jueves, 1 de septiembre de 2011

The New Generation of Microbe Hunters


The New Generation of Microbe Hunters

Annie Tritt for The New York Times
ECOSYSTEMS Dr. David A. Relman of Stanford studies the microbes that live peacefully in or on the human body.
It was Tuesday evening, June 7. A frightening outbreak of food-borne bacteria was killing dozens of people in Germany and sickening hundreds. And the five doctors having dinner at Da Marco Cucina e Vino, a restaurant in Houston, could not stop talking about it.

Subscribe
This week: The microbe hunters, candid camera for endangered animals and trying to plan a graceful exit.
Multimedia
Michael Stravato for The New York Times
DETECTIVE Dr. James M. Musser, second from right, put DNA sequencing to work in a Houston case involving lethal bacteria that looked like anthrax. The culprit turned out to be a closely related strain of Bacillus.
What would they do if something like that happened in Houston? Suppose a patient came in, dying of a rapidly progressing infection of unknown origin? How could they figure out the cause and prevent an epidemic? They talked for hours, finally agreeing on a strategy.
That night one of the doctors, James M. Musser, chairman of pathology and genomic medicine at the Methodist Hospital System, heard from a worried resident. A patient had just died from what looked like inhalation anthrax. What should she do?
“I said, ‘I know precisely what to do,’ ” Dr. Musser said. “ ‘We just spent three hours talking about it.’ ”
The questions were: Was it anthrax? If so, was it a genetically engineered bioterrorism strain, or a strain that normally lives in the soil? How dangerous was it?
And the answers, Dr. Musser realized, could come very quickly from newly available technology that would allow investigators to determine the entire genome sequence of the suspect micro-organism.
It is the start of a new age in microbiology, Dr. Musser and others say. And the sort of molecular epidemiology he and his colleagues wanted to do is only a small part of it. New methods of quickly sequencing entire microbial genomes are revolutionizing the field.
The first bacterial genome was sequenced in 1995 — a triumph at the time, requiring 13 months of work. Today researchers can sequence the DNA that constitutes a micro-organism’s genome in a few days or even, with the latest equipment, a day. (Analyzing it takes a bit longer, though.) They can simultaneously get sequences of all the microbes on a tooth or in saliva or in a sample of sewage. And the cost has dropped to about $1,000 per genome, from more than $1 million.
In a recent review, Dr. David A. Relman, a professor of medicine, microbiology and immunology at Stanford, wrote that researchers had published 1,554 complete bacterial genome sequences and were working on 4,800 more. They have sequences of 2,675 virus species, and within those species they have sequences for tens of thousands of strains — 40,000 strains of flu viruses, more than 300,000 strains of H.I.V., for example.
With rapid genome sequencing, “we are able to look at the master blueprint of a microbe,” Dr. Relman said in a telephone interview. It is “like being given the operating manual for your car after you have been trying to trouble-shoot a problem with it for some time.”
Dr. Matthew K. Waldor of Harvard Medical School said the new technology “is changing all aspects of microbiology — it’s just transformative.”
One group is starting to develop what it calls disease weather maps. The idea is to get swabs or samples from sewage treatment plants or places like subways or hospitals and quickly sequence the genomes of all the micro-organisms. That will tell them exactly what bacteria and viruses are present and how prevalent they are.
With those tools, investigators can create a kind of weather map of disease patterns. And they can take precautions against ones that are starting to emerge — flu or food-borne diseases or SARS, for example, or antibiotic-resistant strains of bacteria in a hospital.
Others are sequencing bacterial genomes to find where diseases originated. To study the Black Death, which swept Europe in the 14th century, researchers compared genomes of today’s bubonic plague bacteria, which are slightly different in different countries. Working backward, they were able to create a family tree that placed the microbe’s origin in China, 2,600 to 2,800 years ago.
Still others, including Dr. Relman, are examining the vast sea of micro-organisms that live peacefully on and in the human body. He finds, for example, that the bacteria in saliva are different from those on teeth and that the bacteria on one tooth are different from those on adjacent teeth. Those mouth bacteria, researchers say, hold clues to tooth decay and gum disease, two of the most common human infections.
A Real-World Test
For Dr. Musser and his colleagues, the real-world test of what they could do came on that June evening.
The patient was a 39-year-old man who lived about 75 miles from Houston in a relatively rural area. He had been welding at home when, suddenly, he could not catch his breath. He began coughing up blood and vomiting. He had a headache and pain in his upper abdomen and chest.
In the emergency room, his blood pressure was dangerously low and his heart was beating fast. Doctors gave him an IV antibiotic and rushed him to Methodist Hospital in Houston. He arrived on Saturday night, June 4. Despite heroic efforts, he died two and a half days later, on Tuesday morning.
Now it was Tuesday night. On autopsy, the cause looked for all the world like anthrax, in the same unusual form — so-called inhalation anthrax — that terrified the nation in 2001. Even before the man died, researchers had been suspicious; washings from his lungs were teeming with the rod-shaped bacteria characteristic of anthrax. Investigators grew the bacteria in the lab, noticing that the colonies looked like piles of ground glass, typical of anthrax but also other Bacillus microbes.
“We knew we had to get this solved in a hurry,” Dr. Musser said. “We had to know precisely what we were dealing with. That’s when we put into play a plan to sequence the genome.”
A few days later they had their answer. The bacteria were not anthrax, but were closely related. They were a different strain of Bacillus: cereus rather than anthracis.
The bacteria had many of the same toxin genes as anthrax bacteria but had only one of the four viruses that inhabit anthrax bacteria and contribute to their toxicity. And they lacked a miniature chromosome — a plasmid — found in anthrax bacteria that also carries toxin genes.
 

