Introduction: Solid cancers Myeloid cells are prevalent in solid cancers, but they frequently exhibit an anti-inflammatory pro-tumor phenotype that contribute to the immunosuppressive tumor microenvironment (TME), which hinders the effectiveness of cancer immunotherapies. Myeloid cells' natural ability of tumor trafficking makes engineered myeloid cell therapy an intriguing approach to tackle the challenges posed by solid cancers, including tumor infiltration, tumor cell heterogenicity and the immunosuppressive TME. One such engineering approach is to target the checkpoint molecule PD-L1, which is often upregulated by solid cancers to evade immune responses.
View Article and Find Full Text PDFInflammation is an integral part of autoimmune diseases, which are caused by dysregulation of the immune system. This dysregulation involves an imbalance between pro-inflammatory versus anti-inflammatory mediators. These mediators include various cytokines and chemokines; defined subsets of T helper/T regulatory cells, M1/M2 macrophages, activating/tolerogenic dendritic cells, and antibody-producing/regulatory B cells.
View Article and Find Full Text PDFAdoptive cellular therapies are making major strides in the treatment of cancer, both for hematologic and solid tumors. These cellular products include chimeric antigen receptor T cells and T-cell receptor-modified T cells, tumor-infiltrating lymphocytes, marrow-infiltrating T cells, natural killer cells as well as macrophage-based therapeutics. Advancement in genomics, computational biology, immunology, and cell therapy manufacturing has facilitated advancement of adoptive T cell therapies into the clinic, whereas clinical efficacy has driven Food and Drug Administration approvals.
View Article and Find Full Text PDFThe prevailing conditions surrounding the COVID-19 pandemic has shifted a variety of everyday activities onto platforms on the Internet. This has led to an increase in the number of people present on these platforms and also led to jump in the time spent by existing participants online. This increase in the presence of people on the Internet is almost never preceded by education about cyber-security and the various types of attacks that an everyday User of the Internet may be subjected to.
View Article and Find Full Text PDF