In Western Africa, Ebola has already killed more than two thousand people, and the Center for Disease Control (CDC) has estimated up to 1.4 million people could contract the deadly virus in the coming months in a worst-case scenario. Despite the growing threat, there is still no therapy that can be distributed at a large-scale. In this time of crisis, CDD wants to make sure that researchers are optimally enabled to discover new drugs to treat and prevent this vicious disease. To this end, CDD is offering the CDD Vault free for a year to any researchers actively engaged in Ebola therapeutic development. CDD Vault’s collaborative tools for organizing and mining structure activity relationships (SAR) will enable drug discovery researchers to work together more easily and efficiently.
CDD strongly believes in the power of collaboration and cheminformatic mining for spurring drug discovery. In fact, a promising antibody therapeutic against Ebola still in development was found via collaboration, and drug repurposing opportunities for Ebola were identified by mining screening data. To learn more about this donation, please contact us at info@collaborativedrug.com.
This blog is authored by members of the CDD Vault community. CDD Vault is a hosted drug discovery informatics platform that securely manages both private and external biological and chemical data. It provides core functionality including chemical registration, structure activity relationship, chemical inventory, and electronic lab notebook capabilities!
CDD Vault: Drug Discovery Informatics your whole project team will embrace!
Tag(s):
CDD Blog
Other posts you might be interested in
View All Posts
CDD Vault Updates
4 min
April 25, 2025
CDD Vault Update (April 2025 #3): AI+ Folding and Docking
Read More
CDD Vault Updates
10 min
April 18, 2025
CDD Vault Update (April 2025 #2): Pharmacokinetic (PK) and Michaelis-Menten Kinetics (Km/Kd) Curve Fit Equations, Donut Charts, TIFF Image Previews, and Parallel Reactions
Read More
CDD Blog
3 min
April 14, 2025
Let’s Talk Security - Why a Bug Bounty May Be More Valuable Than a Penetration Test
Read More