The conclusion was that the lethal bacteria were naturally occurring and, though closely related to anthrax, not usually as dangerous. So why did this man get so ill?
He was a welder, Dr. Musser noted, and welders are unusually susceptible to lung infections, perhaps because their lungs are chronically irritated by fine metal particles. So his fatal illness was most likely due to a confluence of events: welding, living in a rural area where the bacteria lived in the soil and happening to breathe in this toxin-containing species of bacteria.
Dr. Waldor and his colleagues asked a slightly different question when Haiti was swept by cholera after last year’s earthquake. Cholera had not been seen in Haiti for more than a century. Why the sudden epidemic?
The scientists quickly sequenced the genome of the bacteria in Haiti and compared them with known cholera strains from around the world. It turned out that the Haitian strain was different from cholera bacteria in Latin America and Africa, but was identical to those in South Asia.
So the researchers concluded that the earthquake was indirectly responsible for the epidemic. Many relief workers who came to Haiti lived in South Asia, where cholera was endemic. “One or more of these individuals likely brought cholera to Haiti,” Dr. Waldor said.
Charting Disease Maps
One of Dr. Waldor’s collaborators in that study, Eric Schadt, wants to take the idea of molecular forensics one step further. Dr. Schadt, the chairman of genetics at Mount Sinai School of Medicine and chief scientific officer of Pacific Biosciences, wants to make disease weather maps.
He began with pilot studies, first in his company’s offices. For several months, the company analyzed the genomes of microbes on surfaces, like desks and computers and handles on toilets. As the flu season began, the surfaces began containing more and more of the predominant flu strain until, at the height of the flu season, every surface had the flu viruses. The most contaminated surface? The control switches for projectors in the conference rooms. “Everybody touches them and they never get cleaned,” Dr. Schadt said.
He also swabbed his own house and discovered, to his dismay, that his refrigerator handle was always contaminated with microbes that live on poultry and pork. The reason, he realized, is that people take meats out of the refrigerator, make sandwiches, and then open the refrigerator door to return the meat without washing their hands.
“I’ve been washing my hands a lot more now,” Dr. Schadt said.
The most interesting pilot study, he says, was the analyses of sewage.
“If you want to cast as broad a net as possible, sewage is pretty great,” Dr. Schadt said. “Everybody contributes to it every day.”
To his surprise, he saw not only disease-causing microbes but also microbes that live in specific foods, like chicken or peppers or tomatoes.
“I said, ‘Wow, this is like public health epidemiology,’ ” he said. “We could start assessing the dietary composition of a region and correlate it with health.”
Dr. Relman, meanwhile, is focusing on the vast bulk of microbes that live peacefully in or on the human body. There are far more bacterial genes than human genes in the body, he notes. One study that looked at stool samples from 124 healthy Europeans found an average of 536,122 unique genes in each sample, and 99.1 percent were from bacteria.
Bacterial genes help with digestion, sometimes in unexpected ways. One recent studyfound that bacteria in the guts of many Japanese people — but not in the North Americans tested as control — have a gene for an enzyme to break down a type of seaweed that wraps sushi. The gut bacteria apparently picked up the gene from marine bacteria that live on this red algae seaweed in the ocean.
But if these vast communities of microbes are as important as researchers think they are for maintaining health, Dr. Relman asked, what happens when people take antibiotics? Do the microbial communities that were in the gut recover?
Using rapid genome sequencing of all the microbes in fecal samples, he found that they did return, but that the microbial community was not exactly as it was before antibiotics disturbed it. And if a person takes the same antibiotic a second time, as late as six months after the first dose, the microbes take longer to come back and the community is deranged even more.
Now he and his colleagues are looking at babies, taking skin, saliva and tooth swabs at birth and during the first two years of life, a time when the structure of the microbe communities in the body is being established.
“We wait for the babies to be exposed to antibiotics — it doesn’t take that long,” Dr. Relman said. The goal, he says, is to assess the effects on the babies’ microbes, especially when babies get repeated doses of antibiotics that are not really necessary.
“Everything comes with a cost,” he said. “The problem is finding the right balance. As clinicians, we have not been looking at the cost to the health of our microbial ecosystems.”

