Wnt therapy for bone loss: golden goose or Trojan horse?

نویسنده

  • Greg H Enders
چکیده

The Wnt pathway has been found to play a role in the development of many tissues and to spur growth and differentiation of adult osteoblasts, sparking interest in its potential clinical application for bone growth. However, when deregulated, this pathway can be oncogenic in some tissues. In this issue of the JCI, Kansara and colleagues reveal that Wnt inhibitory factor 1 is epigenetically silenced in human osteosarcomas and that its absence augments osteosarcoma formation in mice (see the related article beginning on page 837). These observations suggest the need for caution in stimulating the Wnt pathway for therapeutic bone growth.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Canonical Wnt Signaling (Wnt/β-Catenin Pathway): A Potential Target for Cancer Prevention and Therapy

Precise regulation of signal transduction pathways is crucial for normal animal development and for maintaining cellular and tissue homeostasis in adults. The Wnt/Frizzled-mediated signaling includes canonical and non-canonical signal transduction pathways. Upregulation or downregulation of the canonical Wnt-signaling (or the Wnt/β-Catenin signal transduction) leads to a variety of human diseas...

متن کامل

UDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F Trojan horses in mobile devices

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...

متن کامل

ELT: A Trojan Horse in Disguise?

Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...

متن کامل

Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis

Hardware Trojan detection and protection is becoming more crucial as more untrusted third parties manufacture many parts of critical systems nowadays. The most common way to detect hardware Trojans is comparing the untrusted design with a golden (trusted) one. However, third party intellectual properties (IPs) are black boxes with no golden IPs to trust. So, previous attempts to detect hardware...

متن کامل

Clostridial spores as live 'Trojan horse' vectors for cancer gene therapy: comparison with viral delivery systems

Solid tumours account for 90% of all cancers. Gene therapy represents a potential new modality for their treatment. Up to now, several approaches have been developed, but the most efficient ones are the viral vector based gene therapy systems. However, viral vectors suffer from several deficiencies: firstly most vectors currently in use require intratumoural injection to elicit an effect. This ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • The Journal of clinical investigation

دوره 119 4  شماره 

صفحات  -

تاریخ انتشار 2009