SlideShare a Scribd company logo
Methods for Isolating
       Phytophthora
from Different Substrates
           Kelly Ivors
     Dept. of Plant Pathology
  North Carolina State University
          Fletcher, NC
Asst. Professor  Extension Specialist
MOUNTAIN HORT. CROPS RESEARCH  EXT. CENTER
            (WESTERN) Fletcher, NC

  vegetables, Christmas trees, burley tobacco, ornamentals
Major crops in Western NC




Phytophthora spp.
                     P. nicotianae
      P. capsici




                          P. infestans,
Isolating from foliage, stems and fruit
        using the ‘swipe’ method
Close up of underside of infected leaf
            (P. infestans)
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08
Ivors Fighting Phytophthora 08

More Related Content

Viewers also liked

Matheron Fighting Phytophthora 08
Matheron Fighting Phytophthora 08Matheron Fighting Phytophthora 08
Matheron Fighting Phytophthora 08
Bongsoo Park
 
Kousik Fighting Phytophthora 08
Kousik Fighting Phytophthora 08Kousik Fighting Phytophthora 08
Kousik Fighting Phytophthora 08
Bongsoo Park
 
Abad Fighting Phytophthora 08
Abad Fighting Phytophthora 08Abad Fighting Phytophthora 08
Abad Fighting Phytophthora 08
Bongsoo Park
 
O8 Levesque Pm
O8 Levesque PmO8 Levesque Pm
O8 Levesque Pm
venkatesh.moktali
 
O1 Brasier
O1 BrasierO1 Brasier
O1 Brasier
Bongsoo Park
 
Benson Fighting Phytophthora 08
Benson Fighting Phytophthora 08Benson Fighting Phytophthora 08
Benson Fighting Phytophthora 08
Bongsoo Park
 

Viewers also liked (6)

Matheron Fighting Phytophthora 08
Matheron Fighting Phytophthora 08Matheron Fighting Phytophthora 08
Matheron Fighting Phytophthora 08
 
Kousik Fighting Phytophthora 08
Kousik Fighting Phytophthora 08Kousik Fighting Phytophthora 08
Kousik Fighting Phytophthora 08
 
Abad Fighting Phytophthora 08
Abad Fighting Phytophthora 08Abad Fighting Phytophthora 08
Abad Fighting Phytophthora 08
 
O8 Levesque Pm
O8 Levesque PmO8 Levesque Pm
O8 Levesque Pm
 
O1 Brasier
O1 BrasierO1 Brasier
O1 Brasier
 
Benson Fighting Phytophthora 08
Benson Fighting Phytophthora 08Benson Fighting Phytophthora 08
Benson Fighting Phytophthora 08
 

Similar to Ivors Fighting Phytophthora 08

2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...
2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...
2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...
Ricardo Reyes Chilpa. Instituto de Química. UNAM
 
Unit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.pptUnit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.ppt
Pradnya Wadekar
 
Pests of tenai_Identification,Binomics_Dr.UPR
Pests of tenai_Identification,Binomics_Dr.UPRPests of tenai_Identification,Binomics_Dr.UPR
Pests of tenai_Identification,Binomics_Dr.UPR
PirithiRaju
 
O10 Treena
O10 TreenaO10 Treena
O10 Treena
venkatesh.moktali
 
Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...
Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...
Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...
Journal of Agriculture and Crops
 
2. Borers and defoliators of rice_Dr.UPR.pdf
2. Borers and defoliators of rice_Dr.UPR.pdf2. Borers and defoliators of rice_Dr.UPR.pdf
2. Borers and defoliators of rice_Dr.UPR.pdf
PirithiRaju
 
Isolation and extract of querctin f.pptx
Isolation and extract of querctin f.pptxIsolation and extract of querctin f.pptx
Isolation and extract of querctin f.pptx
AhmedKasem39
 
Herbs as raw materials
Herbs as raw materials Herbs as raw materials
Herbs as raw materials
Prof.(Dr.)Kirtimaya Mishra
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 

Similar to Ivors Fighting Phytophthora 08 (9)

2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...
2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...
2002. influence of leaf, fruit and seed powders and extracts pithecellobium d...
 
Unit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.pptUnit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.ppt
 
Pests of tenai_Identification,Binomics_Dr.UPR
Pests of tenai_Identification,Binomics_Dr.UPRPests of tenai_Identification,Binomics_Dr.UPR
Pests of tenai_Identification,Binomics_Dr.UPR
 
O10 Treena
O10 TreenaO10 Treena
O10 Treena
 
Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...
Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...
Phytochemical and Physicochemical Properties of Leaf, Stem and Flowers of Luf...
 
2. Borers and defoliators of rice_Dr.UPR.pdf
2. Borers and defoliators of rice_Dr.UPR.pdf2. Borers and defoliators of rice_Dr.UPR.pdf
2. Borers and defoliators of rice_Dr.UPR.pdf
 
Isolation and extract of querctin f.pptx
Isolation and extract of querctin f.pptxIsolation and extract of querctin f.pptx
Isolation and extract of querctin f.pptx
 
Herbs as raw materials
Herbs as raw materials Herbs as raw materials
Herbs as raw materials
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 

More from Bongsoo Park

Fungal genomicsbongsoo final
Fungal genomicsbongsoo finalFungal genomicsbongsoo final
Fungal genomicsbongsoo final
Bongsoo Park
 
