Cloud Computing Helps Decode German E. Coli Strain

Cloud Computing Helps Decode German E. Coli Strain

When a nasty strain of E. coli flooded hospitals in Germany this summer, it struck its victims with life-threatening complications far more often than most strains — and the search for an explanation began.

Over a feverish weekend after the rogue bacterium’s genome was sequenced, scientists from all over the world submitted the E. coli genome to rounds of rigorous study. Thanks to a unique Argonne-developed computer program and cloud computing testbed, researchers mapped the strain’s genes — and came a little closer to understanding the bacterium’s secrets.

A team of Argonne scientists near Chicago, Illinois, developed the Rapid Annotation using Subsystems Technology (RAST) program in 2007. The program, which is free and open to any scientist, is designed to make sense of the jumble of letters that makes up an organism’s DNA.

A genome is a long, incomprehensible string of letters in a four-letter alphabet: G, A, T, C. Sections of the string are divided into genes. Each one describes how to build a protein, and proteins build all of the parts of the cell.

If we can figure out what DNA codes for which protein, and what that protein does, then we can look at any bug and have an idea of what it can do,” explained Ross Overbeek, an Argonne computer scientist who helped design RAST.

“For example, bugs with multi-drug resistance often turn out to have little pumps that drain the drug out of the cell as fast as it comes in,” Overbeek said. “Once you know what those pumps look like, you can think about how to get around them.”

RAST matches sections of the new string with its enormous catalogue of previously sequenced genes and proteins. At the end it spits out an annotated genome with a sort of ‘Cliffs Notes’ to the organism’s probable genes and proteins.

When scientists announced they had sequenced the genome to the E. coli strain that plagued Europe on June 3, researchers from around the world began sending versions of the genome to RAST for annotation. They wanted to compare the new strain with past strains to tease out its origins and vulnerabilities.

Genomes can vary even within a strain,” Overbeek said. “You can get slightly different genomes in the same outbreak, even from the same patient. You compare genomes to see how the organism is mutating even as it’s wreaking havoc.”

RAST servers were already overwhelmed by a flush of genomes and the new requests began to pile up — reaching more than 200 genomes an hour at one point. Its operators wanted to prioritize the E. coli work, so they turned to a resource designed for just such a possibility.

Magellan is a test cloud computing project, run by the U.S. Department of Energy, designed to boost research by making additional servers available on demand for scientific computing. The program, partially funded by the Recovery Act, has two sites — one at the Argonne Leadership Computing Facility and one at the National Energy Research Scientific Computing Center in California — but is designed to give researchers across the nation access to computing power in times of need.

The Argonne team duplicated the RAST server on Magellan, rapidly increasing the available computing power. “Our system is designed to use clusters, so we engineered it so that a piece of Magellan became part of the cluster that we use for RAST,” explained Bob Olson, an Argonne computer scientist who maintains RAST.

It worked — so well that even more submissions poured in. Argonne and Virginia Tech teams worked around the clock that weekend to keep the servers running smoothly.

They found exactly what they were looking for,” Overbeek said. “The difference between this new strain and older ones came down to just a few genes. Apparently, the new strain included a combination of virulence factors present in other studied strains.”

The operation was a perfect case for Magellan, Olson said, because each genome submission is an independent problem. Simply adding more processors to handle the extra jobs is easy — unlike many other computations, which often must solve successive problems; processors must wait to start their jobs until another processor finishes.

Overbeek remembered the early days of annotating genomes in the mid-1990s, when it took four or five scientists more than a year to analyze just one genome. “Now we can spit them out in a few hours,” he said, and the team has already tested the next generation of RAST — a version so fast that it cuts the time for annotating a typical E. coli genome from eight hours to just 15 minutes.

RAST is really revolutionary,” Overbeek said. “It’s turned a problem that used to be insurmountable into one that is trivial.”

There is even an iPhone app to submit and receive genomes from RAST servers.

Developed at Argonne, RAST is funded through the U.S. National Institutes of Health and run by the Pathosystems Resource Integration Center (PATRIC) at the Virginia Bioinformatics Institute. PATRIC keeps a publicly available database of sequenced genome information.

Contribution By Louis Lerner/http://www.isgtw.org/

version of this story first appeared on the ANL website.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Cloud on Your Terms – What to look for in an EFSS Provider

The Cloud on Your Terms – What to look for in an EFSS Provider

The Cloud on Your Terms Your company has a mandate to go to the cloud and now it’s time to decide which services to use to help your business grow. You might be wearing several hats or you might be a dedicated IT professional and the responsibility has now been handed to you. So what…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

Connecting To Information With Cyber Physical Systems

Connecting To Information With Cyber Physical Systems

CPS Device Trends On The Rise It isn’t, “Do you remember who starred in XYZ Movie?” It’s, “Can you look it up please?” “Did you ever think you would sit at the dinner table, and when a question came up, someone would look up the answer and share it with everyone?” The words echoed at…

Are You Sure You Are Ready For The Cloud? SDI

Are You Sure You Are Ready For The Cloud? SDI

Software Defined Infrastructure Well, we have come full circle with this string of subjects; about making sure you are ready for the cloud. We have talked security, storage, access, connectivity and feasibility to name a few. Now, lets discuss SDI. What is SDI? It simply stands for “Software Defined Infrastructure”. Many people have their own…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Concept Of Securing IoT To Secure Your Building

The Concept Of Securing IoT To Secure Your Building

Securing IoT Ah, security. It is the dulcet tone of a symphony that we play over and over in the IT world. IoT (Internet of Things) and the myriad of connected devices allow us some intriguing security options. For example, in a mesh array of sensors, you could effectively force users to correctly identify themselves…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising