Cloud Computing Helps Decode German E. Coli Strain

Cloud Computing Helps Decode German E. Coli Strain

When a nasty strain of E. coli flooded hospitals in Germany this summer, it struck its victims with life-threatening complications far more often than most strains — and the search for an explanation began.

Over a feverish weekend after the rogue bacterium’s genome was sequenced, scientists from all over the world submitted the E. coli genome to rounds of rigorous study. Thanks to a unique Argonne-developed computer program and cloud computing testbed, researchers mapped the strain’s genes — and came a little closer to understanding the bacterium’s secrets.

A team of Argonne scientists near Chicago, Illinois, developed the Rapid Annotation using Subsystems Technology (RAST) program in 2007. The program, which is free and open to any scientist, is designed to make sense of the jumble of letters that makes up an organism’s DNA.

A genome is a long, incomprehensible string of letters in a four-letter alphabet: G, A, T, C. Sections of the string are divided into genes. Each one describes how to build a protein, and proteins build all of the parts of the cell.

If we can figure out what DNA codes for which protein, and what that protein does, then we can look at any bug and have an idea of what it can do,” explained Ross Overbeek, an Argonne computer scientist who helped design RAST.

“For example, bugs with multi-drug resistance often turn out to have little pumps that drain the drug out of the cell as fast as it comes in,” Overbeek said. “Once you know what those pumps look like, you can think about how to get around them.”

RAST matches sections of the new string with its enormous catalogue of previously sequenced genes and proteins. At the end it spits out an annotated genome with a sort of ‘Cliffs Notes’ to the organism’s probable genes and proteins.

When scientists announced they had sequenced the genome to the E. coli strain that plagued Europe on June 3, researchers from around the world began sending versions of the genome to RAST for annotation. They wanted to compare the new strain with past strains to tease out its origins and vulnerabilities.

Genomes can vary even within a strain,” Overbeek said. “You can get slightly different genomes in the same outbreak, even from the same patient. You compare genomes to see how the organism is mutating even as it’s wreaking havoc.”

RAST servers were already overwhelmed by a flush of genomes and the new requests began to pile up — reaching more than 200 genomes an hour at one point. Its operators wanted to prioritize the E. coli work, so they turned to a resource designed for just such a possibility.

Magellan is a test cloud computing project, run by the U.S. Department of Energy, designed to boost research by making additional servers available on demand for scientific computing. The program, partially funded by the Recovery Act, has two sites — one at the Argonne Leadership Computing Facility and one at the National Energy Research Scientific Computing Center in California — but is designed to give researchers across the nation access to computing power in times of need.

The Argonne team duplicated the RAST server on Magellan, rapidly increasing the available computing power. “Our system is designed to use clusters, so we engineered it so that a piece of Magellan became part of the cluster that we use for RAST,” explained Bob Olson, an Argonne computer scientist who maintains RAST.

It worked — so well that even more submissions poured in. Argonne and Virginia Tech teams worked around the clock that weekend to keep the servers running smoothly.

They found exactly what they were looking for,” Overbeek said. “The difference between this new strain and older ones came down to just a few genes. Apparently, the new strain included a combination of virulence factors present in other studied strains.”

The operation was a perfect case for Magellan, Olson said, because each genome submission is an independent problem. Simply adding more processors to handle the extra jobs is easy — unlike many other computations, which often must solve successive problems; processors must wait to start their jobs until another processor finishes.

Overbeek remembered the early days of annotating genomes in the mid-1990s, when it took four or five scientists more than a year to analyze just one genome. “Now we can spit them out in a few hours,” he said, and the team has already tested the next generation of RAST — a version so fast that it cuts the time for annotating a typical E. coli genome from eight hours to just 15 minutes.

RAST is really revolutionary,” Overbeek said. “It’s turned a problem that used to be insurmountable into one that is trivial.”

There is even an iPhone app to submit and receive genomes from RAST servers.

Developed at Argonne, RAST is funded through the U.S. National Institutes of Health and run by the Pathosystems Resource Integration Center (PATRIC) at the Virginia Bioinformatics Institute. PATRIC keeps a publicly available database of sequenced genome information.

Contribution By Louis Lerner/http://www.isgtw.org/

version of this story first appeared on the ANL website.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…