20 January 2016
Vol 8, Issue 322
  • Contents

    • Focus

      • “Big data” gets personal

        A woman at-risk for a rare fatal prion disease joined with a bioinformatics team to analyze shared data that provided insights about penetrance and treatment.

    • Perspective

    • Research Articles

      • Quantifying prion disease penetrance using large population control cohorts

        Large genomic reference data sets reveal a spectrum of pathogenicity in the prion protein gene and provide genetic validation for a therapeutic strategy in prion disease.

      • CXCR1-mediated neutrophil degranulation and fungal killing promote Candida clearance and host survival

        CXCR1 as a mediator of neutrophil fungal killing and host defense against systemic fungal infection in mice and humans.

      • Host gene expression classifiers diagnose acute respiratory illness etiology

        Pathogen-specific host gene expression changes may combat inappropriate antibiotic use and emerging antibiotic resistance.

    • Editors' Choice

      • Stem cells lead the blind

        Embryonic stem cell–derived retinas integrate and establish connections with remaining cells of degenerated monkey retinas.

      • A T cell memory problem?

        Memory T cells promote functional differentiation of naïve T cells and impair the antitumor efficacy of adoptive immunotherapy.

      • FGF21: How sweet it is!

        The liver hormone fibroblast growth factor 21 suppresses sweet and alcohol preferences.

    • Podcast

About The Cover

Cover image expansion

ONLINE COVER Lock Up Your Laptops. This issue's cover photo reminds medical researchers of one of their key roles in preserving national security: to protect biomedical research and health data from criminal cyber attacks. In this week's Perspective, Perakslis and Stanley note that virtually all health care organizations have had at least one data breach since 2012 and that most of these could have been prevented by simple strategies such as protecting one's laptop and other mobile devices from theft. The authors outline the responsibility and liability of researchers when it comes to cyber security breaches of research and patient data. [CREDIT: PIRANKA/iSTOCKPHOTO]