2020ok  Directory of FREE Online Books and FREE eBooks

Free eBooks > Science > Biological Sciences > Animals > Mammals > The Common Thread: A Story Of Science, Politics, Ethics, And The Human Genome

The Common Thread: A Story Of Science, Politics, Ethics, And The Human Genome

by John Sulston And Georgina Ferry

Download Book
(Respecting the intellectual property of others is utmost important to us, we make every effort to make sure we only link to legitimate sites, such as those sites owned by authors and publishers. If you have any questions about these links, please contact us.)

link 1

About Book

From Library Journal
The highly publicized events leading up to the 2001 publication of the Human Genome draft sequences in Nature (the public sequence) and Science (Celera's private, i.e., patented, sequence) form the outline of these absorbing, accessible, and complementary books. The stories go back 15-plus years, the cast of characters is large and international, and the events are still a work in progress. Sulston won this year's Nobel prize in medicine and physiology and formerly headed the Sanger Centre, Cambridge, United Kingdom, a major Human Genome sequencing center. Here, he gives a firsthand account of the excitement, hard work, vision, and daring needed to move from worm biology to recommending sequencing of the human genome, while senior and influential colleagues argued vigorously against it. He speaks forcefully of the necessity of keeping the sequence public and freely available. While Americans played a major part in this drama, it is good to have the European perspective and influences represented. Science magazine contributing correspondent Wickelgren focuses on the commercialization of the research process and some of the major players, particularly Craig Venter (Celera), Francis Collins (NIH's National Human Genome Research Inst.), and Kari Stefannson (Iceland's DeCode Genetics). Both books sharply highlight the fundamental tensions and interdependencies between both academic and industrial research and international competition and collaboration, and they also show the extent to which the biopharmaceutical industry is both science- and profit-driven. Many issues around gene patenting are clearly not yet settled, as these excellent books reveal, and the Human Genome Project will continue to be as much about politics, public opinion, and public relations as about science and technology. One quibble: Sulston includes a few web sites in his notes; Wickelgren cites none. Both titles are recommended for almost any library, particularly those with readers willing to go beyond sound bites and media hype.
Mary Chitty, Cambridge Healthtech Inst., Newton, MA
Copyright 2002 Reed Business Information, Inc.

From the New England Journal of Medicine, May 1, 2003
This is a gripping insider's story of the Human Genome Project, revealing both the exciting science leading to it and the battle to keep the results, "the heritage of humanity," secure from control by private interests. As the authors state in the preface, "Today any scientist anywhere can access the sequence freely at no cost. . . . We wrote this book so that people might understand how close the world came to losing that freedom." In Sulston's case, the path to the Human Genome Project began with the nematode worm, on which he worked under Sydney Brenner at Cambridge's Laboratory of Molecular Biology. This work led to a shared 2002 Nobel prize for Brenner, Sulston, and Robert Horvitz, who had also worked under Brenner early in his career. We are given intriguing glimpses into the thinking that led to the idea of mapping, and then sequencing, the entire worm genome; eventually, this work helped to pave the way to the mapping and sequencing of the human genome. A section of photographs conveys at a glance the history of the contribution of the Laboratory of Molecular Biology to the Human Genome Project and sparks some intriguing questions. Why did this lowly worm -- rather than, say, the well-studied fruit fly -- lead the way to the decoding of whole genomes? How could such powerful international cooperation spring from the humble, cramped quarters that were Sulston's office for many years before he moved into the high-powered Sanger Centre, with its rooms full of sequencing machines? What was it about these people that enabled them to overcome first the enormous scientific and technical obstacles and then the challenge of the private competition to the Human Genome Project? The book suggests interesting answers to these questions. The worm was an ingenious choice by Brenner, who wanted a model that was more complex than bacteria but more manageable than the fly. Its transparency let researchers observe cell division directly with a suitable microscope. With only 959 cells, it offered the possibility of complete mapping -- though only to people addicted to tackling what others saw as impossible or insane. James Watson, the first head of the Human Genome Project, apparently used a clever psychological ploy to jolt Sulston and his colleagues into going from mapping to sequencing, and with this step, the worm project became the paradigm the Human Genome Project followed. The cramped quarters inspired some very close, long-lasting collaborations, notably between Sulston and Alan Coulson, who, as Fred Sanger's former assistant, brought crucial experience in sequencing DNA, and between Sulston and Bob Waterston, whose laboratory at Washington University in St. Louis became the primary U.S. center for sequencing the human genome. Sulston remarks that on moving into the spacious Sanger Centre, he missed bumping into people all day long and exchanging ideas; now formal meetings were required. The people, of course, are the most intriguing part of the story. Reading about the challenges along the path to the human genome, one realizes that the Human Genome Project was driven by very special people. They had to be resourceful and undaunted by tasks of incredible magnitude or difficulty. Sulston's early work on the worm provides a nice illustration of resourcefulness: whereas others had found it impossible to observe cell division beyond the first few stages, because the worm would not lie still, Sulston kept it happily immobile by offering it bacterial food right on the microscope slide and continuously recording its divisions. At lunchtime, he would refrigerate the worm to interrupt cell division, then resume where he had left off, continuing until the history of each cell had been traced. These people also had to be good at cooperating, even across national borders. Sulston showed this trait from the start. For him, sharing went along with informality and a sense of fun -- discussions and even interviews tended to continue in the nearest pub. His long-standing international collaboration with Bob Waterston on mapping the worm genome provided a model for the Human Genome Project: split up tasks as fairly as possible, stay in touch daily to avoid duplication and to allow cross-fertilization of ideas, and generally compete yet help each other. Finally, there had to be fierce, unwavering commitment to freedom of scientific information. It is perhaps in this arena that Sulston made his greatest contribution to the Human Genome Project. It was he who scrawled on the board the draft of the "Bermuda Principles" regarding the prompt, free release of data at the 1996 strategic meeting and set a strong example by posting sequence data on the Sanger Centre's Web site daily. In the service of defending this key principle, he transcended his natural aversion to management and politics and used every conceivable means to outwit those who sought to control and monopolize information. The earliest example is his cracking of the software code in the files produced by the sequencers at Applied Biosystems in order to process data more rapidly, more flexibly, and without the company's interfering control; this act is made all the more interesting by the fact that Applied Biosystems, which was acquired by PerkinElmer, was the commercial power behind Craig Venter's Celera Genomics, the private challenger to the Human Genome Project. With that event, the drama reaches a pace that will leave the reader breathless. Luck, last-minute financial rescues, and clashing characters and interests abound. In all of this, Sulston's actions illustrate his ability to shift his thinking quickly -- from producing finished sequences to generating raw sequences at dramatically higher speeds and from doing the science to getting messy in the realm of politics, the press, and the public relations wars. One comes away impressed, with the sense that these scientists could not have omitted even one of these steps without losing the battle they fought for free access to crucial scientific information and inquiry. Isaac Rabino, Ph.D.
Copyright © 2003 Massachusetts Medical Society. All rights reserved. The New England Journal of Medicine is a registered trademark of the MMS.

Nature Medicine, December 2002
"...fascinating and fast-moving... a masterful personal account..."

San Jose Mercury News, December 8, 2002
"The Common Thread has a good story to tell and tells it well."

Library Journal
"...excellent ... recommended for readers willing to go beyond sound bites and media hype."

Book Info
Sulston takes us behind the scenes for an in-depth look at the controversial story behind the headlines; The Human Genome Project. A compelling history and an impassioned call for ethical responsibility in scientific research.


Note that this is for Intel based systems only (mainly laptops) and you would be well advised to IMAGE your disk BEFORE YOU TRY THIS just in case something happens and you cannot load your system (IMAGE, IMAGE, IMAGE!!!) Once you have your disk images precede with the following: Backup your registry or make a restore point just in case. Under search: regedit Navigate to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic es\ Locate: folder "iaStor" Under "iaStor" you will find a folder named "Parameter" > delete this folder Locate: folder "iaStorv" Under "iaStorv" you will find a folder named "Parameter" > delete this folder Reboot Cheers, Carl
Hello This post opens set of articles devoted to computer security. At first, I would like to give some basic definitions for variety of modern computer threats. All these threats are currently known as Malware. Malware ("malicious software") is any application or file that is harmful to a computer or computer user. This would include, computer viruses, Trojan horses, worms, keyloggers, spyware, adware, web-page hijackers, driveby downloads, and any programming that gathers information about a computer user without their expressed permission. 5 years ago, the most security threats that most people came across were Viruses. This is no longer the case! There are new threats out; and they take no prisoners, no longer is an anti-virus application sufficient to stop the invaders, the web is a complex place and the technology is getting so advanced that you need to act now to protect your machine and your private\personal data. A quick overview of some of the more common malware that you might find, sorted by level of threat: SPYWARE Spyware is any technology that aids in gathering info about a person or organisation without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather info about the user and relay it to advertisers or other interested parties. TROJAN Trojans are malicious programs often used by hackers to attack target computers, usually to provide a backdoor into the system but sometimes just to cause destruction. Remote Access Trojans (RATs) are the most famous class of trojans and they usually come in two parts - a server that is sent to infect the victim, and a client that the hacker uses to connect to the server after the victim is infected. There are many ways that hackers can use to infect a target with a trojan, and careful security measures aren't always enough - a strong anti-trojan program can easily detect tens of thousands of trojans that would otherwise be near-impossible for a human to find. VIRUS An application or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can duplicate itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and crash the system. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. WORMS Worms are in a similar category to viruses. Usually spread by email and containing their own email engine, they attempt to spread themselves to all the people in your address books, impacting greatly on network traffic on the web. Sometimes you will find viruses also contain Worm code so the virus is able to mail multiple people using its email engine, whilst infecting the machine with a specific virus, making the sender of the virus hard to find as it looks like it has come from someone you know. KEYLOGGERS A keylogger is a program that has been dropped onto a PC that actively monitors all your keystrokes and mouse clicks to try to capture both personal data, passwords, and browser habits, it will also capture any data entered on any web site including secure sites like online bank sites. This data is then stored in an encrypted text file either on the machine or sent to a pre-defined server for the sender of the keylogger to access at his discretion. ADWARE Adware is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user. HIJACKERS A hijacker is a expression used to explain a registry entry on your machine that has been placed there to re-direct your browser to another site, usually ad-purposed. These are not normally harmful for the machine, other that the fact that it will stop you from getting to the web site you wish to visit. It is more of a frustration than a security risk; however, some Hijackers will attempt to redirect you from Hijack deleting sites. Hope you like this article. Next time I will write about tools used to prevent of/remove particular threat types listed here. Regards, Carl
My computer is running slow what steps can I do to fix it?
Hello. My wife and I bought our house about 6 months ago. It was a foreclosure and we were able to get a great deal on it. We also took advantage of the 8K tax credit so that definitely helped. We did an extensive remodeling job and now I want to refinance to cut the term to a 20 or 15 year loan. Does anyone know any good sites for mortgage information? Thanks! Mike


PLEASE READ: All comments must be approved before appearing in the thread; time and space constraints prevent all comments from appearing. We will only approve comments that are directly related to the article, use appropriate language and are not attacking the comments of others.

Message (please, no HTML tags. Web addresses will be hyperlinked):

Related Free eBooks

Related Tags

DIGG This story   Save To Google   Save To Windows Live   Save To Del.icio.us   diigo it   Save To blinklist
Save To Furl   Save To Yahoo! My Web 2.0   Save To Blogmarks   Save To Shadows   Save To stumbleupon   Save To Reddit