33 research outputs found

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF

    Concise review: evidence for CD34 as a common marker for diverse progenitors

    Get PDF
    CD34 is a transmembrane phosphoglycoprotein, first identified on hematopoietic stem and progenitor cells. Clinically, it is associated with the selection and enrichment of hematopoietic stem cells for bone marrow transplants. Due to these historical and clinical associations, CD34 expression is almost ubiquitously related to hematopoietic cells, and it is a common misconception that CD34‐positive (CD34+) cells in nonhematopoietic samples represent hematopoietic contamination. The prevailing school of thought states that multipotent mesenchymal stromal cells (MSC) do not express CD34. However, strong evidence demonstrates CD34 is expressed not only by MSC but by a multitude of other nonhematopoietic cell types including muscle satellite cells, corneal keratocytes, interstitial cells, epithelial progenitors, and vascular endothelial progenitors. In many cases, the CD34+ cells represent a small proportion of the total cell population and also indicate a distinct subset of cells with enhanced progenitor activity. Herein, we explore common traits between cells that express CD34, including associated markers, morphology and differentiation potential. We endeavor to highlight key similarities between CD34+ cells, with a focus on progenitor activity. A common function of CD34 has yet to be elucidated, but by analyzing and understanding links between CD34+ cells, we hope to be able to offer an insight into the overlapping properties of cells that express CD34. STEM CELLS 2014;32:1380–138

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF
    Il presente volume nasce come continuazione del precedente, con l’obiettivo di delineare un insieme di ambiti progettuali e di azioni che la comunità nazionale della ricerca ritiene essenziali a complemento e a supporto di quelli previsti nel DPCM Gentiloni in materia di sicurezza cibernetica, pubblicato nel febbraio del 2017. La lettura non richiede particolari conoscenze tecniche; il testo è fruibile da chiunque utilizzi strumenti informatici o navighi in rete. Nel volume vengono considerati molteplici aspetti della cybersecurity, che vanno dalla definizione di infrastrutture e centri necessari a organizzare la difesa alle azioni e alle tecnologie da sviluppare per essere protetti al meglio, dall’individuazione delle principali tecnologie da difendere alla proposta di un insieme di azioni orizzontali per la formazione, la sensibilizzazione e la gestione dei rischi. Gli ambiti progettuali e le azioni, che noi speriamo possano svilupparsi nei prossimi anni in Italia, sono poi accompagnate da una serie di raccomandazioni agli organi preposti per affrontare al meglio, e da Paese consapevole, la sfida della trasformazione digitale. Le raccomandazioni non intendono essere esaustive, ma vanno a toccare dei punti che riteniamo essenziali per una corretta implementazione di una politica di sicurezza cibernetica a livello nazionale. Politica che, per sua natura, dovrà necessariamente essere dinamica e in continua evoluzione in base ai cambiamenti tecnologici, normativi, sociali e geopolitici. All’interno del volume, sono riportati dei riquadri con sfondo violetto o grigio; i primi sono usati nel capitolo introduttivo e nelle conclusioni per mettere in evidenza alcuni concetti ritenuti importanti, i secondi sono usati negli altri capitoli per spiegare il significato di alcuni termini tecnici comunemente utilizzati dagli addetti ai lavori. In conclusione, ringraziamo tutti i colleghi che hanno contribuito a questo volume: un gruppo di oltre 120 ricercatori, provenienti da circa 40 tra Enti di Ricerca e Università, unico per numerosità ed eccellenza, che rappresenta il meglio della ricerca in Italia nel settore della cybersecurity. Un grazie speciale va a Gabriella Caramagno e ad Angela Miola che hanno contribuito a tutte le fasi di produzione del libro. Tra i ringraziamenti ci fa piacere aggiungere il supporto ottenuto dai partecipanti al progetto FILIERASICURA

    Infezione da prione : alla ricerca di nuove cure

    No full text

    IoT forensic challenges and opportunities for digital traces

    No full text

    IoT Forensic Science: Principles, Processes, and Activities

    Get PDF
    IoT devices produce information that can be used in criminal investigations and cybersecurity incidents to make inferences about identities, locations, chronologies, and relationships between relevant entities. Before this information is relied upon to make critical decisions, its veracity must be assessed critically, and the link between virtual and physical worlds must be evaluated carefully. This chapter presents the forensic science principles needed to exploit the full potential of IoT traces, including uniqueness, exchange, provenance, integrity, reliability, repeatability, evaluating links between virtual and physical entities, and formally assessing alternative hypotheses. This chapter also discusses core forensic processes and activities, demonstrating their application to forensic analysis of IoT devices using practical examples. A typology of IoT traces is proposed and their usefulness during an investigation is discussed. Finally, an investigative scenario is presented to illustrate the opportunities and challenges of exploiting IoT devices and traces for investigative and forensic purposes

    Extra and Intracranial Meningiomas

    Full text link
    Two cases of extracranial meningiomas respectively in the left frontal region in a 64-year-old woman and in the right frontal sinus in a 13-year-old boy are reported. Both cases were associated with an intracranial meningioma later detected after primary histologic diagnosis of the extracranial surgical specimen. The possibility of an extracranial meningioma, expecially when an angioblastic, fibroblastic or meningothelial pattern is prominent, must always be considered together with the existence of an intracranial equivalent, as our 2 cases clearly demonstrate.</jats:p

    Effect of Aging on the Immune Response to Core Vaccines in Senior and Geriatric Dogs

    Get PDF
    Elderly dogs are steadily increasing worldwide as well as veterinarians&rsquo; and owners&rsquo; interest in their health and wellness. Aging is not a disease, but a combination of changes negatively affecting the organism in general and the immune system in particular, resulting in a decline in protection over time. The aim of this study was to measure the specific serum antibody titers against the main dangerous and widespread viral diseases preventable by core vaccinations in senior and geriatric dogs using the in-practice test VacciCheck. A cohort of three hundred fifty elderly dogs was analyzed for Protective Antibody Titers (PATs) against CPV-2, CDV and CAdV-1. The age ranged from 5 to 19 years, with two hundred fifty-eight seniors (73.7%) and ninety-two geriatrics (26.3%), and 97.4% of them were vaccinated at least once in their lives. More than half of the entire study population (52.9%) had PATs simultaneously for all three diseases, with 80.5% seniors and 19.5% geriatrics. Specific PATs were found in 88.6% of aging dogs for CPV-2, 82.3% for CadV-1 and 66.0% for CDV, demonstrating that unprotected aging dogs represent a minority. Unexpectedly, the larger elderly dogs resulted as more protected than smaller ones for CPV-2. Protection then decreases over time, with geriatric dogs less protected than senior ones. Veterinary practitioners should therefore always consider whether to maintain core vaccinations in aging dogs as in adults on a three-year basis or opt instead for closer boosters (every 1 or 2 years). PATs for core vaccines could then represent a good biomarker of protection and their titration could become a standard of care, especially in such a sensitive period of the dogs&rsquo; life
    corecore