Feeds

All blue-eyed people share one common ancestor

Genetic mutation responsible for Sinatra

SANS - Survey on application security programs

A University of Copenhagen team has identified the gene which around 6-10,000 years ago underwent a genetic mutation in one individual who eventually gave rise to all blue-eyed people.

Professor Eiberg from the Department of Cellular and Molecular Medicine began his research in 1996, when he "first implicated the OCA2 gene as being responsible for eye colour", as ScienceDaily puts it.

Over the next decade, he and his colleagues "examined mitochondrial DNA and compared the eye colour of blue-eyed individuals" in countries including Denmark, Jordan and Turkey.

Eiberg explained: “Originally, we all had brown eyes. But a genetic mutation affecting the OCA2 gene in our chromosomes resulted in the creation of a 'switch', which literally 'turned off' the ability to produce brown eyes."

Specifically, ScienceDaily explains, the OCA2 gene "codes for the so-called P protein, which is involved in the production of melanin". The “switch”, located in the gene adjacent to OCA2, doesn't turn off the gene entirely, but "limits its action to reducing the production of melanin in the iris", thus “diluting” brown eyes to blue.

That the switch doesn't entirely disable the OCA2 gene is significant, because a complete shut-down of melanin production would result in albinism.

The proof that all blue-eyed people have a common ancestor comes from the fact that whereas eye colours ranging from brown to green are caused by relatively large differences in the amount of melanin in the iris, controlled by "considerable individual variation" in the area of the DNA responsible for melanin production, the variation in iris melanin levels across all blue-eyed individuals is very small.

Eiberg elaborated: “From this we can conclude that all blue-eyed individuals are linked to the same ancestor. They have all inherited the same switch at exactly the same spot in their DNA.”

Eiberg noted that the blue eyes mutation is neither "positive nor negative", since it doesn't affect chances of survival. He concluded: "It simply shows that nature is constantly shuffling the human genome, creating a genetic cocktail of human chromosomes and trying out different changes as it does so.” ®

Top three mobile application threats

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.