Book reviews


Book News and Reviews
BOOKS OF THE TIMES

‘The Neighborhood Project ’

David Sloan Wilson
"The more nurturing neighborhoods" glowed brighter during the holidays, a biologist found.
David Sloan Wilson, an evolutionary biologist, uses his training for social good: his neighborhood.
The closing of the Seattle Public Library system, including the Central Library in downtown Seattle, has become something of an end-of-summer ritual.

Book-Loving City Forgoes Free Ones for a Week

The closure of the Seattle Public Library due to cuts has become something of a late-summer tradition in recent years.
CHILDREN'S BOOKS

‘Bailey’

This picture book features a big-eared mutt whose presence at school is both welcome and unquestioned.
The first issue of Action Comics No. 1, featuring Superman. The issue, available in September, is part of DC Comics company-wide push to renumber all of its superhero titles and give the characters new looks.

Heroes Take Flight, Again

In rebooting all its continuing series, including Justice League and Action Comics, DC Comics will revise or jettison decades of continuity in its heroes’ lives.
BOOKS OF THE TIMES
Mick Jagger with James Brown backstage at the filming of the 1964 concert film

‘Jagger: Rebel, Rock Star, Rambler, Rogue’

With the biography “Jagger,” Marc Spitz weighs in on the longstanding grievances between Mick Jagger and Keith Richards.
Tom Perrotta's new novel, “The Leftovers,” comes out on Tuesday.

