Feeds

All blue-eyed people share one common ancestor

Genetic mutation responsible for Sinatra

High performance access to file storage

A University of Copenhagen team has identified the gene which around 6-10,000 years ago underwent a genetic mutation in one individual who eventually gave rise to all blue-eyed people.

Professor Eiberg from the Department of Cellular and Molecular Medicine began his research in 1996, when he "first implicated the OCA2 gene as being responsible for eye colour", as ScienceDaily puts it.

Over the next decade, he and his colleagues "examined mitochondrial DNA and compared the eye colour of blue-eyed individuals" in countries including Denmark, Jordan and Turkey.

Eiberg explained: “Originally, we all had brown eyes. But a genetic mutation affecting the OCA2 gene in our chromosomes resulted in the creation of a 'switch', which literally 'turned off' the ability to produce brown eyes."

Specifically, ScienceDaily explains, the OCA2 gene "codes for the so-called P protein, which is involved in the production of melanin". The “switch”, located in the gene adjacent to OCA2, doesn't turn off the gene entirely, but "limits its action to reducing the production of melanin in the iris", thus “diluting” brown eyes to blue.

That the switch doesn't entirely disable the OCA2 gene is significant, because a complete shut-down of melanin production would result in albinism.

The proof that all blue-eyed people have a common ancestor comes from the fact that whereas eye colours ranging from brown to green are caused by relatively large differences in the amount of melanin in the iris, controlled by "considerable individual variation" in the area of the DNA responsible for melanin production, the variation in iris melanin levels across all blue-eyed individuals is very small.

Eiberg elaborated: “From this we can conclude that all blue-eyed individuals are linked to the same ancestor. They have all inherited the same switch at exactly the same spot in their DNA.”

Eiberg noted that the blue eyes mutation is neither "positive nor negative", since it doesn't affect chances of survival. He concluded: "It simply shows that nature is constantly shuffling the human genome, creating a genetic cocktail of human chromosomes and trying out different changes as it does so.” ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.