Based on knowledge acquired to date, there is no doubt that cancer metabolism provides a wealth of novel therapeutic targets and multiple innovative ways in which to exploit metabolic vulnerabilities for therapeutic beneﬁt. More comprehensive reviews cover the breadth of metabolic targets that are currently under investigation (Stine and Dang, 2013; Vander Heiden, 2011). The following sections of this review focus on PKM2, glutaminase, and mutated IDH1/2 as exemplary metabolism targets under investigation for development of cancer therapies.
Drugging Glycolysis : Targeting Pyruvate Kinase Muscle Isozyme Alternative Splice Variant 2 PK catalyzes the last step of glycolysis, converting phosphoenolpyruvate (PEP) to pyruvate, while producing one molecule of ATP. The reaction encompasses two chemical steps: the ﬁrst involves a phosphoryl transfer from PEP to ADP, forming an enolate intermediate and ATP, and the second involves protonation of the enolate intermediate, forming pyruvate (Robinson and Rose, 1972). PKM2 is one of four PK isoforms in humans. PKM1 and PKM2 result from the alternative splicing of exons 9 and 10 of the PKM gene, which encode a stretch of amino acids that differ at 23 positions between PKM1 and PKM2. PKM1 is constitutively active in skeletal muscle and brain tissue, but is not allosterically regulated. PKM2 is expressed in fetal and proliferating tissues, has low basal activity compared with PKM1, and is allosterically regulated. R-type pyruvate kinase (PKR) and L-type pyruvate kinase (PKL) are transcribed via different promoters from the PKLR gene. PKR is expressed in erythrocytes and PKL in the liver. PKR, PKL, and PKM1 exist as stable tetramers,whereas PKM2 forms tetramers (high activity form), dimers (low activity form), and monomers (Mazurek, 2011).
So I went back to the State College of Washington and there I was influenced, I would say, by the embryology teacher, who was a very strong personality in terms of academic research, he tried to encourage his students. Then I went to the University of Chicago and there was a big shock to learn all the new kinds of things that they were teaching there, in organic chemistry and that sort of stuff, and very attractive concepts, and things began to come together in my mind as to how chemistry worked and how I might be able to exploit some of the early kinds of techniques that were being used in organic chemistry into biochemistry, which was something I was attracted to, due to my reading of the Journal of Biological Chemistry . So at that point I signed up, there was a big gymnasium, and people were signing people up for which major you were going to go into. So I said OK, I’ll be a biochemist.
Traditional strong authentication methods like two-factor authentication built on top of passwords does nothing to address the liability and risk of the insecure password layer, while their shared secret architecture (. OTP) is cryptographically inferior, vulnerable to many attack vectors, and creates a cumbersome experience that users dislike and often avoid. Furthermore, both passwords and the strong authentication built on top of them are incompatible with many of the devices and remote ‘things’ that will require user authentication in the future, but lack the requisite input mechanisms like keyboards and forms to use them.