in prostate cancer?

    International Nuclear Information System (INIS)

    Cha, Edward; Small, Eric J

    2013-01-01

    Treatment for advanced prostate cancer has and will continue to grow increasingly complex, owing to the introduction of multiple new therapeutic approaches with the potential to substantially improve outcomes for this disease. Agents that modulate the patient's immune system to fight prostate cancer – immunotherapeutics – are among the most exciting of these new approaches. The addition of antigen-specific immunotherapy to the treatment of castration-resistant prostate cancer (CRPC) has paved the way for additional research that seeks to augment the activity of the immune system itself. The monoclonal antibody ipilimumab, approved in over 40 countries to treat advanced melanoma and currently under phase 2 and 3 investigation in prostate cancer, is thought to act by augmenting immune responses to tumors through blockade of cytotoxic T-lymphocyte antigen 4, an inhibitory immune checkpoint molecule. Ipilimumab has been studied in seven phase 1 and 2 clinical trials that evaluated various doses, schedules, and combinations across the spectrum of patients with advanced prostate cancer. The CRPC studies of ipilimumab to date suggest that the agent is active in prostate cancer as monotherapy or in combination with radiotherapy, docetaxel, or other immunotherapeutics, and that the adverse event profile is as expected given the safety data in advanced melanoma. The ongoing phase 3 program will further characterize the risk/benefit profile of ipilimumab in chemotherapy-naïve and -pretreated CRPC

  12. The Spindle Assembly Checkpoint in Arabidopsis Is Rapidly Shut Off during Severe Stress.

    Science.gov (United States)

    Komaki, Shinichiro; Schnittger, Arp

    2017-10-23

    The spindle assembly checkpoint (SAC) in animals and yeast assures equal segregation of chromosomes during cell division. The prevalent occurrence of polyploidy in flowering plants together with the observation that many plants can be readily forced to double their genomes by application of microtubule drugs raises the question of whether plants have a proper SAC. Here, we provide a functional framework of the core SAC proteins in Arabidopsis. We reveal that Arabidopsis will delay mitosis in a SAC-dependent manner if the spindle is perturbed. However, we also show that the molecular architecture of the SAC is unique in plants. Moreover, the SAC is short-lived and cannot stay active for more than 2 hr, after which the cell cycle is reset. This resetting opens the possibility for genome duplications and raises the hypothesis that a rapid termination of a SAC-induced mitotic arrest provides an adaptive advantage for plants impacting plant genome evolution. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Morphogenesis checkpoint kinase Swe1 is the executor of lipolysis-dependent cell-cycle progression.

    Science.gov (United States)

    Chauhan, Neha; Visram, Myriam; Cristobal-Sarramian, Alvaro; Sarkleti, Florian; Kohlwein, Sepp D

    2015-03-10

    Cell growth and division requires the precise duplication of cellular DNA content but also of membranes and organelles. Knowledge about the cell-cycle-dependent regulation of membrane and storage lipid homeostasis is only rudimentary. Previous work from our laboratory has shown that the breakdown of triacylglycerols (TGs) is regulated in a cell-cycle-dependent manner, by activation of the Tgl4 lipase by the major cyclin-dependent kinase Cdc28. The lipases Tgl3 and Tgl4 are required for efficient cell-cycle progression during the G1/S (Gap1/replication phase) transition, at the onset of bud formation, and their absence leads to a cell-cycle delay. We now show that defective lipolysis activates the Swe1 morphogenesis checkpoint kinase that halts cell-cycle progression by phosphorylation of Cdc28 at tyrosine residue 19. Saturated long-chain fatty acids and phytosphingosine supplementation rescue the cell-cycle delay in the Tgl3/Tgl4 lipase-deficient strain, suggesting that Swe1 activity responds to imbalanced sphingolipid metabolism, in the absence of TG degradation. We propose a model by which TG-derived sphingolipids are required to activate the protein phosphatase 2A (PP2A(Cdc55)) to attenuate Swe1 phosphorylation and its inhibitory effect on Cdc28 at the G1/S transition of the cell cycle.

  14. Evaluation of response to immune checkpoint inhibitors: Is there a role for positron emission tomography?

    Institute of Scientific and Technical Information of China (English)

    Matteo Bauckneht; Roberta Piva; Gianmario Sambuceti; Francesco Grossi; Silvia Morbelli

    2017-01-01

    Strategies targeting intracellular negative regulators such as immune checkpoint inhibitors(ICPIs) have demonstrated significant antitumor activity across a wide range of solid tumors. In the clinical practice, the radiological effect of immunotherapeutic agents has raised several more relevant and complex challenges for the determination of their imaging-based response at single patient level. Accordingly, it has been suggested that the conventional Response Evaluation Criteria in Solid Tumors assessment alone, based on dimensional evaluation provided by computed tomography(CT), tends to underestimate the benefit of ICPIs at least in a subset of patients, supporting the need of immunerelated response criteria. Different from CT, very few data are available for the evaluation of immunotherapy by means of 18F-fluoro-2-deoxy-D-glucose positron emission tomography(FDG-PET). Moreover, since the antineoplastic activity of ICPIs is highly related to the activation of T cells against cancer cells, FDG accumulation might cause false-positive findings. Yet, discrimination between benign and malignant processes represents a huge challenge for FDG-PET in this clinical setting. Consequently, it might be of high interest to test the complex and variegated response to ICPIs by means of PET and thus it is worthwhile to ask if a similar introduction of immune-related PET-based criteria could be proposed in the future. Finally, PET might offer a new insight into the biology and pathophysiology of ICPIs thanks to a growing number of non-invasive immunediagnostic approaches based on non-FDG tracers.

  15. Checkpoint Kinase 1 Expression Predicts Poor Prognosis in Nigerian Breast Cancer Patients.

    Science.gov (United States)

    Ebili, Henry Okuchukwu; Iyawe, Victoria O; Adeleke, Kikelomo Rachel; Salami, Babatunde Abayomi; Banjo, Adekunbiola Aina; Nolan, Chris; Rakha, Emad; Ellis, Ian; Green, Andrew; Agboola, Ayodeji Olayinka Johnson

    2018-02-01

    Checkpoint kinase 1 (CHEK1), a DNA damage sensor and cell death pathway stimulator, is regarded as an oncogene in tumours, where its activities are considered essential for tumourigenesis and the survival of cancer cells treated with chemotherapy and radiotherapy. In breast cancer, CHEK1 expression has been associated with an aggressive tumour phenotype, the triple-negative breast cancer subtype, an aberrant response to tamoxifen, and poor prognosis. However, the relevance of CHEK1 expression has, hitherto, not been investigated in an indigenous African population. We therefore aimed to investigate the clinicopathological, biological, and prognostic significance of CHEK1 expression in a cohort of Nigerian breast cancer cases. Tissue microarrays of 207 Nigerian breast cancer cases were tested for CHEK1 expression using immunohistochemistry. The clinicopathological, molecular, and prognostic characteristics of CHEK1-positive tumours were determined using the Chi-squared test and Kaplan-Meier and Cox regression analyses in SPSS Version 16. Nuclear expression of CHEK1 was present in 61% of breast tumours and was associated with tumour size, triple-negative cancer, basal-like phenotype, the epithelial-mesenchymal transition, p53 over-expression, DNA homologous repair pathway dysfunction, and poor prognosis. The rate expression of CHEK1 is high in Nigerian breast cancer cases and is associated with an aggressive phenotype and poor prognosis.

  16. Inhibition of CDK7 bypasses spindle assembly checkpoint via premature cyclin B degradation during oocyte meiosis.

    Science.gov (United States)

    Wang, HaiYang; Jo, Yu-Jin; Sun, Tian-Yi; Namgoong, Suk; Cui, Xiang-Shun; Oh, Jeong Su; Kim, Nam-Hyung

    2016-12-01

    To ensure accurate chromosome segregation, the spindle assembly checkpoint (SAC) delays anaphase onset by preventing the premature activation of anaphase-promoting complex/cyclosome (APC/C) until all kinetochores are attached to the spindle. Although an escape from mitosis in the presence of unsatisfied SAC has been shown in several cancer cells, it has not been reported in oocyte meiosis. Here, we show that CDK7 activity is required to prevent a bypass of SAC during meiosis I in mouse oocytes. Inhibition of CDK7 using THZ1 accelerated the first meiosis, leading to chromosome misalignment, lag of chromosomes during chromosome segregation, and a high incidence of aneuploidy. Notably, this acceleration occurred in the presence of SAC proteins including Mad2 and Bub3 at the kinetochores. However, inhibition of APC/C-mediated cyclin B degradation blocked the THZ1-induced premature polar body extrusion. Moreover, chromosomal defects mediated by THZ1 were rescued when anaphase onset was delayed. Collectively, our results show that CDK7 activity is required to prevent premature anaphase onset by suppressing the bypass of SAC, thus ensuring chromosome alignment and proper segregation. These findings reveal new roles of CDK7 in the regulation of meiosis in mammalian oocytes. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Arabidopsis pdr2 reveals a phosphate-sensitive checkpoint in root development.

    Science.gov (United States)

    Ticconi, Carla A; Delatorre, Carla A; Lahner, Brett; Salt, David E; Abel, Steffen

    2004-03-01

    Plants have evolved complex strategies to maintain phosphate (Pi) homeostasis and to maximize Pi acquisition when the macronutrient is limiting. Adjustment of root system architecture via changes in meristem initiation and activity is integral to the acclimation process. However, the mechanisms that monitor external Pi status and interpret the nutritional signal remain to be elucidated. Here, we present evidence that the Pi deficiency response, pdr2, mutation disrupts local Pi sensing. The sensitivity and amplitude of metabolic Pi-starvation responses, such as Pi-responsive gene expression or accumulation of anthocyanins and starch, are enhanced in pdr2 seedlings. However, the most conspicuous alteration of pdr2 is a conditional short-root phenotype that is specific for Pi deficiency and caused by selective inhibition of root cell division followed by cell death below a threshold concentration of about 0.1 mm external Pi. Measurements of general Pi uptake and of total phosphorus (P) in root tips exclude a defect in high-affinity Pi acquisition. Rescue of root meristem activity in Pi-starved pdr2 by phosphite (Phi), a non-metabolizable Pi analog, and divided-root experiments suggest that pdr2 disrupts sensing of low external Pi availability. Thus, PDR2 is proposed to function at a Pi-sensitive checkpoint in root development, which monitors environmental Pi status, maintains and fine-tunes meristematic activity, and finally adjusts root system architecture to maximize Pi acquisition.

  18. Centromeric DNA replication reconstitution reveals DNA loops and ATR checkpoint suppression.

    Science.gov (United States)

    Aze, Antoine; Sannino, Vincenzo; Soffientini, Paolo; Bachi, Angela; Costanzo, Vincenzo

    2016-06-01

    Half of the human genome is made up of repetitive DNA. However, mechanisms underlying replication of chromosome regions containing repetitive DNA are poorly understood. We reconstituted replication of defined human chromosome segments using bacterial artificial chromosomes in Xenopus laevis egg extract. Using this approach we characterized the chromatin assembly and replication dynamics of centromeric alpha-satellite DNA. Proteomic analysis of centromeric chromatin revealed replication-dependent enrichment of a network of DNA repair factors including the MSH2-6 complex, which was required for efficient centromeric DNA replication. However, contrary to expectations, the ATR-dependent checkpoint monitoring DNA replication fork arrest could not be activated on highly repetitive DNA due to the inability of the single-stranded DNA binding protein RPA to accumulate on chromatin. Electron microscopy of centromeric DNA and supercoil mapping revealed the presence of topoisomerase I-dependent DNA loops embedded in a protein matrix enriched for SMC2-4 proteins. This arrangement suppressed ATR signalling by preventing RPA hyper-loading, facilitating replication of centromeric DNA. These findings have important implications for our understanding of repetitive DNA metabolism and centromere organization under normal and stressful conditions.

  19. Akt Kinase-Mediated Checkpoint of cGAS DNA Sensing Pathway

    Directory of Open Access Journals (Sweden)

    Gil Ju Seo

    2015-10-01

    Full Text Available Upon DNA stimulation, cyclic GMP-AMP synthase (cGAS synthesizes the second messenger cyclic GMP-AMP (cGAMP that binds to the STING, triggering antiviral interferon-β (IFN-β production. However, it has remained undetermined how hosts regulate cGAS enzymatic activity after the resolution of DNA immunogen. Here, we show that Akt kinase plays a negative role in cGAS-mediated anti-viral immune response. Akt phosphorylated the S291 or S305 residue of the enzymatic domain of mouse or human cGAS, respectively, and this phosphorylation robustly suppressed its enzymatic activity. Consequently, expression of activated Akt led to the reduction of cGAMP and IFN-β production and the increase of herpes simplex virus 1 replication, whereas treatment with Akt inhibitor augmented cGAS-mediated IFN-β production. Furthermore, expression of the phosphorylation-resistant cGAS S291A mutant enhanced IFN-β production upon DNA stimulation, HSV-1 infection, and vaccinia virus infection. Our study identifies an Akt kinase-mediated checkpoint to fine-tune hosts’ immune responses to DNA stimulation.

  20. Akt Kinase-Mediated Checkpoint of cGAS DNA Sensing Pathway.

    Science.gov (United States)

    Seo, Gil Ju; Yang, Aerin; Tan, Brandon; Kim, Sungyoon; Liang, Qiming; Choi, Younho; Yuan, Weiming; Feng, Pinghui; Park, Hee-Sung; Jung, Jae U

    2015-10-13

    Upon DNA stimulation, cyclic GMP-AMP synthase (cGAS) synthesizes the second messenger cyclic GMP-AMP (cGAMP) that binds to the STING, triggering antiviral interferon-β (IFN-β) production. However, it has remained undetermined how hosts regulate cGAS enzymatic activity after the resolution of DNA immunogen. Here, we show that Akt kinase plays a negative role in cGAS-mediated anti-viral immune response. Akt phosphorylated the S291 or S305 residue of the enzymatic domain of mouse or human cGAS, respectively, and this phosphorylation robustly suppressed its enzymatic activity. Consequently, expression of activated Akt led to the reduction of cGAMP and IFN-β production and the increase of herpes simplex virus 1 replication, whereas treatment with Akt inhibitor augmented cGAS-mediated IFN-β production. Furthermore, expression of the phosphorylation-resistant cGAS S291A mutant enhanced IFN-β production upon DNA stimulation, HSV-1 infection, and vaccinia virus infection. Our study identifies an Akt kinase-mediated checkpoint to fine-tune hosts' immune responses to DNA stimulation. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  1. Inhibition of checkpoint kinase 1 sensitizes lung cancer brain metastases to radiotherapy

    International Nuclear Information System (INIS)

    Yang, Heekyoung; Yoon, Su Jin; Jin, Juyoun; Choi, Seung Ho; Seol, Ho Jun; Lee, Jung-Il

    2011-01-01

    Research highlights: → The most important therapeutic tool in brain metastasis is radiation therapy. → Radiosensitivity of cancer cells was enhanced with treatment of Chk1 inhibitor. → Depletion of Chk1 in cancer cells showed an enhancement of sensitivity to radiation. → Chk1 can be a good target for enhancement of radiosensitivity. -- Abstract: The most important therapeutic tool in brain metastasis is radiation therapy. However, resistance to radiation is a possible cause of recurrence or treatment failure. Recently, signal pathways about DNA damage checkpoints after irradiation have been noticed. We investigated the radiosensitivity can be enhanced with treatment of Chk1 inhibitor, AZD7762 in lung cancer cell lines and xenograft models of lung cancer brain metastasis. Clonogenic survival assays showed enhancement of radiosensitivity with AZD7762 after irradiation of various doses. AZD7762 increased ATR/ATM-mediated Chk1 phosphorylation and stabilized Cdc25A, suppressed cyclin A expression in lung cancer cell lines. In xenograft models of lung cancer (PC14PE6) brain metastasis, AZD7762 significantly prolonged the median survival time in response to radiation. Depletion of Chk1 using shRNA also showed an enhancement of sensitivity to radiation in PC14PE6 cells. The results of this study support that Chk1 can be a good target for enhancement of radiosensitivity.

  2. Replicative stress and alterations in cell cycle checkpoint controls following acetaminophen hepatotoxicity restrict liver regeneration.

