Home Biology The similarities between bacterial genomes and computer code

The similarities between bacterial genomes and computer code

Modelling of Linux package dependencies shows a striking similarity with the evolutionary characteristics of bacterial genomes.

Computational biologist Sergei Maslov of Brookhaven National Laboratory worked with graduate student Tin Yau Pang from Stony Brook University to compare the frequency with which components "survive" in two complex systems: bacterial genomes and operating systems on Linux computers.  Darwin's "survival of the fittest" seems aptly to describe both systems.

Combining the data of the DOE's Systems Biology Knowledgebase and the results of the Linux package popularity contest (popcon), Maslov and Pang attempted to determine not only why it is that some genes (or computer packages) are very common, while others are not; but also how many components in a system are critical to its survival.

"If a bacteria genome doesn't have a particular gene, it will be dead on arrival," Maslov said. "How many of those genes are there? The same goes for large software systems. They have multiple components that work together and the systems require just the right components working together to thrive."


Sergei Maslov. Credit: Brookhaven National Laboratory

The overall finding has a certain universality to it.  "It is almost expected that the frequency of usage of any component is correlated with how many other components depend on it," said Maslov. "But we found that we can determine the number of crucial components - those without which other components couldn't function - by a simple calculation that holds true both in biological systems and computer systems."

Simply put, taking the square root of the number of interdependent components will give the number of key components that are so fundamentally important that nothing can exist without them.

Both bacteria and the Linux environment are examples open access systems with independently installed components.  "Bacteria are the ultimate BitTorrents of biology," said Maslov.  "They have this enormous common pool of genes that they are freely sharing with each other. Bacterial systems can easily add or remove genes from their genomes through what's called horizontal gene transfer, a kind of file sharing between bacteria," he added.

Of course this theory cannot hold true for a Windows operating system, for it is composed only of proprietary components.

The abstract of Maslov and Pang's paper is here (the full paper is behind a paywall).  Additional supporting information is here.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.



Popular News