Ph.D. Candidate Exam Slides
Ph.D. Candidate Exam SlidesPh.D. Candidate Exam Slides
Ph.D. Candidate Exam Slides
Bongsoo Park
 
2010 Spring, Bioinformatics II Presentation
2010 Spring, Bioinformatics II Presentation2010 Spring, Bioinformatics II Presentation
2010 Spring, Bioinformatics II Presentation
Bongsoo Park
 
Colloquium Presentation 2010 Bongsoo
Colloquium Presentation 2010 BongsooColloquium Presentation 2010 Bongsoo
Colloquium Presentation 2010 Bongsoo
Bongsoo Park
 
BG Journal Club 2010
BG Journal Club 2010BG Journal Club 2010
BG Journal Club 2010
Bongsoo Park
 
Colloquium Presentation 2009 Fall Bongsoo
Colloquium Presentation 2009 Fall BongsooColloquium Presentation 2009 Fall Bongsoo
Colloquium Presentation 2009 Fall Bongsoo
Bongsoo Park
 
BG Journal Club
BG Journal ClubBG Journal Club
BG Journal Club
Bongsoo Park
 
Plant Pathology Seminar
Plant Pathology SeminarPlant Pathology Seminar
Plant Pathology Seminar
Bongsoo Park
 
O9 Beever Pal
O9 Beever PalO9 Beever Pal
O9 Beever Pal
Bongsoo Park
 
O32 Coffey
O32 CoffeyO32 Coffey
O32 Coffey
Bongsoo Park
 
O31 De Cock
O31 De CockO31 De Cock
O31 De Cock
Bongsoo Park
 
O30 Abad
O30 AbadO30 Abad
O30 Abad
Bongsoo Park
 
O29 Bonants
O29 BonantsO29 Bonants
O29 Bonants
Bongsoo Park
 
O28 Riedel
O28 RiedelO28 Riedel
O28 Riedel
Bongsoo Park
 
O27 Martin
O27 MartinO27 Martin
O27 Martin
Bongsoo Park
 
O26 Webber
O26 WebberO26 Webber
O26 Webber
Bongsoo Park
 
O25 Scott
O25 ScottO25 Scott
O25 Scott
Bongsoo Park
 
O24 Palmucci
O24 PalmucciO24 Palmucci
O24 Palmucci
Bongsoo Park
 
O23 Nechwatal
O23 NechwatalO23 Nechwatal
O23 Nechwatal
Bongsoo Park
 
O22 Moralejo
O22 MoralejoO22 Moralejo
O22 Moralejo
Bongsoo Park
 

More from Bongsoo Park (20)

Fungal genomicsbongsoo final
Fungal genomicsbongsoo finalFungal genomicsbongsoo final
Fungal genomicsbongsoo final
 
Ph.D. Candidate Exam Slides
Ph.D. Candidate Exam SlidesPh.D. Candidate Exam Slides
Ph.D. Candidate Exam Slides
 
2010 Spring, Bioinformatics II Presentation
2010 Spring, Bioinformatics II Presentation2010 Spring, Bioinformatics II Presentation
2010 Spring, Bioinformatics II Presentation
 
Colloquium Presentation 2010 Bongsoo
Colloquium Presentation 2010 BongsooColloquium Presentation 2010 Bongsoo
Colloquium Presentation 2010 Bongsoo
 
BG Journal Club 2010
BG Journal Club 2010BG Journal Club 2010
BG Journal Club 2010
 
Colloquium Presentation 2009 Fall Bongsoo
Colloquium Presentation 2009 Fall BongsooColloquium Presentation 2009 Fall Bongsoo
Colloquium Presentation 2009 Fall Bongsoo
 
BG Journal Club
BG Journal ClubBG Journal Club
BG Journal Club
 
Plant Pathology Seminar
Plant Pathology SeminarPlant Pathology Seminar
Plant Pathology Seminar
 
O9 Beever Pal
O9 Beever PalO9 Beever Pal
O9 Beever Pal
 
O32 Coffey
O32 CoffeyO32 Coffey
O32 Coffey
 
O31 De Cock
O31 De CockO31 De Cock
O31 De Cock
 
O30 Abad
O30 AbadO30 Abad
O30 Abad
 
O29 Bonants
O29 BonantsO29 Bonants
O29 Bonants
 
O28 Riedel
O28 RiedelO28 Riedel
O28 Riedel
 
O27 Martin
O27 MartinO27 Martin
O27 Martin
 
O26 Webber
O26 WebberO26 Webber
O26 Webber
 
O25 Scott
O25 ScottO25 Scott
O25 Scott
 
O24 Palmucci
O24 PalmucciO24 Palmucci
O24 Palmucci
 
O23 Nechwatal
O23 NechwatalO23 Nechwatal
O23 Nechwatal
 
O22 Moralejo
O22 MoralejoO22 Moralejo
O22 Moralejo
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Ivors Fighting Phytophthora 08

  • 1. Methods for Isolating Phytophthora from Different Substrates Kelly Ivors Dept. of Plant Pathology North Carolina State University Fletcher, NC
  • 2. Asst. Professor Extension Specialist MOUNTAIN HORT. CROPS RESEARCH EXT. CENTER (WESTERN) Fletcher, NC vegetables, Christmas trees, burley tobacco, ornamentals
  • 3. Major crops in Western NC Phytophthora spp. P. nicotianae P. capsici P. infestans,
  • 4. Isolating from foliage, stems and fruit using the ‘swipe’ method
  • 5. Close up of underside of infected leaf (P. infestans)