    Science.gov (United States)

    Viswanathan, Preeti; Sharma, Yogeshwar; Gupta, Priya; Gupta, Sanjeev

    2018-03-05

    Acetaminophen hepatotoxicity is a leading cause of hepatic failure with impairments in liver regeneration producing significant mortality. Multiple intracellular events, including oxidative stress, mitochondrial damage, inflammation, etc., signify acetaminophen toxicity, although how these may alter cell cycle controls has been unknown and was studied for its significance in liver regeneration. Assays were performed in HuH-7 human hepatocellular carcinoma cells, primary human hepatocytes and tissue samples from people with acetaminophen-induced acute liver failure. Cellular oxidative stress, DNA damage and cell proliferation events were investigated by mitochondrial membrane potential assays, flow cytometry, fluorescence staining, comet assays and spotted arrays for protein expression after acetaminophen exposures. In experimental groups with acetaminophen toxicity, impaired mitochondrial viability and substantial DNA damage were observed with rapid loss of cells in S and G2/M and cell cycle restrictions or even exit in the remainder. This resulted from altered expression of the DNA damage regulator, ATM and downstream transducers, which imposed G1/S checkpoint arrest, delayed entry into S and restricted G2 transit. Tissues from people with acute liver failure confirmed hepatic DNA damage and cell cycle-related lesions, including restrictions of hepatocytes in aneuploid states. Remarkably, treatment of cells with a cytoprotective cytokine reversed acetaminophen-induced restrictions to restore cycling. Cell cycle lesions following mitochondrial and DNA damage led to failure of hepatic regeneration in acetaminophen toxicity but their reversibility offers molecular targets for treating acute liver failure. © 2018 John Wiley & Sons Ltd.

  3. The flavonoid eupatorin inactivates the mitotic checkpoint leading to polyploidy and apoptosis

    Energy Technology Data Exchange (ETDEWEB)

    Salmela, Anna-Leena [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Turku Graduate School of Biomedical Sciences, Turku (Finland); Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Pouwels, Jeroen; Kukkonen-Macchi, Anu [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Waris, Sinikka; Toivonen, Pauliina [Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Jaakkola, Kimmo [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Maeki-Jouppila, Jenni [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Drug Discovery Graduate School, University of Turku (Finland); Kallio, Lila, E-mail: lila.kallio@vtt.fi [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Kallio, Marko J. [VTT Technical Research Centre of Finland, Medical Biotechnology, P.O. Box 106, Turku (Finland); Turku Centre for Biotechnology, P.O. Box 123, University of Turku (Finland); Centre of Excellence for Translational Genome-Scale Biology, P.O. Box 106, Academy of Finland (Finland)

    2012-03-10

    The spindle assembly checkpoint (SAC) is a conserved mechanism that ensures the fidelity of chromosome distribution in mitosis by preventing anaphase onset until the correct bipolar microtubule-kinetochore attachments are formed. Errors in SAC function may contribute to tumorigenesis by inducing numerical chromosome anomalies (aneuploidy). On the other hand, total disruption of SAC can lead to massive genomic imbalance followed by cell death, a phenomena that has therapeutic potency. We performed a cell-based high-throughput screen with a compound library of 2000 bioactives for novel SAC inhibitors and discovered a plant-derived phenolic compound eupatorin (3 Prime ,5-dihydroxy-4 Prime ,6,7-trimethoxyflavone) as an anti-mitotic flavonoid. The premature override of the microtubule drug-imposed mitotic arrest by eupatorin is dependent on microtubule-kinetochore attachments but not interkinetochore tension. Aurora B kinase activity, which is essential for maintenance of normal SAC signaling, is diminished by eupatorin in cells and in vitro providing a mechanistic explanation for the observed forced mitotic exit. Eupatorin likely has additional targets since eupatorin treatment of pre-mitotic cells causes spindle anomalies triggering a transient M phase delay followed by impaired cytokinesis and polyploidy. Finally, eupatorin potently induces apoptosis in multiple cancer cell lines and suppresses cancer cell proliferation in organotypic 3D cell culture model.

  4. Dietary flavonoid fisetin induces a forced exit from mitosis by targeting the mitotic spindle checkpoint

    Science.gov (United States)

    Salmela, Anna-Leena; Pouwels, Jeroen; Varis, Asta; Kukkonen, Anu M.; Toivonen, Pauliina; Halonen, Pasi K.; Perälä, Merja; Kallioniemi, Olli; Gorbsky, Gary J.; Kallio, Marko J.

    2009-01-01

    Fisetin is a natural flavonol present in edible vegetables, fruits and wine at 2–160 μg/g concentrations and an ingredient in nutritional supplements with much higher concentrations. The compound has been reported to exert anticarcinogenic effects as well as antioxidant and anti-inflammatory activity via its ability to act as an inhibitor of cell proliferation and free radical scavenger, respectively. Our cell-based high-throughput screen for small molecules that override chemically induced mitotic arrest identified fisetin as an antimitotic compound. Fisetin rapidly compromised microtubule drug-induced mitotic block in a proteasome-dependent manner in several human cell lines. Moreover, in unperturbed human cancer cells fisetin caused premature initiation of chromosome segregation and exit from mitosis without normal cytokinesis. To understand the molecular mechanism behind these mitotic errors, we analyzed the consequences of fisetin treatment on the localization and phoshorylation of several mitotic proteins. Aurora B, Bub1, BubR1 and Cenp-F rapidly lost their kinetochore/centromere localization and others became dephosphorylated upon addition of fisetin to the culture medium. Finally, we identified Aurora B kinase as a novel direct target of fisetin. The activity of Aurora B was significantly reduced by fisetin in vitro and in cells, an effect that can explain the observed forced mitotic exit, failure of cytokinesis and decreased cell viability. In conclusion, our data propose that fisetin perturbs spindle checkpoint signaling, which may contribute to the antiproliferative effects of the compound. PMID:19395653

  5. Dual personality of Mad1: regulation of nuclear import by a spindle assembly checkpoint protein.

    Science.gov (United States)

    Cairo, Lucas V; Ptak, Christopher; Wozniak, Richard W

    2013-01-01

    Nuclear transport is a dynamic process that can be modulated in response to changes in cellular physiology. We recently reported that the transport activity of yeast nuclear pore complexes (NPCs) is altered in response to kinetochore-microtubule (KT-MT) interaction defects. Specifically, KT detachment from MTs activates a signaling pathway that prevents the nuclear import of cargos by the nuclear transport factor Kap121p. This loss of Kap121p-mediated import is thought to influence the nuclear environment, including the phosphorylation state of nuclear proteins. A key regulator of this process is the spindle assembly checkpoint protein Mad1p. In response to unattached KTs, Mad1p dynamically cycles between NPCs and KTs. This cycling appears to induce NPC molecular rearrangements that prevent the nuclear import of Kap121p-cargo complexes. Here, we discuss the underlying mechanisms and the physiological relevance of Mad1p cycling and the inhibition of Kap121p-mediated nuclear import, focusing on outstanding questions within the pathway.

  6. Adventures in Scaffold Morphing: Discovery of Fused Ring Heterocyclic Checkpoint Kinase 1 (CHK1) Inhibitors.

    Science.gov (United States)

    Yang, Bin; Vasbinder, Melissa M; Hird, Alexander W; Su, Qibin; Wang, Haixia; Yu, Yan; Toader, Dorin; Lyne, Paul D; Read, Jon A; Breed, Jason; Ioannidis, Stephanos; Deng, Chun; Grondine, Michael; DeGrace, Nancy; Whitston, David; Brassil, Patrick; Janetka, James W

    2018-02-08

    Checkpoint kinase 1 (CHK1) inhibitors are potential cancer therapeutics that can be utilized for enhancing the efficacy of DNA damaging agents. Multiple small molecule CHK1 inhibitors from different chemical scaffolds have been developed and evaluated in clinical trials in combination with chemotherapeutics and radiation treatment. Scaffold morphing of thiophene carboxamide ureas (TCUs), such as AZD7762 (1) and a related series of triazoloquinolines (TZQs), led to the identification of fused-ring bicyclic CHK1 inhibitors, 7-carboxamide thienopyridines (7-CTPs), and 7-carboxamide indoles. X-ray crystal structures reveal a key intramolecular noncovalent sulfur-oxygen interaction in aligning the hinge-binding carboxamide group to the thienopyridine core in a coplanar fashion. An intramolecular hydrogen bond to an indole NH was also effective in locking the carboxamide in the preferred bound conformation to CHK1. Optimization on the 7-CTP series resulted in the identification of lead compound 44, which displayed respectable drug-like properties and good in vitro and in vivo potency.

  7. The bacterial cell cycle checkpoint protein Obg and its role in programmed cell death

    Directory of Open Access Journals (Sweden)

    Liselot Dewachter

    2016-03-01

    Full Text Available The phenomenon of programmed cell death (PCD, in which cells initiate their own demise, is not restricted to multicellular organisms. Unicellular organisms, both eukaryotes and prokaryotes, also possess pathways that mediate PCD. We recently identified a PCD mechanism in Escherichia coli that is triggered by a mutant isoform of the essential GTPase ObgE (Obg of E. coli. Importantly, the PCD pathway mediated by mutant Obg (Obg* differs fundamentally from other previously described bacterial PCD pathways and thus constitutes a new mode of PCD. ObgE was previously proposed to act as a cell cycle checkpoint protein able to halt cell division. The implication of ObgE in the regulation of PCD further increases the similarity between this protein and eukaryotic cell cycle regulators that are capable of doing both. Moreover, since Obg is conserved in eukaryotes, the elucidation of this cell death mechanism might contribute to the understanding of PCD in higher organisms. Additionally, if Obg*-mediated PCD is conserved among different bacterial species, it will be a prime target for the development of innovative antibacterials that artificially induce this pathway.

  8. Optimising measles virus-guided radiovirotherapy with external beam radiotherapy and specific checkpoint kinase 1 inhibition

    International Nuclear Information System (INIS)

    Touchefeu, Yann; Khan, Aadil A.; Borst, Gerben; Zaidi, Shane H.; McLaughlin, Martin; Roulstone, Victoria; Mansfield, David; Kyula, Joan; Pencavel, Tim; Karapanagiotou, Eleni M.; Clayton, Jamie; Federspiel, Mark J.; Russell, Steve J.; Garrett, Michelle; Collins, Ian; Harrington, Kevin J.

    2013-01-01

    Background and purpose: We previously reported a therapeutic strategy comprising replication-defective NIS-expressing adenovirus combined with radioiodide, external beam radiotherapy (EBRT) and DNA repair inhibition. We have now evaluated NIS-expressing oncolytic measles virus (MV-NIS) combined with NIS-guided radioiodide, EBRT and specific checkpoint kinase 1 (Chk1) inhibition in head and neck and colorectal models. Materials and methods: Anti-proliferative/cytotoxic effects of individual agents and their combinations were measured by MTS, clonogenic and Western analysis. Viral gene expression was measured by radioisotope uptake and replication by one-step growth curves. Potential synergistic interactions were tested in vitro by Bliss independence analysis and in in vivo therapeutic studies. Results: EBRT and MV-NIS were synergistic in vitro. Furthermore, EBRT increased NIS expression in infected cells. SAR-020106 was synergistic with EBRT, but also with MV-NIS in HN5 cells. MV-NIS mediated 131 I-induced cytotoxicity in HN5 and HCT116 cells and, in the latter, this was enhanced by SAR-020106. In vivo studies confirmed that MV-NIS, EBRT and Chk1 inhibition were effective in HCT116 xenografts. The quadruplet regimen of MV-NIS, virally-directed 131 I, EBRT and SAR-020106 had significant anti-tumour activity in HCT116 xenografts. Conclusion: This study strongly supports translational and clinical research on MV-NIS combined with radiation therapy and radiosensitising agents

  9. Drosophila Polo regulates the spindle assembly checkpoint through Mps1-dependent BubR1 phosphorylation.

    Science.gov (United States)

    Conde, Carlos; Osswald, Mariana; Barbosa, João; Moutinho-Santos, Tatiana; Pinheiro, Diana; Guimarães, Sofia; Matos, Irina; Maiato, Helder; Sunkel, Claudio E

    2013-06-12

    Maintenance of genomic stability during eukaryotic cell division relies on the spindle assembly checkpoint (SAC) that prevents mitotic exit until all chromosomes are properly attached to the spindle. Polo is a mitotic kinase proposed to be involved in SAC function, but its role has remained elusive. We demonstrate that Polo and Aurora B functional interdependency comprises a positive feedback loop that promotes Mps1 kinetochore localization and activity. Expression of constitutively active Polo restores normal Mps1 kinetochore levels even after Aurora B inhibition, highlighting a role for Polo in Mps1 recruitment to unattached kinetochores downstream of Aurora B. We also show that Mps1 kinetochore localization is required for BubR1 hyperphosphorylation and formation of the 3F3/2 phosphoepitope. This is essential to allow recruitment of Cdc20 to unattached kinetochores and the assembly of anaphase-promoting complex/cyclosome-inhibitory complexes to levels that ensure long-term SAC activity. We propose a model in which Polo controls Mps1-dependent BubR1 phosphorylation to promote Cdc20 kinetochore recruitment and sustained SAC function.

  10. Early programming and late-acting checkpoints governing the development of CD4 T cell memory.

    Science.gov (United States)

    Dhume, Kunal; McKinstry, K Kai

    2018-04-27

    CD4 T cells contribute to protection against pathogens through numerous mechanisms. Incorporating the goal of memory CD4 T cell generation into vaccine strategies thus offers a powerful approach to improve their efficacy, especially in situations where humoral responses alone cannot confer long-term immunity. These threats include viruses such as influenza that mutate coat proteins to avoid neutralizing antibodies, but that are targeted by T cells that recognize more conserved protein epitopes shared by different strains. A major barrier in the design of such vaccines is that the mechanisms controlling the efficiency with which memory cells form remain incompletely understood. Here, we discuss recent insights into fate decisions controlling memory generation. We focus on the importance of three general cues: interleukin-2, antigen, and costimulatory interactions. It is increasingly clear that these signals have a powerful influence on the capacity of CD4 T cells to form memory during two distinct phases of the immune response. First, through 'programming' that occurs during initial priming, and second, through 'checkpoints' that operate later during the effector stage. These findings indicate that novel vaccine strategies must seek to optimize cognate interactions, during which interleukin-2-, antigen, and costimulation-dependent signals are tightly linked, well beyond initial antigen encounter to induce robust memory CD4 T cells. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  11. Checkpoint Kinase Rad53 Couples Leading- and Lagging-Strand DNA Synthesis under Replication Stress.

    Science.gov (United States)

    Gan, Haiyun; Yu, Chuanhe; Devbhandari, Sujan; Sharma, Sushma; Han, Junhong; Chabes, Andrei; Remus, Dirk; Zhang, Zhiguo

    2017-10-19

    The checkpoint kinase Rad53 is activated during replication stress to prevent fork collapse, an essential but poorly understood process. Here we show that Rad53 couples leading- and lagging-strand synthesis under replication stress. In rad53-1 cells stressed by dNTP depletion, the replicative DNA helicase, MCM, and the leading-strand DNA polymerase, Pol ε, move beyond the site of DNA synthesis, likely unwinding template DNA. Remarkably, DNA synthesis progresses further along the lagging strand than the leading strand, resulting in the exposure of long stretches of single-stranded leading-strand template. The asymmetric DNA synthesis in rad53-1 cells is suppressed by elevated levels of dNTPs in vivo, and the activity of Pol ε is compromised more than lagging-strand polymerase Pol δ at low dNTP concentrations in vitro. Therefore, we propose that Rad53 prevents the generation of excessive ssDNA under replication stress by coordinating DNA unwinding with synthesis of both strands. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. G2 checkpoint abrogator abates the antagonistic interaction between antimicrotubule drugs and radiation therapy

    International Nuclear Information System (INIS)

    Sui Meihua; Zhang Hongfang; Di Xiaoyun; Chang Jinjia; Shen Youqing; Fan Weimin

    2012-01-01

    Background and purpose: We previously demonstrated that radiation may arrest tumor cells at G2 phase, which in turn prevents the cytotoxicity of antimicrotubule drugs and results in antagonistic interaction between these two modalities. Herein we tested whether G2 abrogators would attenuate the above antagonistic interaction and improve the therapeutic efficacy of combination therapy between radiation and antimicrotubule drugs. Materials and methods: Breast cancer BCap37 and epidermoid carcinoma KB cell lines were administered with radiation, UCN-01 (a model drug of G2 abrogator), paclitaxel or vincristine, alone or in combinations. The antitumor activities of single and combined treatments were analyzed by a series of cytotoxic, apoptotic, cell cycle, morphological and biochemical assays. Results: UCN-01 significantly enhanced the cytotoxicity of radiation, antimitotic drugs, and their combined treatments in vitro. Further investigations demonstrated that UCN-01 attenuated radiation-induced G2 arrest, and subsequently repressed the inhibitory effect of radiation on drug-induced mitotic arrest and apoptosis. Conclusions: This is the first report demonstrating that G2 checkpoint abrogation represses the inhibitory effect of radiation on antimicrotubule drugs, which may be implicated in cancer combination therapy. Considering that G2 abrogators are under extensive evaluation for cancer treatment, our findings provide valuable information for this class of promising compounds.

