Feeds

Mammoth wool gives up genetic secrets

Are you taking a sample?

Top 5 reasons to deploy VMware with Tegile

A new technique has allowed researchers to extract genetic information from the hair shafts of ancient woolly mammoths.

The team behind the breakthrough, based at the University of Copenhagen in Denmark, says the method should also work on other well-preserved mammal specimens, the BBC reports.

It is well known to all watchers of CSI, as well as the scientific community, that there is plenty of DNA to be found in the root of a hair. But the shaft was not thought to be a good source, until now.

Knowing this, the team decided to crunch up lots of hair from each of their specimen mammoths on the off-chance it would work. "Basically, for every mammoth we tried, it worked. That blew us away," said Dr Tom Gilbert.

Rather than bog standard DNA, the team reconstructed sequences of mitochondrial DNA. Previously, only two mitochrondrial genomes have been published. The team from Copenhagen has included 10 in the Science paper.

The key to the DNA's preservation lies in the structure of the hair shaft. Gilbert told the BBC: "The reason we think hair is so great comes down to the fact that as a structure, hair is made out of this material called keratin. It's a kind of protein that in a very simplistic sense can be viewed as a plastic that the DNA gets embedded in and surrounded by and protected by."

The team says the technique will be invaluable to researchers wanting to find out more about many specimens - other woolly mammals, like Rhinos, and even ancient humans, held in the vaults of the world's museums. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Simon's says quantum computing will work
Boffins blast algorithm with half a dozen qubits
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?