منابع مشابه
Tearing down actin
n page 987, Yu et al. identify a novel cell death pathway that bypasses mito-chondria. The results indicate that various strategies exist to kill off neurons. A lot of the killing of sympathetic neurons occurs in the first week after birth. During that paring period, ف 50% of sympathetic neurons die due to a lack of nerve growth factor (NGF). Neurons deprived of NGF in vitro die through the c...
متن کاملTearing down the spindle
isassembly of the mitotic spindle takes some effort, according to Kan Cao, Yixian Zheng (Johns Hopkins University, Baltimore, MD), and colleagues, who show that an ATPase and its binding partners pull apart the spindle. The spindle is put together by assembly factors that are activated by the cyclin-dependent kinase Cdc2. The loss of Cdc2 activity at the end of mitosis has thus been the convent...
متن کاملTearing down the Internet
Recent advances in scale-free networks have claimed that their topologies are very weak against attacks. The inhomogeneous connectivity distribution of large-scale current communication networks, such as the Internet, could be exploited by evil hackers in order to damage these systems. However, there have not been many studies on the approaches and consequences of such targeted attacks. In this...
متن کاملTearing down the façades of radical innovation
a r t i c l e i n f o Managers construct organizational façades that mislead external stakeholders, organizational members, auditors, researchers, other managers, and even themselves (Nystrom & Starbuck, 1984). Very little empirical research has been conducted on how managers build these façades since Nystrom & Starbuck's first influential article. This paper reports on the creation of an organ...
متن کاملDe-perimeterisation as a cycle: tearing down and rebuilding security perimeters
If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the hard-shell model, where an organisation secures all its assets using a fixed security border: What is inside the security perimeter is more or less trusted, what is outside is not. Due to changes in technologies, business processes and their legal environments this appro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cell Biology
سال: 2003
ISSN: 1540-8140,0021-9525
DOI: 10.1083/jcb1635iti5