  13. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  14. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  15. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  16. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  17. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  18. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  19. Requirement for the Phospho-H2AX Binding Module of Crb2 in Double-Strand Break Targeting and Checkpoint Activation▿

    Science.gov (United States)

    Sanders, Steven L.; Arida, Ahmad R.; Phan, Funita P.

    2010-01-01

    Activation of DNA damage checkpoints requires the rapid accumulation of numerous factors to sites of genomic lesions, and deciphering the mechanisms of this targeting is central to our understanding of DNA damage response. Histone modification has recently emerged as a critical element for the correct localization of damage response proteins, and one key player in this context is the fission yeast checkpoint mediator Crb2. Accumulation of Crb2 at ionizing irradiation-induced double-strand breaks (DSBs) requires two distinct histone marks, dimethylated H4 lysine 20 (H4K20me2) and phosphorylated H2AX (pH2AX). A tandem tudor motif in Crb2 directly binds H4K20me2, and this interaction is required for DSB targeting and checkpoint activation. Similarly, pH2AX is required for Crb2 localization to DSBs and checkpoint control. Crb2 can directly bind pH2AX through a pair of C-terminal BRCT repeats, but the functional significance of this binding has been unclear. Here we demonstrate that loss of its pH2AX-binding activity severely impairs the ability of Crb2 to accumulate at ionizing irradiation-induced DSBs, compromises checkpoint signaling, and disrupts checkpoint-mediated cell cycle arrest. These impairments are similar to that reported for abolition of pH2AX or mutation of the H4K20me2-binding tudor motif of Crb2. Intriguingly, a combined ablation of its two histone modification binding modules yields a strikingly additive reduction in Crb2 activity. These observations argue that binding of the Crb2 BRCT repeats to pH2AX is critical for checkpoint activity and provide new insight into the mechanisms of chromatin-mediated genome stability. PMID:20679488

  20. Requirement for the phospho-H2AX binding module of Crb2 in double-strand break targeting and checkpoint activation.

    Science.gov (United States)

    Sanders, Steven L; Arida, Ahmad R; Phan, Funita P

    2010-10-01

    Activation of DNA damage checkpoints requires the rapid accumulation of numerous factors to sites of genomic lesions, and deciphering the mechanisms of this targeting is central to our understanding of DNA damage response. Histone modification has recently emerged as a critical element for the correct localization of damage response proteins, and one key player in this context is the fission yeast checkpoint mediator Crb2. Accumulation of Crb2 at ionizing irradiation-induced double-strand breaks (DSBs) requires two distinct histone marks, dimethylated H4 lysine 20 (H4K20me2) and phosphorylated H2AX (pH2AX). A tandem tudor motif in Crb2 directly binds H4K20me2, and this interaction is required for DSB targeting and checkpoint activation. Similarly, pH2AX is required for Crb2 localization to DSBs and checkpoint control. Crb2 can directly bind pH2AX through a pair of C-terminal BRCT repeats, but the functional significance of this binding has been unclear. Here we demonstrate that loss of its pH2AX-binding activity severely impairs the ability of Crb2 to accumulate at ionizing irradiation-induced DSBs, compromises checkpoint signaling, and disrupts checkpoint-mediated cell cycle arrest. These impairments are similar to that reported for abolition of pH2AX or mutation of the H4K20me2-binding tudor motif of Crb2. Intriguingly, a combined ablation of its two histone modification binding modules yields a strikingly additive reduction in Crb2 activity. These observations argue that binding of the Crb2 BRCT repeats to pH2AX is critical for checkpoint activity and provide new insight into the mechanisms of chromatin-mediated genome stability.

  1. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  2. Comparison of checkpoint responses triggered by DNA polymerase inhibition versus DNA damaging agents

    International Nuclear Information System (INIS)

    Liu, J.-S.; Kuo, S.-R.; Melendy, Thomas

    2003-01-01

    To better understand the different cellular responses to replication fork pausing versus blockage, early DNA damage response markers were compared after treatment of cultured mammalian cells with agents that either inhibit DNA polymerase activity (hydroxyurea (HU) or aphidicolin) or selectively induce S-phase DNA damage responses (the DNA alkylating agents, methyl methanesulfonate (MMS) and adozelesin). These agents were compared for their relative abilities to induce phosphorylation of Chk1, H2AX, and replication protein A (RPA), and intra-nuclear focalization of γ-H2AX and RPA. Treatment by aphidicolin and HU resulted in phosphorylation of Chk1, while HU, but not aphidicolin, induced focalization of γ-H2AX and RPA. Surprisingly, pre-treatment with aphidicolin to stop replication fork progression, did not abrogate HU-induced γ-H2AX and RPA focalization. This suggests that HU may act on the replication fork machinery directly, such that fork progression is not required to trigger these responses. The DNA-damaging fork-blocking agents, adozelesin and MMS, both induced phosphorylation and focalization of H2AX and RPA. Unlike adozelesin and HU, the pattern of MMS-induced RPA focalization did not match the BUdR incorporation pattern and was not blocked by aphidicolin, suggesting that MMS-induced damage is not replication fork-dependent. In support of this, MMS was the only reagent used that did not induce phosphorylation of Chk1. These results indicate that induction of DNA damage checkpoint responses due to adozelesin is both replication fork and fork progression dependent, induction by HU is replication fork dependent but progression independent, while induction by MMS is independent of both replication forks and fork progression

  3. Adrenergic Signaling: A Targetable Checkpoint Limiting Development of the Antitumor Immune Response

    Science.gov (United States)

    Qiao, Guanxi; Chen, Minhui; Bucsek, Mark J.; Repasky, Elizabeth A.; Hylander, Bonnie L.

    2018-01-01

    An immune response must be tightly controlled so that it will be commensurate with the level of response needed to protect the organism without damaging normal tissue. The roles of cytokines and chemokines in orchestrating these processes are well known, but although stress has long been thought to also affect immune responses, the underlying mechanisms were not as well understood. Recently, the role of nerves and, specifically, the sympathetic nervous system, in regulating immune responses is being revealed. Generally, an acute stress response is beneficial but chronic stress is detrimental because it suppresses the activities of effector immune cells while increasing the activities of immunosuppressive cells. In this review, we first discuss the underlying biology of adrenergic signaling in cells of both the innate and adaptive immune system. We then focus on the effects of chronic adrenergic stress in promoting tumor growth, giving examples of effects on tumor cells and immune cells, explaining the methods commonly used to induce stress in preclinical mouse models. We highlight how this relates to our observations that mandated housing conditions impose baseline chronic stress on mouse models, which is sufficient to cause chronic immunosuppression. This problem is not commonly recognized, but it has been shown to impact conclusions of several studies of mouse physiology and mouse models of disease. Moreover, the fact that preclinical mouse models are chronically immunosuppressed has critical ramifications for analysis of any experiments with an immune component. Our group has found that reducing adrenergic stress by housing mice at thermoneutrality or treating mice housed at cooler temperatures with β-blockers reverses immunosuppression and significantly improves responses to checkpoint inhibitor immunotherapy. These observations are clinically relevant because there are numerous retrospective epidemiological studies concluding that cancer patients who were

  4. Comparison of checkpoint responses triggered by DNA polymerase inhibition versus DNA damaging agents

    Energy Technology Data Exchange (ETDEWEB)

    Liu, J.-S.; Kuo, S.-R.; Melendy, Thomas

    2003-11-27

    To better understand the different cellular responses to replication fork pausing versus blockage, early DNA damage response markers were compared after treatment of cultured mammalian cells with agents that either inhibit DNA polymerase activity (hydroxyurea (HU) or aphidicolin) or selectively induce S-phase DNA damage responses (the DNA alkylating agents, methyl methanesulfonate (MMS) and adozelesin). These agents were compared for their relative abilities to induce phosphorylation of Chk1, H2AX, and replication protein A (RPA), and intra-nuclear focalization of {gamma}-H2AX and RPA. Treatment by aphidicolin and HU resulted in phosphorylation of Chk1, while HU, but not aphidicolin, induced focalization of {gamma}-H2AX and RPA. Surprisingly, pre-treatment with aphidicolin to stop replication fork progression, did not abrogate HU-induced {gamma}-H2AX and RPA focalization. This suggests that HU may act on the replication fork machinery directly, such that fork progression is not required to trigger these responses. The DNA-damaging fork-blocking agents, adozelesin and MMS, both induced phosphorylation and focalization of H2AX and RPA. Unlike adozelesin and HU, the pattern of MMS-induced RPA focalization did not match the BUdR incorporation pattern and was not blocked by aphidicolin, suggesting that MMS-induced damage is not replication fork-dependent. In support of this, MMS was the only reagent used that did not induce phosphorylation of Chk1. These results indicate that induction of DNA damage checkpoint responses due to adozelesin is both replication fork and fork progression dependent, induction by HU is replication fork dependent but progression independent, while induction by MMS is independent of both replication forks and fork progression.

  5. The Feasibility and Safety of Surgery in Patients Receiving Immune Checkpoint Inhibitors: A Retrospective Study

    Directory of Open Access Journals (Sweden)

    Alexandra W. Elias

    2017-06-01

    Full Text Available Immune checkpoint inhibitors (ICI are revolutionizing care for cancer patients. The list of malignancies for which the Food and Drug Administration is granting approval is rapidly increasing. Furthermore, there is a concomitant increase in clinical trials incorporating ICI. However, the safety of ICI in patients undergoing surgery remains unclear. Herein, we assessed the safety of ICI in the perioperative setting at a single center. We conducted a retrospective review of patients who underwent planned surgery while receiving ICI in the perioperative setting from 2012 to 2016. We collected 30-day postoperative morbidity and mortality utilizing the Clavien–Dindo classification system. We identified 17 patients who received perioperative ICI in 22 operations. Patients were diagnosed with melanoma (n = 14, renal cell carcinoma (n = 2, and urothelial carcinoma (n = 1. Therapies included pembrolizumab (n = 10, ipilimumab (n = 5, atezolizumab (n = 5, and ipilimumab/nivolumab (n = 2. Procedures included cutaneous/subcutaneous resection (n = 6, lymph node resection (n = 5, small bowel resection (n = 5, abdominal wall resection (n = 3, other abdominal surgery (n = 3, orthopedic surgery (n = 1, hepatic resection (n = 1, and neurosurgery (n = 2. There were no Grade III–IV Clavien–Dindo complications. There was one death secondary to ventricular fibrillation in the setting of coronary artery disease. ICI appear safe in the perioperative setting, involving multiple different types of surgery, and likely do not need to be stopped in the perioperative setting. Further studies are warranted to confirm these findings.

  6. Regulation of cell cycle checkpoint kinase WEE1 by miR-195 in malignant melanoma.

    Science.gov (United States)

    Bhattacharya, A; Schmitz, U; Wolkenhauer, O; Schönherr, M; Raatz, Y; Kunz, M

    2013-06-27

    WEE1 kinase has been described as a major gate keeper at the G2 cell cycle checkpoint and to be involved in tumour progression in different malignant tumours. Here we analysed the expression levels of WEE1 in a series of melanoma patient samples and melanoma cell lines using immunoblotting, quantitative real-time PCR and immunohistochemistry. WEE1 expression was significantly downregulated in patient samples of metastatic origin as compared with primary melanomas and in melanoma cell lines of high aggressiveness as compared with cell lines of low aggressiveness. Moreover, there was an inverse correlation between the expression of WEE1 and WEE1-targeting microRNA miR-195. Further analyses showed that transfection of melanoma cell lines with miR-195 indeed reduced WEE1 mRNA and protein expression in these cells. Reporter gene analysis confirmed direct targeting of the WEE1 3' untranslated region (3'UTR) by miR-195. Overexpression of miR-195 in SK-Mel-28 melanoma cells was accompanied by WEE1 reduction and significantly reduced stress-induced G2-M cell cycle arrest, which could be restored by stable overexpression of WEE1. Moreover, miR-195 overexpression and WEE1 knockdown, respectively, increased melanoma cell proliferation. miR-195 overexpression also enhanced migration and invasiveness of melanoma cells. Taken together, the present study shows that WEE1 expression in malignant melanoma is directly regulated by miR-195. miR-195-mediated downregulation of WEE1 in metastatic lesions may help to overcome cell cycle arrest under stress conditions in the local tissue microenvironment to allow unrestricted growth of tumour cells.

  7. How oocytes try to get it right: spindle checkpoint control in meiosis.

    Science.gov (United States)

    Touati, Sandra A; Wassmann, Katja

    2016-06-01

    The generation of a viable, diploid organism depends on the formation of haploid gametes, oocytes, and spermatocytes, with the correct number of chromosomes. Halving the genome requires the execution of two consecutive specialized cell divisions named meiosis I and II. Unfortunately, and in contrast to male meiosis, chromosome segregation in oocytes is error prone, with human oocytes being extraordinarily "meiotically challenged". Aneuploid oocytes, that are with the wrong number of chromosomes, give rise to aneuploid embryos when fertilized. In humans, most aneuploidies are lethal and result in spontaneous abortions. However, some trisomies survive to birth or even adulthood, such as the well-known trisomy 21, which gives rise to Down syndrome (Nagaoka et al. in Nat Rev Genet 13:493-504, 2012). A staggering 20-25 % of oocytes ready to be fertilized are aneuploid in humans. If this were not bad enough, there is an additional increase in meiotic missegregations as women get closer to menopause. A woman above 40 has a risk of more than 30 % of getting pregnant with a trisomic child. Worse still, in industrialized western societies, child birth is delayed, with women getting their first child later in life than ever. This trend has led to an increase of trisomic pregnancies by 70 % in the last 30 years (Nagaoka et al. in Nat Rev Genet 13:493-504, 2012; Schmidt et al. in Hum Reprod Update 18:29-43, 2012). To understand why errors occur so frequently during the meiotic divisions in oocytes, we review here the molecular mechanisms at works to control chromosome segregation during meiosis. An important mitotic control mechanism, namely the spindle assembly checkpoint or SAC, has been adapted to the special requirements of the meiotic divisions, and this review will focus on our current knowledge of SAC control in mammalian oocytes. Knowledge on how chromosome segregation is controlled in mammalian oocytes may help to identify risk factors important for questions

  8. Differential immune microenvironments and response to immune checkpoint blockade amongst molecular subtypes of murine medulloblastoma

    Science.gov (United States)

    Pham, Christina D.; Flores, Catherine; Yang, Changlin; Pinheiro, Elaine M.; Yearley, Jennifer H.; Sayour, Elias J.; Pei, Yanxin; Moore, Colin; McLendon, Roger E.; Huang, Jianping; Sampson, John H.; Wechsler-Reya, Robert; Mitchell, Duane A.

    2016-01-01

    PURPOSE Despite significant strides in the identification and characterization of potential therapeutic targets for medulloblastoma (MB), the role of the immune system and its interplay with the tumor microenvironment within these tumors are poorly understood. To address this, we adapted two syngeneic animal models of human Sonic Hedgehog (SHH)-driven and Group 3 MB for preclinical evaluation in immunocompetent C57BL/6 mice. METHODS AND RESULTS Multicolor flow cytometric analyses were used to phenotype and characterize immune infiltrating cells within established cerebellar tumors. We observed significantly higher percentages of dendritic cells, infiltrating lymphocytes, myeloid derived suppressor cells and tumor-associated macrophages in murine SHH model tumors compared with Group 3 tumors. However, murine Group 3 tumors had higher percentages of CD8+ PD-1+ T cells within the CD3 population. PD-1 blockade conferred superior antitumor efficacy in animals bearing intracranial Group 3 tumors compared to SHH group tumors, indicating that immunologic differences within the tumor microenvironment can be leveraged as potential targets to mediate antitumor efficacy. Further analysis of anti-PD-1 monoclonal antibody localization revealed binding to PD-1+ peripheral T cells, but not tumor infiltrating lymphocytes within the brain tumor microenvironment. Peripheral PD-1 blockade additionally resulted in a marked increase in CD3+ T cells within the tumor microenvironment. CONCLUSIONS This is the first immunologic characterization of preclinical models of molecular subtypes of MB and demonstration that response to immune checkpoint blockade differs across subtype classification. Our findings also suggest that effective anti-PD-1 blockade does not require that systemically administered antibodies penetrate the brain tumor microenvironment. PMID:26405194

  9. DNA damage checkpoint kinase ATM regulates germination and maintains genome stability in seeds.

    Science.gov (United States)

    Waterworth, Wanda M; Footitt, Steven; Bray, Clifford M; Finch-Savage, William E; West, Christopher E

    2016-08-23

    Genome integrity is crucial for cellular survival and the faithful transmission of genetic information. The eukaryotic cellular response to DNA damage is orchestrated by the DNA damage checkpoint kinases ATAXIA TELANGIECTASIA MUTATED (ATM) and ATM AND RAD3-RELATED (ATR). Here we identify important physiological roles for these sensor kinases in control of seed germination. We demonstrate that double-strand breaks (DSBs) are rate-limiting for germination. We identify that desiccation tolerant seeds exhibit a striking transcriptional DSB damage response during germination, indicative of high levels of genotoxic stress, which is induced following maturation drying and quiescence. Mutant atr and atm seeds are highly resistant to aging, establishing ATM and ATR as determinants of seed viability. In response to aging, ATM delays germination, whereas atm mutant seeds germinate with extensive chromosomal abnormalities. This identifies ATM as a major factor that controls germination in aged seeds, integrating progression through germination with surveillance of genome integrity. Mechanistically, ATM functions through control of DNA replication in imbibing seeds. ATM signaling is mediated by transcriptional control of the cell cycle inhibitor SIAMESE-RELATED 5, an essential factor required for the aging-induced delay to germination. In the soil seed bank, seeds exhibit increased transcript levels of ATM and ATR, with changes in dormancy and germination potential modulated by environmental signals, including temperature and soil moisture. Collectively, our findings reveal physiological functions for these sensor kinases in linking genome integrity to germination, thereby influencing seed quality, crucial for plant survival in the natural environment and sustainable crop production.