A Writer Deals With Success as Not the End of the World

In “The Leftovers,” the comic novelist Tom Perrotta advances the more complicated worldview that has characterized his most recent works.
BOOKS OF THE TIMES

Poets’ Visions of America From the Inside and Out

Poetry collections by Kathleesn Ossip, Tracy K. Smitjh, Jane Hirschfield, Dilruba Ahmed and William Carlos Williams.
BOOKS OF THE TIMES
George Pelecanos

‘The Cut’

A novel from George Pelecanos, a writer and producer of “The Wire,” introduces Spero Lucas, a Washington investigator.
Sunday Book Review

‘The Leftovers’

Adrian Tomine
Tom Perrotta’s new novel examines how ordinary people react to extraordinary situations in the wake of a rapturelike event that has whisked millions of people off the face of the earth.
Joseph Heller

Books About Joseph Heller

A biography and a memoir examine the life and career of the author of “Catch-22.”
Enrique Krauze

‘Redeemers: Ideas and Power in Latin America’

A look at literary and political figures in Latin America.
Congressional committee members examine passports of Japanese picture brides at the immigration station of Angel Island, Calif., July 25, 1920.

‘The Buddha in the Attic’

In Julie Otsuka’s novel, Japanese women sail to America in the early 1900s to become the wives of men they have not met.

‘Wendy and the Lost Boys’

A biography of the Pulitzer Prize-winning playwright Wendy Wasserstein reveals a full and complicated life.

‘The Magician King’

A sequel to “The Magicians” revolves around an unexpected quest.
Tracy K. Smith

‘Life on Mars’

The poet Tracy Smith imagines a soundtrack for the universe and mourns her father, who worked on the Hubble Telescope.

‘The Secret Life of Pronouns’

A psychologist argues that pronouns, articles, prepositions, auxiliary verbs and conjunctions reflect our interior lives.
Jesse Ball

‘The Curfew’

This dystopian novel reveals a world where music is banned and punishment is swift.

‘Starting From Happy’

In this illustrated novel, a woman content to be alone meets her mate.
Book Review Back Page
ESSAY
This door hung in Frank Shay’s bookshop in Greenwich Village from 1920 to 1925.

A Portal to 1920s Greenwich Village

An unusual artifact resurfaced at the Harry Ransom Center at the University of Texas at Austin — a narrow pine door from a Greenwich Village bookstore, covered with some 242 signatures.
READING LIFE

What We Do to Books

The creases, the annotations and the blood stains all imprint a book with the fact of my having read it.
CRIME

Deaths in the Family

Mystery novels by Mark Billingham, James Sallis, Maureen Jennings and Kjell Eriksson.

Nonfiction Chronicle

Books about the history of smallpox, Shakespeare’s impact, Anna Politkovskaya’s journalistic work in Russia and growing up in the Southern Baptist church.

Book Review Podcast

Featuring Tom Perrotta on the fictional rapture in his new book, “The Leftovers”; Erica Heller reminisces about her father, the “Catch-22” author, Joseph Heller.
  •  This Week's Book Review Podcast (mp3)
The Times's Critics
Recent reviews by:
Book Review Features
TBR
Penn Jillette

Inside the List

Penn Jillette, the taller and louder half of Penn & Teller, appears on the hardcover nonfiction list at No. 14 with his profanity-laced memoir-cum-atheist-manifesto “God, No!”

Editors’ Choice

Recently reviewed books of particular interest.

Paperback Row

Paperback books of particular interest.
Metropolitan
BOOKSHELF
EMERGENCY An illustration by George Harkins from “9/11: The World Speaks.”

Stories of 9/11 and Its Aftermath

A sampling of books devoted to the remembrances of New Yorkers who survived the attack.

Identificar un archivo infectado antes de abrirlo


Posted: 01 Sep 2011 03:08 AM PDT
Por: Justin Phelps 


¿Acabas de abrir un archivo adjunto en un correo electrónico inesperado? ¿Un sitio Web te pide instalar software que no reconoces? ¿O un amigo cuya computadora está infectada te da una USB? Hazle caso a tus instintos: si no estás seguro de un archivo, no lo descargues o no lo abra antes de investigar.

