منابع مشابه
Are generalist parasites being lost from their hosts?
Co-extinctions should be regarded as fundamental co-evolutionary events promoting species turnover, prior than a consequence of human induced biodiversity loss. Focusing on current scenarios is key to biodiversity conservation, but predicting future trends could be harder and less fruitful than trying to get a better grasp on the past.
متن کاملParasites Lost: Neglecting a Crucial Element in De-Extinction.
Bringing back iconic and beloved extinct species is a hot and intensely debated current topic. Yet, the parasites of de-extinction candidate species have remained largely overlooked in this debate. Here we point out the potentially far-reaching ecological impacts of bringing back extinct species without their parasites.
متن کاملParasites lost? An overlooked hypothesis for the evolution of alternative reproductive strategies in amphibians.
Amphibians exhibit the greatest diversity of reproductive strategies of all tetrapod vertebrates. While authors have traditionally attributed the evolution of these strategies to factors such as complex topography, unpredictable larval environments, and predation on larvae and eggs, support for any of these hypotheses has been limited. Importantly, most authors have ignored parasites, including...
متن کاملReduced helminth parasitism in the introduced bank vole (Myodes glareolus): More parasites lost than gained
Introduced species are often less parasitised compared to their native counterparts and to ecologically similar hosts in the new environment. Reduced parasitism may come about due to both the loss of original parasites and low acquisition of novel parasites. In this study we investigated the intestinal helminth parasites of the introduced bank vole (Myodes glareolus) in Ireland. Results were co...
متن کاملLost iPhone? Lost Passwords!
The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the keychain. It presents results of handson tests that show the possibility for attackers to reveal some of the keychain entries. For the described approach, the knowledge of the user’s secret passcode is not needed, as the protection provided by the passcode is bypassed.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2003
ISSN: 0028-0836,1476-4687
DOI: 10.1038/421585a