  10. Immune checkpoint inhibitor-induced gastrointestinal and hepatic injury: pathologists' perspective.

    Science.gov (United States)

    Karamchandani, Dipti M; Chetty, Runjan

    2018-04-27

    Immune checkpoint inhibitors (CPIs) are a relatively new class of 'miracle' dugs that have revolutionised the treatment and prognosis of some advanced-stage malignancies, and have increased the survival rates significantly. This class of drugs includes cytotoxic T lymphocyte antigen-4 inhibitors such as ipilimumab; programmed cell death protein-1 inhibitors such as nivolumab, pembrolizumab and avelumab; and programmed cell death protein ligand-1 inhibitors such as atezolizumab. These drugs stimulate the immune system by blocking the coinhibitory receptors on the T cells and lead to antitumoural response. However, a flip side of these novel drugs is immune-related adverse events (irAEs), secondary to immune-mediated process due to disrupted self-tolerance. The irAEs in the gastrointestinal (GI) tract/liver may result in diarrhoea, colitis or hepatitis. An accurate diagnosis of CPI-induced colitis and/or hepatitis is essential for optimal patient management. As we anticipate greater use of these drugs in the future given the significant clinical response, pathologists need to be aware of the spectrum of histological findings that may be encountered in GI and/or liver biopsies received from these patients, as well as differentiate them from its histopathological mimics. This present review discusses the clinical features, detailed histopathological features, management and the differential diagnosis of the luminal GI and hepatic irAEs that may be encountered secondary to CPI therapy. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. MK3 modulation affects BMI1-dependent and independent cell cycle check-points.

    Directory of Open Access Journals (Sweden)

    Peggy Prickaerts

    Full Text Available Although the MK3 gene was originally found deleted in some cancers, it is highly expressed in others. The relevance of MK3 for oncogenesis is currently not clear. We recently reported that MK3 controls ERK activity via a negative feedback mechanism. This prompted us to investigate a potential role for MK3 in cell proliferation. We here show that overexpression of MK3 induces a proliferative arrest in normal diploid human fibroblasts, characterized by enhanced expression of replication stress- and senescence-associated markers. Surprisingly, MK3 depletion evokes similar senescence characteristics in the fibroblast model. We previously identified MK3 as a binding partner of Polycomb Repressive Complex 1 (PRC1 proteins. In the current study we show that MK3 overexpression results in reduced cellular EZH2 levels and concomitant loss of epigenetic H3K27me3-marking and PRC1/chromatin-occupation at the CDKN2A/INK4A locus. In agreement with this, the PRC1 oncoprotein BMI1, but not the PCR2 protein EZH2, bypasses MK3-induced senescence in fibroblasts and suppresses P16INK4A expression. In contrast, BMI1 does not rescue the MK3 loss-of-function phenotype, suggesting the involvement of multiple different checkpoints in gain and loss of MK3 function. Notably, MK3 ablation enhances proliferation in two different cancer cells. Finally, the fibroblast model was used to evaluate the effect of potential tumorigenic MK3 driver-mutations on cell proliferation and M/SAPK signaling imbalance. Taken together, our findings support a role for MK3 in control of proliferation and replicative life-span, in part through concerted action with BMI1, and suggest that the effect of MK3 modulation or mutation on M/SAPK signaling and, ultimately, proliferation, is cell context-dependent.

  12. Differential Immune Microenvironments and Response to Immune Checkpoint Blockade among Molecular Subtypes of Murine Medulloblastoma.

    Science.gov (United States)

    Pham, Christina D; Flores, Catherine; Yang, Changlin; Pinheiro, Elaine M; Yearley, Jennifer H; Sayour, Elias J; Pei, Yanxin; Moore, Colin; McLendon, Roger E; Huang, Jianping; Sampson, John H; Wechsler-Reya, Robert; Mitchell, Duane A

    2016-02-01

    Despite significant strides in the identification and characterization of potential therapeutic targets for medulloblastoma, the role of the immune system and its interplay with the tumor microenvironment within these tumors are poorly understood. To address this, we adapted two syngeneic animal models of human Sonic Hedgehog (SHH)-driven and group 3 medulloblastoma for preclinical evaluation in immunocompetent C57BL/6 mice. Multicolor flow cytometric analyses were used to phenotype and characterize immune infiltrating cells within established cerebellar tumors. We observed significantly higher percentages of dendritic cells, infiltrating lymphocytes, myeloid-derived suppressor cells, and tumor-associated macrophages in murine SHH model tumors compared with group 3 tumors. However, murine group 3 tumors had higher percentages of CD8(+) PD-1(+) T cells within the CD3 population. PD-1 blockade conferred superior antitumor efficacy in animals bearing intracranial group 3 tumors compared with SHH group tumors, indicating that immunologic differences within the tumor microenvironment can be leveraged as potential targets to mediate antitumor efficacy. Further analysis of anti-PD-1 monoclonal antibody localization revealed binding to PD-1(+) peripheral T cells, but not tumor infiltrating lymphocytes within the brain tumor microenvironment. Peripheral PD-1 blockade additionally resulted in a marked increase in CD3(+) T cells within the tumor microenvironment. This is the first immunologic characterization of preclinical models of molecular subtypes of medulloblastoma and demonstration that response to immune checkpoint blockade differs across subtype classification. Our findings also suggest that effective anti-PD-1 blockade does not require that systemically administered antibodies penetrate the brain tumor microenvironment. ©2015 American Association for Cancer Research.

  13. DNA damage response and spindle assembly checkpoint function throughout the cell cycle to ensure genomic integrity.

    Directory of Open Access Journals (Sweden)

    Katherine S Lawrence

    2015-04-01

    Full Text Available Errors in replication or segregation lead to DNA damage, mutations, and aneuploidies. Consequently, cells monitor these events and delay progression through the cell cycle so repair precedes division. The DNA damage response (DDR, which monitors DNA integrity, and the spindle assembly checkpoint (SAC, which responds to defects in spindle attachment/tension during metaphase of mitosis and meiosis, are critical for preventing genome instability. Here we show that the DDR and SAC function together throughout the cell cycle to ensure genome integrity in C. elegans germ cells. Metaphase defects result in enrichment of SAC and DDR components to chromatin, and both SAC and DDR are required for metaphase delays. During persistent metaphase arrest following establishment of bi-oriented chromosomes, stability of the metaphase plate is compromised in the absence of DDR kinases ATR or CHK1 or SAC components, MAD1/MAD2, suggesting SAC functions in metaphase beyond its interactions with APC activator CDC20. In response to DNA damage, MAD2 and the histone variant CENPA become enriched at the nuclear periphery in a DDR-dependent manner. Further, depletion of either MAD1 or CENPA results in loss of peripherally associated damaged DNA. In contrast to a SAC-insensitive CDC20 mutant, germ cells deficient for SAC or CENPA cannot efficiently repair DNA damage, suggesting that SAC mediates DNA repair through CENPA interactions with the nuclear periphery. We also show that replication perturbations result in relocalization of MAD1/MAD2 in human cells, suggesting that the role of SAC in DNA repair is conserved.

  14. Indoor Smartphone Navigation Using a Combination of Wi-Fi and Inertial Navigation with Intelligent Checkpoints

    Science.gov (United States)

    Hofer, H.; Retscher, G.

    2017-09-01

    For Wi-Fi positioning location fingerprinting is one of the most commonly employed localization technique. To achieve an acceptable level of positioning accuracy on the few meter level, i.e., to provide at least room resolution in buildings, such an approach is very labour consuming as it requires a high density of reference points. Thus, the novel approach developed aims at a significant reduction of workload for the training phase. The basic idea is to intelligently choose waypoints along possible users' trajectories in the indoor environment. These waypoints are termed intelligent checkpoints (iCPs) and serve as reference points for the fingerprinting localization approach. They are selected along the trajectories in such a way that they define a logical sequence with their ascending order. Thereby, the iCPs are located, for instance, at doors at entrances to buildings, rooms, along corridors, etc., or in low density along the trajectory to provide a suitable absolute user localization. Continuous positioning between these iCPs is obtained with the help of the smartphones' inertial sensors. While walking along a selected trajectory to the destination a dynamic recognition of the iCPs is performed and the drift of the inertial sensors is reduced as the iCP recognition serves as absolute position update. Conducted experiments in a multi-storey office building have shown that positioning accuracy of around 2.0 m are achievable which goes along with a reduction of workload by three quarter using this novel approach. The iCP concept and performance are presented and demonstrated in this paper.

  15. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  16. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  18. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  19. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  20. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  1. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  2. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  3. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  4. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  5. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  6. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  7. The Neurospora crassa UVS-3 epistasis group encodes homologues of the ATR/ATRIP checkpoint control system.

    Science.gov (United States)

    Kazama, Yusuke; Ishii, Chizu; Schroeder, Alice L; Shimada, Hisao; Wakabayashi, Michiyoshi; Inoue, Hirokazu

    2008-02-01

    The mutagen sensitive uvs-3 and mus-9 mutants of Neurospora show mutagen and hydroxyurea sensitivity, mutator effects and duplication instability typical of recombination repair and DNA damage checkpoint defective mutants. To determine the nature of these genes we used cosmids from a genomic library to clone the uvs-3 gene by complementation for MMS sensitivity. Mutation induction by transposon insertion and RIP defined the coding sequence. RFLP analysis confirmed that this sequence maps in the area of uvs-3 at the left telomere of LG IV. Analysis of the cDNA showed that the UVS-3 protein contains an ORF of 969 amino acids with one intron. It is homologous to UvsD of Aspergillus nidulans, a member of the ATRIP family of checkpoint proteins. It retains the N' terminal coiled-coil motif followed by four basic amino acids typical of these proteins and shows the highest homology in this region. The uvsD cDNA partially complements the defects of the uvs-3 mutation. The uvs-3 mutant shows a higher level of micronuclei in conidia and failure to halt germination and nuclear division in the presence of hydroxyurea than wild type, suggesting checkpoint defects. ATRIP proteins bind tightly to ATR PI-3 kinase (phosphatidylinositol 3-kinase) proteins. Therefore, we searched the Neurospora genome sequence for homologues of the Aspergillus nidulans ATR, UvsB. A uvsB homologous sequence was present in the right arm of chromosome I where the mus-9 gene maps. A cosmid containing this genomic DNA complemented the mus-9 mutation. The putative MUS-9 protein is 2484 amino acids long with eight introns. Homology is especially high in the C-terminal 350 amino acids that correspond to the PI-3 kinase domain. In wild type a low level of constitutive mRNA is present for both genes. It is transiently induced upon UV exposure.

  8. Vaccination targeting human HER3 alters the phenotype of infiltrating T cells and responses to immune checkpoint inhibition.

    Science.gov (United States)

    Osada, Takuya; Morse, Michael A; Hobeika, Amy; Diniz, Marcio A; Gwin, William R; Hartman, Zachary; Wei, Junping; Guo, Hongtao; Yang, Xiao-Yi; Liu, Cong-Xiao; Kaneko, Kensuke; Broadwater, Gloria; Lyerly, H Kim

    2017-01-01

    Expression of human epidermal growth factor family member 3 (HER3), a critical heterodimerization partner with EGFR and HER2, promotes more aggressive biology in breast and other epithelial malignancies. As such, inhibiting HER3 could have broad applicability to the treatment of EGFR- and HER2-driven tumors. Although lack of a functional kinase domain limits the use of receptor tyrosine kinase inhibitors, HER3 contains antigenic targets for T cells and antibodies. Using novel human HER3 transgenic mouse models of breast cancer, we demonstrate that immunization with recombinant adenoviral vectors encoding full length human HER3 (Ad-HER3-FL) induces HER3-specific T cells and antibodies, alters the T cell infiltrate in tumors, and influences responses to immune checkpoint inhibitions. Both preventative and therapeutic Ad-HER3-FL immunization delayed tumor growth but were associated with both intratumoral PD-1 expressing CD8 + T cells and regulatory CD4 + T cell infiltrates. Immune checkpoint inhibition with either anti-PD-1 or anti-PD-L1 antibodies increased intratumoral CD8 + T cell infiltration and eliminated tumor following preventive vaccination with Ad-HER3-FL vaccine. The combination of dual PD-1/PD-L1 and CTLA4 blockade slowed the growth of tumor in response to Ad-HER3-FL in the therapeutic model. We conclude that HER3-targeting vaccines activate HER3-specific T cells and induce anti-HER3 specific antibodies, which alters the intratumoral T cell infiltrate and responses to immune checkpoint inhibition.

  9. Pch2 acts through Xrs2 and Tel1/ATM to modulate interhomolog bias and checkpoint function during meiosis.

    Directory of Open Access Journals (Sweden)

    Hsuan-Chung Ho

    2011-11-01

    Full Text Available Proper segregation of chromosomes during meiosis requires the formation and repair of double-strand breaks (DSBs to form crossovers. Repair is biased toward using the homolog as a substrate rather than the sister chromatid. Pch2 is a conserved member of the AAA(+-ATPase family of proteins and is implicated in a wide range of meiosis-specific processes including the recombination checkpoint, maturation of the chromosome axis, crossover control, and synapsis. We demonstrate a role for Pch2 in promoting and regulating interhomolog bias and the meiotic recombination checkpoint in response to unprocessed DSBs through the activation of axial proteins Hop1 and Mek1 in budding yeast. We show that Pch2 physically interacts with the putative BRCT repeats in the N-terminal region of Xrs2, a member of the MRX complex that acts at sites of unprocessed DSBs. Pch2, Xrs2, and the ATM ortholog Tel1 function in the same pathway leading to the phosphorylation of Hop1, independent of Rad17 and the ATR ortholog Mec1, which respond to the presence of single-stranded DNA. An N-terminal deletion of Xrs2 recapitulates the pch2Δ phenotypes for signaling unresected breaks. We propose that interaction with Xrs2 may enable Pch2 to remodel chromosome structure adjacent to the site of a DSB and thereby promote accessibility of Hop1 to the Tel1 kinase. In addition, Xrs2, like Pch2, is required for checkpoint-mediated delay conferred by the failure to synapse chromosomes.

  10. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  11. Immune Checkpoint Molecules on Tumor-Infiltrating Lymphocytes and Their Association with Tertiary Lymphoid Structures in Human Breast Cancer

    Directory of Open Access Journals (Sweden)

    Cinzia Solinas

    2017-10-01

    Full Text Available There is an exponentially growing interest in targeting immune checkpoint molecules in breast cancer (BC, particularly in the triple-negative subtype where unmet treatment needs remain. This study was designed to analyze the expression, localization, and prognostic role of PD-1, PD-L1, PD-L2, CTLA-4, LAG3, and TIM3 in primary BC. Gene expression analysis using the METABRIC microarray dataset found that all six immune checkpoint molecules are highly expressed in basal-like and HER2-enriched compared to the other BC molecular subtypes. Flow cytometric analysis of fresh tissue homogenates from untreated primary tumors show that PD-1 is principally expressed on CD4+ or CD8+ T cells and CTLA-4 is expressed on CD4+ T cells. The global proportion of PD-L1+, PD-L2+, LAG3+, and TIM3+ tumor-infiltrating lymphocytes (TIL was low and detectable in only a small number of tumors. Immunohistochemically staining fixed tissues from the same tumors was employed to score TIL and tertiary lymphoid structures (TLS. PD-L1+, PD-L2+, LAG3+, and TIM3+ cells were detected in some TLS in a pattern that resembles secondary lymphoid organs. This observation suggests that TLS are important sites of immune activation and regulation, particularly in tumors with extensive baseline immune infiltration. Significantly improved overall survival was correlated with PD-1 expression in the HER2-enriched and PD-L1 or CTLA-4 expression in basal-like BC. PD-1 and CTLA-4 proteins were most frequently detected on TIL, which supports the correlations observed between their gene expression and improved long-term outcome in basal-like and HER2-enriched BC. PD-L1 expression by tumor or immune cells is uncommon in BC. Overall, the data presented here distinguish PD-1 as a marker of T cell activity in both the T and B cell areas of BC associated TLS. We found that immune checkpoint molecule expression parallels the extent of TIL and TLS, although there is a noteworthy amount of heterogeneity

  12. Aurora-B Mediated ATM Serine 1403 Phosphorylation Is Required For Mitotic ATM Activation and the Spindle Checkpoint

    OpenAIRE

    Yang, Chunying; Tang, Xi; Guo, Xiaojing; Niikura, Yohei; Kitagawa, Katsumi; Cui, Kemi; Wong, Stephen T.C.; Fu, Li; Xu, Bo

    2011-01-01

    The ATM kinase plays a critical role in the maintenance of genetic stability. ATM is activated in response to DNA damage and is essential for cell cycle checkpoints. Here, we report that ATM is activated in mitosis in the absence of DNA damage. We demonstrate that mitotic ATM activation is dependent on the Aurora-B kinase and that Aurora-B phosphorylates ATM on serine 1403. This phosphorylation event is required for mitotic ATM activation. Further, we show that loss of ATM function results in...

  13. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  14. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  15. Securing the Chernobyl exclusion zone against illegal movement of radioactive materials

    International Nuclear Information System (INIS)

    Bondarenko, O. O.; Proskura, M. I.; Duftschmid, K. E.; Kravchencko, N. E.

    2004-01-01

    . Within the framework of the IAEA Nuclear Security Program the technical cooperation project S trengthening Security of Nuclear Materials in Ukraine ( UKR/0/008) is aimed primarily to strengthen protection the entrance/exit checkpoints of the Chernobyl exclusion zone and adjacent State borders of Ukraine against illicit movement of radioactive materials (including nuclear materials). The particular situation of the exclusion zone presents a high risk of uncontrolled movement of radioactive materials from and into the exclusion zone. In view of the future construction of the S helter-2 a nd decommissioning of the three closed reactor blocks it is expected that the traffic through the exclusion zone will considerably increase in the next years and those large amounts of possibly contaminated metal scrap, construction material and equipment will leave the zone. There is also a risk of illegal movement of radioactive waste into the zone, possibly also through the international border, which could make the zone to an illegal dumping ground for radioactive waste. As practice shows theft of nuclear materials cannot be excluded. The general concept of the project is based on modernization of old and deployment of new vehicle (road and railway) and pedestrian monitoring equipment at all checkpoints of the exclusion zone including road checkpoints, train stations and river ports. A central station of data acquisition and management is to be located in Chernobyl. The equipment to be installed has to meet new technical requirements developed by IAEA. This includes, e.g. sensitivity of gamma and neutron detection, identification of innocent alarms caused by NORM materials or medical radioisotopes, accurate indication of the source position in the vehicle, and remote identification of license plate by advanced video systems. The implementation of the project and deployment of the equipment is expected to start in 2003 and should be completed in 2005. (Author)

  16. The Interaction between Checkpoint Kinase 1 (Chk1) and the Minichromosome Maintenance (MCM) Complex Is Required for DNA Damage-induced Chk1 Phosphorylation*

    Science.gov (United States)

    Han, Xiangzi; Aslanian, Aaron; Fu, Kang; Tsuji, Toshiya; Zhang, Youwei

    2014-01-01

    Chk1 is an essential mediator of the DNA damage response and cell cycle checkpoint. However, how exactly Chk1 transduces the checkpoint signaling is not fully understood. Here we report the identification of the heterohexamic minichromosome maintenance (MCM) complex that interacts with Chk1 by mass spectrometry. The interaction between Chk1 and the MCM complex was reduced by DNA damage treatment. We show that the MCM complex, at least partially, contributes to the chromatin association of Chk1, allowing for immediate phosphorylation of Chk1 by ataxia telangiectasia mutated and Rad3-related (ATR) in the presence of DNA damage. Further, phosphorylation of Chk1 at ATR sites reduces the interaction between Chk1 and the MCM complex, facilitating chromatin release of phosphorylated Chk1, a critical step in the initiation and amplification of cell cycle checkpoint. Together, these data provide novel insights into the activation of Chk1 in response to DNA damage. PMID:25049228

  17. Checkpoint inhibitors in cancer immunotherapy: Cross reactivity of a CTLA-4 antibody and IDO-inhibitor L-1MT in pigs

    DEFF Research Database (Denmark)

    Al-Shatrawi, Zina Adil; Frøsig, Thomas Mørch; Jungersen, Gregers

    a non-specific activation of porcine T cells. This will be further investigated to provide the basis for in vivo studies investigating checkpoint inhibitor blockade in combination with other cancer immunotherapies. Eventually our goal is to establish pigs as an alternative large animal model......Blockade of checkpoint inhibitors has recently shown very convincing results in the treatment of cancer. One key target is CTLA-4, which has been demonstrated to be a potent negative regulator of lymphocyte activation. The treatment with the FDA-approved fully human CTLA-4 monoclonal antibody...... Ipilimumab increases anticancer T-cell reactivity and overall survival of metastatic cancer patients. Indole-amine 2,3-dioxygenase (IDO) is another checkpoint inhibitor which suppresses T-cell immunity by the depletion of tryptophan in the T-cell microenvironment, and also inhibition of IDO by L-1...

  18. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  19. Immune Checkpoint Function of CD85j in CD8 T Cell Differentiation and Aging

    Directory of Open Access Journals (Sweden)

    Claire E. Gustafson

    2017-06-01

    Full Text Available Aging is associated with an increased susceptibility to infection and a failure to control latent viruses thought to be driven, at least in part, by alterations in CD8 T cell function. The aging T cell repertoire is characterized by an accumulation of effector CD8 T cells, many of which express the negative regulatory receptor CD85j. To define the biological significance of CD85j expression on CD8 T cells and to address the question whether presence of CD85j in older individuals is beneficial or detrimental for immune function, we examined the specific attributes of CD8 T cells expressing CD85j as well as the functional role of CD85j in antigen-specific CD8 T cell responses during immune aging. Here, we show that CD85j is mainly expressed by terminally differentiated effector (TEMRAs CD8 T cells, which increase with age, in cytomegalovirus (CMV infection and in males. CD85j+ CMV-specific cells demonstrate clonal expansion. However, TCR diversity is similar between CD85j+ and CD85j− compartments, suggesting that CD85j does not directly impact the repertoire of antigen-specific cells. Further phenotypic and functional analyses revealed that CD85j identifies a specific subset of CMV-responsive CD8 T cells that coexpress a marker of senescence (CD57 but retain polyfunctional cytokine production and expression of cytotoxic mediators. Blocking CD85j binding enhanced proliferation of CMV-specific CD8 T cells upon antigen stimulation but did not alter polyfunctional cytokine production. Taken together, these data demonstrate that CD85j characterizes a population of “senescent,” but not exhausted antigen-specific effector CD8 T cells and indicates that CD85j is an important checkpoint regulator controlling expansion of virus-specific T cells during aging. Inhibition of CD85j activity may be a mechanism to promote stronger CD8 T cell effector responses during immune aging.

  20. Evolution of checkpoint inhibitors for the treatment of metastatic gastric cancers: Current status and future perspectives.

    Science.gov (United States)

    Taieb, Julien; Moehler, Markus; Boku, Narikazu; Ajani, Jaffer A; Yañez Ruiz, Eduardo; Ryu, Min-Hee; Guenther, Silke; Chand, Vikram; Bang, Yung-Jue

    2018-05-01

    Standard treatment options for patients with advanced gastric or gastroesophageal junction cancer (GC/GEJC) are associated with limited efficacy and some toxicity. Recently, immunotherapy with antibodies that inhibit the programmed death 1 (PD-1)/programmed death ligand 1 (PD-L1) interaction has emerged as a new treatment option. This manuscript reviews early-phase and late-phase trials of immunotherapy in advanced GC/GEJC. Searches for studies of immunotherapy in GC/GEJC were performed using PubMed, ClinicalTrials.gov, and abstract databases for select annual congresses. Findings were interpreted based on expert opinion. Monotherapy with anti-PD-1/PD-L1 antibodies, including pembrolizumab, nivolumab, avelumab, durvalumab, and atezolizumab, has shown interesting objective response rates (ORRs; 7-26%) across varying GC/GEJC populations, with ORRs potentially higher in PD-L1 + vs PD-L1 - tumors. Safety profiles compare favorably with chemotherapy, with grade ≥3 treatment-related adverse events occurring in 5-17%. Based on a large phase 2 study, pembrolizumab was approved in the United States for third-line treatment of patients with PD-L1 + GC/GEJC. In a phase 3 trial, third-line or later nivolumab increased overall survival vs placebo in an Asian population, leading to regulatory approval in Japan, although other completed phase 3 trials did not show superiority for pembrolizumab or avelumab monotherapy vs chemotherapy. Other trials in advanced GC/GEJC are assessing various anti-PD-1/PD-L1-based strategies, including administration in first-line and later-line settings and as combination (with chemotherapy or agents targeting other immune checkpoint proteins, eg, CTLA-4, LAG-3, and IDO) or switch-maintenance regimens. Anti-PD-1/PD-L1 antibodies have shown encouraging clinical activity in advanced GC/GEJC. Results from ongoing phase 3 trials are needed to further evaluate the potential roles of these agents within the continuum of care. Copyright

  1. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  2. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  3. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  4. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  5. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  8. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  9. The human papillomavirus type 58 E7 oncoprotein modulates cell cycle regulatory proteins and abrogates cell cycle checkpoints

    International Nuclear Information System (INIS)

    Zhang Weifang; Li Jing; Kanginakudru, Sriramana; Zhao Weiming; Yu Xiuping; Chen, Jason J.

    2010-01-01

    HPV type 58 (HPV-58) is the third most common HPV type in cervical cancer from Eastern Asia, yet little is known about how it promotes carcinogenesis. In this study, we demonstrate that HPV-58 E7 significantly promoted the proliferation and extended the lifespan of primary human keratinocytes (PHKs). HPV-58 E7 abrogated the G1 and the postmitotic checkpoints, although less efficiently than HPV-16 E7. Consistent with these observations, HPV-58 E7 down-regulated the cellular tumor suppressor pRb to a lesser extent than HPV-16 E7. Similar to HPV-16 E7 expressing PHKs, Cdk2 remained active in HPV-58 E7 expressing PHKs despite the presence of elevated levels of p53 and p21. Interestingly, HPV-58 E7 down-regulated p130 more efficiently than HPV-16 E7. Our study demonstrates a correlation between the ability of down-regulating pRb/p130 and abrogating cell cycle checkpoints by HPV-58 E7, which also correlates with the biological risks of cervical cancer progression associated with HPV-58 infection.

  10. Disruption of murine mp29/Syf2/Ntc31 gene results in embryonic lethality with aberrant checkpoint response.

    Directory of Open Access Journals (Sweden)

    Chia-Hsin Chen

    Full Text Available Human p29 is a putative component of spliceosomes, but its role in pre-mRNA is elusive. By siRNA knockdown and stable overexpression, we demonstrated that human p29 is involved in DNA damage response and Fanconi anemia pathway in cultured cells. In this study, we generated p29 knockout mice (mp29(GT/GT using the mp29 gene trap embryonic stem cells to study the role of mp29 in DNA damage response in vivo. Interruption of mp29 at both alleles resulted in embryonic lethality. Embryonic abnormality occurred as early as E6.5 in mp29(GT/GT mice accompanied with decreased mRNA levels of α-tubulin and Chk1. The reduction of α-tubulin and Chk1 mRNAs is likely due to an impaired post-transcriptional event. An aberrant G2/M checkpoint was found in mp29 gene trap embryos when exposed to aphidicolin and UV light. This embryonic lethality was rescued by crossing with mp29 transgenic mice. Additionally, the knockdown of zfp29 in zebrafish resulted in embryonic death at 72 hours of development postfertilization (hpf. A lower level of acetylated α-tubulin was also observed in zfp29 morphants. Together, these results illustrate an indispensable role of mp29 in DNA checkpoint response during embryonic development.

  11. Pemodelan Molekul Turunan p-Metoksi sinnamoil Hidrazida Sebagai Inhibitor Checkpoint Kinase 1 dan Inhibitor Aromatase secara In silico

    Directory of Open Access Journals (Sweden)

    Galih Satrio Putra

    2017-08-01

    Full Text Available The development of anticancer drugs from ethyl p-methoxycinnamate (EPMC derivatives continues to obtain compounds that have high ability of cancer cells apoptosis and minimal side effects. p-Methoxycinnamoyl hydrazide derivate compounds from EPMC structure modification were docked into the ligand-binding pocket of Check point kinase 1 enzymes (2YWP and the aromatase enzyme (3S7S using software Molegro Virtual Docker (MVD Ver.5.5. We compared the Rerank score of native ligand with derivate compounds of p-Methoxycinnamoyl hydrazide. Rerank scores of compounds 4b and 4c (-99.98 Kcal/mol and -99.80 Kcal/mol were lower than the native ligand A42 in inhibiting the enzyme checkpoint kinase 1. Rerank values of p-Methoxycinnamoyl hydrazide derivate compounds were greater than the native ligand EXM in inhibiting the enzyme aromatase. p-Methoxycinnamoyl hydrazide derivate compounds, especially compounds 4b and 4c, had anticancer mechanism by inhibiting the enzyme pathway checkpoint kinase 1 and had not activity in inhibiting the aromatase enzyme.

  12. Mitotic catastrophe occurs in the absence of apoptosis in p53-null cells with a defective G1 checkpoint.

    Directory of Open Access Journals (Sweden)

    Michalis Fragkos

    Full Text Available Cell death occurring during mitosis, or mitotic catastrophe, often takes place in conjunction with apoptosis, but the conditions in which mitotic catastrophe may exhibit features of programmed cell death are still unclear. In the work presented here, we studied mitotic cell death by making use of a UV-inactivated parvovirus (adeno-associated virus; AAV that has been shown to induce a DNA damage response and subsequent death of p53-defective cells in mitosis, without affecting the integrity of the host genome. Osteosarcoma cells (U2OSp53DD that are deficient in p53 and lack the G1 cell cycle checkpoint respond to AAV infection through a transient G2 arrest. We found that the infected U2OSp53DD cells died through mitotic catastrophe with no signs of chromosome condensation or DNA fragmentation. Moreover, cell death was independent of caspases, apoptosis-inducing factor (AIF, autophagy and necroptosis. These findings were confirmed by time-lapse microscopy of cellular morphology following AAV infection. The assays used readily revealed apoptosis in other cell types when it was indeed occurring. Taken together the results indicate that in the absence of the G1 checkpoint, mitotic catastrophe occurs in these p53-null cells predominantly as a result of mechanical disruption induced by centrosome overduplication, and not as a consequence of a suicide signal.

  13. Interactions of checkpoint-genes RAD9, RAD17, RAD24 and RAD53 determining radioresistance of Yeast Saccharomyces Cerevisiae

    International Nuclear Information System (INIS)

    Koltovaya, N.A.; Nikulushkina, Yu.V.; Roshchina, M.P.; Devin, A.B.

