The largest database of trusted experimental protocols

8 protocols using shrna2

1

Targeted Knockdown of Key Neuroprotective Proteins

Check if the same lab product or an alternative is used in the 5 most similar protocols
pLKO vectors expressing shRNAs targeting the mRNA sequences of human NMNAT2 (shRNA1: TRCN0000035439, shRNA2: TRCN0000035440), NMNAT1 (TRCN0000111436), PARP16 (shRNA1: TRCN0000433598, shRNA2: TRCN0000053169), and control shRNA (SHC002) were purchased from Sigma.
Dox-inducible shRNA knockdown of NMNAT2 in SH-SY5Y cells were described previously (Ryu et al., 2018 ). The pTRIPZ vectors encoding shRNAs targeting human NMNAT2 were purchased from Dharmacon (shRNA1: V3THS400730, shRNA2: V3THS_400733) and the control pTRIPZ vector was used as described previously (Ryu et al., 2018 ). The pTRIPZ vector encoding shRNAs targeting human RPL24 was purchased from Horizon Discovery (RHS4696-200748120).
+ Open protocol
+ Expand
2

Modulating CYTL1 Expression in hMSCs

Check if the same lab product or an alternative is used in the 5 most similar protocols
The adenovirus bearing human CYTL1 (Ad-CYTL1) was purchased from Vector Biolabs. Empty virus was used as a control (Ad-C). hMSCs were infected with the relevant adenovirus at an MOI of 400 for 2 h and then incubated for an additional 36 h or 14 days, as indicated. Two different lentiviruses bearing shRNAs (shRNA1 and shRNA2) were purchased from Sigma. The sequences of these shRNAs and the control (non-mammalian) shRNA are presented in Table S1. hMSCs were infected with 25 MOI of lentivirus, and infected cells were selected by incubation with puromycin (4 μg/ml) for 4 days. The level of CYTL1 in hMSCs was also down-regulated by transfection of a mixture of three different siRNAs specific for human CYTL1, as presented in Supplementary Table S1. reCYTL1 (Abcam) was added to the osteogenic medium, and the medium was replaced every 3 days.
+ Open protocol
+ Expand
3

Knockdown of EphrinB2 in Ocy454 Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
Two shRNA constructs were used to knock down EphrinB2: shRNA 1 (5′-CGG-GTG-TTA-CAG-TAG-CCT-TAT-3′) and shRNA 2 (5′-CAG-ATT-GTG-TAC-ATA-GAG-CAA-T-3′), both obtained from Sigma-Aldrich (St. Louis, MO, USA). shRNA were cloned into the PLKO lentiviral vector6 (link) and infected by retrovirus into undifferentiated Ocy454 cells. Infected cells were selected with puromycin (5 µg/mL) and cultured at permissive temperature (33 °C) before transfer to 37 °C for differentiation. Knockdown was validated by qRT-PCR using multiplex primers, as above.
+ Open protocol
+ Expand
4

Fli1 Knockdown in Macrophages

Check if the same lab product or an alternative is used in the 5 most similar protocols
293T cells were cotransfected with packaging plasmid (psPAX2), envelope plasmid (VSVg) together with a plasmid expressing short hairpin RNA (shRNA) specific for mouse Fli1 (TRCN0000324345, shRNA#1 or TRCN000032413, shRNA#2, Sigma Aldrich) or non-target control shRNA (Sigma Aldrich). We transfected 293T cells in 10-cm dish and harvested the virus-containing culture medium 48 hours after changing the transfection medium to DMEM containing 10% FCS. The collected medium was filtered through 0.45-μm filters. The filtered virus were diluted in DMEM containing 10% FCS and used to infect bone marrow cells after one day of culture. 24 hours after infection, the medium was replaced with fresh macrophage medium containing 5 μg/ml puromycin. After 72 hours of puromycin selection, the macrophages were replated for further experiments.
+ Open protocol
+ Expand
5

Knockdown of CDK2AP1 using shRNAs in hESCs

Check if the same lab product or an alternative is used in the 5 most similar protocols
We have identified two potent shRNAs targeted to CDK2AP1 mRNA. Multiple shRNAs were obtained from commercially available sources (Open Biosystems, PA; Sigma-Aldrich, MO) and screened for their effectiveness. Control scrambled sequences were used similarly. To identify the shRNA clone that produced the strongest knockdown of CDK2AP1, hESCs were transduced with the different shRNA clones using lentiviral vectors and successfully transduced cells were selected by puromycin treatment (1 μg/ml). Following 6 days of selection, antibiotic-resistant colonies were harvested and RNA extracted. QPCR analyses using human CDK2AP1 specific primers were conducted. In our experiments, one shRNA (labeled as shRNA1 henceforth) (Open Biosystems, PA) produced the strongest knockdown and was used in subsequent experiments. For rescue experiments, validated CDK2AP1 shRNA (labeled as shRNA2 henceforth) (Sigma-Aldrich, MO) that target the 3’-UTR was used. In experiments involving analysis of the role of p53, expression was downregulated using lentiviral delivery of p53-specific shRNA (Addgene, MA, USA), followed by validation of knockdown by qPCR analyses.
+ Open protocol
+ Expand
6

Conditional PD-L1 Knockdown in CT26 Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
Five PD-L1-specific shRNA (shRNA1, shRNA2, shRNA3, shRNA4, shRNA5) and a scrambled control (Table 1) from Sigma (St Louis, USA) was cloned into a Tet-pLKO-puro backbone purchased from Addgene (Cambridge, UK) respectively. The plasmids were mixed with XhoI (Thermo Fisher Scientific, Massachusetts, USA) at 37°C for 15 min. Cleaved DNA fragments were separated on 2% agarose gels to identify successful cloning. These verified plasmids were transfected into packaging cells and then virus-containing medium supernatants were used to infect CT26.WT tumor cells using polybrene methodology. For conditional knockdown, stable cell lines were generated after screening with 8 μg/mL puro for three weeks. The expanded surviving cells were treated with 200 ng/mL Dox and 100 ng/mL IFN-γ for 48 h. The efficiency of PD-L1 knockdown was detected by western blot.
+ Open protocol
+ Expand
7

Genetic Manipulation of Spliceosome Components in mESCs

Check if the same lab product or an alternative is used in the 5 most similar protocols
shRNAs targeting Eftud2 (shRNA1 – Sigma Aldrich, #TRCN0000294567, shRNA2 – Sigma Aldrich, #TRCN0000306704), Sf3b4 (Sigma Aldrich, #TRCN0000379192), Txnl4a (Sigma Aldrich, #TRCN0000123687), Prpf8 (Sigma Aldrich, #TRCN0000109106) or non-targeting (nt-) shRNA (Addgene, 30323) were transfected with lentiviral envelope and packaging plasmids (Addgene, psPAX2 12260, pMD2.G 12259) into HEK293FT cells using Lipofectamine 2000 (Thermo Fisher Scientific, #11668027). Virus-containing medium from HEK293FT cells was collected and used to infect mESCs on two subsequent days. Each day mESCs were incubated in a mix of virus-containing and standard mESC medium (1:1) for 4 hours before changing the medium to standard mESC medium alone. Cells were then washed with cold PBS and collected for analyses.
+ Open protocol
+ Expand
8

Lentiviral-mediated POT1 Knockdown in HL-60 Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
For lentivirus production, 15 × 106 HEK293T cells were seeded on 15 cm dishes and transfected with VSV-G, pCMVdr8.2dvpr and shRNA plasmids containing specific POT1 knockdown sequences or non-coding shRNA. The transfection was performed using Lipofectamine 2000 according to the manufacturer’s instructions. The following plasmids were obtained from Sigma-Aldrich, St. Louis, Missouri: control (SHC016), shRNA1 (TRCN0000039804; predicted knockdown level, 0.56), shRNA2 (TRCN0000010352; predicted knockdown level, 0.92). The plasmids were amplified in maxi cultures and POT1 WT/Q199* DNA was purified using a NucleoBond® Xtra Maxi EF kit (Qiagen).
HL-60 cells were transduced via spinfection on Retronectin (TakaraBio, Saint-Germain-en-Laye, France) coated 6-well plates. The successfully transduced HL-60 cells were selected with 1 µg/mL puromycin (Invitrogen), which was reduced to 0.5 µg/mL after 1 week. Knockdown of POT1 in HL-60 cells was quantified by qRT-PCR using POT1 TaqMan assays (Hs01565611_m1).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!