Scaligner After many new functionalities have been added over the last years, Scaligner’s source code is reviewed in depth to provide a consistent and more user friendly display of the information. A new option has been added prevent fixing automatically frameshifts during the processing of sequences. When fixes are allowed (behavior until 3.23), some nucleotides […]
Blog
IMGT CDR rearrangement
When a sequence is quite dissimilar from any germline, the alignment algorithm tends to add gaps here and there to increase similarity with the choosen germline. From 3.24, a post-alignment procedure enables aminoacid rearrangement to make the CDR look like an IMGT CDR, even when the alignment has created gaps in the CDR. This procedure […]
Network outage
The redundant network connection has been interrupted at the primary datacenter around 10 minutes around 15:15 today. All the services are now up.
Release 3.23 – 4 Feb 2020
Scaligner (NGS) New module to analyze and visualize NGS data based on clonotype analysis The NGS module can analyze millions of antibody sequences from several animals Sequences are processed by Scaligner using a procedure similar to the one described by Trinklein et al (in section “Variable region amplification, sequencing, and clonotype analysis”). Clonotypes are stored […]
Server update – OpenSSL 1.1.1d
LTS for OpenSSL 1.0.2 ended on the 31st of December 2019 Added support for TLS 1.3
Release strategy
The versioning scheme uses the format: MAJOR.MINOR.PATCH MAJOR: API incompatible changes will increase this number. Changes that expect the database to be at a minimum version will also increase this number. MINOR: addition of new large features or important modification of existing features will change this number. Features impacted by the changes are always QCed […]
Zombie POODLE and GOLDENDOODLE vulnerabilities
Early 2019 new vulnerabilities like Zombie POODLE, GOLDENDOODLE, 0-Length OpenSSL and Sleeping POODLE were published for websites that use CBC (Cipher Block Chaining) block cipher modes. These vulnerabilities are applicable only if the server uses TLS 1.2 or TLS 1.1 or TLS 1.0 with CBC cipher modes. SSL Labs discourages the use of CBC-based cipher […]