Tu programa antivirus o antimalware puede revisar un archivo antes de abrirlo (o incluso antes de transferir el archivo de un medio físico a tu computadora). Para realizar dicha revisión, primero ve el icono del archivo en una ventana. Da clic con el botón derecho en el icono para abrir un menú contextual. Tu software de seguridad puedo haber puesto una entrada de menú llamada ‘Analizar archivo’ o algo similar. Pulsa la entrada para iniciar un análisis.

Si tu software de seguridad no ofrece la opción de menú contextual, abre el panel de control del software de seguridad y ve a la sección de escaneo. Aquí, podrá seleccionar los objetivos específicos (archivos) a escanear; algunas veces encontrarás esta opción listada en el menú Opciones avanzadas.

Búsqueda en Internet

Si un sitio Web está tratando de instalar algo misterioso, reúna tantos detalles como pueda sobre el software. Registra su nombre así como el del sitio en el que estabas cuando apareció. Busca en Internet el nombre del software; su legitimidad y seguridad normalmente se aclararán después de que lea los primeros resultados. De lo contrario, busca el nombre y agregua un término como “malware”, “eliminar” o “seguro”. También consulte la reputación del sitio que le pidió aceptar el software.

En general, mantén el software actualizado: los navegadores Web más recientes pueden filtrar descargas, advertirte de programas dañinos, y bloquear el código malicioso recién descubierto. Y la mayoría de los programas de correo electrónico analizan los archivos adjuntos para detectar infecciones antes de descargarlos.
Posted: 01 Sep 2011 03:00 AM PDT
Tras las vacaciones de verano es frecuente "el cambio de equipos informáticos que se tiran o se ceden a amigos", según informó este lunes el Instituto Nacional de Tecnologías de la Comunicación (Inteco), que, por ello, ha recomendado que antes de deshacerse de ellos o de cualquier tipo de dispositivo de almacenamiento, como los disquetes, lápices de memoria USB, CD o DVD, se elimine toda la información personal y sensible que estuviera alojada en ellos "para evitar sorpresas".

     La advertencia se extiende también a las PDAs u ordenadores de bolsillo y teléfonos móviles, especialmente los smartphones o teléfonos inteligentes, que actualmente se utilizan para albergar mucha información personal.

   "Los datos sensibles pueden ser de muchos tipos: fotografías familiares, documentos de trabajo, correos privados, archivos temporales, datos bancarios, contraseñas e incluso copias de declaraciones del IRPF, entre otros.

   En cualquier caso, es información privada que no debería llegar a manos ajenas porque pone en peligro la confidencialidad de los datos, facilitando su uso fraudulento o malintencionado", explica Pablo Pérez, gerente del Observatorio de la Seguridad de la Información de Inteco. En palabras de Pablo Pérez, "es sorprendente la cantidad de información sensible que pueden encontrarse en los discos duros de segunda mano".

   Un estudio de British Telecom sobre una muestra de más 300 discos duros comprados en la página de subastas eBay obtuvo como resultado que más el 34% de los discos duros conservaba información personal y un 36% era datos financieros. "Algo análogo sucede con los teléfonos móviles de segunda mano, especialmente los smartphones", concluye Pérez.

   Inteco explica que formatear el disco duro o 'vaciar la papelera de reciclaje' no es suficiente para eliminar permanentemente los datos almacenados en los equipos informáticos, ya que estos métodos no garantizan el borrado irreversible de la información almacenada y además existen programas informáticos que permiten recuperar archivos que erróneamente se consideran borrados.

   Para deshacerse de un equipo informático de forma segura, con la certeza de que nadie podrá acceder a su disco duro, Inteco recuerda tres métodos de borrado seguro: destrucción física del dispositivo de almacenamiento para que no pueda ser utilizado en adelante, desmagnetización o, más simple, 'sobre-escritura', que consiste en introducir nuevos archivos en el dispositivo ocupando el espacio en el que antes se encontraba la información que se desea borrar.