    2007-01-01

    The mechanisms of genetic control of progress through the division cell cycle (checkpoint-control) in yeast Saccharomyces cerevisiae have been studied intensively. To investigate the role of checkpoint-genes RAD9, RAD17, RAD24, RAD53 in cell radioresistance we have investigated cell sensitivity of double mutants to γ-ray. Double mutants involving various combinations with rad9Δ show epistatic interactions, i.e. the sensitivity of the double mutants to γ-ray was no greater than that of more sensitive of the two single mutants. This suggests that all these genes govern the same pathway. This group of genes was named RAD9-epistasis group. It is interesting to note that the genes RAD9 and RAD53 have positive effect but RAD17 and RAD24 have negative effect on radiosensitivity of yeast cells. Interactions between mutations may differ depending on the agent γ-ray or UV-light, for example mutations rad9Δ and rad24Δ show additive effect for γ-ray and epistatic effect for UV-light

  14. Cancer immunogenomic approach to neoantigen discovery in a checkpoint blockade responsive murine model of oral cavity squamous cell carcinoma

    Science.gov (United States)

    Zolkind, Paul; Przybylski, Dariusz; Marjanovic, Nemanja; Nguyen, Lan; Lin, Tianxiang; Johanns, Tanner; Alexandrov, Anton; Zhou, Liye; Allen, Clint T.; Miceli, Alexander P.; Schreiber, Robert D.; Artyomov, Maxim; Dunn, Gavin P.; Uppaluri, Ravindra

    2018-01-01

    Head and neck squamous cell carcinomas (HNSCC) are an ideal immunotherapy target due to their high mutation burden and frequent infiltration with lymphocytes. Preclinical models to investigate targeted and combination therapies as well as defining biomarkers to guide treatment represent an important need in the field. Immunogenomics approaches have illuminated the role of mutation-derived tumor neoantigens as potential biomarkers of response to checkpoint blockade as well as representing therapeutic vaccines. Here, we aimed to define a platform for checkpoint and other immunotherapy studies using syngeneic HNSCC cell line models (MOC2 and MOC22), and evaluated the association between mutation burden, predicted neoantigen landscape, infiltrating T cell populations and responsiveness of tumors to anti-PD1 therapy. We defined dramatic hematopoietic cell transcriptomic alterations in the MOC22 anti-PD1 responsive model in both tumor and draining lymph nodes. Using a cancer immunogenomics pipeline and validation with ELISPOT and tetramer analysis, we identified the H-2Kb-restricted ICAM1P315L (mICAM1) as a neoantigen in MOC22. Finally, we demonstrated that mICAM1 vaccination was able to protect against MOC22 tumor development defining mICAM1 as a bona fide neoantigen. Together these data define a pre-clinical HNSCC model system that provides a foundation for future investigations into combination and novel therapeutics. PMID:29423108

  15. NDR1 modulates the UV-induced DNA-damage checkpoint and nucleotide excision repair

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jeong-Min; Choi, Ji Ye [Department of Biological Science, Dong-A University, Busan (Korea, Republic of); Yi, Joo Mi [Research Center, Dongnam Institute of Radiological & Medical Sciences, Busan (Korea, Republic of); Chung, Jin Woong; Leem, Sun-Hee; Koh, Sang Seok [Department of Biological Science, Dong-A University, Busan (Korea, Republic of); Kang, Tae-Hong, E-mail: thkang@dau.ac.kr [Department of Biological Science, Dong-A University, Busan (Korea, Republic of)

    2015-06-05

    Nucleotide excision repair (NER) is the sole mechanism of UV-induced DNA lesion repair in mammals. A single round of NER requires multiple components including seven core NER factors, xeroderma pigmentosum A–G (XPA–XPG), and many auxiliary effector proteins including ATR serine/threonine kinase. The XPA protein helps to verify DNA damage and thus plays a rate-limiting role in NER. Hence, the regulation of XPA is important for the entire NER kinetic. We found that NDR1, a novel XPA-interacting protein, modulates NER by modulating the UV-induced DNA-damage checkpoint. In quiescent cells, NDR1 localized mainly in the cytoplasm. After UV irradiation, NDR1 accumulated in the nucleus. The siRNA knockdown of NDR1 delayed the repair of UV-induced cyclobutane pyrimidine dimers in both normal cells and cancer cells. It did not, however, alter the expression levels or the chromatin association levels of the core NER factors following UV irradiation. Instead, the NDR1-depleted cells displayed reduced activity of ATR for some set of its substrates including CHK1 and p53, suggesting that NDR1 modulates NER indirectly via the ATR pathway. - Highlights: • NDR1 is a novel XPA-interacting protein. • NDR1 accumulates in the nucleus in response to UV irradiation. • NDR1 modulates NER (nucleotide excision repair) by modulating the UV-induced DNA-damage checkpoint response.

  16. Study of the G2/M cell cycle checkpoint in irradiated mammary epithelial cells overexpressing Cul-4A gene

    International Nuclear Information System (INIS)

    Gupta, Anu; Yang, L.-X.; Chen, L.-C.

    2002-01-01

    Purpose: Members of the cullin gene family are known to be involved in cell cycle control. One of the cullin genes, Cul-4A, is amplified and overexpressed in breast cancer cells. This study investigates the effect of Cul-4A overexpression upon G2/M cell cycle checkpoint after DNA damage induced by either ionizing or nonionizing radiation. Methods and Materials: The normal mammary epithelial cell line MCF10A was stably transfected with full-length Cul-4A cDNA. Independent clones of MCF10A cells that overexpress Cul-4A proteins were selected and treated with either 8 Gy of ionizing radiation or 7 J/M 2 of UV radiation. The profile of cell cycle progression and the accumulation of several cell cycle proteins were analyzed. Results: We found that overexpression of Cul-4A in MCF10A cells abrogated the G2/M cell cycle checkpoint in response to DNA damage induced by ionizing irradiation, but not to DNA damage induced by nonionizing radiation. Analysis of cell cycle proteins showed that after ionizing irradiation, p53 accumulated in the mock-transfected MCF10A cells, but not in the Cul-4A transfectants. Conclusion: Our results suggest a role for Cul-4A in tumorigenesis and/or tumor progression, possibly through disruption of cell cycle control

  17. Ermenilerin Kontrol Noktası: İskenderun Limanı Alexandretta Port - Checkpoint For Armenians

    Directory of Open Access Journals (Sweden)

    Naim ÜRKMEZ

    2013-07-01

    Full Text Available The period of Yavuz Sultan Selim and the Ottoman Empire’s entering Alexandretta until the first half of the 19th century had identity of a very small village. Right to the end of the century, the industry revolution’s impact and trading goods’ large amount of transport means gained importance starting especially in the city of Aleppo and then in one of South Anatolia’s natural ports as of the day the preliminary plan came out. After the 1890’s the increase of Armenian activities in Anatolia and the outbreak of revolts in many other places parallel the Ottoman government’s large forces’ involvement to prevent and be able to keep Armenian rebels under control, taking various measures. Abdul Hamid II started under this negative initiative; the Sultan tried to resist in various ways. From these measures in any of the provinces of Aleppo, Mamuretülaziz, Adana, Kayseri, Bitlis, Van, Diyarbekir, or Erzurum, Armenians living in the diaspora and connecting supplier port, as in Alexandretta, have a checkpoint facility. Sultan Abdul Hamid II’s direction of the facility is seen at the checkpoint from the dock outside rising or Anatolia geography’s various residential areas incoming Armenian travelers often reserved monthly lists. In addition to this, England in the grip of Cyprus was able to check Armenians’ entries into Anatolia set by a weapons and bombs training field. It is understood that this matter is elaborated on further in books prepared from lists. These books will come to light with the acceleration of the classification of records. Yavuz Sultan Selim döneminde Osmanlı hâkimiyetine giren İskenderun, 19. yüzyılın ilk yarısına kadar çok küçük bir köy hüviyetinde kalmıştır. Yüzyılın sonuna doğru sanayi devriminin etkisi ve ticari emtianın çokça taşınması vesilesi ile önem kazanmaya başlayan şehir özellikle Halep ve ardı ile Güney Anadolu’nun doğal bir limanı olarak gün geçtikçe ön plana

  18. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  19. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  20. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  1. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  2. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  3. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  4. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  5. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  6. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  7. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  10. Structure of a Blinkin-BUBR1 complex reveals an interaction crucial for kinetochore-mitotic checkpoint regulation via an unanticipated binding Site

    DEFF Research Database (Denmark)

    Bolanos-Garcia, Victor M; Lischetti, Tiziana; Matak-Vinković, Dijana

    2011-01-01

    The maintenance of genomic stability relies on the spindle assembly checkpoint (SAC), which ensures accurate chromosome segregation by delaying the onset of anaphase until all chromosomes are properly bioriented and attached to the mitotic spindle. BUB1 and BUBR1 kinases are central for this proc...

  11. Deficiency of the Arabidopsis helicase RTEL1 triggers a SOG1-dependent replication checkpoint in response to DNA cross-links.

    Science.gov (United States)

    Hu, Zhubing; Cools, Toon; Kalhorzadeh, Pooneh; Heyman, Jefri; De Veylder, Lieven

    2015-01-01

    To maintain genome integrity, DNA replication is executed and regulated by a complex molecular network of numerous proteins, including helicases and cell cycle checkpoint regulators. Through a systematic screening for putative replication mutants, we identified an Arabidopsis thaliana homolog of human Regulator of Telomere Length 1 (RTEL1), which functions in DNA replication, DNA repair, and recombination. RTEL1 deficiency retards plant growth, a phenotype including a prolonged S-phase duration and decreased cell proliferation. Genetic analysis revealed that rtel1 mutant plants show activated cell cycle checkpoints, specific sensitivity to DNA cross-linking agents, and increased homologous recombination, but a lack of progressive shortening of telomeres, indicating that RTEL1 functions have only been partially conserved between mammals and plants. Surprisingly, RTEL1 deficiency induces tolerance to the deoxynucleotide-depleting drug hydroxyurea, which could be mimicked by DNA cross-linking agents. This resistance does not rely on the essential replication checkpoint regulator WEE1 but could be blocked by a mutation in the SOG1 transcription factor. Taken together, our data indicate that RTEL1 is required for DNA replication and that its deficiency activates a SOG1-dependent replication checkpoint. © 2015 American Society of Plant Biologists. All rights reserved.

  12. Roles of nibrin and ATM/ATR kinases on the G2 checkpoint under endogenous or radio-induced DNA damage

    Directory of Open Access Journals (Sweden)

    Katherine Marcelain

    2005-01-01

    Full Text Available Checkpoint response to DNA damage involves the activation of DNA repair and G2 lengthening subpathways. The roles of nibrin (NBS1 and the ATM/ATR kinases in the G2 DNA damage checkpoint, evoked by endogenous and radio-induced DNA damage, were analyzed in control, A-T and NBS lymphoblast cell lines. Short-term responses to G2 treatments were evaluated by recording changes in the yield of chromosomal aberrations in the ensuing mitosis, due to G2 checkpoint adaptation, and also in the duration of G2 itself. The role of ATM/ATR in the G2 checkpoint pathway repairing chromosomal aberrations was unveiled by caffeine inhibition of both kinases in G2. In the control cell lines, nibrin and ATM cooperated to provide optimum G2 repair for endogenous DNA damage. In the A-T cells, ATR kinase substituted successfully for ATM, even though no G2 lengthening occurred. X-ray irradiation (0.4 Gy in G2 increased chromosomal aberrations and lengthened G2, in both mutant and control cells. However, the repair of radio-induced DNA damage took place only in the controls. It was associated with nibrin-ATM interaction, and ATR did not substitute for ATM. The absence of nibrin prevented the repair of both endogenous and radio-induced DNA damage in the NBS cells and partially affected the induction of G2 lengthening.

  13. Alterations of the spindle checkpoint pathway in clinicopathologically aggressive CpG island methylator phenotype clear cell renal cell carcinomas.

    Science.gov (United States)

    Arai, Eri; Gotoh, Masahiro; Tian, Ying; Sakamoto, Hiromi; Ono, Masaya; Matsuda, Akio; Takahashi, Yoriko; Miyata, Sayaka; Totsuka, Hirohiko; Chiku, Suenori; Komiyama, Motokiyo; Fujimoto, Hiroyuki; Matsumoto, Kenji; Yamada, Tesshi; Yoshida, Teruhiko; Kanai, Yae

    2015-12-01

    CpG-island methylator phenotype (CIMP)-positive clear cell renal cell carcinomas (RCCs) are characterized by accumulation of DNA hypermethylation of CpG islands, clinicopathological aggressiveness and poor patient outcome. The aim of this study was to clarify the molecular pathways participating in CIMP-positive renal carcinogenesis. Genome (whole-exome and copy number), transcriptome and proteome (two-dimensional image converted analysis of liquid chromatography-mass spectrometry) analyses were performed using tissue specimens of 87 CIMP-negative and 14 CIMP-positive clear cell RCCs and corresponding specimens of non-cancerous renal cortex. Genes encoding microtubule-associated proteins, such as DNAH2, DNAH5, DNAH10, RP1 and HAUS8, showed a 10% or higher incidence of genetic aberrations (non-synonymous single-nucleotide mutations and insertions/deletions) in CIMP-positive RCCs, whereas CIMP-negative RCCs lacked distinct genetic characteristics. MetaCore pathway analysis of CIMP-positive RCCs revealed that alterations of mRNA or protein expression were significantly accumulated in six pathways, all participating in the spindle checkpoint, including the "The metaphase checkpoint (p = 1.427 × 10(-6))," "Role of Anaphase Promoting Complex in cell cycle regulation (p = 7.444 × 10(-6))" and "Spindle assembly and chromosome separation (p = 9.260 × 10(-6))" pathways. Quantitative RT-PCR analysis revealed that mRNA expression levels for genes included in such pathways, i.e., AURKA, AURKB, BIRC5, BUB1, CDC20, NEK2 and SPC25, were significantly higher in CIMP-positive than in CIMP-negative RCCs. All CIMP-positive RCCs showed overexpression of Aurora kinases, AURKA and AURKB, and this overexpression was mainly attributable to increased copy number. These data suggest that abnormalities of the spindle checkpoint pathway participate in CIMP-positive renal carcinogenesis, and that AURKA and AURKB may be potential therapeutic targets in more aggressive CIMP-positive RCCs.

  14. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  15. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  16. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  17. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  18. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  19. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  20. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  1. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  2. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  3. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  4. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  5. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  6. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  7. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  8. Fission Yeast Apc15 Stabilizes MCC-Cdc20-APC/C Complexes, Ensuring Efficient Cdc20 Ubiquitination and Checkpoint Arrest.

    Science.gov (United States)

    May, Karen M; Paldi, Flora; Hardwick, Kevin G

    2017-04-24

    During mitosis, cells must segregate the replicated copies of their genome to their daughter cells with extremely high fidelity. Segregation errors lead to an abnormal chromosome number (aneuploidy), which typically results in disease or cell death [1]. Chromosome segregation and anaphase onset are initiated through the action of the multi-subunit E3 ubiquitin ligase known as the anaphase-promoting complex or cyclosome (APC/C [2]). The APC/C is inhibited by the spindle checkpoint in the presence of kinetochore attachment defects [3, 4]. Here we demonstrate that two non-essential APC/C subunits (Apc14 and Apc15) regulate association of spindle checkpoint proteins, in the form of the mitotic checkpoint complex (MCC), with the APC/C. apc14Δ mutants display increased MCC association with the APC/C and are unable to silence the checkpoint efficiently. Conversely, apc15Δ mutants display reduced association between the MCC and APC/C, are defective in poly-ubiquitination of Cdc20, and are checkpoint defective. In vitro reconstitution studies have shown that human MCC-APC/C can contain two molecules of Cdc20 [5-7]. Using a yeast strain expressing two Cdc20 genes with different epitope tags, we show by co-immunoprecipitation that this is true in vivo. MCC binding to the second molecule of Cdc20 is mediated via the C-terminal KEN box in Mad3. Somewhat surprisingly, complexes containing both molecules of Cdc20 accumulate in apc15Δ cells, and the implications of this observation are discussed. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  9. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  10. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  11. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  12. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  13. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  14. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  15. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  16. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  17. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  18. Modulation of dendritic cell and T cell cross-talk during aging: The potential role of checkpoint inhibitory molecules.

    Science.gov (United States)

    Gardner, Joanne K; Mamotte, Cyril D S; Jackaman, Connie; Nelson, Delia J

    2017-09-01

    Dendritic cells (DCs) undergo continuous changes throughout life, and there is evidence that elderly DCs have a reduced capacity to stimulate T cells, which may contribute to impaired anti-tumour immune responses in elderly people with cancer. Changes in checkpoint inhibitory molecules/pathways during aging may be one mechanism that impairs the ability of elderly DCs to activate T cells. However, little is currently known regarding the combined effects of aging and cancer on DC and T cell inhibitory molecules/pathways. In this review, we discuss our current understanding of the influence of aging and cancer on key DC and T cell inhibitory molecules/pathways, the potential underlying cellular and molecular mechanisms contributing to their modulation, and the possibility of therapeutically targeting inhibitory molecules in elderly cancer patients. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. RPA mediates recombination repair during replication stress and is displaced from DNA by checkpoint signalling in human cells

    DEFF Research Database (Denmark)

    Sleeth, Kate M; Sørensen, Claus Storgaard; Issaeva, Natalia

    2007-01-01

    The replication protein A (RPA) is involved in most, if not all, nuclear metabolism involving single-stranded DNA. Here, we show that RPA is involved in genome maintenance at stalled replication forks by the homologous recombination repair system in humans. Depletion of the RPA protein inhibited...... the formation of RAD51 nuclear foci after hydroxyurea-induced replication stalling leading to persistent unrepaired DNA double-strand breaks (DSBs). We demonstrate a direct role of RPA in homology directed recombination repair. We find that RPA is dispensable for checkpoint kinase 1 (Chk1) activation...... and that RPA directly binds RAD52 upon replication stress, suggesting a direct role in recombination repair. In addition we show that inhibition of Chk1 with UCN-01 decreases dissociation of RPA from the chromatin and inhibits association of RAD51 and RAD52 with DNA. Altogether, our data suggest a direct role...

