Cloud Computing Helps Decode German E. Coli Strain

Cloud Computing Helps Decode German E. Coli Strain

When a nasty strain of E. coli flooded hospitals in Germany this summer, it struck its victims with life-threatening complications far more often than most strains — and the search for an explanation began.

Over a feverish weekend after the rogue bacterium’s genome was sequenced, scientists from all over the world submitted the E. coli genome to rounds of rigorous study. Thanks to a unique Argonne-developed computer program and cloud computing testbed, researchers mapped the strain’s genes — and came a little closer to understanding the bacterium’s secrets.

A team of Argonne scientists near Chicago, Illinois, developed the Rapid Annotation using Subsystems Technology (RAST) program in 2007. The program, which is free and open to any scientist, is designed to make sense of the jumble of letters that makes up an organism’s DNA.

A genome is a long, incomprehensible string of letters in a four-letter alphabet: G, A, T, C. Sections of the string are divided into genes. Each one describes how to build a protein, and proteins build all of the parts of the cell.

If we can figure out what DNA codes for which protein, and what that protein does, then we can look at any bug and have an idea of what it can do,” explained Ross Overbeek, an Argonne computer scientist who helped design RAST.

“For example, bugs with multi-drug resistance often turn out to have little pumps that drain the drug out of the cell as fast as it comes in,” Overbeek said. “Once you know what those pumps look like, you can think about how to get around them.”

RAST matches sections of the new string with its enormous catalogue of previously sequenced genes and proteins. At the end it spits out an annotated genome with a sort of ‘Cliffs Notes’ to the organism’s probable genes and proteins.

When scientists announced they had sequenced the genome to the E. coli strain that plagued Europe on June 3, researchers from around the world began sending versions of the genome to RAST for annotation. They wanted to compare the new strain with past strains to tease out its origins and vulnerabilities.

Genomes can vary even within a strain,” Overbeek said. “You can get slightly different genomes in the same outbreak, even from the same patient. You compare genomes to see how the organism is mutating even as it’s wreaking havoc.”

RAST servers were already overwhelmed by a flush of genomes and the new requests began to pile up — reaching more than 200 genomes an hour at one point. Its operators wanted to prioritize the E. coli work, so they turned to a resource designed for just such a possibility.

Magellan is a test cloud computing project, run by the U.S. Department of Energy, designed to boost research by making additional servers available on demand for scientific computing. The program, partially funded by the Recovery Act, has two sites — one at the Argonne Leadership Computing Facility and one at the National Energy Research Scientific Computing Center in California — but is designed to give researchers across the nation access to computing power in times of need.

The Argonne team duplicated the RAST server on Magellan, rapidly increasing the available computing power. “Our system is designed to use clusters, so we engineered it so that a piece of Magellan became part of the cluster that we use for RAST,” explained Bob Olson, an Argonne computer scientist who maintains RAST.

It worked — so well that even more submissions poured in. Argonne and Virginia Tech teams worked around the clock that weekend to keep the servers running smoothly.

They found exactly what they were looking for,” Overbeek said. “The difference between this new strain and older ones came down to just a few genes. Apparently, the new strain included a combination of virulence factors present in other studied strains.”

The operation was a perfect case for Magellan, Olson said, because each genome submission is an independent problem. Simply adding more processors to handle the extra jobs is easy — unlike many other computations, which often must solve successive problems; processors must wait to start their jobs until another processor finishes.

Overbeek remembered the early days of annotating genomes in the mid-1990s, when it took four or five scientists more than a year to analyze just one genome. “Now we can spit them out in a few hours,” he said, and the team has already tested the next generation of RAST — a version so fast that it cuts the time for annotating a typical E. coli genome from eight hours to just 15 minutes.

RAST is really revolutionary,” Overbeek said. “It’s turned a problem that used to be insurmountable into one that is trivial.”

There is even an iPhone app to submit and receive genomes from RAST servers.

Developed at Argonne, RAST is funded through the U.S. National Institutes of Health and run by the Pathosystems Resource Integration Center (PATRIC) at the Virginia Bioinformatics Institute. PATRIC keeps a publicly available database of sequenced genome information.

Contribution By Louis Lerner/http://www.isgtw.org/

version of this story first appeared on the ANL website.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…