  20. Human papillomavirus type 16 E7 oncoprotein engages but does not abrogate the mitotic spindle assembly checkpoint

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Yueyang [Division of Infectious Diseases, Brigham and Women' s Hospital and Biological and Biomedical Sciences Program, Harvard Medical School, Boston, MA 02115 (United States); Munger, Karl, E-mail: kmunger@rics.bwh.harvard.edu [Division of Infectious Diseases, Brigham and Women' s Hospital and Biological and Biomedical Sciences Program, Harvard Medical School, Boston, MA 02115 (United States)

    2012-10-10

    The mitotic spindle assembly checkpoint (SAC) ensures faithful chromosome segregation during mitosis by censoring kinetochore-microtubule interactions. It is frequently rendered dysfunctional during carcinogenesis causing chromosome missegregation and genomic instability. There are conflicting reports whether the HPV16 E7 oncoprotein drives chromosomal instability by abolishing the SAC. Here we report that degradation of mitotic cyclins is impaired in cells with HPV16 E7 expression. RNAi-mediated depletion of Mad2 or BubR1 indicated the involvement of the SAC, suggesting that HPV16 E7 expression causes sustained SAC engagement. Mutational analyses revealed that HPV16 E7 sequences that are necessary for retinoblastoma tumor suppressor protein binding as well as sequences previously implicated in binding the nuclear and mitotic apparatus (NuMA) protein and in delocalizing dynein from the mitotic spindle contribute to SAC engagement. Importantly, however, HPV16 E7 does not markedly compromise the SAC response to microtubule poisons.

  1. Requirement of Sequences outside the Conserved Kinase Domain of Fission Yeast Rad3p for Checkpoint Control

    Science.gov (United States)

    Chapman, Carolyn Riley; Evans, Sarah Tyler; Carr, Antony M.; Enoch, Tamar

    1999-01-01

    The fission yeast Rad3p checkpoint protein is a member of the phosphatidylinositol 3-kinase-related family of protein kinases, which includes human ATMp. Mutation of the ATM gene is responsible for the disease ataxia-telangiectasia. The kinase domain of Rad3p has previously been shown to be essential for function. Here, we show that although this domain is necessary, it is not sufficient, because the isolated kinase domain does not have kinase activity in vitro and cannot complement a rad3 deletion strain. Using dominant negative alleles of rad3, we have identified two sites N-terminal to the conserved kinase domain that are essential for Rad3p function. One of these sites is the putative leucine zipper, which is conserved in other phosphatidylinositol 3-kinase-related family members. The other is a novel motif, which may also mediate Rad3p protein–protein interactions. PMID:10512862

  2. Cell-cycle dependent expression of a translocation-mediated fusion oncogene mediates checkpoint adaptation in rhabdomyosarcoma.

    Directory of Open Access Journals (Sweden)

    Ken Kikuchi

    2014-01-01

    Full Text Available Rhabdomyosarcoma is the most commonly occurring soft-tissue sarcoma in childhood. Most rhabdomyosarcoma falls into one of two biologically distinct subgroups represented by alveolar or embryonal histology. The alveolar subtype harbors a translocation-mediated PAX3:FOXO1A fusion gene and has an extremely poor prognosis. However, tumor cells have heterogeneous expression for the fusion gene. Using a conditional genetic mouse model as well as human tumor cell lines, we show that that Pax3:Foxo1a expression is enriched in G2 and triggers a transcriptional program conducive to checkpoint adaptation under stress conditions such as irradiation in vitro and in vivo. Pax3:Foxo1a also tolerizes tumor cells to clinically-established chemotherapy agents and emerging molecularly-targeted agents. Thus, the surprisingly dynamic regulation of the Pax3:Foxo1a locus is a paradigm that has important implications for the way in which oncogenes are modeled in cancer cells.

  3. Leveraging the checkpoint-restart technique for optimizing CPU efficiency of ATLAS production applications on opportunistic platforms

    CERN Document Server

    Cameron, David; The ATLAS collaboration

    2017-01-01

    Data processing applications of the ATLAS experiment, such as event simulation and reconstruction, spend considerable amount of time in the initialization phase. This phase includes loading a large number of shared libraries, reading detector geometry and condition data from external databases, building a transient representation of the detector geometry and initializing various algorithms and services. In some cases the initialization step can take as long as 10-15 minutes. Such slow initialization, being inherently serial, has a significant negative impact on overall CPU efficiency of the production job, especially when the job is executed on opportunistic, often short-lived, resources such as commercial clouds or volunteer computing. In order to improve this situation, we can take advantage of the fact that ATLAS runs large numbers of production jobs with similar configuration parameters (e.g. jobs within the same production task). This allows us to checkpoint one job at the end of its configuration step a...

  4. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  5. Phenotypic characterization of autoreactive B cells--checkpoints of B cell tolerance in patients with systemic lupus erythematosus.

    Directory of Open Access Journals (Sweden)

    Annett M Jacobi

    Full Text Available DNA-reactive B cells play a central role in systemic lupus erythematosus (SLE; DNA antibodies precede clinical disease and in established disease correlate with renal inflammation and contribute to dendritic cell activation and high levels of type 1 interferon. A number of central and peripheral B cell tolerance mechanisms designed to control the survival, differentiation and activation of autoreactive B cells are thought to be disturbed in patients with SLE. The characterization of DNA-reactive B cells has, however, been limited by their low frequency in peripheral blood. Using a tetrameric configuration of a peptide mimetope of DNA bound by pathogenic anti-DNA antibodies, we can identify B cells producing potentially pathogenic DNA-reactive antibodies. We, therefore, characterized the maturation and differentiation states of peptide, (ds double stranded DNA cross-reactive B cells in the peripheral blood of lupus patients and correlated these with clinical disease activity. Flow cytometric analysis demonstrated a significantly higher frequency of tetramer-binding B cells in SLE patients compared to healthy controls. We demonstrated the existence of a novel tolerance checkpoint at the transition of antigen-naïve to antigen-experienced. We further demonstrate that patients with moderately active disease have more autoreactive B cells in both the antigen-naïve and antigen-experienced compartments consistent with greater impairment in B cell tolerance in both early and late checkpoints in these patients than in patients with quiescent disease. This methodology enables us to gain insight into the development and fate of DNA-reactive B cells in individual patients with SLE and paves the way ultimately to permit better and more customized therapies.

  6. DW-MRI as a Predictive Biomarker of Radiosensitization of GBM through Targeted Inhibition of Checkpoint Kinases.

    Science.gov (United States)

    Williams, Terence M; Galbán, Stefanie; Li, Fei; Heist, Kevin A; Galbán, Craig J; Lawrence, Theodore S; Holland, Eric C; Thomae, Tami L; Chenevert, Thomas L; Rehemtulla, Alnawaz; Ross, Brian D

    2013-04-01

    The inherent treatment resistance of glioblastoma (GBM) can involve multiple mechanisms including checkpoint kinase (Chk1/2)-mediated increased DNA repair capability, which can attenuate the effects of genotoxic chemotherapies and radiation. The goal of this study was to evaluate diffusion-weighted magnetic resonance imaging (DW-MRI) as a biomarker for Chk1/2 inhibitors in combination with radiation for enhancement of treatment efficacy in GBM. We evaluated a specific small molecule inhibitor of Chk1/2, AZD7762, in combination with radiation using in vitro human cell lines and in vivo using a genetically engineered GBM mouse model. DW-MRI and T1-contrast MRI were used to follow treatment effects on intracranial tumor cellularity and growth rates, respectively. AZD7762 inhibited clonal proliferation in a panel of GBM cell lines and increased radiosensitivity in p53-mutated GBM cell lines to a greater extent compared to p53 wild-type cells. In vivo efficacy of AZD7762 demonstrated a dose-dependent inhibitory effect on GBM tumor growth rate and a reduction in tumor cellularity based on DW-MRI scans along with enhancement of radiation efficacy. DW-MRI was found to be a useful imaging biomarker for the detection of radiosensitization through inhibition of checkpoint kinases. Chk1/2 inhibition resulted in antiproliferative activity, prevention of DNA damage-induced repair, and radiosensitization in preclinical GBM tumor models, both in vitro and in vivo. The effects were found to be maximal in p53-mutated GBM cells. These results provide the rationale for integration of DW-MRI in clinical translation of Chk1/2 inhibition with radiation for the treatment of GBM.

  7. Spindle assembly checkpoint protein expression correlates with cellular proliferation and shorter time to recurrence in ovarian cancer.

    LENUS (Irish Health Repository)

    McGrogan, Barbara

    2014-07-01

    Ovarian carcinoma (OC) is the most lethal of the gynecological malignancies, often presenting at an advanced stage. Treatment is hampered by high levels of drug resistance. The taxanes are microtubule stabilizing agents, used as first-line agents in the treatment of OC that exert their apoptotic effects through the spindle assembly checkpoint. BUB1-related protein kinase (BUBR1) and mitotic arrest deficient 2 (MAD2), essential spindle assembly checkpoint components, play a key role in response to taxanes. BUBR1, MAD2, and Ki-67 were assessed on an OC tissue microarray platform representing 72 OC tumors of varying histologic subtypes. Sixty-one of these patients received paclitaxel and platinum agents combined; 11 received platinum alone. Overall survival was available for all 72 patients, whereas recurrence-free survival (RFS) was available for 66 patients. Increased BUBR1 expression was seen in serous carcinomas, compared with other histologies (P = .03). Increased BUBR1 was significantly associated with tumors of advanced stage (P = .05). Increased MAD2 and BUBR1 expression also correlated with increased cellular proliferation (P < .0002 and P = .02, respectively). Reduced MAD2 nuclear intensity was associated with a shorter RFS (P = .03), in ovarian tumors of differing histologic subtype (n = 66). In this subgroup, for those women who received paclitaxel and platinum agents combined (n = 57), reduced MAD2 intensity also identified women with a shorter RFS (P < .007). For the entire cohort of patients, irrespective of histologic subtype or treatment, MAD2 nuclear intensity retained independent significance in a multivariate model, with tumors showing reduced nuclear MAD2 intensity identifying patients with a poorer RFS (P = .05).

  8. Upregulated ATM gene expression and activated DNA crosslink-induced damage response checkpoint in Fanconi anemia: implications for carcinogenesis.

    Science.gov (United States)

    Yamamoto, Kazuhiko; Nihrane, Abdallah; Aglipay, Jason; Sironi, Juan; Arkin, Steven; Lipton, Jeffrey M; Ouchi, Toru; Liu, Johnson M

    2008-01-01

    Fanconi anemia (FA) predisposes to hematopoietic failure, birth defects, leukemia, and squamous cell carcinoma of the head and neck (HNSCC) and cervix. The FA/BRCA pathway includes 8 members of a core complex and 5 downstream gene products closely linked with BRCA1 or BRCA2. Precancerous lesions are believed to trigger the DNA damage response (DDR), and we focused on the DDR in FA and its putative role as a checkpoint barrier to cancer. In primary fibroblasts with mutations in the core complex FANCA protein, we discovered that basal expression and phosphorylation of ATM (ataxia telangiectasia mutated) and p53 induced by irradiation (IR) or mitomycin C (MMC) were upregulated. This heightened response appeared to be due to increased basal levels of ATM in cultured FANCA-mutant cells, highlighting the new observation that ATM can be regulated at the transcriptional level in addition to its well-established activation by autophosphorylation. Functional analysis of this response using gamma-H2AX foci as markers of DNA double-stranded breaks (DSBs) demonstrated abnormal persistence of only MMC- and not IR-induced foci. Thus, we describe a processing defect that leads to general DDR upregulation but specific persistence of DNA crosslinker-induced damage response foci. Underscoring the significance of these findings, we found resistance to DNA crosslinker-induced cell cycle arrest and apoptosis in a TP53-mutant, patient-derived HNSCC cell line, whereas a lymphoblastoid cell line derived from this same individual was not mutated at TP53 and retained DNA crosslinker sensitivity. Our results suggest that cancer in FA may arise from selection for cells that escape from a chronically activated DDR checkpoint.

  9. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  11. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  12. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  13. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  14. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  15. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  17. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  18. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  19. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  20. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  1. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  2. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  3. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  5. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  6. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  7. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  8. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  9. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  10. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  11. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  12. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  13. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  14. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  15. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  16. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  17. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  18. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  19. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  20. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  1. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  2. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  3. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  4. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  5. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  6. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  7. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  8. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  9. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  10. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  11. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  12. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  13. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  14. A case of pembrolizumab-induced type-1 diabetes mellitus and discussion of immune checkpoint inhibitor-induced type 1 diabetes.

    Science.gov (United States)

    Chae, Young Kwang; Chiec, Lauren; Mohindra, Nisha; Gentzler, Ryan; Patel, Jyoti; Giles, Francis

    2017-01-01

    Immune checkpoint inhibitors such as pembrolizumab, ipilimumab, and nivolumab, now FDA-approved for use in treating several types of cancer, have been associated with immune-related adverse effects. Specifically, the antibodies targeting the programmed-cell death-1 immune checkpoint, pembrolizumab and nivolumab, have been rarely reported to induce the development of type 1 diabetes mellitus. Here we describe a case of a patient who developed antibody-positive type 1 diabetes mellitus following treatment with pembrolizumab in combination with systemic chemotherapy for metastatic adenocarcinoma of the lung. We will also provide a brief literature review of other rarely reported cases of type 1 diabetes presenting after treatment with pembrolizumab and nivolumab, as well as discussion regarding potential mechanisms of this adverse effect and its importance as these drugs continue to become even more widespread.

  15. Incorporation of Immune Checkpoint Blockade into Chimeric Antigen Receptor T Cells (CAR-Ts): Combination or Built-In CAR-T.

    Science.gov (United States)

    Yoon, Dok Hyun; Osborn, Mark J; Tolar, Jakub; Kim, Chong Jai

    2018-01-24

    Chimeric antigen receptor (CAR) T cell therapy represents the first U.S. Food and Drug Administration approved gene therapy and these engineered cells function with unprecedented efficacy in the treatment of refractory CD19 positive hematologic malignancies. CAR translation to solid tumors is also being actively investigated; however, efficacy to date has been variable due to tumor-evolved mechanisms that inhibit local immune cell activity. To bolster the potency of CAR-T cells, modulation of the immunosuppressive tumor microenvironment with immune-checkpoint blockade is a promising strategy. The impact of this approach on hematological malignancies is in its infancy, and in this review we discuss CAR-T cells and their synergy with immune-checkpoint blockade.

  16. Checkpoint-based forward recovery using lookahead execution and rollback validation in parallel and distributed systems. Ph.D. Thesis, 1992

    Science.gov (United States)

    Long, Junsheng

    1994-01-01

    This thesis studies a forward recovery strategy using checkpointing and optimistic execution in parallel and distributed systems. The approach uses replicated tasks executing on different processors for forwared recovery and checkpoint comparison for error detection. To reduce overall redundancy, this approach employs a lower static redundancy in the common error-free situation to detect error than the standard N Module Redundancy scheme (NMR) does to mask off errors. For the rare occurrence of an error, this approach uses some extra redundancy for recovery. To reduce the run-time recovery overhead, look-ahead processes are used to advance computation speculatively and a rollback process is used to produce a diagnosis for correct look-ahead processes without rollback of the whole system. Both analytical and experimental evaluation have shown that this strategy can provide a nearly error-free execution time even under faults with a lower average redundancy than NMR.

  17. Fission yeast strains with circular chromosomes require the 9-1-1 checkpoint complex for the viability in response to the anti-cancer drug 5-fluorodeoxyuridine.

    Directory of Open Access Journals (Sweden)

    Hossain Mohammad Shamim

    Full Text Available Thymidine kinase converts 5-fluorodeoxyuridine to 5-fluorodeoxyuridine monophosphate, which causes disruption of deoxynucleotide triphosphate ratios. The fission yeast Schizosaccharomyces pombe does not express endogenous thymidine kinase but 5-fluorodeoxyuridine inhibits growth when exogenous thymidine kinase is expressed. Unexpectedly, we found that 5-fluorodeoxyuridine causes S phase arrest even without thymidine kinase expression. DNA damage checkpoint proteins such as the 9-1-1 complex were required for viability in the presence of 5-fluorodeoxyuridine. We also found that strains with circular chromosomes, due to loss of pot1+, which have higher levels of replication stress, were more sensitive to loss of the 9-1-1 complex in the presence of 5-fluorodeoxyuridine. Thus, our results suggest that strains carrying circular chromosomes exhibit a greater dependence on DNA damage checkpoints to ensure viability in the presence of 5-fluorodeoxyuridine compared to stains that have linear chromosomes.

  18. Fission yeast strains with circular chromosomes require the 9-1-1 checkpoint complex for the viability in response to the anti-cancer drug 5-fluorodeoxyuridine.

    Science.gov (United States)

    Shamim, Hossain Mohammad; Minami, Yukako; Tanaka, Daiki; Ukimori, Shinobu; Murray, Johanne M; Ueno, Masaru

    2017-01-01

    Thymidine kinase converts 5-fluorodeoxyuridine to 5-fluorodeoxyuridine monophosphate, which causes disruption of deoxynucleotide triphosphate ratios. The fission yeast Schizosaccharomyces pombe does not express endogenous thymidine kinase but 5-fluorodeoxyuridine inhibits growth when exogenous thymidine kinase is expressed. Unexpectedly, we found that 5-fluorodeoxyuridine causes S phase arrest even without thymidine kinase expression. DNA damage checkpoint proteins such as the 9-1-1 complex were required for viability in the presence of 5-fluorodeoxyuridine. We also found that strains with circular chromosomes, due to loss of pot1+, which have higher levels of replication stress, were more sensitive to loss of the 9-1-1 complex in the presence of 5-fluorodeoxyuridine. Thus, our results suggest that strains carrying circular chromosomes exhibit a greater dependence on DNA damage checkpoints to ensure viability in the presence of 5-fluorodeoxyuridine compared to stains that have linear chromosomes.

  19. Incorporation of Immune Checkpoint Blockade into Chimeric Antigen Receptor T Cells (CAR-Ts: Combination or Built-In CAR-T

    Directory of Open Access Journals (Sweden)

    Dok Hyun Yoon

    2018-01-01

    Full Text Available Chimeric antigen receptor (CAR T cell therapy represents the first U.S. Food and Drug Administration approved gene therapy and these engineered cells function with unprecedented efficacy in the treatment of refractory CD19 positive hematologic malignancies. CAR translation to solid tumors is also being actively investigated; however, efficacy to date has been variable due to tumor-evolved mechanisms that inhibit local immune cell activity. To bolster the potency of CAR-T cells, modulation of the immunosuppressive tumor microenvironment with immune-checkpoint blockade is a promising strategy. The impact of this approach on hematological malignancies is in its infancy, and in this review we discuss CAR-T cells and their synergy with immune-checkpoint blockade.

  20. Leptin Regulation of Gonadotrope Gonadotropin-Releasing Hormone Receptors As a Metabolic Checkpoint and Gateway to Reproductive Competence

    Directory of Open Access Journals (Sweden)

    Angela K. Odle

    2018-01-01

    Full Text Available The adipokine leptin signals the body’s nutritional status to the brain, and particularly, the hypothalamus. However, leptin receptors (LEPRs can be found all throughout the body and brain, including the pituitary. It is known that leptin is permissive for reproduction, and mice that cannot produce leptin (Lep/Lep are infertile. Many studies have pinpointed leptin’s regulation of reproduction to the hypothalamus. However, LEPRs exist at all levels of the hypothalamic–pituitary–gonadal axis. We have previously shown that deleting the signaling portion of the LEPR specifically in gonadotropes impairs fertility in female mice. Our recent studies have targeted this regulation to the control of gonadotropin releasing hormone receptor (GnRHR expression. The hypotheses presented here are twofold: (1 cyclic regulation of pituitary GnRHR levels sets up a target metabolic checkpoint for control of the reproductive axis and (2 multiple checkpoints are required for the metabolic signaling that regulates the reproductive axis. Here, we emphasize and explore the relationship between the hypothalamus and the pituitary with regard to the regulation of GnRHR. The original data we present strengthen these hypotheses and build on our previous studies. We show that we can cause infertility in 70% of female mice by deleting all isoforms of LEPR specifically in gonadotropes. Our findings implicate activin subunit (InhBa mRNA as a potential leptin target in gonadotropes. We further show gonadotrope-specific upregulation of GnRHR protein (but not mRNA levels following leptin stimulation. In order to try and understand this post-transcriptional regulation, we tested candidate miRNAs (identified with in silico analysis that may be binding the Gnrhr mRNA. We show significant upregulation of one of these miRNAs in our gonadotrope-Lepr-null females. The evidence provided here, combined with our previous work, lay the foundation for metabolically regulated post

  1. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  2. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  3. A Phase 1 Trial of an Immune Checkpoint Inhibitor plus Stereotactic Ablative Radiotherapy in Patients with Inoperable Stage I Non-Small Cell Lung Cancer

    Science.gov (United States)

    2017-10-01

    with Inoperable Stage I Non-Small Cell Lung Cancer PRINCIPAL INVESTIGATOR: Karen Kelly, MD CONTRACTING ORGANIZATION: University of California...Inhibitor plus Stereotactic Ablative Radiotherapy in Patients with Inoperable Stage I Non-Small Cell Lung Cancer 5b. GRANT NUMBER W81XWH-15-2-0063...immune checkpoint inhibitor MPDL3280A (atezolizumab) in early stage inoperable non-small cell lung cancer . The trial is comprised of a traditional 3 + 3

  4. A Novel Antagonist of the Immune Checkpoint Protein Adenosine A2a Receptor Restores Tumor-Infiltrating Lymphocyte Activity in the Context of the Tumor Microenvironment

    Directory of Open Access Journals (Sweden)

    Melanie Mediavilla-Varela

    2017-07-01

    Full Text Available BACKGROUND: Therapeutic strategies targeting immune checkpoint proteins have led to significant responses in patients with various tumor types. The success of these studies has led to the development of various antibodies/inhibitors for the different checkpoint proteins involved in immune evasion of the tumor. Adenosine present in high concentrations in the tumor microenvironment activates the immune checkpoint adenosine A2a receptor (A2aR, leading to the suppression of antitumor responses. Inhibition of this checkpoint has the potential to enhance antitumor T-cell responsiveness. METHODS: We developed a novel A2aR antagonist (PBF-509 and tested its antitumor response in vitro, in a mouse model, and in non-small cell lung cancer patient samples. RESULTS: Our studies showed that PBF-509 is highly specific to the A2aR as well as inhibitory of A2aR function in an in vitro model. In a mouse model, we found that lung metastasis was decreased after treatment with PBF-509 compared with its control. Furthermore, freshly resected tumor-infiltrating lymphocytes from lung cancer patients showed increased A2aR expression in CD4+ cells and variable expression in CD8+ cells. Ex vivo studies showed an increased responsiveness of human tumor-infiltrating lymphocytes when PBF-509 was combined with anti-PD-1 or anti-PD-L1. CONCLUSIONS: Our studies demonstrate that inhibition of the A2aR using the novel inhibitor PBF-509 could lead to novel immunotherapeutic strategies in non-small cell lung cancer.

  5. ALDH1A1 maintains ovarian cancer stem cell-like properties by altered regulation of cell cycle checkpoint and DNA repair network signaling.

    Directory of Open Access Journals (Sweden)

    Erhong Meng

    Full Text Available OBJECTIVE: Aldehyde dehydrogenase (ALDH expressing cells have been characterized as possessing stem cell-like properties. We evaluated ALDH+ ovarian cancer stem cell-like properties and their role in platinum resistance. METHODS: Isogenic ovarian cancer cell lines for platinum sensitivity (A2780 and platinum resistant (A2780/CP70 as well as ascites from ovarian cancer patients were analyzed for ALDH+ by flow cytometry to determine its association to platinum resistance, recurrence and survival. A stable shRNA knockdown model for ALDH1A1 was utilized to determine its effect on cancer stem cell-like properties, cell cycle checkpoints, and DNA repair mediators. RESULTS: ALDH status directly correlated to platinum resistance in primary ovarian cancer samples obtained from ascites. Patients with ALDHHIGH displayed significantly lower progression free survival than the patients with ALDHLOW cells (9 vs. 3 months, respectively p<0.01. ALDH1A1-knockdown significantly attenuated clonogenic potential, PARP-1 protein levels, and reversed inherent platinum resistance. ALDH1A1-knockdown resulted in dramatic decrease of KLF4 and p21 protein levels thereby leading to S and G2 phase accumulation of cells. Increases in S and G2 cells demonstrated increased expression of replication stress associated Fanconi Anemia DNA repair proteins (FANCD2, FANCJ and replication checkpoint (pS317 Chk1 were affected. ALDH1A1-knockdown induced DNA damage, evidenced by robust induction of γ-H2AX and BAX mediated apoptosis, with significant increases in BRCA1 expression, suggesting ALDH1A1-dependent regulation of cell cycle checkpoints and DNA repair networks in ovarian cancer stem-like cells. CONCLUSION: This data suggests that ovarian cancer cells expressing ALDH1A1 may maintain platinum resistance by altered regulation of cell cycle checkpoint and DNA repair network signaling.

  6. A plant cyclin B2 is degraded early in mitosis and its ectopic expression shortens G2-phase and alleviates the DNA-damage checkpoint

    Czech Academy of Sciences Publication Activity Database

    Weingartner, M.; Pelayo, H. R.; Binarová, Pavla; Zwerger, K.; Melikant, B.; Torre, C.; Heberle-Bors, E.; Bogre, L.

    2003-01-01

    Roč. 116, č. 3 (2003), s. 487-498 ISSN 0021-9533 R&D Projects: GA MŠk LN00A081 Grant - others:GA Ministerio de Ciencia y Tecnologia(ES) BMC2001-2195; Biotechnology and Biological Science Research Council(AU) 111/P133340 Institutional research plan: CEZ:AV0Z5020903 Keywords : cyclin B * mitosis * checkpoint Subject RIV: EE - Microbiology, Virology Impact factor: 7.250, year: 2003

  7. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  8. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  9. Attenuation of G2 cell cycle checkpoint control in human tumor cells is associated with increased frequencies of unrejoined chromosome breaks but not increased cytotoxicity following radiation exposure

    International Nuclear Information System (INIS)

    Schwartz, J.L.; Cowan, J.; Grdina, D.J.

    1997-01-01

    The contribution of G 2 cell cycle checkpoint control to ionizing radiation responses was examined in ten human tumor cell lines. Most of the delay in cell cycle progression seen in the first cell cycle following radiation exposure was due to blocks in G 2 and there were large cell line-to-cell line variations in the length of the G 2 block. Longer delays were seen in cell lines that had mutations in p53. There was a highly significant inverse correlation between the length of G 2 delay and the frequency of unrejoined chromosome breaks seen as chromosome terminal deletions in mitosis, and observation that supports the hypothesis that the signal for G 2 delay in mammalian cells is an unrejoined chromosome break. There were also an inverse correlation between the length of G 2 delay and the level of chromosome aneuploidy in each cell line, suggesting that the G 2 and mitotic spindel checkpoints may be linked to each other. Attenuation in G 2 checkpoint control was not associated with alterations in either the frequency of induced chromosome rearrangements or cell survival following radiation exposure suggesting that chromosome rearrangements, the major radiation-induced lethal lesion in tumor cells, form before cells enters G 2 . Thus, agents that act solely to override G 2 arrest should produce little radiosensitization in human tumor cells

  10. Loss of yeast peroxiredoxin Tsa1p induces genome instability through activation of the DNA damage checkpoint and elevation of dNTP levels.

    Directory of Open Access Journals (Sweden)

    Hei-Man Vincent Tang

    2009-10-01

    Full Text Available Peroxiredoxins are a family of antioxidant enzymes critically involved in cellular defense and signaling. Particularly, yeast peroxiredoxin Tsa1p is thought to play a role in the maintenance of genome integrity, but the underlying mechanism is not understood. In this study, we took a genetic approach to investigate the cause of genome instability in tsa1Delta cells. Strong genetic interactions of TSA1 with DNA damage checkpoint components DUN1, SML1, and CRT1 were found when mutant cells were analyzed for either sensitivity to DNA damage or rate of spontaneous base substitutions. An elevation in intracellular dNTP production was observed in tsa1Delta cells. This was associated with constitutive activation of the DNA damage checkpoint as indicated by phosphorylation of Rad9/Rad53p, reduced steady-state amount of Sml1p, and induction of RNR and HUG1 genes. In addition, defects in the DNA damage checkpoint did not modulate intracellular level of reactive oxygen species, but suppressed the mutator phenotype of tsa1Delta cells. On the contrary, overexpression of RNR1 exacerbated this phenotype by increasing dNTP levels. Taken together, our findings uncover a new role of TSA1 in preventing the overproduction of dNTPs, which is a root cause of genome instability.

  11. Characterization of a cancer cell line that expresses a splicing variant form of 53BP1: Separation of checkpoint and repair functions in 53BP1

    International Nuclear Information System (INIS)

    Iwabuchi, Kuniyoshi; Matsui, Tadashi; Hashimoto, Mitsumasa; Matsumoto, Yoshihisa; Kurihara, Takayuki; Date, Takayasu

    2008-01-01

    53BP1 plays important roles in checkpoint signaling and repair for DNA double-strand breaks. We found that a colon cancer cell line, SW48, expressed a splicing variant form of 53BP1, which lacks the residues corresponding to exons 10 and 11. Activation of ATM and phosphorylation of ATM and ATR targets occurred in SW48 cells in response to X-irradiation, and these X-ray-induced responses were not enhanced by expression of full-length 53BP1 in SW48 cells, indicating that this splicing variant fully activates the major checkpoint signaling in SW48 cells. In contrast, the expression of full-length 53BP1 in SW48 cells promoted the repair of X-ray-induced DNA damage, evidenced by faster disappearance of X-ray-induced γ-H2AX foci, a marker for DNA damage, and less residual chromosomal aberrations after X-irradiation. We conclude that the two major roles of 53BP1, the checkpoint signaling and repair for DNA damage, can be functionally separated

  12. Checkpoint kinase 1-induced phosphorylation of O-linked β-N-acetylglucosamine transferase regulates the intermediate filament network during cytokinesis.

    Science.gov (United States)

    Li, Zhe; Li, Xueyan; Nai, Shanshan; Geng, Qizhi; Liao, Ji; Xu, Xingzhi; Li, Jing

    2017-12-01

    Checkpoint kinase 1 (Chk1) is a kinase instrumental for orchestrating DNA replication, DNA damage checkpoints, the spindle assembly checkpoint, and cytokinesis. Despite Chk1's pivotal role in multiple cellular processes, many of its substrates remain elusive. Here, we identified O- linked β- N -acetylglucosamine ( O -GlcNAc)-transferase (OGT) as one of Chk1's substrates. We found that Chk1 interacts with and phosphorylates OGT at Ser-20, which not only stabilizes OGT, but also is required for cytokinesis. Phospho-specific antibodies of OGT-pSer-20 exhibited specific signals at the midbody of the cell, consistent with midbody localization of OGT as reported previously. Moreover, phospho-deficient OGT (S20A) cells attenuated cellular O -GlcNAcylation levels and also reduced phosphorylation of Ser-71 in the cytoskeletal protein vimentin, a modification critical for severing vimentin filament during cytokinesis. Consequently, elongated vimentin bridges were observed in cells depleted of OGT via an si OGT- based approach. Lastly, expression of plasmids resistant to si OGT efficiently rescued the vimentin bridge phenotype, but the OGT-S20A rescue plasmids did not. Our results suggest a Chk1-OGT-vimentin pathway that regulates the intermediate filament network during cytokinesis. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  13. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  14. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  15. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  16. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  17. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  18. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  19. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  20. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  1. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  2. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  3. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  4. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  5. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  6. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  7. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  8. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  9. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  10. The secure heating reactor

    International Nuclear Information System (INIS)

    Pind, C.

    1987-01-01

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories

  11. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  12. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  13. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  14. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  15. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  16. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  17. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  18. 76 FR 8946 - Security Ratings

    Science.gov (United States)

    2011-02-16

    ... grade securities (such as foreign currency or other cash settled derivative securities). See... investment grade securities (such as foreign currency or other cash settled derivative securities). See... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No...

  19. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  20. Quantum secure communication models comparison

    Directory of Open Access Journals (Sweden)

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.